Is the US adopting the gray zone cyber playbook?
12
Jan
2026

Is the US adopting the gray zone cyber playbook?

When President Trump referenced America’s ability to “darken” parts of Caracas during Operation Absolute Resolve, the comment stood out not…

Critical React Router Vulnerability Let Attackers Access or Modify Server Files
12
Jan
2026

Critical React Router Vulnerability Let Attackers Access or Modify Server Files

Security researchers have identified critical vulnerabilities in React Router that allow attackers to access or modify server files via directory…

Critical Apache Struts 2 Flaw Could Let Attackers Steal Sensitive Data
12
Jan
2026

Critical Apache Struts 2 Flaw Could Let Attackers Steal Sensitive Data

A newly disclosed vulnerability in Apache Struts 2’s XWork component could expose sensitive data and open the door to denial‑of‑service…

Cyber fraud network behind €5,93 million in losses dismantled in Spain
12
Jan
2026

Cyber fraud network behind €5,93 million in losses dismantled in Spain

The Spanish National Police (Policía Nacional), working closely with the Bavarian State Criminal Police Office (Bayerisches Landeskriminalamt) and with support…

Anthropic Launches Claude AI for Healthcare with Secure Health Record Access
12
Jan
2026

Anthropic Launches Claude AI for Healthcare with Secure Health Record Access

Jan 12, 2026Ravie LakshmananArtificial Intelligence / Healthcare Anthropic has become the latest Artificial intelligence (AI) company to announce a new…

Intersec Dubai highlights why AI has become critical in the race against cyber attackers
12
Jan
2026

Intersec Dubai highlights why AI has become critical in the race against cyber attackers

At Intersec Dubai, one of the world’s largest gatherings for security, safety and fire protection, the conversation around cyber security…

Credential-harvesting attacks by APT28 hit Turkish, European, and Central Asian organizations
12
Jan
2026

Credential-harvesting attacks by APT28 hit Turkish, European, and Central Asian organizations

Credential-harvesting attacks by APT28 hit Turkish, European, and Central Asian organizations Pierluigi Paganini January 12, 2026 Russia-linked cyberespionage group APT28…

How to stop insider-driven data loss in browser sessions
12
Jan
2026

How to stop insider-driven data loss in browser sessions

Not all data security risks involving the web browser come from external adversaries. A large portion comes from well-meaning employees…

Critical Zlib Vulnerability Let Attackers Trigger Buffer Overflow by Invoking untgz
12
Jan
2026

Critical Zlib Vulnerability Let Attackers Trigger Buffer Overflow by Invoking untgz

A severe global buffer overflow vulnerability has been discovered in the zlib untgz utility version 1.3.1.2. Allowing attackers to corrupt…

Cybercriminal Crypto Transactions Surge to 2025 High
12
Jan
2026

Cybercriminal Crypto Transactions Surge to 2025 High

Illicit cryptocurrency transactions reached unprecedented levels in 2025 as nation-states weaponized digital assets to evade sanctions, transforming the cybercrime landscape…

Debian 13.3 is now available with targeted corrections, updates
12
Jan
2026

Debian 13.3 is now available with targeted corrections, updates

Debian 13.3 is the third maintenance update for the stable Debian 13 distribution, codenamed “trixie”. It updates package content to…

Auditing, classifying and building a data sovereignty strategy
12
Jan
2026

Auditing, classifying and building a data sovereignty strategy

Data sovereignty is a hot topic. For commercial and public sector organisations, compliance to ensure personal data is secure is…