Security Affairs newsletter Round 549 by Pierluigi Paganini – INTERNATIONAL EDITION
25
Jan
2026

Security Affairs newsletter Round 560 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs…

The Instant Smear Campaign Against Border Patrol Shooting Victim Alex Pretti
25
Jan
2026

The Instant Smear Campaign Against Border Patrol Shooting Victim Alex Pretti

Within minutes of Alex Pretti being shot and killed by a federal immigration officer in Minneapolis on Saturday, the Trump…

ICE Asks Companies About ‘Ad Tech and Big Data’ Tools It Could Use in Investigations
25
Jan
2026

ICE Asks Companies About ‘Ad Tech and Big Data’ Tools It Could Use in Investigations

US Immigration and Customs Enforcement is asking companies to provide information about “commercial Big Data and Ad Tech” products that…

Sandworm
25
Jan
2026

Sandworm hackers linked to failed wiper attack on Poland’s energy systems

A cyberattack targeting Poland’s power grid in late December 2025 has been linked to the Russian state-sponsored hacking group Sandworm,…

Ohio’s Union County suffers ransomware attack impacting 45,000 people
24
Jan
2026

Osiris ransomware emerges, leveraging BYOVD technique to kill security tools

Osiris ransomware emerges, leveraging BYOVD technique to kill security tools Pierluigi Paganini January 24, 2026 Researchers identified a new Osiris…

FBI Accessed Windows Laptops After Microsoft Shared BitLocker Recovery Keys
24
Jan
2026

FBI Accessed Windows Laptops After Microsoft Shared BitLocker Recovery Keys – Hackread – Cybersecurity News, Data Breaches, AI, and More

Is your Windows PC secure? A recent Guam court case reveals Microsoft can provide BitLocker encryption keys to the FBI….

Attackers Leveraging telnetd Exploit for Root Privileges After PoC Goes Public
24
Jan
2026

Attackers Leveraging telnetd Exploit for Root Privileges After PoC Goes Public

The threat actors have begun actively exploiting a critical authentication bypass vulnerability in GNU InetUtils telnetd immediately after proof-of-concept code…

CISA Warns of Critical VMware vCenter RCE Vulnerability Now Exploited in Attacks
24
Jan
2026

CISA Warns of Critical VMware vCenter RCE Vulnerability Now Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability affecting Broadcom’s VMware vCenter Server to its Known…

Researchers Uncover Multi-Stage AiTM Attack Using SharePoint to Bypass Security Controls
24
Jan
2026

Researchers Uncover Multi-Stage AiTM Attack Using SharePoint to Bypass Security Controls

Microsoft Defender researchers have exposed a sophisticated adversary-in-the-middle (AiTM) phishing campaign targeting energy sector organizations, leveraging SharePoint file-sharing services to…

Microsoft Shared BitLocker Recovery Keys with FBI to Unlock Encrypted Laptop Data
24
Jan
2026

Microsoft Shared BitLocker Recovery Keys with FBI to Unlock Encrypted Laptop Data

Microsoft has confirmed that it provided BitLocker encryption recovery keys to the FBI following a valid search warrant, marking the…

Konni hackers target blockchain engineers with AI-built malware
24
Jan
2026

Konni hackers target blockchain engineers with AI-built malware

The North Korean hacker group Konni (Opal Sleet, TA406) is using AI-generated PowerShell malware to target developers and engineers in…

Microsoft Open-Sources winapp, a New CLI Tool for Streamlined Windows App Development
24
Jan
2026

Microsoft Open-Sources winapp, a New CLI Tool for Streamlined Windows App Development

Microsoft has announced the public preview of the Windows App Development CLI (winapp), a new open-source command-line tool designed to…