Resilience for resilience: Managing burnout among cyber leaders
13
Jan
2026

Cutting through the noise: SaaS accelerators vs. enterprise AI

AI in cyber is everywhere this year, and if you’re a CISO you’re feeling the push from all sides. Boards…

Target
13
Jan
2026

Target employees confirm leaked code after ‘accelerated’ Git lockdown

Multiple current and former Target employees have reached out to BleepingComputer to confirm that the source code and documentation shared…

Threat Actors Leveraging RMM Tools to Attack Users via Weaponized PDF Files
13
Jan
2026

Threat Actors Leveraging RMM Tools to Attack Users via Weaponized PDF Files

A new wave of cyberattacks has surfaced where threat actors are using weaponized PDF files to trick users into installing…

AuraInspector: Open-source tool to audit Salesforce Aura access control misconfigurations
13
Jan
2026

AuraInspector: Open-source tool to audit Salesforce Aura access control misconfigurations

Google and its Mandiant threat intelligence unit have released AuraInspector, an open-source tool aimed at auditing data access paths in…

liquid glass security fix
13
Jan
2026

Why iPhone users should update and restart their devices now

If you were still questioning whether iOS 26+ is for you, now is the time to make that call. Why?…

New Advanced Linux VoidLink Malware Targets Cloud and container Environments
13
Jan
2026

New Advanced Linux VoidLink Malware Targets Cloud and container Environments

Jan 13, 2026Ravie LakshmananThreat Intelligence / Cyber Espionage Cybersecurity researchers have disclosed details of a previously undocumented and feature-rich malware…

Fujitsu UK job cuts as staff pay the price for failures of top executives
13
Jan
2026

Post Office scandal’s oldest victim calls for total ban on Fujitsu

Fujitsu should be banned from all UK government contracts, according to the Post Office scandal’s oldest victim. Former subpostmaster Betty…

Hackers Hijacked Apex Legends Game to Control the Inputs of Another Player Remotely
13
Jan
2026

Hackers Hijacked Apex Legends Game to Control the Inputs of Another Player Remotely

A significant security incident has emerged in Apex Legends, where attackers gained the ability to remotely control player inputs during…

Top 5 Best Cyber Attack Prevention Methods 2026
13
Jan
2026

Top 5 Best Cyber Attack Prevention Methods 2026

Cyber attack prevention for Small businesses very has to get serious about their cybersecurity. Hackers are now actively Performing Targeted…

Q4 2025 Malware Trends: Telegram Backdoor, Banking Trojans Surge, Joker Returns to Google Play
13
Jan
2026

Telegram Backdoor, Banking Trojans Surge, Joker Returns to Google Play – Hackread – Cybersecurity News, Data Breaches, AI, and More

A modified version of Telegram X has been used to infect tens of thousands of Android devices with a sophisticated…

Browser-in-the-Browser phishing is on the rise: Here's how to spot it
13
Jan
2026

Browser-in-the-Browser phishing is on the rise: Here’s how to spot it

Browser-in-the-Browser (BitB) phishing attacks are on the rise, with attackers reviving and refining the technique to bypass user skepticism and…

ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonation
13
Jan
2026

ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonation

Jan 13, 2026Ravie LakshmananVulnerability / SaaS Security ServiceNow has disclosed details of a now-patched critical security flaw impacting its ServiceNow…