In cybersecurity, an inaccessible tool isn’t just a nuisance: it’s a vulnerability. With the European Accessibility Act tightening regulations across…
Seqrite Labs has uncovered a sophisticated spear-phishing campaign targeting Argentina’s judicial sector with a multi-stage infection chain designed to deploy…
Google has settled yet another class-action lawsuit accusing it of collecting children’s data and using it to target them with…
Leaked API keys are no longer unusual, nor are the breaches that follow. So why are sensitive tokens still being…
Ravie LakshmananJan 20, 2026Web Security / Vulnerability Cloudflare has addressed a security vulnerability impacting its Automatic Certificate Management Environment (ACME)…
The boss of Sweden’s national health app claims she is unfazed by the revelation that a quarter of Swedes have…
The rise of malicious bots is changing how the internet operates, underscoring the need for stronger safeguards that keep humans…
Pulsar RAT has emerged as a sophisticated derivative of the open-source Quasar RAT, introducing dangerous enhancements that enable attackers to…
A critical zero-day vulnerability in Cloudflare’s Web Application Firewall (WAF) allowed attackers to bypass security controls and directly access protected…
VoidLink emerges as a significant threat to Linux cloud environments, representing a major shift in how rootkits are designed and…
A sophisticated malvertising campaign tracked as TamperedChef has compromised over 100 organizations across 19 countries by distributing weaponized PDF editing…
Let’s Encrypt says its short-lived TLS certificates with a 6-day lifetime are now generally available. Each certificate is valid for…
