Is it time for internet services to adopt identity verification?
15
Jan
2026

Is it time for internet services to adopt identity verification?

Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters. 14 Jan…

JumpCloud introduces AI features to govern shadow AI and autonomous agents
15
Jan
2026

JumpCloud introduces AI features to govern shadow AI and autonomous agents

JumpCloud is unveiling new AI capabilities to fuel safe innovation. Organizations can leverage JumpCloud’s platform to accelerate AI adoption. They…

Palo Alto Networks
15
Jan
2026

Palo Alto Networks warns of DoS bug letting hackers disable firewalls

Palo Alto Networks patched a high-severity vulnerability that could allow unauthenticated attackers to disable firewall protections in denial-of-service (DoS) attacks….

The NSA lays out the first steps for zero trust adoption
15
Jan
2026

The NSA lays out the first steps for zero trust adoption

Security pros often say that zero trust sounds straightforward until they try to apply it across real systems, real users,…

China bans U.S. and Israeli cybersecurity software over security concerns
15
Jan
2026

China bans U.S. and Israeli cybersecurity software over security concerns

China bans U.S. and Israeli cybersecurity software over security concerns Pierluigi Paganini January 15, 2026 China has told domestic firms…

Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses
15
Jan
2026

Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses

Microsoft has announced a coordinated legal action in the United States and the United Kingdom to disrupt RedVDS, a global…

Vic Education database breached via school's network
15
Jan
2026

Vic Education database breached via school’s network

All Victorian government schools and their students are impacted by the breach of a Department of Education database that has…

Microsoft
15
Jan
2026

Microsoft disrupts massive RedVDS cybercrime virtual desktop service

Microsoft announced on Wednesday that it disrupted RedVDS, a massive cybercrime platform linked to at least $40 million in reported…

Chinese Threat Actors Hosted 18,000 Active C2 Servers Across 48 Hosting Providers
15
Jan
2026

Chinese Threat Actors Hosted 18,000 Active C2 Servers Across 48 Hosting Providers

Threat actors linked to Chinese hosting infrastructure have established a massive network of over 18,000 active command-and-control servers across 48…

CISOs flag gaps in third-party risk management
15
Jan
2026

CISOs flag gaps in third-party risk management

Third-party cyber risk continues to concern security leaders as vendor ecosystems grow, supply chains stretch, and AI plays a larger…

CSIRO looks to next-gen AI agents to fulfil 'copilot' promise
15
Jan
2026

Microsoft patches single-click Copilot data stealing attack

The first Patch Tuesday (Wednesday in the Antipodes) for the year included a fix for a single-click prompt injection attack…

GoLogin vs MultiLogin vs VMLogin - What's the Anti-Detect Browsers Difference? - GBHackers Security
15
Jan
2026

GoLogin vs MultiLogin vs VMLogin – What’s the Anti-Detect Browsers Difference? – GBHackers Security

A web browser is a door to the Global Network, allows to surf through different resources, obtain all required information,…