Cal.com Broken Access Controls Lead to Account Takeover and Data Exposure
28
Jan
2026

Cal.com Broken Access Controls Lead to Account Takeover and Data Exposure

Cal.com, an open-source scheduling platform and developer-friendly alternative to Calendly, recently patched a set of critical vulnerabilities that exposed user…

Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution
28
Jan
2026

Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution

Ravie LakshmananJan 28, 2026Vulnerability / Open Source A critical sandbox escape vulnerability has been disclosed in the popular vm2 Node.js…

UK competition regulator looks into Google’s AI search
28
Jan
2026

UK competition regulator looks into Google’s AI search

The Competition and Markets Authority (CMA) has proposed what it describes as a “package of measures” to improve how Google…

Advanced Micro Devices chair and CEO Lisa Su shows the company’s EPYC “Venice” graphics processing unit during a press conference ahead of the opening of the CES trade show in Las Vegas on January 5, 2026. Photo: AFP
28
Jan
2026

Hygon’s chips ‘safe’ from AMD security flaw amid China’s tech self-reliance drive

Chips from Chinese semiconductor designer Hygon Information Technology were found unaffected by a recently disclosed vulnerability in products developed by…

GoTo Resolve Flagged for Silent Access, Abuse Linked to Ransomware Tactics
28
Jan
2026

GoTo Resolve Tool’s Background Activities Compared to Ransomware Tactics – Hackread – Cybersecurity News, Data Breaches, AI, and More

A new security alert has been issued over a computer program that is acting as a silent gateway for intruders….

From Triage to Threat Hunts: How AI Accelerates SecOps
28
Jan
2026

From Triage to Threat Hunts: How AI Accelerates SecOps

If you work in security operations, the concept of the AI SOC agent is likely familiar. Early narratives promised total…

UK’s ‘deregulatory’ AI approach won’t protect human rights
28
Jan
2026

FCA launches review as ‘non-human intelligence’ surpassing human reasoning is plausible

The UK’s financial services sector regulator has announced a review of the potential long-term impacts of advanced artificial intelligence (AI)…

Hackers hijack exposed LLM endpoints in Bizarre Bazaar operation
28
Jan
2026

Hackers hijack exposed LLM endpoints in Bizarre Bazaar operation

A malicious campaign is actively targeting exposed LLM (Large Language Model) service endpoints to commercialize unauthorized access to AI infrastructure. Over a…

SoundCloud Data Breach Exposes 29.8 Million Personal users Details
28
Jan
2026

SoundCloud Data Breach Exposes 29.8 Million Personal users Details

In December 2025, music streaming platform SoundCloud disclosed a significant data breach affecting approximately 29.8 million user accounts. The unauthorized…

28
Jan
2026

MIND DLP for Agentic AI protects sensitive data and controls AI access

MIND announced DLP for Agentic AI, a data-centric approach to AI security designed to help organizations safely achieve the business…

WhatsApp logo
28
Jan
2026

WhatsApp rolls out new protections against advanced exploits and spyware

WhatsApp is quietly rolling out a new safety layer for photos, videos, and documents, and it lives entirely under the…

Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
28
Jan
2026

Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

Ravie LakshmananJan 28, 2026Vulnerability / Workflow Automation Cybersecurity researchers have disclosed two new security flaws in the n8n workflow automation…