Ring now lets users verify whether videos have been altered
To give users peace of mind, Ring has introduced a new content authenticity feature that allows them to verify whether a Ring video has been…
To give users peace of mind, Ring has introduced a new content authenticity feature that allows them to verify whether a Ring video has been…
The third week of 2026 highlights a series of cybersecurity events affecting businesses, critical infrastructure, and regulatory compliance. This week, network administrators are grappling with…
Days after admins began reporting that their fully patched firewalls are being hacked, Fortinet confirmed it’s working to fully address a critical FortiCloud SSO authentication…
TrustAsia has revoked 143 SSL/TLS certificates following the discovery of a vulnerability in its LiteSSL ACME service. The flaw allowed for the improper reuse of…
A database containing 149 million account usernames and passwords—including 48 million for Gmail, 17 million for Facebook, and 420,000 for the cryptocurrency platform Binance—has been…
Elastic announced the general availability of Agent Builder, a set of capabilities that helps developers quickly build secure, reliable, and context-driven AI agents. AI agents…
A critical privilege escalation vulnerability affecting multiple storage platforms could allow remote attackers to gain administrative access without physical interaction. The flaw, tracked as CVE-2026-23594,…
Raspberry Pi has launched a USB flash drive optimized for use across its lineup of single-board computers. The drive is offered in two capacities, with…
Researchers discover phishing toolkits specifically engineered for voice-based social engineering attacks—often called “vishing”—that synchronize fake login pages with live phone conversations to defeat multifactor authentication.…
Investigation underway after 72M Under Armour records surface online Pierluigi Paganini January 23, 2026 Under Armour is investigating a data breach after 72M customer records…
North Korea–aligned hackers have launched a new campaign that turns artificial intelligence into a weapon against software teams. Using AI-written PowerShell code, the group known…
Microsoft has warned of a multi‑stage adversary‑in‑the‑middle (AitM) phishing and business email compromise (BEC) campaign targeting multiple organizations in the energy sector. “The campaign abused…