report-ad-banner
02
Jan
2026

The Cyber Express Weekly Roundup: Dec 2025- Jan 2026

This week, The Cyber Express takes a closer look at the events shaping the global cybersecurity landscape as we transition…

CISA Warns of WHILL Model C2 Wheelchairs Vulnerability Let Attackers Take Control of Product
02
Jan
2026

CISA Warns of WHILL Model C2 Wheelchairs Vulnerability Let Attackers Take Control of Product

A critical security advisory warned of severe vulnerabilities in WHILL electric wheelchairs that could allow attackers to hijack the devices…

Threat Actors Testing Modified and Highly Obfuscated Version of Shai Hulud Strain
02
Jan
2026

Threat Actors Testing Modified and Highly Obfuscated Version of Shai Hulud Strain

Cybersecurity researchers have identified a new variant of the Shai Hulud malware that reveals important insights into how threat actors…

How Protesters Became Content for the Cops
02
Jan
2026

How Protesters Became Content for the Cops

In 2025, protest policing in major US cities increasingly took on the character of a spectacle: overwhelming deployments, theatrical staging,…

report-ad-banner
02
Jan
2026

La Poste & La Banque Postale Hit By Cyberattack Disruptions

French postal and banking services faced fresh disruptions on Thursday, January 1, 2026, following a cyberattack that temporarily rendered the websites and mobile applications…

IBM warns of critical API Connect bug enabling remote access
02
Jan
2026

IBM warns of critical API Connect bug enabling remote access

IBM warns of critical API Connect bug enabling remote access Pierluigi Paganini January 02, 2026 IBM disclosed a critical API…

Cognizant Hit With Multiple US Class-Action Lawsuits Following TriZetto Data Breach
02
Jan
2026

Cognizant Hit With Multiple US Class-Action Lawsuits Following TriZetto Data Breach

Cognizant Technology Solutions is facing multiple class-action lawsuits following a significant data breach at TriZetto Provider Solutions (TPS), its healthcare…

convicted AI
02
Jan
2026

How AI made scams more convincing in 2025

This blog is part of a series where we highlight new or fast-evolving threats in consumer security. This one focuses…

Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign
02
Jan
2026

Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign

Jan 02, 2026Ravie LakshmananCloud Security / Email Security Cybersecurity researchers have disclosed details of a phishing campaign that involves the…

Careto Hacker Group is Back After 10 Years of Silence with New Attack Tactics
02
Jan
2026

Careto Hacker Group is Back After 10 Years of Silence with New Attack Tactics

After a decade of disappearing from the cybersecurity landscape, the Careto threat group, also known as “The Mask,” has resurfaced…

report-ad-banner
02
Jan
2026

The New China Cybersecurity Law Becomes A Reality In 2026

China has officially entered a new era of cyber regulation. As of January 1, 2026, the amended China cybersecurity law…

Lessons From Mongobleed Vulnerability (CVE-2025-14847) That Actively Exploited In The Wild
02
Jan
2026

Lessons From Mongobleed Vulnerability (CVE-2025-14847) That Actively Exploited In The Wild

The cybersecurity community was alarmed in late December 2025 when MongoDB announced a serious vulnerability called “Mongobleed” (CVE-2025-14847). This high-severity…