The Role of Initial Access Markets in Ransomware Campaigns Targeting Australia and New Zealand
10
Jan
2026

The Role of Initial Access Markets in Ransomware Campaigns Targeting Australia and New Zealand

The cyber threat environment in Australia and New Zealand has entered a critical phase throughout 2025, marked by a dramatic…

CrowdStrike Acquires Identity Security Startup SGNL in $740 Million Deal
10
Jan
2026

CrowdStrike Acquires Identity Security Startup SGNL in $740 Million Deal

CrowdStrike has announced its agreement to acquire SGNL, a leading identity-first security company, for $740 million. The acquisition will strengthen…

Attackers Use Over 240 Exploits Ahead of Ransomware Attacks
10
Jan
2026

Attackers Use Over 240 Exploits Ahead of Ransomware Attacks

Ransomware attacks don’t begin with encryption. They start with reconnaissance and security researchers just documented a significant reconnaissance operation that…

Hegseth, Gabbard tap Tim Kosiba as NSA deputy director after months of cyber leadership tumult
09
Jan
2026

Hegseth, Gabbard tap Tim Kosiba as NSA deputy director after months of cyber leadership tumult

The National Security Agency on Friday announced Tim Kosiba as its deputy director, nine months after the Trump administration axed…

Copilot
09
Jan
2026

Microsoft may soon allow IT admins to uninstall Copilot

Microsoft is testing a new policy that allows IT administrators to uninstall the AI-powered Copilot digital assistant on managed devices….

OWASP CRS Vulnerability Enables Charset Validation Bypass
09
Jan
2026

OWASP CRS Vulnerability Enables Charset Validation Bypass

A newly disclosed vulnerability in the OWASP Core Rule Set (CRS) allows attackers to bypass charset validation in web application firewalls (WAFs), enabling…

Why AI-Powered Cyber Defense Is No Longer Optional for Modern Businesses
09
Jan
2026

Why AI-Powered Cyber Defense Is No Longer Optional for Modern Businesses – Hackread – Cybersecurity News, Data Breaches, AI, and More

Large businesses or governments aren’t the only ones threatened by cyber attacks. Every organization is now equally threatened. This is…

Hackers target misconfigured proxies to access paid LLM services
09
Jan
2026

Hackers target misconfigured proxies to access paid LLM services

Threat actors are systematically hunting for misconfigured proxy servers that could provide access to commercial large language model (LLM) services….

Best Ways to Learn Everything About Investing in Bitcoin - GBHackers Security
09
Jan
2026

Best Ways to Learn Everything About Investing in Bitcoin – GBHackers Security

Bitcoin is a digital asset and a payment system invented by Satoshi Nakamoto. Transactions are verified by network nodes through…

MAESTRO Toolkit Exploiting VMware VM Escape Vulnerabilities
09
Jan
2026

MAESTRO Toolkit Exploiting VMware VM Escape Vulnerabilities – Hackread – Cybersecurity News, Data Breaches, AI, and More

In December 2025, a security team caught a group of hackers just in time. Researchers Anna Pham and Matt Anderson…

China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
09
Jan
2026

China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines

Jan 09, 2026Ravie LakshmananVirtualization / Vulnerability Chinese-speaking threat actors are suspected to have leveraged a compromised SonicWall VPN appliance as…

Congressional Dems press governors to block feds from accessing state DMV data
09
Jan
2026

Dems pressure Google, Apple to drop X app as international regulators turn up heat

A trio of Senate Democrats are calling on Apple and Google to drop Elon Musk’s X from app stores as…