What Every Company Needs To Know About Cybersecurity In 2026
27
Jan
2026

RSAC 2026—Where The World Talks Security

For 35 years, RSAC has been a driving force behind the world’s cybersecurity community. The power of community is a…

UK government’s National Data Library works up steam
27
Jan
2026

UK government’s National Data Library works up steam

The UK government’s Department for Science, Innovation and Technology (DSIT) has completed what it calls the “discovery phase” of its…

Shadowserver finds 6,000+ likely vulnerable SmarterMail servers exposed online
27
Jan
2026

Shadowserver finds 6,000+ likely vulnerable SmarterMail servers exposed online

Shadowserver finds 6,000+ likely vulnerable SmarterMail servers exposed online Pierluigi Paganini January 27, 2026 Shadowserver researchers found 6,000+ SmarterMail servers…

Hackers Using Teams to Deliver Malicious Content Posing as Microsoft Services
27
Jan
2026

Hackers Using Teams to Deliver Malicious Content Posing as Microsoft Services

A sophisticated phishing campaign has been identified in which threat actors are abusing legitimate Microsoft Teams functionality to distribute malicious…

CISA Urges Public to Stay Alert Against Rising Natural Disaster Scams
27
Jan
2026

CISA Urges Public to Stay Alert Against Rising Natural Disaster Scams

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical advisory alerting the public to heightened risks of malicious…

Tenable One AI Exposure delivers unified visibility and governance across AI, cloud and SaaS
27
Jan
2026

Tenable One AI Exposure delivers unified visibility and governance across AI, cloud and SaaS

Tenable announced general availability of Tenable One AI Exposure. With this release, the Tenable One Exposure Management Platform unifies AI…

Post Office scandal inquiry to publish first findings this summer
27
Jan
2026

Peer demands independent investigation into DWP’s prosecution of subpostmasters

The government should commit to a thorough independent investigation of the prosecutions of subpostmasters by the Department of Work and…

U.S. CISA adds Prettier eslint-config-prettier, Vite Vitejs, Versa Concerto SD-WAN orchestration platform and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog
27
Jan
2026

U.S. CISA adds Microsoft Office, GNU InetUtils, SmarterTools SmarterMail, and Linux Kernel flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Microsoft Office, GNU InetUtils, SmarterTools SmarterMail, and Linux Kernel flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini…

LevelBlue acquires Fortra’s Alert Logic managed services to scale its MDR
27
Jan
2026

LevelBlue acquires Fortra’s Alert Logic managed services to scale its MDR

LevelBlue, a Dallas-based managed security services provider, announced Tuesday that it is expanding its managed detection and response business through…

Flare
27
Jan
2026

The psychology behind modern ransomware extortion

For years, security teams treated ransomware as a technological problem. Security teams hardened backup systems, deployed endpoint detection, practiced incident…

Hackers are Leveraging SEO Poisoning to Attack Users Looking for Legitimate Tools
27
Jan
2026

Hackers are Leveraging SEO Poisoning to Attack Users Looking for Legitimate Tools

Cybercriminals have adopted a deceptive strategy to compromise users searching for common software applications online. These attackers are using search…

G_Wagon NPM Package Exploits Users to Steal Browser Credentials with Obfuscated Payload
27
Jan
2026

G_Wagon NPM Package Exploits Users to Steal Browser Credentials with Obfuscated Payload

A highly sophisticated infostealer malware disguised as a legitimate npm UI component library has been targeting developers through the ansi-universal-ui…