Ransomware IAB abuses EDR for stealthy malware execution
18
Jan
2026

Malicious GhostPoster browser extensions found with 840,000 installs

Another set of 17 malicious extensions linked to the GhostPoster campaign has been discovered in Chrome, Firefox, and Edge stores, where…

Login prompt
18
Jan
2026

Credential-stealing Chrome extensions target enterprise HR platforms

Malicious Chrome extensions on the Chrome Web Store masquerading as productivity and security tools for enterprise HR and ERP platforms…

Malicious extensions in Chrome Web store steal user credentials
18
Jan
2026

Google Chrome now lets you turn off on-device AI model powering scam detection

Google Chrome now lets you delete the local AI models that power the “Enhanced Protection” feature, which was upgraded with…

Ukraine–Germany operation targets Black Basta, Russian leader wanted
17
Jan
2026

Ukraine–Germany operation targets Black Basta, Russian leader wanted

Ukraine–Germany operation targets Black Basta, Russian leader wanted Pierluigi Paganini January 17, 2026 Police in Ukraine and Germany identified Black…

Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
17
Jan
2026

Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice

Ravie LakshmananJan 17, 2026Law Enforcement / Cybercrime Ukrainian and German law enforcement authorities have identified two Ukrainians suspected of working…

Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
17
Jan
2026

Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available

Let’s Encrypt, a key provider of free TLS certificates, has rolled out short-lived and IP address-based certificates for general use….

Australia’s spy chief warns of China-linked threats to critical infrastructure
17
Jan
2026

China-linked APT UAT-8837 targets North American critical infrastructure

China-linked APT UAT-8837 targets North American critical infrastructure Pierluigi Paganini January 17, 2026 Cisco Talos says a China-linked group, tracked…

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself
17
Jan
2026

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

The business social networking site is a vast, publicly accessible database of corporate information. Don’t believe everyone on the site…

Google Vertex AI Flaw Lets Low-Privilege Users Escalate to Service Agent Roles
17
Jan
2026

Google Vertex AI Flaw Lets Low-Privilege Users Escalate to Service Agent Roles

Security researchers have discovered critical privilege escalation vulnerabilities in Google’s Vertex AI platform that allow attackers with minimal permissions to…

Google’s Vertex AI Vulnerability Enables Low-Privileged Users to Gain Service Agent Roles
17
Jan
2026

Google’s Vertex AI Vulnerability Enables Low-Privileged Users to Gain Service Agent Roles

Google’s Vertex AI contains default configurations that allow low-privileged users to escalate privileges by hijacking Service Agent roles. XM Cyber…

Python-powered Toolkit for Information Gathering and reconnaissance
17
Jan
2026

Python-powered Toolkit for Information Gathering and reconnaissance

Argus is a comprehensive Python-based toolkit designed for reconnaissance tasks in cybersecurity. The developers recently released version 2.0, expanding it…

US Hackers Reportedly Caused a Blackout in Venezuela
17
Jan
2026

US Hackers Reportedly Caused a Blackout in Venezuela

Now The New York Times has cited unnamed US officials confirming that the blackout was in fact caused by a…