Crimson Collective Claims Alleged Breach of Brightspeed Fiber Network
05
Jan
2026

Crimson Collective Claims Alleged Breach of Brightspeed Fiber Network

A threat actor group operating under the name “Crimson Collective” has publicly claimed responsibility for a significant data breach targeting…

Researchers Warn of Data Exposure Risks in Claude Chrome Extension
05
Jan
2026

Researchers Warn of Data Exposure Risks in Claude Chrome Extension – Hackread – Cybersecurity News, Data Breaches, AI, and More

On December 18, 2025, Anthropic released the beta version of its Claude Chrome extension, a tool that lets the AI…

Kimwolf Android Botnet Infects Over 2 Million Devices via Exposed ADB and Proxy Networks
05
Jan
2026

Kimwolf Android Botnet Infects Over 2 Million Devices via Exposed ADB and Proxy Networks

Jan 05, 2026Ravie LakshmananIoT Security / Mobile Security The botnet known as Kimwolf has infected more than 2 million Android…

FCC investigation could derail its own IoT security certification program
05
Jan
2026

FCC IoT labeling program loses lead company after China probe

Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. The Federal…

NordVPN
05
Jan
2026

NordVPN denies breach claims, says attackers have “dummy data”

NordVPN denied allegations that its internal Salesforce development servers were breached, saying that cybercriminals obtained “dummy data” from a trial…

WhatsApp Vulnerabilities Leaks User’s Metadata Including Device’s Operating System
05
Jan
2026

WhatsApp Vulnerabilities Leaks User’s Metadata Including Device’s Operating System

WhatsApp’s multi-device encryption protocol has long leaked metadata, allowing attackers to fingerprint users’ device operating systems, aiding targeted malware delivery….

AI-Powered Red Team Toolkit Integrating Metasploit, Nmap, and More
05
Jan
2026

AI-Powered Red Team Toolkit Integrating Metasploit, Nmap, and More

A new open-source tool is bridging the gap between artificial intelligence and offensive security operations.  GHOSTCREW is an advanced AI red…

How charities are using customer applications to boost support
05
Jan
2026

How charities are using customer applications to boost support

It’s a tough time in the charity sector. With the rises in cost of living and unemployment, fewer people are…

SentinelOne analysis links service disruption to software flaw
05
Jan
2026

Thousands of firewalls at risk as legacy flaw in Fortinet faces renewed threat

Researchers warn that thousands of Fortinet instances are at risk of exploitation after the company disclosed that a legacy flaw…

VSCode IDE forks expose users to
05
Jan
2026

VSCode IDE forks expose users to “recommended extension” attacks

Popular AI-powered integrated development environment solutions, such as Cursor, Windsurf, Google Antigravity, and Trae, recommend extensions that are non-existent in…

Post-Escalation Tool Designed to Achieve Red Team Objectives
05
Jan
2026

Post-Escalation Tool Designed to Achieve Red Team Objectives

ProfileHound emerges as a specialized post-exploitation instrument for offensive security professionals seeking to identify high-value targets within Active Directory environments….

An illustrated padlock is mounted into a microphone stand with sound waves emitting from the device.
05
Jan
2026

ALPRs are recording your daily drive (Lock and Code S06E26)

This week on the Lock and Code podcast… There’s an entire surveillance network popping up across the United States that…