Jeffrey Epstein Had a ‘Personal Hacker,’ Informant Claims
As the standoff between the United States government and Minnesota continues this week over immigration enforcement operations that have essentially occupied the Twin Cities and…
As the standoff between the United States government and Minnesota continues this week over immigration enforcement operations that have essentially occupied the Twin Cities and…
Cyberattacks Disrupt Communications at Wind, Solar, and Heat Facilities in Poland Pierluigi Paganini January 31, 2026 CERT Polska said cyberattacks hit 30+ wind and solar…
In January 2026, two Americans were killed in the act of watching Immigration and Customs Enforcement operations in Minneapolis. Renee Nicole Good was acting as…
AutoPentestX, an open-source automated penetration testing toolkit for Linux systems, enables comprehensive security assessments from a single command. Developed by Gowtham Darkseid and released in…
Ravie LakshmananJan 31, 2026Social Engineering / SaaS Security Google-owned Mandiant on Friday said it identified an “expansion in threat activity” that uses tradecraft consistent with…
A medium-severity vulnerability in the Iconics Suite SCADA system that could allow attackers to trigger denial-of-service conditions on critical industrial control systems. The flaw, tracked…
Ravie LakshmananJan 31, 2026Network Security / SCADA CERT Polska, the Polish computer emergency response team, revealed that coordinated cyber attacks targeted more than 30 wind…
The year got off to a busy start, with January offering an early snapshot of the challenges that (not just) cybersecurity teams are likely to…
A significant security discovery reveals that approximately 175,000 Ollama servers remain publicly accessible across the internet, creating a serious risk for widespread code execution and…
The latest update to the Metasploit Framework this week provides a significant enhancement for penetration testers and red teamers, introducing seven new exploit modules targeting…
New year, new and more complex challenges for cybersecurity leaders, starting on the technology front: AI tools are revolutionizing ways of working for security operations…
A stealthy data theft technique in Microsoft 365 that abuses Outlook add-ins to exfiltrate email content without leaving meaningful forensic traces. The technique, dubbed “Exfil…