Robert Rea
20
Jan
2026

Predator bots are exploiting APIs at scale. Here’s how defenders must respond.

The rise of malicious bots is changing how the internet operates, underscoring the need for stronger safeguards that keep humans…

Pulsar RAT Using Memory-Only Execution & HVNC to Gain Invisible Remote Access
20
Jan
2026

Pulsar RAT Using Memory-Only Execution & HVNC to Gain Invisible Remote Access

Pulsar RAT has emerged as a sophisticated derivative of the open-source Quasar RAT, introducing dangerous enhancements that enable attackers to…

Cloudflare Zero-Day Flaw Allows Attackers to Bypass Security and Access Any Host
20
Jan
2026

Cloudflare Zero-Day Flaw Allows Attackers to Bypass Security and Access Any Host

A critical zero-day vulnerability in Cloudflare’s Web Application Firewall (WAF) allowed attackers to bypass security controls and directly access protected…

VoidLink Rewrites Rootkit Playbook with Server-Side Kernel Compilation and AI-Assisted Code
20
Jan
2026

VoidLink Rewrites Rootkit Playbook with Server-Side Kernel Compilation and AI-Assisted Code

VoidLink emerges as a significant threat to Linux cloud environments, representing a major shift in how rootkits are designed and…

Google Ads Exploited to Deliver TamperedChef Through Malicious PDF Editor
20
Jan
2026

Google Ads Exploited to Deliver TamperedChef Through Malicious PDF Editor

A sophisticated malvertising campaign tracked as TamperedChef has compromised over 100 organizations across 19 countries by distributing weaponized PDF editing…

Let's Encrypt rolls out 6-day and IP-based certificates
20
Jan
2026

Let’s Encrypt rolls out 6-day and IP-based certificates

Let’s Encrypt says its short-lived TLS certificates with a 6-day lifetime are now generally available. Each certificate is valid for…

Telegram-based illicit billionaire marketplace Tudou Guarantee stopped transactions
20
Jan
2026

Telegram-based illicit billionaire marketplace Tudou Guarantee stopped transactions

Telegram-based illicit billionaire marketplace Tudou Guarantee stopped transactions Pierluigi Paganini January 20, 2026 Major Telegram-based illicit marketplace Tudou Guarantee appears…

Attackers Abuse Discord to Deliver Clipboard Hijacker That Steals Wallet Addresses on Paste
20
Jan
2026

Attackers Abuse Discord to Deliver Clipboard Hijacker That Steals Wallet Addresses on Paste

A new clipboard hijacker is quietly draining cryptocurrency from gamers and streamers by abusing trust inside Discord communities. The campaign…

Critical WordPress Plugin Vulnerability Exposes 100,000+ Websites to Privilege Escalation Attacks
20
Jan
2026

Critical WordPress Plugin Vulnerability Exposes 100,000+ Websites to Privilege Escalation Attacks

A critical privilege escalation vulnerability discovered in the Advanced Custom Fields: Extended WordPress plugin threatens over 100,000 active installations. The…

One Identity Unveils Major Upgrade to Identity Manager, Strengthening Enterprise Identity Security
20
Jan
2026

One Identity Unveils Major Upgrade to Identity Manager, Strengthening Enterprise Identity Security

Alisa Viejo, United States, January 20th, 2026, CyberNewsWire One Identity, a trusted leader in identity security, today announces a major upgrade to One Identity Manager, a…

How open banking is evolving to unlock finances
20
Jan
2026

How open banking is evolving to unlock finances

Thank you for joining! Access your Pro+ Content below. 20 January 2026 How open banking is evolving to unlock finances…

WhisperPair Attack Allows Hijacking of Laptops, Earbuds Without User Consent
20
Jan
2026

WhisperPair Attack Allows Hijacking of Laptops, Earbuds Without User Consent

A critical vulnerability in Google’s Fast Pair protocol that allows attackers to hijack Bluetooth audio accessories and track users without…