VMware
26
Jan
2026

CISA says critical VMware RCE flaw now actively exploited

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has flagged a critical VMware vCenter Server vulnerability as actively exploited and…

New Malware Toolkit Sends Users to Malicious Websites While the URL Stays the Same
26
Jan
2026

New Malware Toolkit Sends Users to Malicious Websites While the URL Stays the Same

Browser attacks have become far more dangerous and organized than before. A new threat called Stanley, discovered in January 2026,…

New Fake CAPTCHA Scam Abuses Microsoft Tools to Install Amatera Stealer
26
Jan
2026

New Fake CAPTCHA Scam Abuses Microsoft Tools to Install Amatera Stealer – Hackread – Cybersecurity News, Data Breaches, AI, and More

Blackpoint Cyber discovered a new Fake CAPTCHA campaign that tricks users into installing Amatera Stealer. By abusing legitimate Microsoft scripts…

Winning Against AI-Based Attacks Requires a Combined Defensive Approach
26
Jan
2026

Winning Against AI-Based Attacks Requires a Combined Defensive Approach

The Hacker NewsJan 26, 2026Endpoint Security / Artificial Intelligence If there’s a constant in cybersecurity, it’s that adversaries are always…

Singapore to invest over $1.1 billion in public AI research
26
Jan
2026

Singapore to invest over $1.1 billion in public AI research

The Singapore government will ​invest over ⁠S$1 billion ($1.14 billion) in public artificial intelligence research through 2030 to strengthen the…

Lazarus Hackers Actively Attacking European Drone Manufacturing Companies
26
Jan
2026

Lazarus Hackers Actively Attacking European Drone Manufacturing Companies

Lazarus, a sophisticated North Korean-aligned hacking group also known as HIDDEN COBRA, has launched a new wave of targeted attacks…

$6,000 “Stanley” Toolkit Sold on Russian Forums Fakes Secure URLs in Chrome
26
Jan
2026

$6,000 “Stanley” Toolkit Sold on Russian Forums Fakes Secure URLs in Chrome – Hackread – Cybersecurity News, Data Breaches, AI, and More

Stanley is a newly discovered malware toolkit that, as per its developer, bypasses the Chrome Web Store review process. Disguised…

'Jobs, jobs, jobs' the AI mantra in Davos
26
Jan
2026

‘Jobs, jobs, jobs’ the AI mantra in Davos

Biting cold, political tensions and doubts about artificial intelligence did nothing to curb the enthusiasm of business ​leaders in Davos…

North Korea–linked KONNI uses AI to build stealthy malware tooling
26
Jan
2026

North Korea–linked KONNI uses AI to build stealthy malware tooling

North Korea–linked KONNI uses AI to build stealthy malware tooling Pierluigi Paganini January 26, 2026 Check Point links an active…

MITRE Releases New Cybersecurity Framework to Protect the Embedded Systems
26
Jan
2026

MITRE Releases New Cybersecurity Framework to Protect the Embedded Systems

A new Embedded Systems Threat Matrix (ESTM) framework was introduced to help secure embedded systems used in critical infrastructure and…

Top 3 factors for selecting an identity access management tool
26
Jan
2026

Top 3 factors for selecting an identity access management tool

It’s not like forgetting the milk at the grocery store. No big deal, just add it to the list for…

'SyncFuture' Campaign Weaponizing Legitimate Enterprise Security Software to Deploy Malware
26
Jan
2026

‘SyncFuture’ Campaign Weaponizing Legitimate Enterprise Security Software to Deploy Malware

In December 2025, threat researchers uncovered an alarming espionage operation targeting residents of India through sophisticated phishing campaigns. The attack,…