Amazon has confirmed 16,000 corporate job cuts, completing a plan for around 30,000 since October, while leaving open the possibility…
A Virginia man who co-created Empire Market, one of the largest dark web marketplaces at the time, pleaded guilty to…
Microsoft has announced a revised deprecation timeline for SMTP AUTH Basic Authentication in Exchange Online, giving organizations an extended runway…
The FBI has seized the notorious RAMP cybercrime forum, a platform used to advertise a wide range of malware and…
A high command injection vulnerability has been discovered in TP-Link’s Archer MR600 v5 router, enabling authenticated attackers to execute arbitrary…
Health and safety remain one of the most complex and high-risk responsibilities in the construction industry. From managing detailed risk…
Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS Code) extension for Moltbot (formerly Clawdbot) on the…
Two vulnerabilities in the n8n workflow automation platform could allow attackers to fully compromise affected instances, access sensitive data, and…
In a sophisticated supply chain phishing attack, threat actors hijacked an ongoing email thread among C-suite executives discussing a document…
A critical vulnerability in IDIS Cloud Manager (ICM) Viewer exposes organizations using IDIS IP cameras to one-click remote code execution…
In a huge blow to the global cybercrime underground, US federal authorities have seized the clearnet and dark web domains…
Ravie LakshmananJan 28, 2026Critical Infrastructure / Threat Intelligence The “coordinated” cyber attack targeting multiple sites across the Polish power grid…