Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
23
Jan
2026

Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time

Halo Security, a leading provider of external attack surface management and penetration testing services, today announced it has successfully achieved…

CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
23
Jan
2026

CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities

Ravie LakshmananJan 23, 2026Vulnerability / Software Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added four security…

UK government ‘blindly accepted’ Iver datacentre environmental assurances, it is claimed
23
Jan
2026

UK government ‘blindly accepted’ Iver datacentre environmental assurances, it is claimed

The UK government is facing scrutiny for failing to do its due diligence on the environmental impacts of hyperscale datacentres,…

Intruder invaders
23
Jan
2026

What an AI-Written Honeypot Taught Us About Trusting Machines

“Vibe coding” — using AI models to help write code — has become part of everyday development for a lot…

MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command
23
Jan
2026

MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command

A sophisticated macOS malware called MacSync has emerged as a dangerous new threat targeting cryptocurrency users through deceptive social engineering…

Fortinet Confirms Active Exploitation of FortiCloud SSO Bypass Vulnerability
23
Jan
2026

Fortinet Confirms Active Exploitation of FortiCloud SSO Bypass Vulnerability

Fortinet has officially confirmed active exploitation of critical FortiCloud single sign-on (SSO) authentication bypass vulnerabilities affecting multiple enterprise security appliances….

Node.js Updated HackerOne Program to Require a Signal of 1.0 or Higher to Submit Vulnerability Reports
23
Jan
2026

Node.js Updated HackerOne Program to Require a Signal of 1.0 or Higher to Submit Vulnerability Reports

Node.js has updated its HackerOne vulnerability disclosure program to require a minimum Signal score of 1.0, aiming to reduce low-quality…

Outlook
23
Jan
2026

Outlook for iOS crashes, freezes due to coding error

Microsoft confirmed today that Outlook mobile may crash or freeze when launched on iPad devices due to a coding error….

Hackers Can Use GenAI to Change Loaded Clean Page Into Malicious within Seconds
23
Jan
2026

Hackers Can Use GenAI to Change Loaded Clean Page Into Malicious within Seconds

A new and alarming threat has emerged in the cybersecurity landscape where attackers combine artificial intelligence with web-based attacks to…

5 Hot Cybersecurity Certifications for Salary Growth in 2026
23
Jan
2026

5 Hot Cybersecurity Certifications for Salary Growth in 2026

Cybercrime was predicted to cost the world $10.5 trillion annually in 2025, and to reach $12.2 trillion by 2031, according to Cybersecurity…

Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access
23
Jan
2026

Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access

Ravie LakshmananJan 23, 2026Email Security / Endpoint Security Cybersecurity researchers have disclosed details of a new dual-vector campaign that leverages…

Pwn2Own
23
Jan
2026

Hackers get $1,047,000 for 76 zero-days at Pwn2Own Automotive 2026

Pwn2Own Automotive 2026 has ended with security researchers earning $1,047,000 after exploiting 76 zero-day vulnerabilities between January 21 and January…