Android Banking Malware deVixor Actively Targeting Users with Ransomware Capabilities
13
Jan
2026

Android Banking Malware deVixor Actively Targeting Users with Ransomware Capabilities

A sophisticated Android banking threat has emerged in the threat landscape, posing serious risks to mobile users across certain regions….

Breach Ready, Board Ready, and AI-Powered Cybersecurity
13
Jan
2026

Breach Ready, Board Ready, and AI-Powered Cybersecurity

Cybersecurity Ventures estimated that the global cost of cybercrime would reach $10.5 trillion USD annually by 2025, and ransomware would cost…

Minimal Ubuntu Pro expands Canonical's cloud security offerings
13
Jan
2026

Minimal Ubuntu Pro expands Canonical’s cloud security offerings

Canonical has released Minimal Ubuntu Pro images for use on public cloud platforms, aiming to give teams a smaller base…

Resilience for resilience: Managing burnout among cyber leaders
13
Jan
2026

Cutting through the noise: SaaS accelerators vs. enterprise AI

AI in cyber is everywhere this year, and if you’re a CISO you’re feeling the push from all sides. Boards…

Target
13
Jan
2026

Target employees confirm leaked code after ‘accelerated’ Git lockdown

Multiple current and former Target employees have reached out to BleepingComputer to confirm that the source code and documentation shared…

Threat Actors Leveraging RMM Tools to Attack Users via Weaponized PDF Files
13
Jan
2026

Threat Actors Leveraging RMM Tools to Attack Users via Weaponized PDF Files

A new wave of cyberattacks has surfaced where threat actors are using weaponized PDF files to trick users into installing…

AuraInspector: Open-source tool to audit Salesforce Aura access control misconfigurations
13
Jan
2026

AuraInspector: Open-source tool to audit Salesforce Aura access control misconfigurations

Google and its Mandiant threat intelligence unit have released AuraInspector, an open-source tool aimed at auditing data access paths in…

liquid glass security fix
13
Jan
2026

Why iPhone users should update and restart their devices now

If you were still questioning whether iOS 26+ is for you, now is the time to make that call. Why?…

New Advanced Linux VoidLink Malware Targets Cloud and container Environments
13
Jan
2026

New Advanced Linux VoidLink Malware Targets Cloud and container Environments

Jan 13, 2026Ravie LakshmananThreat Intelligence / Cyber Espionage Cybersecurity researchers have disclosed details of a previously undocumented and feature-rich malware…

Fujitsu UK job cuts as staff pay the price for failures of top executives
13
Jan
2026

Post Office scandal’s oldest victim calls for total ban on Fujitsu

Fujitsu should be banned from all UK government contracts, according to the Post Office scandal’s oldest victim. Former subpostmaster Betty…

Hackers Hijacked Apex Legends Game to Control the Inputs of Another Player Remotely
13
Jan
2026

Hackers Hijacked Apex Legends Game to Control the Inputs of Another Player Remotely

A significant security incident has emerged in Apex Legends, where attackers gained the ability to remotely control player inputs during…

Top 5 Best Cyber Attack Prevention Methods 2026
13
Jan
2026

Top 5 Best Cyber Attack Prevention Methods 2026

Cyber attack prevention for Small businesses very has to get serious about their cybersecurity. Hackers are now actively Performing Targeted…