Sovereign cloud and AI services tipped for take-off in 2026
26
Jan
2026

Sovereign cloud and AI services tipped for take-off in 2026

Interest in sovereign cloud services has followed a bumpy trajectory over the past decade, both in the public sector and…

Russia-linked Sandworm APT implicated in major cyber attack on Poland’s power grid
26
Jan
2026

Russia-linked Sandworm APT implicated in major cyber attack on Poland’s power grid

Russia-linked Sandworm APT implicated in major cyber attack on Poland’s power grid Pierluigi Paganini January 26, 2026 Russia-linked APT Sandworm…

New Instagram Vulnerability Exposes Private Instagram Posts to Anyone
26
Jan
2026

New Instagram Vulnerability Exposes Private Instagram Posts to Anyone

A critical server-side vulnerability in Instagram’s infrastructure allowed unauthenticated attackers to access private photos and captions without a login or…

Firewalla outlines a zero trust approach to fixing flat home networks
26
Jan
2026

Firewalla outlines a zero trust approach to fixing flat home networks

Firewalla announced a new approach to modernizing large, flat home networks, helping users improve security, scalability, and performance without the…

week in security
26
Jan
2026

A week in security (January 19 – January 25)

Last week on Malwarebytes Labs: On the ThreatDown blog: Stay safe! We don’t just report on threats—we remove them Cybersecurity…

Russia-linked Sandworm APT implicated in major cyber attack on Poland’s power grid
26
Jan
2026

Russia-linked Sandworm APT implicated in major cyber attack on Poland’s power grid

Russia-linked Sandworm APT implicated in major cyber attack on Poland’s power grid Pierluigi Paganini January 26, 2026 Russia-linked APT Sandworm…

Attackers Targeting Construction Firms Exploiting Mjobtime App Vulnerability Using MSSQL and IIS POST Request
26
Jan
2026

Attackers Targeting Construction Firms Exploiting Mjobtime App Vulnerability Using MSSQL and IIS POST Request

Attackers are increasingly turning their attention to construction firms by abusing weaknesses in business software that runs on their job…

Inside Microsoft’s veteran-to-tech workforce pipeline
26
Jan
2026

Inside Microsoft’s veteran-to-tech workforce pipeline

The technology workforce is changing, and military veterans are increasingly being recognized as one of the industry’s most valuable and…

48M Gmail, 6.5M Instagram Exposed Online From Unprotected Database
26
Jan
2026

48M Gmail, 6.5M Instagram Exposed Online From Unprotected Database

A massive database containing 149 million stolen login credentials was discovered exposed online without password protection or encryption. Posing serious…

Threat Actors Fake BSODs and Trusted Build Tools to Bypass Defenses and Deploy DCRat
26
Jan
2026

Threat Actors Fake BSODs and Trusted Build Tools to Bypass Defenses and Deploy DCRat

A new malware campaign is exploiting fake Blue Screen of Death warnings and trusted Microsoft build tools to deliver a…

Brakeman: Open-source vulnerability scanner for Ruby on Rails applications
26
Jan
2026

Brakeman: Open-source vulnerability scanner for Ruby on Rails applications

Brakeman is an open-source security scanner used by teams that build applications with Ruby on Rails. The tool focuses on…

AWS releases updated PCI PIN compliance report for payment cryptography
26
Jan
2026

AWS releases updated PCI PIN compliance report for payment cryptography

Amazon Web Services has published an updated Payment Card Industry Personal Identification Number (PCI PIN) compliance package for its AWS…