Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
31
Jan
2026

Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms

Ravie LakshmananJan 31, 2026Social Engineering / SaaS Security Google-owned Mandiant on Friday said it identified an “expansion in threat activity”…

SCADA Vulnerability Triggers DoS, Potentially Disrupting Industrial Operations
31
Jan
2026

SCADA Vulnerability Triggers DoS, Potentially Disrupting Industrial Operations

A medium-severity vulnerability in the Iconics Suite SCADA system that could allow attackers to trigger denial-of-service conditions on critical industrial…

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms
31
Jan
2026

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

Ravie LakshmananJan 31, 2026Network Security / SCADA CERT Polska, the Polish computer emergency response team, revealed that coordinated cyber attacks…

This month in security with Tony Anscombe – January 2026 edition
31
Jan
2026

This month in security with Tony Anscombe – January 2026 edition

The year got off to a busy start, with January offering an early snapshot of the challenges that (not just)…

175,000 Exposed Ollama Hosts Enable Code Execution and External System Access
31
Jan
2026

175,000 Exposed Ollama Hosts Enable Code Execution and External System Access

A significant security discovery reveals that approximately 175,000 Ollama servers remain publicly accessible across the internet, creating a serious risk…

Metasploit Releases 7 New Exploit Modules covering FreePBX, Cacti and SmarterMail
31
Jan
2026

Metasploit Releases 7 New Exploit Modules covering FreePBX, Cacti and SmarterMail

The latest update to the Metasploit Framework this week provides a significant enhancement for penetration testers and red teamers, introducing…

Cybersecurity 2026: AI, CISA, manufacturing sector all in the hot seat
31
Jan
2026

Cybersecurity 2026: AI, CISA, manufacturing sector all in the hot seat

New year, new and more complex challenges for cybersecurity leaders, starting on the technology front: AI tools are revolutionizing ways…

Attackers Weaponize Microsoft 365 Outlook Add-ins to Quietly Exfiltrate Email Data
31
Jan
2026

Attackers Weaponize Microsoft 365 Outlook Add-ins to Quietly Exfiltrate Email Data

A stealthy data theft technique in Microsoft 365 that abuses Outlook add-ins to exfiltrate email content without leaving meaningful forensic…

Ivanti Endpoint Manager Vulnerability Allows Remote Code Execution,
30
Jan
2026

Ivanti Endpoint Manager Vulnerability Allows Remote Code Execution,

Ivanti has disclosed two critical vulnerabilities affecting Endpoint Manager Mobile (EPMM) that could allow attackers to achieve unauthenticated remote code…

New Wireshark 4.6.3 Release Patches Dissector, Parser Stability Issues
30
Jan
2026

New Wireshark 4.6.3 Release Patches Dissector, Parser Stability Issues

The Wireshark Foundation released Wireshark version 4.6.3 on January 14, 2026, addressing four critical security vulnerabilities and multiple stability issues…

report-ad-banner
30
Jan
2026

Default Credentials Exploited In Polish Energy Grid Attack

A cyberattack by Russian state-sponsored threat actors that targeted at least 30 wind and solar farms in Poland relied on…

Crypto wallets received a record $158 billion in illicit funds last year
30
Jan
2026

Crypto wallets received a record $158 billion in illicit funds last year

Illegal cryptocurrency flows reached a record $158 billion in 2025, reversing a three-year trend of declining amounts from $86B in…