Category: EN

WhatsApp Launches High-Security Mode for Ultimate User Protection

  WhatsApp has launched a new high-security mode called “Strict Account Settings,” providing users with enhanced defenses against sophisticated cyber threats. This feature, introduced on January 27, 2026, allows one-click activation and builds on the platform’s existing end-to-end encryption. It…

ShinyHunters-Branded Extortion Activity Expands, Escalates

Hackers rely on evolved vishing and login harvesting to compromise SSO credentials for unauthorized MFA enrollment. The post ShinyHunters-Branded Extortion Activity Expands, Escalates appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: ShinyHunters-Branded Extortion…

AI Agent Orchestration: How It Works and Why It Matters

AI agent orchestration is reshaping how businesses build intelligent systems. It moves beyond single chatbots or generative interfaces, coordinating multiple specialized AI agents to complete…Read More The post AI Agent Orchestration: How It Works and Why It Matters appeared first…

Cyber Briefing: 2026.02.02

Supply-chain attacks poison software updates, crypto scams steal millions, energy sites face attacks, crime networks move billions, and Apple boosts privacy. This article has been indexed from CyberMaterial Read the original article: Cyber Briefing: 2026.02.02

Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack

A hacker published malicious versions of four established VS Code extensions to distribute a GlassWorm malware loader. The post Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Vulnerability Summary for the Week of January 26, 2026

High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info Patch Info 10-Strike Software–Bandwidth Monitor 10-Strike Bandwidth Monitor 3.9 contains a buffer overflow vulnerability that allows attackers to bypass SafeSEH, ASLR, and DEP protections through carefully crafted input. Attackers…