Critical n8n Vulnerability Allows Authenticated Remote Code Execution
08
Jan
2026

Critical n8n Vulnerability Allows Authenticated Remote Code Execution

A critical security vulnerability has been discovered in n8n, the popular workflow automation tool, potentially allowing authenticated attackers to execute…

report-ad-banner
07
Jan
2026

Infostealers And Lack Of MFA Led To Dozens Of Major Breaches

Infostealer infections compounded by a lack of multi-factor authentication (MFA) have resulted in dozens of breaches at major global companies…

China asks tech firms to halt orders for Nvidia's H200 chips
07
Jan
2026

China asks tech firms to halt orders for Nvidia’s H200 chips

Beijing has asked some Chinese tech companies to ​halt orders ⁠for Nvidia’s H200 chips this week, and is expected to…

Hackers Using Malicious QR Codes for Phishing via HTML Table
07
Jan
2026

Hackers Using Malicious QR Codes for Phishing via HTML Table

Threat actors are continuing to refine “quishing” phishing delivered through QR codes by shifting from traditional image-based payloads to “imageless”…

Gov quietly launches onshore instance of GPT-4o for APS
07
Jan
2026

DTA warns against permanent bans of IT services firms

The Digital Transformation Agency has warned against “permanent” bans of IT suppliers and services firms for “unethical conduct”, in part…

Is Your Company Selling Or Storytelling?
07
Jan
2026

Is Your Company Selling Or Storytelling?

07 Jan Cybersecurity CEO: Is Your Company Selling Or Storytelling? Posted at 14:10h in Blogs by Taylor Fox Lessons learned…

AI Hacker
07
Jan
2026

Threat Intel on Vibe Hacking & HackGPT

Right now, across dark web forums, Telegram channels, and underground marketplaces, hackers are talking about artificial intelligence – but not…

Chinese Hackers Deploy NFC-enabled Android Malware to Steal Payment Data
07
Jan
2026

Chinese Hackers Deploy NFC-enabled Android Malware to Steal Payment Data

Chinese threat actors have launched a sophisticated campaign using NFC-enabled Android malware called Ghost Tap to intercept and steal financial…

Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches
07
Jan
2026

Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches

Jan 07, 2026Ravie LakshmananCybercrime / Software Security A cybercrime gang known as Black Cat has been attributed to a search…

Logitech Options+, G HUB macOS apps break after certificate expires
07
Jan
2026

Logitech Options+, G HUB macOS apps break after certificate expires

Logitech’s Options+ and G Hub apps on macOS stopped working after their code-signing certificate expired, leaving users unable to launch…

Hackers Using Malicious Imageless QR Codes to Render Phishing Attack Via HTML Table
07
Jan
2026

Hackers Using Malicious Imageless QR Codes to Render Phishing Attack Via HTML Table

A recent phishing campaign is abusing QR codes in a new way, turning simple HTML tables into working codes that…

Max severity Ni8mare flaw lets hackers hijack n8n servers
07
Jan
2026

Max severity Ni8mare flaw lets hackers hijack n8n servers

A maximum severity vulnerability dubbed “Ni8mare” allows remote, unauthenticated attackers to take control over locally deployed instances of the N8N workflow automation…