In a sophisticated supply chain phishing attack, threat actors hijacked an ongoing email thread among C-suite executives discussing a document…
A critical vulnerability in IDIS Cloud Manager (ICM) Viewer exposes organizations using IDIS IP cameras to one-click remote code execution…
In a huge blow to the global cybercrime underground, US federal authorities have seized the clearnet and dark web domains…
Ravie LakshmananJan 28, 2026Critical Infrastructure / Threat Intelligence The “coordinated” cyber attack targeting multiple sites across the Polish power grid…
As we move into 2026, some clear trends will crystallise in the UK tech recruitment and talent market. The seeds…
About six of every 10 corporate employees are willing to use shadow AI tools if it helps them meet work…
A critical zero‑day vulnerability in Gemini MCP Tool exposes users to remote code execution (RCE) attacks without any authentication. Tracked…
A Vietnamese threat actor is using AI-authored code to power a phishing campaign that delivers the PureRAT malware and related…
In a huge blow to the global cybercrime underground, US federal authorities have seized the clearnet and dark web domains…
The UK government is working with industry and teachers to develop an artificial intelligence (AI) tutoring tool to give more…
Fortinet patches actively exploited FortiOS SSO auth bypass (CVE-2026-24858) Pierluigi Paganini January 28, 2026 Fortinet released fixes for a critical…
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief:…