ZAP Releases OWASP PenTest Kit Browser Extension for Application Security Testing
23
Jan
2026

ZAP Releases OWASP PenTest Kit Browser Extension for Application Security Testing

The Zed Attack Proxy (ZAP) team has released the OWASP PTK add-on, version 0.2.0 alpha, integrating the OWASP Penetration Testing…

Kimwolf Botnet Lurking in Corporate, Govt. Networks – Krebs on Security
23
Jan
2026

Kimwolf Botnet Lurking in Corporate, Govt. Networks – Krebs on Security

A new Internet-of-Things (IoT) botnet called Kimwolf has spread to more than 2 million devices, forcing infected systems to participate…

Researchers Score $516,500 For 37 Unique Zero-Days
23
Jan
2026

Researchers Score $516,500 For 37 Unique Zero-Days

Day Two of Pwn2Own Automotive 2026 kicked off with high intensity, as security researchers targeted automotive infotainment systems, EV chargers,…

Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
23
Jan
2026

Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time – GBHackers Security

Miami, Florida, January 22nd, 2026, CyberNewsWire Halo Security, a leading provider of external attack surface management and penetration testing services,…

Latest email threats – from QR code deception to callback phishing
23
Jan
2026

Latest email threats – from QR code deception to callback phishing

Over the last month, Barracuda threat analysts have investigated the following email threats targeting organisations and their employees: Tycoon phishing kit using…

Call for Comments on NIST SP 800-82, Guide to Operational Technology (OT) Security
23
Jan
2026

Call for Comments on NIST SP 800-82, Guide to Operational Technology (OT) Security

NIST has initiated the process of revising Special Publication (SP) 800-82, Guide to Operational Technology (OT) Security, to incorporate lessons learned,…

Okta
23
Jan
2026

Okta SSO accounts targeted in vishing-based data theft attacks

Okta is warning about custom phishing kits built specifically for voice-based social engineering (vishing) attacks. BleepingComputer has learned that these…

Fix out for remotely exploited Cisco enterprise UC suite bug
23
Jan
2026

Fix out for remotely exploited Cisco enterprise UC suite bug

Patches are available for a critical vulnerability in Cisco’s unified communications (UC) products, following detection of the bug being exploited…

Twins with hacking history charged in insider data breach affecting multiple federal agencies
23
Jan
2026

Leader of ransomware crew pleads guilty to four-year crime spree

A Russian national pleaded guilty to leading a ransomware conspiracy that targeted at least 50 victims during a four-year period…

Beware of PNB MetLife Payment Gateway that Steals Your Details and Direct to UPI Payments
23
Jan
2026

Beware of PNB MetLife Payment Gateway that Steals Your Details and Direct to UPI Payments

A sophisticated phishing campaign targeting PNB MetLife insurance customers has surfaced, deceiving victims through fake payment gateway pages that steal…

Node.js binary-parser Library Flaw Enables Malicious Code Injection
23
Jan
2026

Node.js binary-parser Library Flaw Enables Malicious Code Injection

A critical code injection vulnerability in the popular Node.js binary-parser library exposes applications to arbitrary JavaScript execution. CERT/CC published Vulnerability…

Comms Department queries Telstra over outback LEOsat outages
23
Jan
2026

Comms Department queries Telstra over outback LEOsat outages

The federal government has started examining the performance of around 200 Telstra-supplied small cell mobile base stations providing service to…