Inside the trend of tech ‘spinouts’ solving real-world problems
23
Jan
2026

Inside the trend of tech ‘spinouts’ solving real-world problems

Silicon Valley has created the impression of the archetypal technology company as founded by smart, young guns in a garage…

Catastrophic cyber event could cause widespread disruptions to global infrastructure, study suggests
23
Jan
2026

5 Cybersecurity trends to watch in 2026

The cybersecurity sector faced historic pressure in 2025. New AI tools changed the way we work, but at the same…

Bank ATM
23
Jan
2026

US to deport Venezuelans who emptied bank ATMs using malware

South Carolina federal prosecutors announced that two Venezuelan nationals convicted of stealing hundreds of thousands of dollars from U.S. banks…

New Watering Hole Attacking EmEditor Users with Stealer Malware
23
Jan
2026

New Watering Hole Attacking EmEditor Users with Stealer Malware

A major security threat has emerged targeting developers who use EmEditor, a popular text editor favored by Japanese programming communities….

Fake Captcha Exploits Trusted Web Infrastructure to Distribute Malware
23
Jan
2026

Fake Captcha Exploits Trusted Web Infrastructure to Distribute Malware

Fake Captcha and “ClickFix” lures have emerged as among the most persistent and deceptive malware-delivery mechanisms on the modern web….

Zendesk logo
23
Jan
2026

Spammers abuse Zendesk to flood inboxes with legitimate-looking emails, but why?

Short answer: we have no idea. People are actively complaining that their mailboxes and queues are being flooded by emails…

Like it or not, AI will transform cyber strategy in 2026
23
Jan
2026

Ransomware, reputation, risk: Black Hat Europe in review, 2026 in view

Common failures in security that enable vulnerabilities to be exploited, as well as the politicisation of technology leading to its…

NIST loses key cyber experts in standards and research
23
Jan
2026

NIST is rethinking its role in analyzing software vulnerabilities

The National Institute of Standards and Technology is reevaluating its role in analyzing software vulnerabilities as it tries to meet…

Microsoft to Add Brand Impersonation Protection Warning to Teams Calls
23
Jan
2026

Microsoft to Add Brand Impersonation Protection Warning to Teams Calls

A new security feature for Teams Calling now alerts users to suspicious external calls that try to impersonate trusted organizations….

TrustAsia Pulls 143 Certificates Following Critical LiteSSL ACME Vulnerability
23
Jan
2026

TrustAsia Pulls 143 Certificates Following Critical LiteSSL ACME Vulnerability

TrustAsia has revoked 143 SSL/TLS certificates following the discovery of a critical vulnerability in its LiteSSL ACME service. The flaw,…

Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
23
Jan
2026

Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time

Halo Security, a leading provider of external attack surface management and penetration testing services, today announced it has successfully achieved…

CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
23
Jan
2026

CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities

Ravie LakshmananJan 23, 2026Vulnerability / Software Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added four security…