U.S. CISA adds Prettier eslint-config-prettier, Vite Vitejs, Versa Concerto SD-WAN orchestration platform and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog
24
Jan
2026

U.S. CISA adds a flaw in Broadcom VMware vCenter Server to its Known Exploited Vulnerabilities catalog

U.S. CISA adds a flaw in Broadcom VMware vCenter Server to its Known Exploited Vulnerabilities catalog Pierluigi Paganini January 24,…

Sandworm behind cyberattack on Poland’s power grid in late 2025
24
Jan
2026

Sandworm behind cyberattack on Poland’s power grid in late 2025

The attack involved data-wiping malware that ESET researchers have now analyzed and named DynoWiper 23 Jan 2026  •  , 1…

Microsoft Teams to Share your Location With Your Employer Soon Based on Wi-Fi Network
24
Jan
2026

Microsoft Teams to Share your Location With Your Employer Soon Based on Wi-Fi Network

Microsoft is preparing to deploy a significant, potentially controversial update to Microsoft Teams that automatically detects and displays a user’s…

CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog
24
Jan
2026

CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog

Ravie LakshmananJan 24, 2026Vulnerability / Enterprise Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical…

Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents
24
Jan
2026

Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents

AI agents are accelerating how work gets done. They schedule meetings, access data, trigger workflows, write code, and take action…

Microsoft Launches Open-Source WinApp CLI to Streamline Windows App Development
24
Jan
2026

Microsoft Launches Open-Source WinApp CLI to Streamline Windows App Development

Microsoft has unveiled the public preview of WinApp CLI (winapp), a new open-source command-line tool designed to simplify Windows app…

New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector
24
Jan
2026

New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector

Ravie LakshmananJan 24, 2026Malware / Critical Infrastructure The Russian nation-state hacking group known as Sandworm has been attributed to what…

Threat Actors Leverage SharePoint Services in Sophisticated AiTM Phishing Campaign
24
Jan
2026

Threat Actors Leverage SharePoint Services in Sophisticated AiTM Phishing Campaign

Microsoft Defender researchers have exposed a sophisticated adversary-in-the-middle (AiTM) phishing campaign targeting energy sector organizations through SharePoint file-sharing abuse. The…

Microsoft Launches Open-Source WinApp CLI to Streamline Windows App Development
24
Jan
2026

Microsoft Launches Open-Source WinApp CLI to Streamline Windows App Development

Microsoft has unveiled the public preview of WinApp CLI (winapp), a new open-source command-line tool designed to simplify Windows app…

Hackers Exploiting telnetd Vulnerability for Root Access
24
Jan
2026

Hackers Exploiting telnetd Vulnerability for Root Access

Active exploitation of a critical authentication bypass vulnerability in the GNU InetUtils telnetd server (CVE-2026-24061) has been observed in the…

Microsoft Shares BitLocker Keys with FBI to Unlock Encrypted Laptops in Guam Fraud Investigation
24
Jan
2026

Microsoft Shares BitLocker Keys with FBI to Unlock Encrypted Laptops in Guam Fraud Investigation

Microsoft gave U.S. federal agents the digital keys needed to unlock three encrypted laptops linked to a massive COVID unemployment…

Top 10 World's Best Data Security Companies in 2026
24
Jan
2026

Top 10 World’s Best Data Security Companies in 2026

Best Data Security Companies In 2026, data has become the most valuable asset for businesses and the most targeted. With…