Attackers use Windows App-V scripts to slip infostealer past enterprise defenses
27
Jan
2026

Attackers use Windows App-V scripts to slip infostealer past enterprise defenses

A malware delivery campaign detailed by Blackpoint researchers employs an impressive array of tricks to deliver an infostealer to employees…

ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services
27
Jan
2026

ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services

Cybersecurity researchers have disclosed details of a new campaign that combines ClickFix-style fake CAPTCHAs with a signed Microsoft Application Virtualization…

Gartner: What to look for in a customer data platform
27
Jan
2026

Alan Turing Institute fellowship programme boosted by $1m from Meta

Building on the CustomerFirst unit, which was unveiled last week, the UK government has announced that Meta is investing $1m…

Email
27
Jan
2026

Over 6,000 SmarterMail servers exposed to automated hijacking attacks

Nonprofit security organization Shadowserver has found over 6,000 SmarterMail servers exposed online and likely vulnerable to attacks exploiting a critical…

MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent Security Rules
27
Jan
2026

MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent Security Rules

MEDUSA, an AI-first Static Application Security Testing (SAST) tool boasting 74 specialized scanners and over 180 AI agent security rules….

Attackers Hijack GitHub Desktop Repo to Spread Malware via Official Installer
27
Jan
2026

Attackers Hijack GitHub Desktop Repo to Spread Malware via Official Installer

Threat actors have successfully exploited a design flaw in GitHub’s fork architecture to distribute malware disguised as the legitimate GitHub…

China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023
27
Jan
2026

China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023

Ravie LakshmananJan 27, 2026Web Security / Malware Cybersecurity researchers have discovered a JScript-based command-and-control (C2) framework called PeckBirdy that has…

Saudi Arabia ordered to pay £3m to UK dissident targeted with Pegasus spyware
27
Jan
2026

Saudi Arabia ordered to pay £3m to UK dissident targeted with Pegasus spyware

A judge has ordered the Kingdom of Saudi Arabia (KSA) to pay compensation of £3m to a London-based dissident who…

New Deepfake Phishing Attack Via Zoom or Microsoft Teams Call Attacking Bitcoin Users
27
Jan
2026

New Deepfake Phishing Attack Via Zoom or Microsoft Teams Call Attacking Bitcoin Users

A dangerous phishing campaign is targeting cryptocurrency holders through video calls that use artificial intelligence to create fake versions of…

Talking Points for Government CISOs and Cybersecuirty Leaders in 2026
27
Jan
2026

Talking Points for Government CISOs and Cybersecuirty Leaders in 2026

Dan Lohrmann is calling all government CISOs (and yes, CTOs, CIOs, CFOs, COOs, and even a few corporate CEOs can listen…

Microsoft brings AI-powered investigations to security teams
27
Jan
2026

Microsoft brings AI-powered investigations to security teams

Microsoft Purview Data Security Investigations is now available. The tool is part of Microsoft Purview and is intended for scenarios…

Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet Formulas
27
Jan
2026

Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet Formulas

Ravie LakshmananJan 27, 2026Vulnerability / Cloud Security A critical security flaw has been disclosed in Grist‑Core, an open-source, self-hosted version…