A 40-year-old Jordanian man has admitted to selling unauthorized access to computer networks of at least 50 companies, the US…
The Hacker NewsJan 20, 2026Enterprise Security / AI Security The Problem: The Identities Left Behind As organizations grow and evolve,…
In cybersecurity, an inaccessible tool isn’t just a nuisance: it’s a vulnerability. With the European Accessibility Act tightening regulations across…
Seqrite Labs has uncovered a sophisticated spear-phishing campaign targeting Argentina’s judicial sector with a multi-stage infection chain designed to deploy…
Google has settled yet another class-action lawsuit accusing it of collecting children’s data and using it to target them with…
Leaked API keys are no longer unusual, nor are the breaches that follow. So why are sensitive tokens still being…
Ravie LakshmananJan 20, 2026Web Security / Vulnerability Cloudflare has addressed a security vulnerability impacting its Automatic Certificate Management Environment (ACME)…
The boss of Sweden’s national health app claims she is unfazed by the revelation that a quarter of Swedes have…
The rise of malicious bots is changing how the internet operates, underscoring the need for stronger safeguards that keep humans…
Pulsar RAT has emerged as a sophisticated derivative of the open-source Quasar RAT, introducing dangerous enhancements that enable attackers to…
A critical zero-day vulnerability in Cloudflare’s Web Application Firewall (WAF) allowed attackers to bypass security controls and directly access protected…
VoidLink emerges as a significant threat to Linux cloud environments, representing a major shift in how rootkits are designed and…
