19
Jan
2026

Black Basta Ransomware Leader Added To EU Most Wanted

European and international law enforcement agencies have intensified their pursuit of individuals connected to the Black Basta ransomware operation. Authorities…

19
Jan
2026

Attack Surface Visibility Tops CISO Priorities For 2026

As organizations look toward 2026, infrastructure security is becoming one of the most defining challenges for cybersecurity leaders. Expanding cloud…

New “BodySnatcher” Flaw Allows Full ServiceNow User Impersonation
19
Jan
2026

New “BodySnatcher” Flaw Allows Full ServiceNow User Impersonation

Security researcher has disclosed a critical vulnerability in ServiceNow’s Virtual Agent API and Now Assist AI Agents application, tracked as…

Review: AI Strategy and Security
19
Jan
2026

Review: AI Strategy and Security

AI Strategy and Security is a guide for organizations planning enterprise AI programs. The book targets technology leaders, security professionals,…

New Vulnerability Allows Attacker to Impersonate Any ServiceNow User
19
Jan
2026

New Vulnerability Allows Attacker to Impersonate Any ServiceNow User

A critical vulnerability in ServiceNow’s Virtual Agent API and the Now Assist AI Agents application has been discovered, allowing unauthenticated…

Threat Actors Abuse Browser Extensions to Deliver Fake Warning Messages
19
Jan
2026

Threat Actors Abuse Browser Extensions to Deliver Fake Warning Messages

Threat intelligence researchers at Huntress have uncovered a sophisticated browser extension campaign orchestrated by the KongTuke threat actor group, featuring…

A new European standard outlines security requirements for AI
19
Jan
2026

A new European standard outlines security requirements for AI

The European Telecommunications Standards Institute (ETSI) has released a new European Standard that addresses a growing concern for security teams…

19
Jan
2026

CIRO Cybersecurity Incident: Data Impact Confirmed

The Canadian Investment Regulatory Organization (CIRO) has confirmed that it detected a cybersecurity threat earlier this month and took immediate…

New Kerberos Relay Technique Exploits DNS CNAMEs to Bypass Existing Defenses
19
Jan
2026

New Kerberos Relay Technique Exploits DNS CNAMEs to Bypass Existing Defenses

A critical vulnerability in Windows Kerberos authentication that enables attackers to conduct credential-relay attacks by exploiting DNS CNAME records. Tracked…

When the Olympics connect everything, attackers pay attention
19
Jan
2026

When the Olympics connect everything, attackers pay attention

Global sporting events bring a surge of network traffic, new systems, and short term partnerships. That mix draws attention from…

GhostPoster Malware Targets Chrome Users via 17 Rogue Extensions
19
Jan
2026

GhostPoster Malware Targets Chrome Users via 17 Rogue Extensions

A sophisticated malware campaign has compromised users of Chrome, Firefox, and Edge by deploying 17 malicious extensions that employ advanced…

Cyber risk keeps winning, even as AI takes over
19
Jan
2026

Cyber risk keeps winning, even as AI takes over

Cyber risk continues to dominate global business concerns, with AI rising quickly alongside it. According to a new risk survey…