The impact of Tesco versus Broadcom lawsuit on software procurement
21
Jan
2026

The impact of Tesco versus Broadcom lawsuit on software procurement

The latest filings in Tesco’s £100m lawsuit against Broadcom and VMware over an alleged breach in software licensing terms demonstrates…

Attackers Leverages LinkedIn to Deliver Remote Access Trojan Targeting Corporate Environments
21
Jan
2026

Attackers Leverages LinkedIn to Deliver Remote Access Trojan Targeting Corporate Environments

A sophisticated phishing campaign is actively exploiting LinkedIn’s trusted social media platform to distribute a dangerous remote access trojan to…

Carlsberg Event Wristband Leaked PII, Researcher Told Not to Disclose
21
Jan
2026

Carlsberg Event Wristband Leaked PII, Researcher Told Not to Disclose – Hackread – Cybersecurity News, Data Breaches, AI, and More

Carlsberg Group, a Danish multinational brewer, is in the news for unexpected reasons after a cybersecurity researcher uncovered a vulnerability…

Exposure Assessment Platforms Signal a Shift in Focus
21
Jan
2026

Exposure Assessment Platforms Signal a Shift in Focus

Gartner® doesn’t create new categories lightly. Generally speaking, a new acronym only emerges when the industry’s collective “to-do list” has…

UK government appoints banking tech bosses as AI champions
21
Jan
2026

UK government appoints banking tech bosses as AI champions

The UK government has named senior tech executives from two banks to champion and guide the adoption of artificial intelligence…

Stolen LastPass backups enable crypto theft through 2025
21
Jan
2026

Crooks impersonate LastPass in campaign to harvest master passwords

Crooks impersonate LastPass in campaign to harvest master passwords Pierluigi Paganini January 21, 2026 Password manager LastPass warns of an…

Beware of Weaponized Shipping Documents that Deliver Remcos RAT with a Wide Range of Capabilities
21
Jan
2026

Beware of Weaponized Shipping Documents that Deliver Remcos RAT with a Wide Range of Capabilities

Threat actors are leveraging a dangerous new campaign that weaponizes ordinary-looking shipping documents to distribute Remcos, a powerful remote access…

Pro-Russian hacktivist campaigns continue against UK organizations
21
Jan
2026

Pro-Russian hacktivist campaigns continue against UK organizations

The UK’s National Cyber Security Centre reports ongoing cyber operations by Russian-aligned hacktivist groups targeting organizations in the UK and…

VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code
21
Jan
2026

VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code

The recently discovered sophisticated Linux malware framework known as VoidLink is assessed to have been developed by a single person…

Microsoft Teams External Domain Anomalies Allow Defenders to Detect Attackers at Earliest
21
Jan
2026

Microsoft Teams External Domain Anomalies Allow Defenders to Detect Attackers at Earliest

Microsoft is rolling out a new security feature called the External Domains Anomalies Report for Teams, designed to help IT…

Linux users targeted by crypto thieves via hijacked apps on Snap Store
21
Jan
2026

Linux users targeted by crypto thieves via hijacked apps on Snap Store

Cryptocurrency thieves have found a new way to turn trusted software packages for Linux on the Snap Store into crypto-stealing…

Chainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs
21
Jan
2026

Chainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs

Ravie LakshmananJan 21, 2026Vulnerability / Artificial Intelligence Security vulnerabilities were uncovered in the popular open-source artificial intelligence (AI) framework Chainlit…