Why inaccessible cybersecurity is a security risk: our path to accessibility
20
Jan
2026

Why inaccessible cybersecurity is a security risk: our path to accessibility

In cybersecurity, an inaccessible tool isn’t just a nuisance: it’s a vulnerability. With the European Accessibility Act tightening regulations across…

Spear-Phishing Campaign Abuses Argentine Federal Court Rulings to Deliver Covert RAT
20
Jan
2026

Spear-Phishing Campaign Abuses Argentine Federal Court Rulings to Deliver Covert RAT

Seqrite Labs has uncovered a sophisticated spear-phishing campaign targeting Argentina’s judicial sector with a multi-stage infection chain designed to deploy…

Google
20
Jan
2026

Google will pay $8.25m to settle child data-tracking allegations

Google has settled yet another class-action lawsuit accusing it of collecting children’s data and using it to target them with…

Why Secrets in JavaScript Bundles are Still Being Missed
20
Jan
2026

Why Secrets in JavaScript Bundles are Still Being Missed

Leaked API keys are no longer unusual, nor are the breaches that follow. So why are sensitive tokens still being…

Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers
20
Jan
2026

Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers

Ravie LakshmananJan 20, 2026Web Security / Vulnerability Cloudflare has addressed a security vulnerability impacting its Automatic Certificate Management Environment (ACME)…

Swedish government software developer counters poor health apps claim
20
Jan
2026

Swedish government software developer counters poor health apps claim

The boss of Sweden’s national health app claims she is unfazed by the revelation that a quarter of Swedes have…

Robert Rea
20
Jan
2026

Predator bots are exploiting APIs at scale. Here’s how defenders must respond.

The rise of malicious bots is changing how the internet operates, underscoring the need for stronger safeguards that keep humans…

Pulsar RAT Using Memory-Only Execution & HVNC to Gain Invisible Remote Access
20
Jan
2026

Pulsar RAT Using Memory-Only Execution & HVNC to Gain Invisible Remote Access

Pulsar RAT has emerged as a sophisticated derivative of the open-source Quasar RAT, introducing dangerous enhancements that enable attackers to…

Cloudflare Zero-Day Flaw Allows Attackers to Bypass Security and Access Any Host
20
Jan
2026

Cloudflare Zero-Day Flaw Allows Attackers to Bypass Security and Access Any Host

A critical zero-day vulnerability in Cloudflare’s Web Application Firewall (WAF) allowed attackers to bypass security controls and directly access protected…

VoidLink Rewrites Rootkit Playbook with Server-Side Kernel Compilation and AI-Assisted Code
20
Jan
2026

VoidLink Rewrites Rootkit Playbook with Server-Side Kernel Compilation and AI-Assisted Code

VoidLink emerges as a significant threat to Linux cloud environments, representing a major shift in how rootkits are designed and…

Google Ads Exploited to Deliver TamperedChef Through Malicious PDF Editor
20
Jan
2026

Google Ads Exploited to Deliver TamperedChef Through Malicious PDF Editor

A sophisticated malvertising campaign tracked as TamperedChef has compromised over 100 organizations across 19 countries by distributing weaponized PDF editing…

Let's Encrypt rolls out 6-day and IP-based certificates
20
Jan
2026

Let’s Encrypt rolls out 6-day and IP-based certificates

Let’s Encrypt says its short-lived TLS certificates with a 6-day lifetime are now generally available. Each certificate is valid for…