Mozilla launched Firefox 147 on January 13, 2026, to resolve 16 security vulnerabilities affecting critical systems like JavaScript and network protocols. This article has been indexed from CyberMaterial Read the original article: Firefox 147 Fixes Code Execution Flaws
Maine Healthcare Breach Exposes Data
A significant data breach at Central Maine Healthcare recently concluded its investigation, revealing that the personal information of over 145,000 people was compromised. This article has been indexed from CyberMaterial Read the original article: Maine Healthcare Breach Exposes Data
Monroe University Data Breach Affects Many
Monroe University recently confirmed that a cyberattack in late 2024 resulted in the theft of sensitive data belonging to more than 320,000 individuals. This article has been indexed from CyberMaterial Read the original article: Monroe University Data Breach Affects Many
Hackers Steal Student Data In Victoria
The Victorian Department of Education recently confirmed a data breach involving a database containing personal information and email addresses of both current and former students. This article has been indexed from CyberMaterial Read the original article: Hackers Steal Student Data…
IT Security News Hourly Summary 2026-01-15 15h : 13 posts
13 posts were published in the last hour 13:32 : Aembit Announces Agenda and Speaker Lineup for NHIcon 2026 on Agentic AI Security 13:32 : New CastleLoader Variant Linked to 469 Infections Across Critical Sectors 13:32 : Patch Now: Active…
Aembit Announces Agenda and Speaker Lineup for NHIcon 2026 on Agentic AI Security
Silver Spring, Maryland, 15th January 2026, CyberNewsWire This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the original article: Aembit Announces Agenda and Speaker Lineup for NHIcon 2026 on Agentic AI Security
New CastleLoader Variant Linked to 469 Infections Across Critical Sectors
ANY.RUN report reveals how the new CastleLoader malware targets US government agencies using stealthy ClickFix tricks and memory-based attacks to bypass security. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the original…
Patch Now: Active Exploitation Underway for Critical HPE OneView Vulnerability
Executive Summary Check Point Research identified active, large-scale exploitation of CVE-2025-37164, a critical remote code execution vulnerability affecting HPE OneView. The exploitation campaign is attributed to the RondoDox botnet and escalated rapidly to tens of thousands of automated attack attempts.…
Former CISA Director Jen Easterly Will Lead RSA Conference
The longtime cybersecurity professional says she’s taking the helm of the legacy security organization at “an inflection point” for tech and the world beyond. This article has been indexed from Security Latest Read the original article: Former CISA Director Jen…
Bridging Cybersecurity and AI
New AI threats challenge the traditional CVE. Discover how to modernize vulnerability sharing frameworks and secure AI systems. The post Bridging Cybersecurity and AI appeared first on Palo Alto Networks Blog. This article has been indexed from Palo Alto Networks…
Turla’s Kazuar v3 Loader Leverages Event Tracing for Windows and Bypasses Antimalware Scan Interface
Turla, a sophisticated threat actor known for targeted cyber attacks, has deployed an upgraded version of its Kazuar v3 loader that introduces advanced evasion techniques designed to bypass modern security defenses. This latest iteration, discovered in January 2026, showcases a…
New Sicarii RaaS Operation Attacks Exposed RDP Services and Attempts to Exploit Fortinet Devices
In December 2025, a previously unknown ransomware-as-a-service operation named Sicarii emerged across underground platforms, introducing itself as an Israeli or Jewish affiliated group. The operation stands apart from typical financially motivated ransomware due to its explicit use of Hebrew language,…
Woman bailed as cops probe doctor’s surgery data breach
Suspect assisting West Midlands Police over alleged theft at Walsall GP practice The UK’s West Midlands Police has released a woman on bail as part of an investigation into a data breach at a Walsall general practitioner’s (GP) surgery.… This…
isVerified Emerges From Stealth With Voice Deepfake Detection Apps
isVerified provides Android and iOS mobile applications designed to protect enterprise communications. The post isVerified Emerges From Stealth With Voice Deepfake Detection Apps appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: isVerified Emerges…
Classroom Device Management: 8 Strategies for K-12 Success
Digital devices now shape daily instruction in K–12 classrooms. Laptops, tablets, and phones support research, collaboration in the classroom, and blended learning. Many schools also cater for bring your own device (BYOD) environments. These tools can unlock engagement and creativity,…
Delinea Acquries StrongDM to Secure Access to IT Infrastructure
Delinea announces the acquisition of StrongDM to enhance its privileged access management platform, offering just-in-time access for IT infrastructure and improving cybersecurity for human and non-human identities. The post Delinea Acquries StrongDM to Secure Access to IT Infrastructure appeared first…
PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
A critical vulnerability (CVE-2025-64155) in Fortinet’s FortiSIEM security platform has now been accompanied by publicly released proof-of-concept (PoC) exploit code, raising the urgency for organizations to patch immediately. About CVE-2025-64155 CVE-2025-64155 may allow unauthenticated, remote attackers to execute unauthorized code…
Model Security Is the Wrong Frame – The Real Risk Is Workflow Security
As AI copilots and assistants become embedded in daily work, security teams are still focused on protecting the models themselves. But recent incidents suggest the bigger risk lies elsewhere: in the workflows that surround those models. Two Chrome extensions posing…
Palo Alto Networks addressed a GlobalProtect flaw, PoC exists
Palo Alto Networks addressed a flaw impacting GlobalProtect Gateway and Portal, for which a proof-of-concept (PoC) exploit exists. Palo Alto Networks addressed a high-severity vulnerability, tracked as CVE-2026-0227 (CVSS score: 7.7), affecting GlobalProtect Gateway and Portal, for which a proof-of-concept (PoC) exploit…
New Vulnerability in n8n
This isn’t good: We discovered a critical vulnerability (CVE-2026-21858, CVSS 10.0) in n8n that enables attackers to take over locally deployed instances, impacting an estimated 100,000 servers globally. No official workarounds are available for this vulnerability. Users should upgrade to…
Critical WordPress Plugin Vulnerability Exploited in the Wild to Gain Instant Admin Access
A critical unauthenticated privilege escalation vulnerability in the Modular DS WordPress plugin allows attackers to gain instant admin access, with exploitation confirmed in the wild. Affecting over 40,000 sites, the flaw in versions up to 2.5.1 has prompted urgent patches…
Firefox 147 Released With Fixes for 16 Vulnerabilities that Enable Arbitrary Code Execution
Mozilla released Firefox 147 on January 13, 2026, addressing 16 security vulnerabilities detailed in the Mozilla Foundation Security Advisory. The update patches critical issues across components such as graphics, JavaScript, and networking, addressing six high-impact flaws, including multiple sandbox escapes,…
Critical Cal.com Vulnerability Let Attackers Bypass Authentication and Hijack any User Account
A critical authentication bypass vulnerability in Cal.com’s scheduling platform enables attackers to hijack any user account by exploiting a flaw in the NextAuth JWT callback mechanism. Tracked as CVE-2026-23478, this vulnerability affects versions from 3.1.6 up to but not including…
Microsoft and Authorities Dismatles BEC Attack Chain Powered by RedVDS Fraud Engine
A joint operation led by Microsoft and international law enforcement has dismantled a business email compromise (BEC) attack chain powered by the RedVDS fraud engine. RedVDS operated as a low‑cost “cybercrime subscription” platform, giving criminals disposable virtual machines that looked…