SAP Security Patch Day January 2026
13
Jan
2026

SAP Security Patch Day January 2026

SAP released 17 new security notes on January 13, 2026, as part of its monthly Security Patch Day, addressing critical…

Hackers Remotely Took Control of an Apex Legends Player’s Inputs
13
Jan
2026

Hackers Remotely Took Control of an Apex Legends Player’s Inputs

A critical security vulnerability has emerged in Respawn Entertainment’s popular battle royale title, allowing threat actors to remotely manipulate player…

Enterprise security faces a three-front war: cybercrime, AI misuse, and supply chains
13
Jan
2026

Enterprise security faces a three-front war: cybercrime, AI misuse, and supply chains

Security teams are dealing with pressures tied to AI use, geopolitical instability, and expanding cybercrime that reach beyond technical controls,…

CISA Warns of Gogs Path Traversal Vulnerability Exploited in Attacks
13
Jan
2026

CISA Warns of Gogs Path Traversal Vulnerability Exploited in Attacks

A critical warning about a path traversal vulnerability in Gogs, a self-hosted Git service, that is being actively exploited in…

3 Best Android Apps to Help Students to Study Well
13
Jan
2026

3 Best Android Apps to Help Students to Study Well

For college students, it’s always difficult to keep all their lessons and homework well-organized as well as manage their time….

Parrot OS shares its 2026 plans for security tools and platform support
13
Jan
2026

Parrot OS shares its 2026 plans for security tools and platform support

Parrot OS is a Debian-based Linux distribution built for cybersecurity work. Security practitioners use it for penetration testing, digital forensics,…

Unlocking the value of multi-agent systems in 2026
13
Jan
2026

Execs see AI and automation as long-term strategic investments

A number of surveys conducted towards the end of 2025 suggest that IT decision makers and board-level executives see the…

DPRK's Remote Workers Generating $600M Using Identity Theft to Gain Access to Sensitive Systems
13
Jan
2026

DPRK’s Remote Workers Generating $600M Using Identity Theft to Gain Access to Sensitive Systems

The cybersecurity landscape has undergone a fundamental shift in recent years, as the definition of insider threats continues to evolve….

Multiple Hikvision Flaws Allow Device Disruption via Crafted Network Packets
13
Jan
2026

Multiple Hikvision Flaws Allow Device Disruption via Crafted Network Packets

Hikvision has disclosed two high buffer overflow vulnerabilities affecting its security devices that could allow network-based attackers to cause device…

CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution
13
Jan
2026

CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution

Jan 13, 2026Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned of active exploitation…

Hackers Leverage Browser-in-the-browser Tactic to Trick Facebook Users and Steal Logins
13
Jan
2026

Hackers Leverage Browser-in-the-browser Tactic to Trick Facebook Users and Steal Logins

Facebook users are increasingly becoming targets of a sophisticated phishing technique that bypasses conventional security measures. With over three billion…

DPRK Hackers Earn $600M Posing as Remote Workers
13
Jan
2026

DPRK Hackers Earn $600M Posing as Remote Workers

The landscape of corporate espionage has undergone a fundamental transformation. For decades, security teams focused their efforts on identifying disgruntled…