64% of Third-Party Applications Access Sensitive Data Without Authorization – Hackread – Cybersecurity News, Data Breaches, AI, and More
21
Jan
2026

64% of Third-Party Applications Access Sensitive Data Without Authorization – Hackread – Cybersecurity News, Data Breaches, AI, and More

Boston, MA, USA, January 21st, 2026, CyberNewsWire Reflectiz today announced the release of its 2026 State of Web Exposure Research,…

Rust package registry adds security tools and metrics to crates.io
21
Jan
2026

Rust package registry adds security tools and metrics to crates.io

The Rust project updated crates.io to include a Security tab on individual crate pages. The tab shows security advisories drawn…

Calendar invite Gemini
21
Jan
2026

Malicious Google Calendar invites could expose private data

Researchers found a way to weaponize calendar invites. They uncovered a vulnerability that allowed them to bypass Google Calendar’s privacy…

Interview: Barry Panayi, group chief data officer, Howden
21
Jan
2026

Interview: Barry Panayi, group chief data officer, Howden

Barry Panayi, group chief data officer (CDO) at insurance firm Howden, is on a mission to create what he calls…

Critical Zoom Command Injection Vulnerability Enables Remote Code Execution
21
Jan
2026

Critical Zoom Command Injection Vulnerability Enables Remote Code Execution

A critical command injection vulnerability in Node Multimedia Routers (MMRs) could allow meeting participants to execute arbitrary code on affected…

RansomHub claims alleged breach of Apple partner Luxshare
21
Jan
2026

RansomHub claims alleged breach of Apple partner Luxshare

Chinese electronic manufacturer and Apple partner Luxshare Precision Industry has allegedly been breached by affiliates of the RansomHub ransomware-as-a-service outfit….

Pwn2Own
21
Jan
2026

Tesla hacked, 37 zero-days demoed at Pwn2Own Automotive 2026

Security researchers have hacked the Tesla Infotainment System and earned $516,500 after exploiting 37 zero-days on the first day of…

Multiple Vulnerabilities in Anthropic Git MCP server Enables Code Execution
21
Jan
2026

Multiple Vulnerabilities in Anthropic Git MCP server Enables Code Execution

Three zero-day vulnerabilities in mcp-server-git, the reference implementation of Git integration for the Model Context Protocol (MCP). The flaws stem…

How Smart MSSPs Using AI to Boost Margins with Half the Staff
21
Jan
2026

How Smart MSSPs Using AI to Boost Margins with Half the Staff

The Hacker NewsJan 21, 2026Artificial Intelligence / Automation Every managed security provider is chasing the same problem in 2026 —…

The impact of Tesco versus Broadcom lawsuit on software procurement
21
Jan
2026

The impact of Tesco versus Broadcom lawsuit on software procurement

The latest filings in Tesco’s £100m lawsuit against Broadcom and VMware over an alleged breach in software licensing terms demonstrates…

Attackers Leverages LinkedIn to Deliver Remote Access Trojan Targeting Corporate Environments
21
Jan
2026

Attackers Leverages LinkedIn to Deliver Remote Access Trojan Targeting Corporate Environments

A sophisticated phishing campaign is actively exploiting LinkedIn’s trusted social media platform to distribute a dangerous remote access trojan to…

Carlsberg Event Wristband Leaked PII, Researcher Told Not to Disclose
21
Jan
2026

Carlsberg Event Wristband Leaked PII, Researcher Told Not to Disclose – Hackread – Cybersecurity News, Data Breaches, AI, and More

Carlsberg Group, a Danish multinational brewer, is in the news for unexpected reasons after a cybersecurity researcher uncovered a vulnerability…