Chinese Hackers Control 18,000 Active Servers Across 48 Hosting Providers
15
Jan
2026

Chinese Hackers Control 18,000 Active Servers Across 48 Hosting Providers

Chinese infrastructure is currently hosting more than 18,000 active command‑and‑control (C2) servers across 48 providers, with activity heavily concentrated on…

AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks
15
Jan
2026

AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks

A critical misconfiguration in Amazon Web Services (AWS) CodeBuild could have allowed complete takeover of the cloud service provider’s own…

ACMA tries to source unfixable Samsung handsets
15
Jan
2026

ACMA tries to source unfixable Samsung handsets

The Australian Communications and Media Authority (ACMA) is trying to source end-of-life Samsung devices that are being blocked from networks…

Hackers Abusing Legitimate Cloud and CDN Platforms to Host Phishing Kits
15
Jan
2026

Hackers Abusing Legitimate Cloud and CDN Platforms to Host Phishing Kits

Threat actors are increasingly using trusted cloud and content delivery network platforms to host phishing kits, creating major detection challenges…

Elon Musk’s Grok ‘Undressing’ Problem Isn’t Fixed
15
Jan
2026

Elon Musk’s Grok ‘Undressing’ Problem Isn’t Fixed

Elon Musk’s X has introduced new restrictions stopping people from editing and generating images of real people in bikinis or…

HPE Aruba Vulnerabilities Enables Unauthorized Access To Sensitive Information
15
Jan
2026

HPE Aruba Vulnerabilities Enables Unauthorized Access To Sensitive Information

HPE has released security patches for multiple high-severity vulnerabilities in HPE Networking Instant On devices that could expose internal VLAN…

Malicious VSCode Marketplace extensions hid trojan in fake PNG file
15
Jan
2026

Microsoft Copilot Studio extension for VS Code now publicly available

Microsoft announced that the Copilot Studio extension for the Visual Studio Code (VS Code) integrated development environment is now available to…

Promptware Kill Chain - Five-Step Kill Chain Model for Analyzing Cyberthreats
15
Jan
2026

Promptware Kill Chain – Five-Step Kill Chain Model for Analyzing Cyberthreats

Large language models have become deeply integrated into everyday business operations, from customer service chatbots to autonomous agents managing calendars,…

Why ICE Can Kill With Impunity
15
Jan
2026

Why ICE Can Kill With Impunity

When Jonathan Ross shot and killed Renee Nicole Good last Wednesday morning in Minneapolis, the 37-year-old mother became one of…

Palo Alto Networks Firewall Vulnerability Allows Attackers To Trigger Denial Of Service
15
Jan
2026

Palo Alto Networks Firewall Vulnerability Allows Attackers To Trigger Denial Of Service

Palo Alto Networks has released security updates to address a high‑severity denial-of-service (DoS) vulnerability in PAN-OS that could allow unauthenticated…

AppGuard Critiques AI Defenses & Expands Insider Release
15
Jan
2026

AppGuard Critiques AI Defenses & Expands Insider Release

McLean, Virginia, United States, January 15th, 2026, CyberNewsWire A new Top 10 Cybersecurity Innovators profile by AppGuard has been released,…

Microsoft and Authorities Dismatles BEC Attack Chain Powered By RedVDS Fraud Engine
15
Jan
2026

Microsoft and Authorities Dismatles BEC Attack Chain Powered By RedVDS Fraud Engine

Microsoft, in collaboration with U.S. and U.K. authorities, has announced a major international operation that dismantled RedVDS, a cybercrime‑as‑a‑service platform…