The online mentoring site UStrive exposed email addresses, phone numbers, and other non-public information to other logged-in users. The nonprofit told TechCrunch that the issue is now fixed, but wouldn’t commit to alerting affected individuals. This article has been indexed…
Trump administration admits DOGE may have misused Americans’ Social Security data
The revelation comes as part of a series of corrections in a legal case over DOGE’s access to Social Security Administration data. This article has been indexed from Security News | TechCrunch Read the original article: Trump administration admits DOGE…
VoidLink Represents the Future of AI-Developed Malware: Check Point
Check Point dug into the details of VoidLink and found a sophisticated and quickly developed malware that was mostly generated using AI and putting a spotlight on what the future of cyber threats looks like. The post VoidLink Represents the…
Airlock Digital Announces Independent TEI Study Quantifying Measurable ROI & Security Impact
Atlanta, GA, United States, 20th January 2026, CyberNewsWire Airlock Digital Announces Independent TEI Study Quantifying Measurable ROI & Security Impact on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses. This article has been indexed from…
Access broker caught: Jordanian pleads guilty to hacking 50 companies
A Jordanian man pleaded guilty in the US to selling illegal access to 50 compromised enterprise networks after an undercover sting. A Jordanian national Feras Khalil Ahmad Albashiti (40), living in Georgia, pleaded guilty in a US court to acting…
NDSS 2025 – Studying the Defensive Registration Practices of the Fortune 500
Session 9C: Phishing & Fraud 2 Authors, Creators & Presenters: Boladji Vinny Adjibi (Georgia Tech), Athanasios Avgetidis (Georgia Tech), Manos Antonakakis (Georgia Tech), Michael Bailey (Georgia Tech), Fabian Monrose (Georgia Tech) PAPER The Guardians of Name Street: Studying the Defensive…
New iOS and iPadOS Flaws Leave Millions of iPhones at Risk
Critical iOS and iPadOS WebKit flaws put millions of iPhones and iPads at risk of silent takeover. Apple urges users to update immediately. The post New iOS and iPadOS Flaws Leave Millions of iPhones at Risk appeared first on TechRepublic.…
EU Plans Phase Out of High Risk Telecom Suppliers, in Proposals Seen as Targeting China
Under the new rules, measures for 5G cybersecurity would become mandatory. The post EU Plans Phase Out of High Risk Telecom Suppliers, in Proposals Seen as Targeting China appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Fall 2025 SOC 1, 2, and 3 reports are now available with 185 services in scope
Amazon Web Services (AWS) is pleased to announce that the Fall 2025 System and Organization Controls (SOC) 1, 2, and 3 reports are now available. The reports cover 185 services over the 12-month period from October 1, 2024–September 30, 2025, giving…
IT Security News Hourly Summary 2026-01-20 21h : 8 posts
8 posts were published in the last hour 19:34 : ICE Details a New Minnesota-Based Detention Network That Spans 5 States 19:34 : The Zero Risk Trap: How to Ditch Perfection and Prioritize Real Cyber Resilience 19:10 : Docker Hardened…
ICE Details a New Minnesota-Based Detention Network That Spans 5 States
Internal ICE planning documents propose spending up to $50 million on a privately run network capable of shipping immigrants in custody hundreds of miles across the Upper Midwest. This article has been indexed from Security Latest Read the original article:…
The Zero Risk Trap: How to Ditch Perfection and Prioritize Real Cyber Resilience
In Star Trek, the Kobayashi Maru simulation is an unwinnable test faced by Starfleet cadet captains. The only way to “win” is to accept that you can’t. It’s a test of character — forcing cadet captains to choose between impossible options…
Docker Hardened Images for Container Security
In 2024, a staggering 87% of container images were found to have at least one vulnerability, and a measurable fraction of them have been targeted to compromise the production infrastructure. With cloud and container orchestration adoption not slowing down, the…
Google Gemini Flaw Let Attackers Access Private Calendar Data
Security researchers found a Google Gemini flaw that let hidden instructions in a meeting invite extract private calendar data and create deceptive events. The post Google Gemini Flaw Let Attackers Access Private Calendar Data appeared first on TechRepublic. This article…
Remember VoidLink, the cloud-targeting Linux malware? An AI agent wrote it
AI + skilled malware developers = security threat VoidLink, the newly spotted Linux malware that targets victims’ clouds with 37 evil plugins, was generated “almost entirely by artificial intelligence” and likely developed by just one person, according to the research…
The Data Center Is Secure, But Your Users Are Not
Today’s data centers are hardened facilities with layered access controls, surveillance, redundancy and security teams focused on keeping threats out. Yet, even the most secure environment can be compromised by a single moment of trust, such as a legitimate-looking email…
Four priorities for AI-powered identity and network access security in 2026
Discover four key identity and access priorities for the new year to strengthen your organization’s identity security baseline. The post Four priorities for AI-powered identity and network access security in 2026 appeared first on Microsoft Security Blog. This article has…
North Korea-Linked Hackers Target Developers via Malicious VS Code Projects
The North Korean threat actors associated with the long-running Contagious Interview campaign have been observed using malicious Microsoft Visual Studio Code (VS Code) projects as lures to deliver a backdoor on compromised endpoints. The latest finding demonstrates continued evolution of…
Geopolitical Conflict Is Increasing the Risk of Cyber Disruption
Cybersecurity is increasingly shaped by global politics. Armed conflicts, economic sanctions, trade restrictions, and competition over advanced technologies are pushing countries to use digital operations as tools of state power. Cyber activity allows governments to disrupt rivals quietly, without deploying…
Vulnerability Summary for the Week of January 12, 2026
High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info Patch Info 10-Strike–Strike Network Inventory Explorer Pro 10-Strike Network Inventory Explorer Pro 9.31 contains a buffer overflow vulnerability in the text file import functionality that allows remote code execution.…
ClickFix to CrashFix: KongTuke Used Fake Chrome Ad Blocker to Install ModeloRAT
Huntress discovers ‘CrashFix,’ a new attack by KongTuke hacker group using fake ad blockers to crash browsers and trick office workers into installing ModeloRAT malware. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More…
LayerX Links GhostPoster to 17 Extensions and 840K Downloads
LayerX says GhostPoster spread across 17 extensions and 840,000 downloads. The post LayerX Links GhostPoster to 17 Extensions and 840K Downloads appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: LayerX Links…
Why Smart Contract Security Can’t Wait for “Better” AI Models
The numbers tell a stark story: $1.42 billion lost across 149 documented incidents in 2024 due to smart contract vulnerabilities, with access control flaws accounting for $953.2 million in damages alone. While the Web3 community debates the perfect AI solution…
DNS OverDoS: Are Private Endpoints Too Private?
We’ve identified an aspect of Azure’s Private Endpoint architecture that could expose Azure resources to denial of service (DoS) attacks. The post DNS OverDoS: Are Private Endpoints Too Private? appeared first on Unit 42. This article has been indexed from…