HPE Aruba Vulnerabilities Enables Unauthorized Access to Sensitive Information
15
Jan
2026

HPE Aruba Vulnerabilities Enables Unauthorized Access to Sensitive Information

Hewlett Packard Enterprise (HPE) has disclosed four high-severity vulnerabilities in its Aruba Networking Instant On devices that could allow attackers…

RedVDS Cybercrime Infrastructure
15
Jan
2026

Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud

Microsoft on Wednesday announced that it has taken a “coordinated legal action” in the U.S. and the U.K. to disrupt…

Lumen disrupts AISURU and Kimwolf botnet by blocking over 550 C2 servers
15
Jan
2026

Lumen disrupts AISURU and Kimwolf botnet by blocking over 550 C2 servers

Lumen disrupts AISURU and Kimwolf botnet by blocking over 550 C2 servers Pierluigi Paganini January 15, 2026 Lumen’s Black Lotus…

Product comparison: Detectify vs. Acunetix
15
Jan
2026

Product comparison: Detectify vs. Acunetix

The section below summarize the key pros and cons of Acunetix vs Detectify to help AppSec teams quickly evaluate which…

Is it time for internet services to adopt identity verification?
15
Jan
2026

Is it time for internet services to adopt identity verification?

Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters. 14 Jan…

JumpCloud introduces AI features to govern shadow AI and autonomous agents
15
Jan
2026

JumpCloud introduces AI features to govern shadow AI and autonomous agents

JumpCloud is unveiling new AI capabilities to fuel safe innovation. Organizations can leverage JumpCloud’s platform to accelerate AI adoption. They…

Palo Alto Networks
15
Jan
2026

Palo Alto Networks warns of DoS bug letting hackers disable firewalls

Palo Alto Networks patched a high-severity vulnerability that could allow unauthenticated attackers to disable firewall protections in denial-of-service (DoS) attacks….

The NSA lays out the first steps for zero trust adoption
15
Jan
2026

The NSA lays out the first steps for zero trust adoption

Security pros often say that zero trust sounds straightforward until they try to apply it across real systems, real users,…

China bans U.S. and Israeli cybersecurity software over security concerns
15
Jan
2026

China bans U.S. and Israeli cybersecurity software over security concerns

China bans U.S. and Israeli cybersecurity software over security concerns Pierluigi Paganini January 15, 2026 China has told domestic firms…

Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses
15
Jan
2026

Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses

Microsoft has announced a coordinated legal action in the United States and the United Kingdom to disrupt RedVDS, a global…

Vic Education database breached via school's network
15
Jan
2026

Vic Education database breached via school’s network

All Victorian government schools and their students are impacted by the breach of a Department of Education database that has…

Microsoft
15
Jan
2026

Microsoft disrupts massive RedVDS cybercrime virtual desktop service

Microsoft announced on Wednesday that it disrupted RedVDS, a massive cybercrime platform linked to at least $40 million in reported…