Post Office Capture and Ecco+ users asked to make contact with Scottish statutory body
30
Jan
2026

History repeats itself in Post Office Capture redress scheme with low-ball offers made

Subpostmasters who suffered at the hands of errors in the Post Office’s Capture software, like Horizon users, are receiving derisory…

Cisco sees vulnerability exploitation top phishing in Q4
30
Jan
2026

Cisco sees vulnerability exploitation top phishing in Q4

Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief:…

Attackers Using Hugging Face Hosting to Deliver Android RAT Payload
30
Jan
2026

Attackers Using Hugging Face Hosting to Deliver Android RAT Payload

A new Android threat campaign has emerged that uses social engineering combined with a legitimate machine learning platform to spread…

Hugging Face Repositories Hijacked For Android RAT Delivery, Bypassing Traditional Defenses
30
Jan
2026

Hugging Face Repositories Hijacked For Android RAT Delivery, Bypassing Traditional Defenses

A sophisticated Android RAT campaign that exploits Hugging Face’s popular machine learning platform to host and distribute malicious payloads. Attackers…

Cybersecurity Predictions for 2026
30
Jan
2026

Cybersecurity Predictions for 2026

30 Jan Cybersecurity Predictions for 2026 Posted at 10:57h in Blogs by Taylor Fox Six Predictions for the AI-Driven SOC…

Manufacturers fortify cyber defenses in response to dramatic surge in cyberattacks
30
Jan
2026

Manufacturers fortify cyber defenses in response to dramatic surge in cyberattacks

As U.S. manufacturing firms weather a constant barrage of cyberattacks, the various industries in that sector — which underpin everything…

Image of global data networks
30
Jan
2026

Google’s disruption rips millions out of devices out of malicious network

Millions of devices used as proxies by cybercriminals, espionage groups and data thieves have been removed from circulation following Google’s…

UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS
30
Jan
2026

UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS

A new wave of targeted attacks has emerged against Internet Information Services (IIS) servers across Asia, with threat actors deploying…

Over 200 Magento Stores Compromised in Rootkit Rampage via Zero-Day Exploit
30
Jan
2026

Over 200 Magento Stores Compromised in Rootkit Rampage via Zero-Day Exploit

A dangerous wave of attacks exploiting CVE-2025-54236, dubbed “SessionReaper,” in Magento e-commerce platforms. This vulnerability lets attackers bypass authentication by…

Arsink Spyware Posing as WhatsApp, YouTube, Instagram, TikTok Hits 143 Countries
30
Jan
2026

Arsink Spyware Posing as WhatsApp, YouTube, Instagram, TikTok Hits 143 Countries – Hackread – Cybersecurity News, Data Breaches, AI, and More

Researchers at Zimperium zLabs have identified Arsink, a dangerous Android Trojan that impersonates 50+ popular brands, including WhatsApp and TikTok….

Police Digital Service ex-staffers launch employment tribunal action over mistreatment claims
30
Jan
2026

Police Digital Service future remains uncertain as ‘radical’ Home Office policing reform unveiled

Uncertainty about what the future holds for the Police Digital Service (PDS) continues, despite the UK government confirming the organisation is…

Outlook
30
Jan
2026

Microsoft fixes Outlook bug blocking access to encrypted emails

Microsoft has fixed a known issue that prevented Microsoft 365 customers from opening encrypted emails in classic Outlook after a…