Here’s a look at the most interesting products from the past month, featuring releases from Acronis, Booz Allen Hamilton, cside, Descope, JumpCloud, MIND, Noction, Obsidian Security, Rubrik, SEON, SpyCloud, Tenable, Tosi and Vectra AI. Acronis Archival Storage brings compliance-ready, S3-compatible…
Wearable tech adoption continues as privacy worries grow
Over 1 billion users wear devices for tracking steps, sleep, heart rate, and other personal metrics. These devices collect a continuous stream of sensitive data, often tied to detailed user profiles and companion apps. New Clutch survey data show that…
Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
Ivanti has rolled out security updates to address two security flaws impacting Ivanti Endpoint Manager Mobile (EPMM) that have been exploited in zero-day attacks, one of which has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to…
IT Security News Hourly Summary 2026-01-30 06h : 1 posts
1 posts were published in the last hour 4:31 : Microsoft Releases Update for Windows 11, version 25H2 and 24H2 Systems
Microsoft Releases Update for Windows 11, version 25H2 and 24H2 Systems
Microsoft has officially released the optional non-security preview update KB5074105 for Windows 11, versions 25H2 and 24H2. This release, part of the January 2026 “C-week” schedule, focuses on functionality enhancements, performance optimization, and reliability improvements rather than addressing security vulnerabilities.…
Ivanti provides temporary patches for actively exploited EPMM zero-day (CVE-2026-1281)
Ivanti has released provisional patches that fix two critical code injection vulnerabilities in Endpoint Manager Mobile (EPMM), one of which (CVE-2026-1281) has been exploited in zero-day attacks and has been added to CISA’s Known Exploited Vulnerabilities catalog. Investigating potential compromise…
ISC Stormcast For Friday, January 30th, 2026 https://isc.sans.edu/podcastdetail/9788, (Fri, Jan 30th)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ISC Stormcast For Friday, January 30th, 2026…
Java developers want container security, just not the job that comes with it
BellSoft survey finds 48% prefer pre‑hardened images over managing vulnerabilities themselves Java developers still struggle to secure containers, with nearly half (48 percent) saying they’d rather delegate security to providers of hardened containers than worry about making their own container…
Maybe CISA should take its own advice about insider threats hmmm?
The call is coming from inside the house opinion Maybe everything is all about timing, like the time (this week) America’s lead cyber-defense agency sounded the alarm on insider threats after it came to light that its senior official uploaded…
MY TAKE: Transparent vs. opaque — edit Claude’s personalized memory, or trust ChatGPT’s blindly?
After two years of daily ChatGPT use, I recently started experimenting with Claude, Anthropic’s competing AI assistant. Related: Microsofts see a ‘protopian’ AI future Claude is four to five times slower generating responses. But something emerged that matters more than…
Turning threat reports into detection insights with AI
Security teams often spend days manually turning long incident reports and threat writeups into actionable detections by extracting TTPs. This blog post shows an AI-assisted workflow that does the same job in minutes. It extracts the TTPs, maps them to…
IT Security News Hourly Summary 2026-01-30 00h : 2 posts
2 posts were published in the last hour 22:55 : IT Security News Daily Summary 2026-01-29 22:34 : MongoDB Ransomware Is Still Actively Hitting Exposed Databases
IT Security News Daily Summary 2026-01-29
181 posts were published in the last hour 22:34 : MongoDB Ransomware Is Still Actively Hitting Exposed Databases 21:38 : Understanding the Russian Cyber Threat to the 2026 Winter Olympics 21:38 : Meta confirms it’s working on premium subscription for…
MongoDB Ransomware Is Still Actively Hitting Exposed Databases
MongoDB ransomware remains an active threat, fueled by exposed databases and insecure deployment practices rather than advanced exploits. The post MongoDB Ransomware Is Still Actively Hitting Exposed Databases appeared first on eSecurity Planet. This article has been indexed from eSecurity…
Understanding the Russian Cyber Threat to the 2026 Winter Olympics
Russia’s current isolation from the Olympics may lead to increased cyber threats targeting the 2026 Winter Games. We discuss the potential threat picture. The post Understanding the Russian Cyber Threat to the 2026 Winter Olympics appeared first on Unit 42.…
Meta confirms it’s working on premium subscription for its apps
Details are currently thin, but one thing is clear: paying more is unlikely to buy users meaningful privacy or less tracking. This article has been indexed from Malwarebytes Read the original article: Meta confirms it’s working on premium subscription for…
Fintech firm Marquis blames hack at firewall provider SonicWall for its data breach
The fintech giant said it plans to “seek recoupment of any expenses” from its firewall provider SonicWall after a 2025 data breach exposed customer firewall configurations. This article has been indexed from Security News | TechCrunch Read the original article:…
Report: Open Source Malware Instances Increased 73% in 2025
ReversingLabs this week published a report that finds there was a 73% increase in the number of malicious open source packages discovered in 2025 compared with the previous year. More than 10,000 malicious open source packages were discovered, most of…
SolarWinds addressed four critical Web Help Desk flaws
SolarWinds patched six Web Help Desk vulnerabilities, including four critical flaws exploitable without authentication for RCE or auth bypass. SolarWinds released security updates to address six Web Help Desk vulnerabilities, including four critical bugs that allow unauthenticated remote code execution…
How to get started with security response automation on AWS
At AWS, we encourage you to use automation. Not just to deploy your workloads and configure services, but to also help you quickly detect and respond to security events within your AWS environments. In addition to increasing the speed of…
IT Security News Hourly Summary 2026-01-29 21h : 8 posts
8 posts were published in the last hour 19:32 : SoundCloud – 29,815,722 breached accounts 19:32 : Google Introduces AI-Powered Side Panel in Chrome to Automate Browsing 19:32 : Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries…
SoundCloud – 29,815,722 breached accounts
In December 2025, SoundCloud announced it had discovered unauthorised activity on its platform. The incident allowed an attacker to map publicly available SoundCloud profile data to email addresses for approximately 20% of its users. The impacted data included 30M unique…
Google Introduces AI-Powered Side Panel in Chrome to Automate Browsing
Google has updated its Chrome browser by adding a built-in artificial intelligence panel powered by its Gemini model, marking a stride toward automated web interaction. The change reflects the company’s broader push to integrate AI directly into everyday browsing activities.…
Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries
A new joint investigation by SentinelOne SentinelLABS, and Censys has revealed that the open-source artificial intelligence (AI) deployment has created a vast “unmanaged, publicly accessible layer of AI compute infrastructure” that spans 175,000 unique Ollama hosts across 130 countries. These…