The start of a new year brings new opportunities – and heightened cyber risks as scammers exploit the holiday aftermath. In 2024 the FBI’s Internet… The post Your digital safety checklist for the start of the year appeared first on…
News alert: AppGuard reopens insider program as AI-enhanced malware outpaces detection defenses
MCLEAN, Va., Jan.15, 2026, CyberNewswire — A new Top 10 Cybersecurity Innovators profile by AppGuard has been released, spotlighting growing concerns over AI-enhanced malware. AI makes malware even more difficult to detect. Worse, they use AI to assess, adapt, and…
News alert: BreachLock unveils agentic AI pen testing that mimics attacker behavior on web apps
NEW YORK, Jan. 15, 2026, CyberNewswire — BreachLock, a global leader in offensive security, today announced that its Adversarial Exposure Validation (AEV) solution now supports autonomous red teaming at the application layer, expanding beyond its initial network-layer capabilities introduced ……
As AI raises the stakes, app modernization and security are becoming inseparable
Security leaders are under pressure to support AI programs that move from pilots into production. New Cloudflare research suggests that success depends less on experimentation and more on disciplined application modernization tied closely to security strategy. The survey examines how…
New intelligence is moving faster than enterprise controls
AI is being integrated into core enterprise systems faster than many organizations can secure and govern it. A new global study from NTT shows companies expanding AI deployment while gaps in infrastructure readiness, data integrity controls, and governance frameworks continue…
Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways
Cisco on Thursday released security updates for a maximum-severity security flaw impacting Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager, nearly a month after the company disclosed that it had been exploited as…
Who’s on the other end? Rented accounts are stress-testing trust in gig platforms
Fraud has become a routine part of gig work for many earners, and the ways workers respond are creating new security problems for platforms. A recent TransUnion study of U.S. gig workers shows broad exposure to fraud, inconsistent reporting, and…
New infosec products of the week: January 16, 2026
Here’s a look at the most interesting products from the past week, featuring releases from Acronis, JumpCloud, Noction, and SpyCloud. Acronis Archival Storage brings compliance-ready, S3-compatible cold storage to MSPs Acronis announced the launch of Acronis Archival Storage, a long-term,…
Staples Slips Up On Data Removal
Cybersecurity Challenges: Data Privacy Failures, AI Risks, and New Malware Threats In this episode of Cybersecurity Today, host David Shipley covers a range of pressing issues. The discussion kicks off with Staples Canada reselling laptops without wiping customer data, highlighting…
ISC Stormcast For Friday, January 16th, 2026 https://isc.sans.edu/podcastdetail/9770, (Fri, Jan 16th)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ISC Stormcast For Friday, January 16th, 2026…
How safe are your secrets with agentic AI handling them
How Secure Are Your Secrets When Managed by Non-Human Identities? What is the risk associated with non-human identities (NHIs) in cybersecurity? Understanding this concept is vital for the protection of your organization’s digital assets. NHIs—the machine identities in cybersecurity—have become…
Do AI-driven security systems empower compliance
Are Non-Human Identities the Missing Link in AI-Driven Security? Are traditional methods enough to protect our digital assets, or is there a growing need for more sophisticated approaches? With the advent of AI-driven security systems, the focus is turning towards…
Are AI managed NHIs reliable in identity management
What Are Non-Human Identities and Why Are They Critical in Cybersecurity? The concept of managing non-human identities (NHIs) is increasingly gaining traction. But what exactly are these NHIs, and why are they pivotal in securing modern digital infrastructures? Let’s delve…
How does Agentic AI deliver value in SOC operations
Are Organizations Maximizing the Value of Agentic AI in SOC Operations? Where security threats evolve with alarming speed, security operations centers (SOCs) must remain at the forefront of innovation. One intriguing advancement capturing the attention of cybersecurity professionals is Agentic…
Cisco finally fixes max-severity bug under active attack for weeks
This is a threat to security – and to the weekend for some unlucky netadmins Cisco finally delivered a fix for a maximum-severity bug in AsyncOS that has been under attack for at least a month.… This article has been…
IT Security News Hourly Summary 2026-01-16 00h : 3 posts
3 posts were published in the last hour 22:55 : IT Security News Daily Summary 2026-01-15 22:31 : A ransomware attack disrupted operations at South Korean conglomerate Kyowon 22:31 : Chinese spies used Maduro’s capture as a lure to phish…
IT Security News Daily Summary 2026-01-15
166 posts were published in the last hour 22:31 : A ransomware attack disrupted operations at South Korean conglomerate Kyowon 22:31 : Chinese spies used Maduro’s capture as a lure to phish US govt agencies 22:2 : East-West Is the…
A ransomware attack disrupted operations at South Korean conglomerate Kyowon
South Korean conglomerate Kyowon confirmed a ransomware attack that disrupted operations and may have exposed customer data. Kyowon Group is a major South Korean conglomerate with diverse business interests spanning education, publishing, media, and technology. It operates nationwide, serving millions…
Chinese spies used Maduro’s capture as a lure to phish US govt agencies
What’s next for Venezuela? Click on the file and see What policy wonk wouldn’t want to click on an attachment promising to unveil US plans for Venezuela? Chinese cyberspies used just such a lure to target US government agencies and…
East-West Is the New North-South: Rethink Security for the AI-Driven Data Center
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: East-West Is the New North-South: Rethink Security for the AI-Driven Data Center
CISA Issues New AI Security Guidance for Critical Infrastructure
CISA and international partners issued new guidance on securing AI in operational technology, warning of OT risks and urging stronger governance and safeguards. The post CISA Issues New AI Security Guidance for Critical Infrastructure appeared first on TechRepublic. This article…
Kaiser to Pay $46M in Patient Data Lawsuit. Find Out If You’re Eligible
Kaiser Permanente agreed to a $46M settlement over claims that patient health information was improperly disclosed online. The claims deadline is March 12, 2026. The post Kaiser to Pay $46M in Patient Data Lawsuit. Find Out If You’re Eligible appeared…
40K WordPress Installs at Risk From Modular DS Admin Bypass
CVE-2026-23550 is being exploited to gain unauthenticated admin access via the Modular DS WordPress plugin. The post 40K WordPress Installs at Risk From Modular DS Admin Bypass appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…
Securing AI-Generated Code: Preventing Phantom APIs and Invisible Vulnerabilities
The conference room went silent when the fintech’s CISO pulled up the logs. There, buried in production traffic, sat an endpoint nobody had documented: /api/debug/users. It was leaking customer data with every ping. The engineer who’d committed the module swore…