Threat Actors Hide Behind School-Themed Domains In Newly Uncovered Bulletproof Infrastructure
30
Jan
2026

Threat Actors Hide Behind School-Themed Domains In Newly Uncovered Bulletproof Infrastructure

A sophisticated traffic distribution system (TDS) hiding behind education-themed domains. The operation uses bulletproof hosting to deliver phishing pages, scams,…

How Granite complied with new federal cyber regs before a critical deadline
30
Jan
2026

How Granite complied with new federal cyber regs before a critical deadline

Malcolm Jack wants you to understand that when it comes to cybersecurity, people are just as important as technology. Jack…

Windows
30
Jan
2026

Microsoft to disable NTLM by default in future Windows releases

Microsoft announced that it will disable the 30-year-old NTLM authentication protocol by default in upcoming Windows releases due to security vulnerabilities…

GhostChat Spyware Targets Android Users Through WhatsApp, Steals Sensitive Data
30
Jan
2026

GhostChat Spyware Targets Android Users Through WhatsApp, Steals Sensitive Data

A sneaky Android spyware called GhostChat, which tricks Pakistan-based users with romance scams via WhatsApp. The malware grabs sensitive data…

Post Office Capture and Ecco+ users asked to make contact with Scottish statutory body
30
Jan
2026

History repeats itself in Post Office Capture redress scheme with low-ball offers made

Subpostmasters who suffered at the hands of errors in the Post Office’s Capture software, like Horizon users, are receiving derisory…

Cisco sees vulnerability exploitation top phishing in Q4
30
Jan
2026

Cisco sees vulnerability exploitation top phishing in Q4

Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief:…

Attackers Using Hugging Face Hosting to Deliver Android RAT Payload
30
Jan
2026

Attackers Using Hugging Face Hosting to Deliver Android RAT Payload

A new Android threat campaign has emerged that uses social engineering combined with a legitimate machine learning platform to spread…

Hugging Face Repositories Hijacked For Android RAT Delivery, Bypassing Traditional Defenses
30
Jan
2026

Hugging Face Repositories Hijacked For Android RAT Delivery, Bypassing Traditional Defenses

A sophisticated Android RAT campaign that exploits Hugging Face’s popular machine learning platform to host and distribute malicious payloads. Attackers…

Cybersecurity Predictions for 2026
30
Jan
2026

Cybersecurity Predictions for 2026

30 Jan Cybersecurity Predictions for 2026 Posted at 10:57h in Blogs by Taylor Fox Six Predictions for the AI-Driven SOC…

Manufacturers fortify cyber defenses in response to dramatic surge in cyberattacks
30
Jan
2026

Manufacturers fortify cyber defenses in response to dramatic surge in cyberattacks

As U.S. manufacturing firms weather a constant barrage of cyberattacks, the various industries in that sector — which underpin everything…

Image of global data networks
30
Jan
2026

Google’s disruption rips millions out of devices out of malicious network

Millions of devices used as proxies by cybercriminals, espionage groups and data thieves have been removed from circulation following Google’s…

UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS
30
Jan
2026

UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS

A new wave of targeted attacks has emerged against Internet Information Services (IIS) servers across Asia, with threat actors deploying…