Essential E-Signature Solutions for Cybersecurity in 2026
29
Jan
2026

Essential E-Signature Solutions for Cybersecurity in 2026

E-signatures are now part of your security posture. In 2026, most organizations sign contracts, approvals, onboarding packets, and financial documents…

An AI Toy Exposed 50,000 Logs of Its Chats With Kids to Anyone With a Gmail Account
29
Jan
2026

An AI Toy Exposed 50,000 Logs of Its Chats With Kids to Anyone With a Gmail Account

Even now that the data is secured, Margolis and Thacker argue that it raises questions about how many people inside…

Fake “Mac Cleaner” Campaign Uses Google Ads to Redirect Users to Malware
29
Jan
2026

Fake “Mac Cleaner” Campaign Uses Google Ads to Redirect Users to Malware

Cybercriminals are exploiting Google Search Ads to distribute malware through deceptive landing pages that impersonate Apple’s official website design. The…

Is the Investigatory Powers Tribunal powerless?
29
Jan
2026

Metropolitan Police needs effective constraints on live facial recognition use, court hears

There is virtually nothing in the Metropolitan Police policy to constrain where it deploys live facial recognition (LFR), the High…

Microsoft Teams
29
Jan
2026

New Microsoft Teams feature will let you report suspicious calls

Microsoft plans to introduce a call reporting feature in Teams by mid-March, allowing users to flag suspicious or unwanted calls as…

31.4 Tbps DDoS Attack Via Aisuru Botnet Breaks Internet With New World Record
29
Jan
2026

31.4 Tbps DDoS Attack Via Aisuru Botnet Breaks Internet With New World Record

The Aisuru/Kimwolf botnet unleashed the largest publicly disclosed distributed denial-of-service (DDoS) attack in history, peaking at an unprecedented 31.4 terabits…

Swarmer Tool Abuses Windows Registry to Evade Detection and Persist on Systems
29
Jan
2026

Swarmer Tool Abuses Windows Registry to Evade Detection and Persist on Systems

Swarmer, a sophisticated tool designed to manipulate Windows registry hives while bypassing endpoint detection systems. The tool exploits legacy Windows…

29
Jan
2026

Google disrupts proxy network used by 550+ threat groups

Google has disrupted Ipidea, a massive residential proxy network consisting of user devices that are being used as the last-mile…

Gartner: How CIOs can lead the talent remix
29
Jan
2026

Skills key to successful AI adoption, says IBM

A shift in employee skills will be vital over the next five years to fully utilise artificial intelligence (AI), according…

Google sues cybercriminal group Smishing Triad
29
Jan
2026

Google targets IPIDEA in crackdown on global residential proxy networks

Google targets IPIDEA in crackdown on global residential proxy networks Pierluigi Paganini January 29, 2026 Google disrupted IPIDEA, a major…

[tl;dr sec] #311 - Slack's Security Agents, Cloud-Native Detection Engineering, Trail of Bits' Claude Skills
29
Jan
2026

[tl;dr sec] #313 – MCP Security Hub, IDE-Shepherd, Plaid’s Security Pipeline as Code

Weird Al Last week, I saw something I never thought I would… We cut to the early 2000s, Clint is…

Cloudflare
29
Jan
2026

Aisuru botnet sets new record with 31.4 Tbps DDoS attack

The Aisuru/Kimwolf botnet launched a new massive distributed denial of service (DDoS) attack that peaked at 31.4 Tbps and 200 million…