Promptware Kill Chain - Five-step Kill Chain Model For Analyzing Cyberthreats
15
Jan
2026

Promptware Kill Chain – Five-step Kill Chain Model For Analyzing Cyberthreats

Promptware Kill Chain is a new five-step model that explains how attacks against AI systems powered by large language models…

Microsoft Copilot
15
Jan
2026

“Reprompt” attack lets attackers steal data from Microsoft Copilot

Researchers found a method to steal data which bypasses Microsoft Copilot’s built-in safety mechanisms.   The attack flow, called Reprompt,…

MonetaStealer Malware Powered with AI Code Attacking macOS Users in the Wild
15
Jan
2026

MonetaStealer Malware Powered with AI Code Attacking macOS Users in the Wild

A new information-stealing malware named MonetaStealer has been discovered actively targeting macOS users through deceptive file disguises and social engineering…

Aembit Announces Agenda and Speaker Lineup for NHIcon 2026 on Agentic AI Security – Hackread – Cybersecurity News, Data Breaches, AI, and More
15
Jan
2026

Aembit Announces Agenda and Speaker Lineup for NHIcon 2026 on Agentic AI Security – Hackread – Cybersecurity News, Data Breaches, AI, and More

Silver Spring, Maryland, January 15th, 2026, CyberNewsWire Aembit today announced the agenda and speaker lineup for NHIcon 2026: The Rise…

Canon U.S.A. Managing Office Technology, IT Infrastructure And Cybersecurity Under One Roof
15
Jan
2026

Canon U.S.A. Managing Office Technology, IT Infrastructure And Cybersecurity Under One Roof

Today’s businesses face unprecedented challenges, from the increasing complexity of digital transformations and hybrid cloud environments to constantly evolving cybersecurity…

PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
15
Jan
2026

PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)

A critical vulnerability (CVE-2025-64155) in Fortinet’s FortiSIEM security platform has now been accompanied by publicly released proof-of-concept (PoC) exploit code,…

Model Security Is the Wrong Frame – The Real Risk Is Workflow Security
15
Jan
2026

Model Security Is the Wrong Frame – The Real Risk Is Workflow Security

Jan 15, 2026The Hacker NewsData Security / Artificial Intelligence As AI copilots and assistants become embedded in daily work, security…

7 Reasons to Get Certified in API Security — API Security
15
Jan
2026

7 Reasons to Get Certified in API Security — API Security

API security is becoming more important by the day and skilled practitioners are in high demand. Now’s the time to…

New Sicarii RaaS Operation Attacks Exposed RDP Services and Attempts to Exploit Fortinet Devices
15
Jan
2026

New Sicarii RaaS Operation Attacks Exposed RDP Services and Attempts to Exploit Fortinet Devices

In December 2025, a previously unknown ransomware-as-a-service operation named Sicarii emerged across underground platforms, introducing itself as an Israeli or…

Former CISA Director Jen Easterly Will Lead RSA Conference
15
Jan
2026

Former CISA Director Jen Easterly Will Lead RSA Conference

Jen Easterly, a longtime public- and private-sector cybersecurity practitioner who led the US Cybersecurity and Infrastructure Security Agency for more…

New CastleLoader Malware Targeting Government Agencies
15
Jan
2026

New CastleLoader Variant Linked to 469 Infections Across Critical Sectors – Hackread – Cybersecurity News, Data Breaches, AI, and More

A new name is surfacing in cyber intelligence reports that has security teams on edge. Known as CastleLoader, it has…

The changing workplace: Shifts defining its future
15
Jan
2026

CEOs are taking the lead on AI initiatives

The AI radar 2026 study from Boston Consulting Group (BCG) has reported that artificial intelligence (AI) investment is set to…