Unlocking the value of multi-agent systems in 2026
13
Jan
2026

Execs see AI and automation as long-term strategic investments

A number of surveys conducted towards the end of 2025 suggest that IT decision makers and board-level executives see the…

DPRK's Remote Workers Generating $600M Using Identity Theft to Gain Access to Sensitive Systems
13
Jan
2026

DPRK’s Remote Workers Generating $600M Using Identity Theft to Gain Access to Sensitive Systems

The cybersecurity landscape has undergone a fundamental shift in recent years, as the definition of insider threats continues to evolve….

Multiple Hikvision Flaws Allow Device Disruption via Crafted Network Packets
13
Jan
2026

Multiple Hikvision Flaws Allow Device Disruption via Crafted Network Packets

Hikvision has disclosed two high buffer overflow vulnerabilities affecting its security devices that could allow network-based attackers to cause device…

CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution
13
Jan
2026

CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution

Jan 13, 2026Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned of active exploitation…

Hackers Leverage Browser-in-the-browser Tactic to Trick Facebook Users and Steal Logins
13
Jan
2026

Hackers Leverage Browser-in-the-browser Tactic to Trick Facebook Users and Steal Logins

Facebook users are increasingly becoming targets of a sophisticated phishing technique that bypasses conventional security measures. With over three billion…

DPRK Hackers Earn $600M Posing as Remote Workers
13
Jan
2026

DPRK Hackers Earn $600M Posing as Remote Workers

The landscape of corporate espionage has undergone a fundamental transformation. For decades, security teams focused their efforts on identifying disgruntled…

AsyncRAT Leveraging Cloudflare's Free-Tier Services to Mask Malicious Activities and Detection
13
Jan
2026

AsyncRAT Leveraging Cloudflare’s Free-Tier Services to Mask Malicious Activities and Detection

A recent AsyncRAT campaign is using Cloudflare’s free tier services and TryCloudflare tunnels to hide remote access activity inside normal…

Hackers Exploit Browser-in-the-Browser Trick to Hijack Facebook Accounts
13
Jan
2026

Hackers Exploit Browser-in-the-Browser Trick to Hijack Facebook Accounts

Facebook’s massive 3 billion active users make it an attractive target for sophisticated phishing campaigns. As attackers grow more inventive,…

Rakuten Viber CISO/CTO on balancing encryption, abuse prevention, and platform resilience
13
Jan
2026

Rakuten Viber CISO/CTO on balancing encryption, abuse prevention, and platform resilience

In this Help Net Security interview, Liad Shnell, CISO and CTO at Rakuten Viber, discusses how messaging platforms have become…

report-ad-banner
13
Jan
2026

Endesa Data Breach Exposes Customer Contract Information

Spanish energy provider Endesa and its regulated electricity operator Energía XXI have begun notifying customers after detecting unauthorized access to…

Multiple Hikvision Vulnerabilities Let Attackers Cause Device Malfunction Using Crafted Packets
13
Jan
2026

Multiple Hikvision Vulnerabilities Let Attackers Cause Device Malfunction Using Crafted Packets

Hikvision, a leading provider of surveillance and access control systems, faces serious security risks from two newly disclosed stack overflow…

Important Consideration To Prevent Insider Cyber Security Threats
13
Jan
2026

Important Consideration To Prevent Insider Cyber Security Threats

Insider threats are very real and make up the majority of cybersecurity attacks on enterprises. Yet, many businesses still spend…