2026 Panorays Study: CISOs Lack Third-Party Visibility
14
Jan
2026

2026 Panorays Study: CISOs Lack Third-Party Visibility

New York, NY, January 14th, 2026, CyberNewsWire Panorays, a leading provider of third-party security risk management software, has released the…

Microsoft seized the infrastructure used to run RedVDS, a cybercrime marketplace that facilitated thousands of attacks globally. (Courtesy of Microsoft)
14
Jan
2026

Microsoft seizes RedVDS infrastructure, disrupts fast-growing cybercrime marketplace

Microsoft announced Wednesday that it worked with international law enforcement to seize infrastructure used to run cybercrime subscription service RedVDS…

Pushing header
14
Jan
2026

Insights from the new OAuth phishing attack

In December, the Push Security research team discovered and blocked a brand new attack technique that we coined ConsentFix. This…

SpyCloud Launches Supply Chain Identity Protection
14
Jan
2026

SpyCloud Launches Supply Chain Identity Protection

Austin, TX / USA, January 14th, 2026, CyberNewsWire New monitoring capability delivers unprecedented visibility into vendor identity exposures, moving enterprises…

Hacker Claims Full Breach of Max Messenger, Threatens Public Data Leak
14
Jan
2026

Hacker Claims Full Breach of Russia’s Max Messenger, Threatens Public Leak – Hackread – Cybersecurity News, Data Breaches, AI, and More

A hacker using the alias CamelliaBtw has claimed responsibility for a major data breach involving Max Messenger, according to a…

VVS Stealer Attacking Discord Users to Exfiltrate Credentials and Tokens
14
Jan
2026

VVS Stealer Attacking Discord Users to Exfiltrate Credentials and Tokens

Discord users are facing a growing threat from VVS Stealer, a Python-based information-stealing malware that targets sensitive account data, including…

Survey: Rapid AI Adoption Causes Major Cyber Risk Visibility Gaps
14
Jan
2026

Rapid AI Adoption Causes Major Cyber Risk Visibility Gaps – Hackread – Cybersecurity News, Data Breaches, AI, and More

As software supply chains become longer and more interconnected, enterprises have become well aware of the need to protect themselves…

Webinar: Beyond the Quadrant: An Analyst's Guide to Evaluating Email Security in 2026
14
Jan
2026

Webinar: Beyond the Quadrant: An Analyst’s Guide to Evaluating Email Security in 2026

Join former Gartner analyst Ravisha Chugh and Abnormal’s Director of Product Marketing, Lane Billings, on January 20th for an exclusive…

Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware
14
Jan
2026

Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware

Security experts have disclosed details of an active malware campaign that’s exploiting a DLL side-loading vulnerability in a legitimate binary…

Microsoft Copilot
14
Jan
2026

Reprompt attack let hackers hijack Microsoft Copilot sessions

Researchers identified an attack method dubbed “Reprompt” that could allow attackers to infiltrate a user’s Microsoft Copilot session and issue…

Open-Source Tool for Salesforce Aura Framework Misconfiguration Analysis
14
Jan
2026

Open-Source Tool for Salesforce Aura Framework Misconfiguration Analysis

Mandiant has released AuraInspector, an open-source command-line tool that helps security defenders identify and audit access-control misconfigurations in the Salesforce…

12 Most Popular Deep Learning Libraries 2026
14
Jan
2026

12 Most Popular Deep Learning Libraries 2026

Deep learning libraries are essentially sets of functions and routines written in a given programming language. A large set of…