Proxy Network, Google, Google Threat Intelligence, Nation-State Actors,
29
Jan
2026

Google Dismantles World’s Largest Residential Proxy Network

Google dismantled what is believed to be one of the world’s largest residential proxy networks, taking legal action to seize…

29
Jan
2026

Google Dismantles World’s Largest Residential Proxy Network

Google dismantled what is believed to be one of the world’s largest residential proxy networks, taking legal action to seize…

Critical Solarwinds Web Vulnerability Allows Remote Code Execution and Security Bypass
29
Jan
2026

Critical Solarwinds Web Vulnerability Allows Remote Code Execution and Security Bypass

Multiple critical vulnerabilities in SolarWinds Web Help Desk (WHD), culminating in unauthenticated remote code execution (RCE) via Java deserialization in…

A practical take on cyber resilience for CISOs
29
Jan
2026

A practical take on cyber resilience for CISOs

In this Help Net Security video, Shebani Baweja, CISO for Consumer, Private, Wealth & Business Banking at Standard Chartered, explains…

Google Disrupts IPIDEA — One of the World's Largest Residential Proxy Networks
29
Jan
2026

Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks

Google on Wednesday announced that it worked together with other partners to disrupt IPIDEA, which it described as one of…

Swarmer Tool Evading EDR With a Stealthy Modification on Windows Registry for Persistence
29
Jan
2026

Swarmer Tool Evading EDR With a Stealthy Modification on Windows Registry for Persistence

Praetorian Inc. has publicly released Swarmer, a tool enabling low-privilege attackers to achieve stealthy Windows registry persistence by sidestepping Endpoint…

Open-source malware zeroes in on developer environments
29
Jan
2026

Open-source malware zeroes in on developer environments

Open source malware activity during 2025 concentrated on a single objective: executing code inside developer environments, according to Sonatype. The…

29
Jan
2026

Acting CISA Chief Flagged for Uploading Sensitive Government Files Into ChatGPT

The acting head of the federal government’s top cyber defense agency triggered an internal cybersecurity warning last summer after uploading sensitive government…

New Semantic Chaining Jailbreak Attack Bypasses Grok 4 and Gemini Nano Security Filters
29
Jan
2026

New Semantic Chaining Jailbreak Attack Bypasses Grok 4 and Gemini Nano Security Filters

Following the recent Echo Chamber Multi-Turn Jailbreak, NeuralTrust researchers have disclosed Semantic Chaining, a potent vulnerability in the safety mechanisms…

Hottest cybersecurity open-source tools of the month: January 2026
29
Jan
2026

Hottest cybersecurity open-source tools of the month: January 2026

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. OpenAEV: Open-source…

What motivates hackers and what makes them walk away
29
Jan
2026

What motivates hackers and what makes them walk away

Most hackers spend more time learning, testing, and comparing notes than breaking into systems. The work often happens alone or…

Network Attacks Outpace Malware in Australia
29
Jan
2026

Network Attacks Outpace Malware in Australia

Australian businesses are now facing significantly more network-based attacks than traditional malware, according to WatchGuard Technologies’ Q4 2025 Threat Landscape…