As Hollywood imagines our future, are brain and human microchip implants nearing a “ChatGPT moment” in 2026? Medical progress collides with privacy fears and state bans. The post Will 2026 See a ‘ChatGPT Moment’ for Microchip Implants? appeared first on…
Week in review: PoC for FortiSIEM flaw released, Rakuten Viber CISO/CTO on messaging risks
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: What security teams can learn from torrent metadata Security teams often spend time sorting through logs and alerts that point to activity happening outside corporate…
IT Security News Hourly Summary 2026-01-18 09h : 2 posts
2 posts were published in the last hour 8:4 : “How many states are there in the United States?”, (Sun, Jan 18th) 7:31 : ISO 9001:
“How many states are there in the United States?”, (Sun, Jan 18th)
I've seen many API requests for different LLMs in the honeypot logs. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: “How many states are there in the United States?”, (Sun, Jan 18th)
ISO 9001:
What is ISO 9001? ISO 9001 is recognized globally as the standard for Quality Management Systems (QMS). Its full name is ISO 9001:2015, indicating the most recent revision published in 2015 by the International Organization for Standardization (ISO). This framework…
IT Security News Hourly Summary 2026-01-18 06h : 1 posts
1 posts were published in the last hour 4:31 : Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
Google-owned Mandiant has publicly released a comprehensive dataset of Net-NTLMv1 rainbow tables, marking a significant escalation in demonstrating the security risks of legacy authentication protocols. The release underscores an urgent message: organizations must immediately migrate away from Net-NTLMv1, a deprecated…
IT Security News Hourly Summary 2026-01-18 00h : 1 posts
1 posts were published in the last hour 22:55 : IT Security News Daily Summary 2026-01-17
IT Security News Daily Summary 2026-01-17
40 posts were published in the last hour 20:5 : IT Security News Hourly Summary 2026-01-17 21h : 1 posts 19:31 : Ukraine–Germany operation targets Black Basta, Russian leader wanted 18:31 : NDSS 2025 – ScopeVerif: Analyzing The Security Of…
IT Security News Hourly Summary 2026-01-17 21h : 1 posts
1 posts were published in the last hour 19:31 : Ukraine–Germany operation targets Black Basta, Russian leader wanted
Ukraine–Germany operation targets Black Basta, Russian leader wanted
Police in Ukraine and Germany identified Black Basta suspects and issued an international wanted notice for the group’s alleged Russian leader. Ukrainian and German police raided homes linked to alleged Black Basta ransomware members, identifying two Ukrainian suspects. Law enforcement…
NDSS 2025 – ScopeVerif: Analyzing The Security Of Android’s Scoped Storage Via Differential Analysis
Session 9A: Android Security 2 Authors, Creators & Presenters: Zeyu Lei (Purdue University), Güliz Seray Tuncay (Google), Beatrice Carissa Williem (Purdue University), Z. Berkay Celik (Purdue University), Antonio Bianchi (Purdue University) PAPER ScopeVerif: Analyzing the Security of Android’s Scoped Storage…
Cybersecurity Falls Behind as Threat Scale Outpaces Capabilities
Cyber defence is entering its 2026 year with the balance of advantage increasingly being determined by speed rather than sophistication. With the window between intrusion and impact now measured in minutes rather than days instead of days, the advantage is…
Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
Ukrainian and German law enforcement authorities have identified two Ukrainians suspected of working for the Russia-linked ransomware-as-a-service (RaaS) group Black Basta. In addition, the group’s alleged leader, a 35-year-old Russian national named Oleg Evgenievich Nefedov (Нефедов Олег Евгеньевич), has been…
IT Security News Hourly Summary 2026-01-17 18h : 4 posts
4 posts were published in the last hour 17:4 : Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available 16:31 : China-linked APT UAT-8837 targets North American critical infrastructure 16:9 : Your 100 Billion Parameter Behemoth is a Liability…
Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
Let’s Encrypt, a key provider of free TLS certificates, has rolled out short-lived and IP address-based certificates for general use. These new options became available starting in early 2026, addressing long-standing issues in certificate security. Short-lived certificates last just 160…
China-linked APT UAT-8837 targets North American critical infrastructure
Cisco Talos says a China-linked group, tracked as UAT-8837, has targeted North American critical infrastructure since last year. Cisco Talos reports that threat group UAT-8837, likely linked to China, has targeted critical infrastructure in North America since at least last…
Your 100 Billion Parameter Behemoth is a Liability
The “bigger is better” era of AI is hitting a wall. We are in an LLM bubble, characterized by ruinous inference costs and diminishing returns. The future belongs to Agentic AI powered by specialized Small Language Models (SLMs). Think of…
GootLoader Malware Uses Malformed ZIP Archives to Evade Detection
A fresh tactic has emerged among cybercriminals using GootLoader, a JavaScript-driven malware installer. Instead of standard compression, they now distribute broken ZIP files designed to slip past digital defenses. These flawed archives exploit differences across decompression programs – some…
JFrog Researchers Uncover RCE Exploit for Existing Redis Database Vulnerability
JFrog this week published an analysis of a vulnerability in Redis databases that may be more serious than initially thought following the discovery of a remote code execution (RCE) exploit. Researchers found that a stack buffer overflow vulnerability in Redis…
IT Security News Hourly Summary 2026-01-17 15h : 1 posts
1 posts were published in the last hour 13:32 : Google Vertex AI Flaw Lets Low-Privilege Users Escalate to Service Agent Roles
Google Vertex AI Flaw Lets Low-Privilege Users Escalate to Service Agent Roles
Security researchers have discovered critical privilege escalation vulnerabilities in Google’s Vertex AI platform that allow attackers with minimal permissions to hijack high-privileged Service Agent accounts. The flaws affect the Vertex AI Agent Engine and Ray on Vertex AI, where default…
Google’s Vertex AI Vulnerability Enables Low-Privileged Users to Gain Service Agent Roles
Google’s Vertex AI contains default configurations that allow low-privileged users to escalate privileges by hijacking Service Agent roles. XM Cyber researchers identified two attack vectors in the Vertex AI Agent Engine and Ray on Vertex AI, which Google deemed “working…
Argus – Python-powered Toolkit for Information Gathering and Reconnaissance
Argus is a comprehensive Python-based toolkit designed for reconnaissance tasks in cybersecurity. The developers recently released version 2.0, expanding it to include 135 modules. This tool consolidates network analysis, web app scanning, and threat intelligence into one interface. Users access…