Intruder invaders
23
Jan
2026

What an AI-Written Honeypot Taught Us About Trusting Machines

“Vibe coding” — using AI models to help write code — has become part of everyday development for a lot…

MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command
23
Jan
2026

MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command

A sophisticated macOS malware called MacSync has emerged as a dangerous new threat targeting cryptocurrency users through deceptive social engineering…

Fortinet Confirms Active Exploitation of FortiCloud SSO Bypass Vulnerability
23
Jan
2026

Fortinet Confirms Active Exploitation of FortiCloud SSO Bypass Vulnerability

Fortinet has officially confirmed active exploitation of critical FortiCloud single sign-on (SSO) authentication bypass vulnerabilities affecting multiple enterprise security appliances….

Node.js Updated HackerOne Program to Require a Signal of 1.0 or Higher to Submit Vulnerability Reports
23
Jan
2026

Node.js Updated HackerOne Program to Require a Signal of 1.0 or Higher to Submit Vulnerability Reports

Node.js has updated its HackerOne vulnerability disclosure program to require a minimum Signal score of 1.0, aiming to reduce low-quality…

Outlook
23
Jan
2026

Outlook for iOS crashes, freezes due to coding error

Microsoft confirmed today that Outlook mobile may crash or freeze when launched on iPad devices due to a coding error….

Hackers Can Use GenAI to Change Loaded Clean Page Into Malicious within Seconds
23
Jan
2026

Hackers Can Use GenAI to Change Loaded Clean Page Into Malicious within Seconds

A new and alarming threat has emerged in the cybersecurity landscape where attackers combine artificial intelligence with web-based attacks to…

5 Hot Cybersecurity Certifications for Salary Growth in 2026
23
Jan
2026

5 Hot Cybersecurity Certifications for Salary Growth in 2026

Cybercrime was predicted to cost the world $10.5 trillion annually in 2025, and to reach $12.2 trillion by 2031, according to Cybersecurity…

Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access
23
Jan
2026

Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access

Ravie LakshmananJan 23, 2026Email Security / Endpoint Security Cybersecurity researchers have disclosed details of a new dual-vector campaign that leverages…

Pwn2Own
23
Jan
2026

Hackers get $1,047,000 for 76 zero-days at Pwn2Own Automotive 2026

Pwn2Own Automotive 2026 has ended with security researchers earning $1,047,000 after exploiting 76 zero-day vulnerabilities between January 21 and January…

New Phishing Kit As-a-service Attacking Google, Microsoft, and Okta Users
23
Jan
2026

New Phishing Kit As-a-service Attacking Google, Microsoft, and Okta Users

A dangerous new generation of phishing kits designed specifically for voice-based attacks has emerged as a growing threat to enterprise…

ShinyHunters Leak Alleged Data of Millions From SoundCloud, Crunchbase and Betterment
23
Jan
2026

ShinyHunters Leak Alleged Data of Millions From SoundCloud, Crunchbase and Betterment – Hackread – Cybersecurity News, Data Breaches, AI, and More

ShinyHunters claim to have leaked millions of records from SoundCloud and Crunchbase after failed extortion attempts, with possible links to…

Okta users under attack: Modern phishing kits are turbocharging vishing attacks
23
Jan
2026

Okta users under attack: Modern phishing kits are turbocharging vishing attacks

Threat actors who specialize in vishing (i.e., voice phishing) have started using phishing kits that can intercept targets’ login credentials…