Law enforcement authorities in the United States have for years circumvented the US Constitution’s Fourth Amendment by purchasing data on…
A new multi-stage phishing campaign has been observed targeting users in Russia with ransomware and a remote access trojan called…
U.S. CISA adds a flaw in Broadcom VMware vCenter Server to its Known Exploited Vulnerabilities catalog Pierluigi Paganini January 24,…
The attack involved data-wiping malware that ESET researchers have now analyzed and named DynoWiper 23 Jan 2026 • , 1…
Microsoft is preparing to deploy a significant, potentially controversial update to Microsoft Teams that automatically detects and displays a user’s…
Ravie LakshmananJan 24, 2026Vulnerability / Enterprise Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical…
AI agents are accelerating how work gets done. They schedule meetings, access data, trigger workflows, write code, and take action…
Microsoft has unveiled the public preview of WinApp CLI (winapp), a new open-source command-line tool designed to simplify Windows app…
Ravie LakshmananJan 24, 2026Malware / Critical Infrastructure The Russian nation-state hacking group known as Sandworm has been attributed to what…
Microsoft Defender researchers have exposed a sophisticated adversary-in-the-middle (AiTM) phishing campaign targeting energy sector organizations through SharePoint file-sharing abuse. The…
Microsoft has unveiled the public preview of WinApp CLI (winapp), a new open-source command-line tool designed to simplify Windows app…
Active exploitation of a critical authentication bypass vulnerability in the GNU InetUtils telnetd server (CVE-2026-24061) has been observed in the…