If you don’t control your keys, you don’t control your data
28
Jan
2026

If you don’t control your keys, you don’t control your data

A recent Forbes investigation revealed that Microsoft has allegedly been handing over Bitlocker encryption recovery keys to law enforcement when…

Fortinet Confirms Critical FortiCloud SSO Vulnerability(CVE-2026-24858) Actively Exploited in the Wild
28
Jan
2026

Fortinet Confirms Critical FortiCloud SSO Vulnerability(CVE-2026-24858) Actively Exploited in the Wild

Fortinet has confirmed a critical authentication bypass vulnerability in its FortiCloud SSO feature, actively exploited in the wild under CVE-2026-24858….

Phantom Malware in Android Game Mods Hijacks Phones for Ad Fraud
28
Jan
2026

Phantom Malware in Android Game Mods Hijacks Phones for Ad Fraud – Hackread – Cybersecurity News, Data Breaches, AI, and More

Phantom malware hidden in Android game mods hijacks devices to run covert ad fraud, using remote control and machine learning…

28
Jan
2026

n8n adds Chat Hub to centralize AI access inside automation workflows

Teams using automation platforms are starting to treat conversational AI as another operational interface. That change is reflected in a…

Password Reuse in Disguise: An Often-Missed Risky Workaround
28
Jan
2026

Password Reuse in Disguise: An Often-Missed Risky Workaround

When security teams discuss credential-related risk, the focus typically falls on threats such as phishing, malware, or ransomware. These attack…

Nike Investigates Data Breach Following WorldLeaks Ransomware Group Claim
28
Jan
2026

Nike Investigates Data Breach Following WorldLeaks Ransomware Group Claim

Sportswear giant Nike is actively investigating a potential cybersecurity incident after WorldLeaks, a financially motivated ransomware group, claimed responsibility for…

28
Jan
2026

AHA Guides For Cyber Preparedness In Healthcare

Healthcare organizations in the United States face threats, ranging from public health emergencies to cyberattacks. To support hospitals and health…

PackageGate bugs let attackers bypass protections in NPM, PNPM, VLT, and Bun
28
Jan
2026

PackageGate bugs let attackers bypass protections in NPM, PNPM, VLT, and Bun

PackageGate bugs let attackers bypass protections in NPM, PNPM, VLT, and Bun Pierluigi Paganini January 28, 2026 Koi researchers found…

WhatsApp Denies Lawsuit Claim and Confirms Messages are Device-encrypted and Private
28
Jan
2026

WhatsApp Denies Lawsuit Claim and Confirms Messages are Device-encrypted and Private

WhatsApp has strongly denied a new class-action lawsuit accusing Meta of secretly accessing users’ end-to-end encrypted messages, labeling the claims…

28
Jan
2026

Teleport’s Agentic Identity Framework protects AI agents in production environments

Teleport has unveiled the Teleport Agentic Identity Framework, an AI-centered framework that provides organizations with a roadmap for securely deploying…

Hong Kong hit with record cyberattacks in 2025 as AI-linked threats rise
28
Jan
2026

Hong Kong hit with record cyberattacks in 2025 as AI-linked threats rise

The number of cyberattacks in Hong Kong hit a record high in 2025, with detected system vulnerabilities tripling, prompting experts…

Chinese National Jailed to 46 Months for Laundering Millions of Dollars Stolen from American Investors
28
Jan
2026

Chinese National Jailed to 46 Months for Laundering Millions of Dollars Stolen from American Investors

A Chinese national named Jingliang Su has been sentenced to 46 months in prison for his involvement in a major…