New Study Finds GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale
20
Jan
2026

New Study Finds GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale

Advanced large language models can autonomously develop working exploits for zero-day vulnerabilities, marking a significant shift in the offensive cybersecurity…

Threat actor behind a mask
20
Jan
2026

Make Identity Threat Detection your security strategy for 2026

Attackers no longer break in, they log in. To defend against compromised accounts and insider threats, organizations need in-depth visibility…

New Study Shows GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale
20
Jan
2026

New Study Shows GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale

A groundbreaking experiment has revealed that advanced language models can now create working exploits for previously unknown security vulnerabilities. Security…

OPNsense 25.7.11 Enhances Network Visibility With Host Discovery Feature
20
Jan
2026

OPNsense 25.7.11 Enhances Network Visibility With Host Discovery Feature

The OPNsense team has started the new year with the release of version 25.7.11, bringing a notable networking enhancement: a native host…

Sprocket Security Appoints Eric Sheridan as Chief Technology Officer – Hackread – Cybersecurity News, Data Breaches, AI, and More
20
Jan
2026

Sprocket Security Appoints Eric Sheridan as Chief Technology Officer – Hackread – Cybersecurity News, Data Breaches, AI, and More

Madison, United States, January 20th, 2026, CyberNewsWire Veteran cybersecurity leader brings decades of experience and patented innovation to advance the…

Laptop showing a warning
20
Jan
2026

Fake extension crashes browsers to trick users into infecting themselves

Researchers have found another method used in the spirit of ClickFix: CrashFix. ClickFix campaigns use convincing lures—historically “Human Verification” screens—to…

LinkedIn Messages to Spread RAT Malware
20
Jan
2026

Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading

Ravie LakshmananJan 20, 2026Malware / Threat Intelligence Cybersecurity researchers have uncovered a new phishing campaign that exploits social media private…

Alert fatigue
20
Jan
2026

Aligning cybersecurity purchases with what your SOC team needs

Security teams are expected to detect and respond to attacks in real time—but often with tools they didn’t choose and…

NCSC Warns of Hacktivist Groups Attacking UK Organisations and Online Services
20
Jan
2026

NCSC Warns of Hacktivist Groups Attacking UK Organisations and Online Services

A critical alert issued on January 19, 2026, warned of rising cyber-attacks by Russian-aligned hacktivist groups targeting UK organisations. These…

Apache Airflow Flaws Expose Sensitive Workflow Data to Potential Attackers
20
Jan
2026

Apache Airflow Flaws Expose Sensitive Workflow Data to Potential Attackers

Apache Airflow has patched two separate credential-exposure vulnerabilities in versions before 3.1.6.   The flaws could allow attackers to extract sensitive…

Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution
20
Jan
2026

Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution

Ravie LakshmananJan 20, 2026Vulnerability / Artificial Intelligence A set of three security vulnerabilities has been disclosed in mcp-server-git, the official…

WordPress Plugin Vulnerability Exposes 100,000+ Sites to Privilege Escalation Attacks
20
Jan
2026

WordPress Plugin Vulnerability Exposes 100,000+ Sites to Privilege Escalation Attacks

A critical security flaw in the popular Advanced Custom Fields: Extended WordPress plugin has put more than 100,000 websites at…