Thank you for joining! Access your Pro+ Content below. 20 January 2026 How open banking is evolving to unlock finances…
A critical vulnerability in Google’s Fast Pair protocol that allows attackers to hijack Bluetooth audio accessories and track users without…
On January 13, 2026, Check Point Research published its analysis of VoidLink, a Chinese-developed Linux malware framework designed to target…
UK NCSC warns of Russia-linked hacktivists DDoS attacks Pierluigi Paganini January 20, 2026 The UK government warns Russia-linked hacktivists are…
SolyxImmortal represents a notable advancement in information-stealing malware targeting Windows systems. This Python-based threat combines multiple data theft capabilities into…
TP-Link has disclosed a high-severity authentication bypass vulnerability affecting its VIGI security camera lineup, allowing attackers on local networks to reset administrator passwords without…
Ravie LakshmananJan 20, 2026Cryptocurrency / Artificial Intelligence A Telegram-based guarantee marketplace known for advertising a broad range of illicit services…
Seven vulnerabilities were disclosed in Process Optimization (formerly ROMeo) 2024.1 and earlier on January 13, 2026, including a critical flaw…
A newly discovered information-stealing malware, SolyxImmortal, has emerged as a persistent surveillance threat targeting Windows users. Distributed through underground Telegram…
A malvertising campaign identified in September 2025 has brought a significant threat to Windows users worldwide. Attackers created fake PDF…
CloudSEK’s STRIKE team has uncovered a sophisticated cryptocurrency theft operation orchestrated by the threat actor “RedLineCyber,” who deliberately impersonates the…
Every interaction online, from signing up for a newsletter to making a purchase, leaves a trace. These traces are collected…
