Germany plans to enable and deploy stronger cyber-attack countermeasures to take action against foreign powers such as Russia This article has been indexed from Silicon UK Read the original article: Germany To Strengthen Cyber Countermeasures
Microsoft reveals actively exploited Office zero-day, provides emergency fix (CVE-2026-21509)
Microsoft released emergency Office security updates to fix a security feature bypass vulnerability (CVE-2026-21509) that its threat intelligence and security teams spotted being exploited in the wild in zero-day attacks. Users and admins are advised to review the associated advisory…
Microsoft Begins Deploying Next-Gen AI Chip
Microsoft now beginning to deploy new in-house AI chip Maia 200 within its own AI team and to power Copilot, following delays This article has been indexed from Silicon UK Read the original article: Microsoft Begins Deploying Next-Gen AI Chip
Microsoft Patches Office Zero-Day Likely Exploited in Targeted Attacks
The vulnerability is tracked as CVE-2026-21509 and it can be exploited to bypass security features. The post Microsoft Patches Office Zero-Day Likely Exploited in Targeted Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Why Cyber Fusion Centers and Zero-Trust Work Better Together
Cyber fusion centers make zero-trust more effective by improving visibility, automating response, and shrinking the window for attacks. The post Why Cyber Fusion Centers and Zero-Trust Work Better Together appeared first on Security Boulevard. This article has been indexed from…
Microsoft Office Zero-Day (CVE-2026-21509) – Emergency Patch Issued for Active Exploitation
Microsoft on Monday issued out-of-band security patches for a high-severity Microsoft Office zero-day vulnerability exploited in attacks. The vulnerability, tracked as CVE-2026-21509, carries a CVSS score of 7.8 out of 10.0. It has been described as a security feature bypass…
Google Pays $68m To Settle Assistant Privacy Claims
Google agrees to pay $68m to settle class action claiming digital assistant recorded private conversations, passed data to advertisers This article has been indexed from Silicon UK Read the original article: Google Pays $68m To Settle Assistant Privacy Claims
Zscaler expands AI security capabilities to deliver visibility, control, and governance
Zscaler has announced new AI security innovations designed to empower enterprises to secure the fast growing use of AI, while maintaining visibility, control, and governance. As organizations adopt generative AI and prepare for the use of agentic AI, they face…
Microsoft patches Office zero-day vulnerability, Indian users targeted by Blackmoon, Konni targets blockchain developers
Microsoft patches Office zero-day vulnerability Indian users targeted by Blackmoon Konni targets blockchain developers Huge thanks to our episode sponsor, Conveyor True story, an infosec team had to give customers MapQuest style directions just to navigate their Trust Center. …
EU Probes X Over Grok Images
EU opens new investigation into X, formerly Twitter, after millions of AI-generated sexualised images flood network This article has been indexed from Silicon UK Read the original article: EU Probes X Over Grok Images
HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns
Kaspersky researchers analyze updated CoolClient backdoor and new tools and scripts used in HoneyMyte (aka Mustang Panda or Bronze President) APT campaigns, including three variants of a browser data stealer. This article has been indexed from Securelist Read the original…
Threat Actors Using Fake Notepad++ and 7-zip Websites to Deploy Remote Monitoring Tools
Cybercriminals are increasingly distributing malicious Remote Monitoring and Management (RMM) tools through fake websites that mimic popular software download pages. These deceptive sites impersonate legitimate utilities like Notepad++ and 7-Zip, tricking users into installing remote access tools such as LogMeIn…
IT Security News Hourly Summary 2026-01-27 09h : 5 posts
5 posts were published in the last hour 7:32 : Dormakaba flaws allow to access major organizations’ doors 7:31 : When open science meets real-world cybersecurity 7:31 : Logitech introduces two Rally AI Cameras designed for large spaces 7:31 :…
Dormakaba flaws allow to access major organizations’ doors
Researchers found over 20 flaws in Dormakaba access systems that could let attackers remotely unlock doors at major organizations. Researchers from SEC Consult discovered and fixed more than 20 security flaws in Dormakaba physical access control systems. The experts uncovered…
When open science meets real-world cybersecurity
Scientific research environments are built for openness and collaboration, often prioritizing long-term discovery over traditional enterprise security. In this Help Net Security interview, Matthew Kwiatkowski, CISO at Fermilab, America’s particle physics and accelerator laboratory, discusses where cybersecurity blind spots emerge,…
Logitech introduces two Rally AI Cameras designed for large spaces
Logitech announced Rally AI Camera and Rally AI Camera Pro, conference cameras that pack new AI-powered video intelligence into a nearly-invisible aesthetic for large spaces. Rally AI Cameras bring new intelligence, automation into larger, more complex rooms Logitech is merging…
Descope introduces dedicated identity infrastructure for AI agents and MCP ecosystems
Descope has updated its Agentic Identity Hub to provide MCP developers and AI agent builders with standards-based identity infrastructure for their AI systems. Organizations can now use Descope to manage AI agents as first-class identities alongside human users, add OAuth…
Critical CERT-In Advisories – January 2026: SAP, Microsoft, and Atlassian Vulnerabilities
January 2026 was a wake-up month for enterprise security teams. In a single week, CERT-In released three high-severity advisories exposing critical flaws across SAP, Microsoft, and Atlassian, the very platforms that run finance systems, identity layers, developer pipelines, and collaboration…
Waiting for AI superintelligence? Don’t hold your breath
AI’s impact on systems, security, and decision-making is already permanent. Superintelligence, often referred to as artificial superintelligence (ASI), describes a theoretical stage in which AI capability exceeds human cognitive performance across domains. Whether current systems are progressing toward cybersecurity superintelligence…
AI’s appetite for data is testing enterprise guardrails
Privacy programs are taking on more operational responsibility across the enterprise. A new Cisco global benchmark study shows expanding mandates, rising investment, and sustained pressure around data quality, accountability, and cross-border data management tied to AI systems. Privacy programs grow…
Ivanti expands Neurons platform with agentic AI and autonomous endpoint management
Ivanti announced AI advancements to the Ivanti Neurons platform, introducing solutions that transform how IT and security teams harness AI-driven intelligence to achieve impactful business outcomes. These features include agentic AI capabilities for Ivanti Neurons for IT Service Management (ITSM),…
Cybersecurity jobs available right now: January 27, 2026
CISO micro1 | USA | Remote – View job details As a CISO, you will define the enterprise security vision and implement a zero-trust architecture across systems and data pipelines. You will secure AI Labs environments, oversee identity and access…
New Lawsuit Claims that Meta Can Read All the WhatsApp Users Messages
A new class-action lawsuit accuses Meta Platforms of misleading billions of WhatsApp users by claiming their messages are protected by unbreakable end-to-end encryption. Filed in the San Francisco federal court, the suit alleges the company secretly stores, analyzes, and grants…
Microsoft Office Zero-day Vulnerability Actively Exploited in Attacks
Microsoft released emergency out-of-band security updates on January 26, 2026, to address CVE-2026-21509, a zero-day security feature bypass vulnerability in Microsoft Office that attackers are actively exploiting. The flaw, rated “Important” with a CVSS v3.1 base score of 7.8, relies…