Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks
28
Jan
2026

Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks

Threat actors with ties to China have been observed using an updated version of a backdoor called COOLCLIENT in cyber…

Falcon and beyond: Abu Dhabi’s blueprint for national AI governance
28
Jan
2026

ENEC, TII and Aspire test autonomous aerial systems for critical infrastructure security

The Emirates Nuclear Energy Company (ENEC), the Technology Innovation Institute (TII) and Aspire have launched a joint proof-of-concept (PoC) project…

Robot reading compliance manuals
28
Jan
2026

AI Is Rewriting Compliance Controls and CISOs Must Take Notice

By Itamar Apelblat, CEO & Co-Founder, Token Security For decades, compliance frameworks were built on an assumption that now feels…

Check Point Harmony SASE Windows Client Vulnerability Enables Privilege Escalation
28
Jan
2026

Check Point Harmony SASE Windows Client Vulnerability Enables Privilege Escalation

A critical privilege-escalation vulnerability has been discovered in Check Point’s Harmony SASE (Secure Access Service Edge) Windows client software, affecting versions prior…

Cal.com Broken Access Controls Lead to Account Takeover and Data Exposure
28
Jan
2026

Cal.com Broken Access Controls Lead to Account Takeover and Data Exposure

Cal.com, an open-source scheduling platform and developer-friendly alternative to Calendly, recently patched a set of critical vulnerabilities that exposed user…

Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution
28
Jan
2026

Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution

Ravie LakshmananJan 28, 2026Vulnerability / Open Source A critical sandbox escape vulnerability has been disclosed in the popular vm2 Node.js…

UK competition regulator looks into Google’s AI search
28
Jan
2026

UK competition regulator looks into Google’s AI search

The Competition and Markets Authority (CMA) has proposed what it describes as a “package of measures” to improve how Google…

Advanced Micro Devices chair and CEO Lisa Su shows the company’s EPYC “Venice” graphics processing unit during a press conference ahead of the opening of the CES trade show in Las Vegas on January 5, 2026. Photo: AFP
28
Jan
2026

Hygon’s chips ‘safe’ from AMD security flaw amid China’s tech self-reliance drive

Chips from Chinese semiconductor designer Hygon Information Technology were found unaffected by a recently disclosed vulnerability in products developed by…

GoTo Resolve Flagged for Silent Access, Abuse Linked to Ransomware Tactics
28
Jan
2026

GoTo Resolve Tool’s Background Activities Compared to Ransomware Tactics – Hackread – Cybersecurity News, Data Breaches, AI, and More

A new security alert has been issued over a computer program that is acting as a silent gateway for intruders….

From Triage to Threat Hunts: How AI Accelerates SecOps
28
Jan
2026

From Triage to Threat Hunts: How AI Accelerates SecOps

If you work in security operations, the concept of the AI SOC agent is likely familiar. Early narratives promised total…

UK’s ‘deregulatory’ AI approach won’t protect human rights
28
Jan
2026

FCA launches review as ‘non-human intelligence’ surpassing human reasoning is plausible

The UK’s financial services sector regulator has announced a review of the potential long-term impacts of advanced artificial intelligence (AI)…

Hackers hijack exposed LLM endpoints in Bizarre Bazaar operation
28
Jan
2026

Hackers hijack exposed LLM endpoints in Bizarre Bazaar operation

A malicious campaign is actively targeting exposed LLM (Large Language Model) service endpoints to commercialize unauthorized access to AI infrastructure. Over a…