A critical-severity vulnerability in the Advanced Custom Fields: Extended (ACF Extended) plugin for WordPress can be exploited remotely by unauthenticated…
The federal government may exempt some telcos from rules requiring them to maintain service outage registers, as ordered by communications…
PDFSIDER Malware – Exploitation of DLL Side-Loading for AV and EDR Evasion Pierluigi Paganini January 20, 2026 Threat actors use…
Unverified and low quality data generated by artificial intelligence (AI) models – often known as AI slop – is forcing…
Britain is considering an Australian-style ban on social media for children under 16, with prime minister Keir Starmer warning they…
Four years ago, the Department of Justice announced it would no longer seek criminal charges against independent and third-party security…
A sophisticated spear-phishing campaign has emerged targeting Argentina’s judicial sector, exploiting trust in legitimate court communications to deliver a dangerous…
Atlanta, GA, United States, January 20th, 2026, CyberNewsWire Airlock Digital, a leader in proactive application control and endpoint security, announced…
A wave of denial of service (DoS) attacks against UK organisations allegedly orchestrated by hacktivist Russian threat actors has prompted…
Ransomware and supply chain attacks set records in 2025, with ransomware attacks up more than 50% and supply chain attacks…
The European Union plans to phase out components and equipment from high-risk suppliers in critical sectors, according to a draft…
The Everest ransomware group has claimed responsibility for a major cyberattack targeting McDonald’s India, allegedly exfiltrating 861 GB of sensitive…
