4 posts were published in the last hour 17:2 : Critical Flaw Puts WHILL Electric Wheelchairs at Risk of Hijacking 16:32 : Hacker Claims 200GB Data Theft From European Space Agency — Here’s What We Know 16:31 : Brit lands…
Critical Flaw Puts WHILL Electric Wheelchairs at Risk of Hijacking
A critical Bluetooth flaw could allow nearby attackers to remotely control WHILL electric wheelchairs, posing serious safety risks. The post Critical Flaw Puts WHILL Electric Wheelchairs at Risk of Hijacking appeared first on eSecurity Planet. This article has been indexed…
Hacker Claims 200GB Data Theft From European Space Agency — Here’s What We Know
The European Space Agency confirmed a cyber incident after a hacker claimed to access and steal data from external collaboration servers. The post Hacker Claims 200GB Data Theft From European Space Agency — Here’s What We Know appeared first on…
Brit lands invite-only Aussie visa after uncovering vuln in government systems
Jacob Riggs is set to swap London for Sydney some time in the next year A British security researcher has secured Australia’s strictest, invite-only visa after discovering a critical vulnerability in a government system.… This article has been indexed from…
Why Lightweight Browsers Are the Key to Faster, More Focused Web Productivity
As modern web browsers continue to expand into multifunctional platforms, they often sacrifice speed and efficiency in the process. What was once a simple tool for accessing the internet has become a complex workspace packed with features that many…
Debugging DNS response times with tshark, (Fri, Jan 2nd)
One of my holiday projects was to redo and optimize part of my home network. One of my homelab servers failed in November. I had only thrown the replacement in the rack to get going, but some cleanup was needed. In…
Covenant Health data breach after ransomware attack impacted over 478,000 people
Covenant Health suffered a ransomware attack by the Qilin group in May 2025, compromising data of over 478,000 individuals. Covenant Health, Inc., based in Andover, Massachusetts, is a healthcare organization that provides medical services and patient care. Covenant Health operates…
Best of 2025: Huge Food Wholesaler Paralyzed by Hack — is it Scattered Spider Again?
UNFInished business: We were warned this would happen. And now here we are. The post Best of 2025: Huge Food Wholesaler Paralyzed by Hack — is it Scattered Spider Again? appeared first on Security Boulevard. This article has been indexed…
South Africa Warns of Cybercrime Surge Amid Festive Season
South Africa is experiencing a sudden and deeply concerning rise in cybercrime this holiday season, with consumers and businesses being warned to prepare for more aggressive attacks on digital banking, mobile applications and online services. Surge in festive-season attacks The…
Cyber Briefing: 2026.01.02
ClickFix scams scale, Zoom Stealer hits millions, MongoBleed exploited, major data breaches surface, ESA hacked, big M&A, and arrests unfold. This article has been indexed from CyberMaterial Read the original article: Cyber Briefing: 2026.01.02
TriZetto Data Breach Triggers Class-Action Lawsuits Against Cognizant
Cognizant faces lawsuits after a prolonged TriZetto data breach exposed sensitive healthcare data. The post TriZetto Data Breach Triggers Class-Action Lawsuits Against Cognizant appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article:…
Hackers Abusing Google Tasks Notification for Sophisticated Phishing Attack
Hackers have launched a sophisticated phishing campaign exploiting Google Tasks notifications to target over 3,000 organizations worldwide, primarily in the manufacturing sector. The December 2025 attacks signal a dangerous shift in email-based threats, in which attackers abuse legitimate Google infrastructure…
Handala Hackers Targeted Israeli Officials by Compromising Telegram Accounts
In December 2025, the Iranian-linked hacking group Handala claimed to have fully compromised the mobile devices of two prominent Israeli political figures. However, detailed analysis by Kela cyber intelligence researchers revealed a more limited scope—the breaches targeted Telegram accounts specifically,…
10,000+ Fortinet Firewalls Still Exposed to 5-year Old MFA Bypass Vulnerability
Over 10,000 Fortinet firewalls worldwide remain vulnerable to CVE-2020-12812, a multi-factor authentication (MFA) bypass flaw disclosed over five and a half years ago. Shadowserver recently added the issue to its daily Vulnerable HTTP Report, highlighting persistent exposure amid active exploitation…
5 UC and collaboration trends reshaping the market in 2026
<p>If 2024 was the year generative AI arrived, then 2025 was the year of the AI agent. Almost every vendor in the unified communications and collaboration (UCC) space released an AI-powered agent, beginning the march toward agentic AI to give…
The Kimwolf Botnet is Stalking Your Local Network
The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide security advisory. The vulnerability at issue has been exploited for months already, and it’s time for a broader awareness of the threat. The…
Best of 2025: NIST Launches Updated Incident Response Guide
The National Institute of Standards and Technology (NIST) has released a long-awaited update to its incident response guidance: Special Publication 800-61 Revision 3 (SP 800-61r3). This new version, titled “Incident Response Recommendations and Considerations for Cybersecurity Risk Management,” aligns closely…
Antivirus vs Identity Protection Software: What to Choose and How?
Users often put digital security into a single category and confuse identity protection with antivirus, assuming both work the same. But they are not. Before you buy one, it is important to understand the difference between the two. This blog…
Amazon Links Five-Year Cloud Cyber Campaign to Russia’s Sandworm Group
Amazon is talking about a hacking problem that has been going on for a long time. This problem was targeting customers who use cloud services in countries. Amazon says that a group called Sandworm, which is linked to Russias…
IT Security News Hourly Summary 2026-01-02 15h : 8 posts
8 posts were published in the last hour 14:2 : RondoDoX Botnet Abuses React2Shell Vulnerability for Malware Deployment 14:2 : Cognizant Faces Multiple US Class-Action Lawsuits After TriZetto Data Breach 14:2 : Hacker Group Claims Responsibility for Alleged Tokyo FM…
RondoDoX Botnet Abuses React2Shell Vulnerability for Malware Deployment
CloudSEK has uncovered a sustained nine-month campaign by the RondoDoX botnet operation, revealing rapid exploitation of emerging vulnerabilities including the critical React2Shell vulnerability. Analysis of exposed command-and-control logs spanning March through December 2025 demonstrates how threat actors swiftly adapted attack…
Cognizant Faces Multiple US Class-Action Lawsuits After TriZetto Data Breach
Cognizant Technology Solutions is facing a wave of legal challenges in the United States following a significant data breach at its subsidiary, TriZetto Provider Solutions (TPS). The IT services giant has been hit with at least three class-action lawsuits alleging…
Hacker Group Claims Responsibility for Alleged Tokyo FM Broadcasting Breach
A threat actor operating under the alias “victim” has claimed responsibility for a significant data breach targeting Tokyo FM Broadcasting Co., Ltd., a central radio broadcasting station in Japan. The alleged intrusion, which was observed on January 1, 2025, reportedly…
Google Tasks Feature Exploited in New Sophisticated Phishing Campaign
Over 3,000 organisations, predominantly in manufacturing, fell victim to a sophisticated phishing campaign in December 2025 that leveraged Google’s own application infrastructure to bypass enterprise email security controls. Attackers sent deceptive messages from noreply-application-integration@google.com, marking a critical shift in how threat…