Portnox has unveiled a major expansion of its zero trust network access (ZTNA) solution, extending credential-free access beyond web and on-premises applications to include enterprise console-based applications. Organizations can eliminate passwords and credentials from administrative access via Remote Desktop Protocol…
Imprivata delivers passwordless access to improve security, compliance, and productivity
Imprivata has introduced comprehensive new capabilities to enable the next generation of fast, frictionless, and passwordless access for frontline staff, knowledge workers, and all other enterprise users. Imprivata Enterprise Access Management (EAM) now offers context-aware passwordless authentication, identity verification, and…
Most Engagement Data Is Compromised and That’s a Major Security Problem
Most engagement data is compromised by bots and spoofing. Datavault AI treats engagement as a security problem, verifying real human actions at the source. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read…
Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps
The purpose of this Alert is to amplify Poland’s Computer Emergency Response Team (CERT Polska’s) Energy Sector Incident Report published on Jan. 30, 2026, and highlight key mitigations for Energy Sector stakeholders. In December 2025, a malicious cyber actor(s) targeted…
Safer Internet Day 2026 – Addressing the Age of Artificial Intelligence
Safer Internet Day takes place during an era of heavy AI usage amongst individuals of all ages. This year’s theme ‘Smart tech, safe choices – Exploring the safe and responsible use of AI’ urges digital mindfulness in navigating AI and…
Next Gen Spotlights: Turning Behavioural Intelligence into a Powerful Tool Against Fraud and Crime – Q&A with Paddy Lawton, Co-Founder of FACT360
Founded on pioneering British research and real-world intelligence applications, FACT360 is using behavioural analytics to help governments and organisations detect fraud, terrorism and serious crime without breaching privacy. The Gurus spoke to Paddy Lawton, Founder of FACT360, about the origins…
Backslash Raises $19 Million to Secure Vibe Coding
The company will use the investment to expand its R&D team and operations, deepen platform capabilities, and scale go-to-market presence. The post Backslash Raises $19 Million to Secure Vibe Coding appeared first on SecurityWeek. This article has been indexed from…
Versa SASE Platform Now Prevents Sensitive Data From Being Shared With AI
Versa has enhanced its SASE platform by integrating text analysis and optical character recognition (OCR) capabilities to better identify sensitive data and improve cybersecurity. The updates aim to provide deeper insights for teams dealing with AI-related data risks, reduce false…
Backslash Security raises $19 million to address AI coding security risks
Backslash Security announced a $19 million Series A funding round led by KOMPAS VC, with participation from Maniv, Artofin Venture Capital, and existing investors StageOne Ventures and First Rays Capital. The round, which follows Backslash’s $8 million seed funding, tracks…
Armis Centrix brings unified, AI-driven application security to the SDLC
Armis has announced Armis Centrix for Application Security, which unifies application security across an organization’s software development lifecycle. The technology helps security teams secure code as a next-generation attack vector to fortify organizations’ defenses and protect against cyber threats. “To…
Trojanized 7-Zip downloads turn home computers into proxy nodes
A trojanized version of the popular 7-Zip software is quietly turning home computers into residential proxy nodes, Malwarebytes warns. Spurred by a Reddit post in which a user complained about getting infected with malware after downloading 7-Zip from 7zip[.]com instead…
BloodHound Scentry helps organizations reduce identity risk and close attack paths
SpecterOps has announced BloodHound Scentry, a new service designed to help customers accelerate their APM practice and reduce identity risk. BloodHound Scentry combines the power of BloodHound Enterprise with SpecterOps tradecraft experts and practitioners to provide customers with tailored guidance…
From Ransomware to Residency: Inside the Rise of the Digital Parasite
Are ransomware and encryption still the defining signals of modern cyberattacks, or has the industry been too fixated on noise while missing a more dangerous shift happening quietly all around them? According to Picus Labs’ new Red Report 2026, which…
Fugitive Gets 20 Years In Crypto Scam
A U.S. This article has been indexed from CyberMaterial Read the original article: Fugitive Gets 20 Years In Crypto Scam
EU Says TikTok Faces Major Fine
The European Commission has issued preliminary findings stating that TikTok is in breach of the Digital Services Act due to addictive design features like infinite scroll and autoplay. This article has been indexed from CyberMaterial Read the original article: EU…
New Tool Blocks Imposter Command Attacks
Tirith is a new cross-platform, open-source tool designed to prevent homoglyph attacks by inspecting shell commands for deceptive URLs before they execute. This article has been indexed from CyberMaterial Read the original article: New Tool Blocks Imposter Command Attacks
Hackers Weaponize 7-Zip Downloads to Turn Home PCs Into Proxy Nodes
A fake website impersonating the popular 7-Zip file archiver has been distributing malicious software that secretly converts infected computers into residential proxy nodes. The counterfeit site has been operating undetected for an extended period, exploiting user trust in what appears…
Global Cyber Attacks Rise in January 2026 Amid Increasing Ransomware Activity and Expanding GenAI Risks
Global Attack Volumes Climb Worldwide In January 2026, the global volume of cyber attacks continued its steady escalation. Organizations worldwide experienced an average of 2,090 cyber‑attacks per organization per week, marking a 3% increase from December and a 17% rise…
Coming Soon: Discord to Roll Out Global Age Verification Using Facial Scans, ID
Discord will soon roll out global age verification, using age inference plus video selfie or ID checks to limit access to sensitive content. Find out when. The post Coming Soon: Discord to Roll Out Global Age Verification Using Facial Scans,…
Attackers Weaponizing Windows Shortcut File to Deliver Global Group Ransomware
The cyber threat landscape is witnessing the resurgence of the Phorpiex botnet, a long-standing malware-as-a-service platform active for over a decade. In a recent high-volume campaign, attackers are distributing phishing emails with the deceptive subject line “Your Document.” These emails…
Windows Error Reporting Service Vulnerability Let Attackers Elevate Privileges – PoC Released
A critical security flaw in Windows Error Reporting Service has been discovered, allowing attackers with standard user access to escalate their privileges to SYSTEM-level control. CVE-2026-20817, patched by Microsoft in January 2026, represents a significant threat to Windows environments due…
VoidLink Linux C2 Highlights LLM-Generated Malware with Multi-Cloud and Kernel-Level Stealth
A sophisticated Linux malware framework known as VoidLink has emerged as a concerning example of AI-assisted threat development, combining advanced multi-cloud targeting capabilities with kernel-level stealth mechanisms. The malware represents a new generation of cyber threats where large language models…
Threat Actors Exploiting React2Shell Vulnerability Using AI-Generated Malware
A fully AI-generated malware campaign actively exploiting the “React2Shell” vulnerability, detected within Darktrace’s “CloudyPots” global honeypot network, the intrusion highlights a critical shift in cybercrime: the weaponization of Large Language Models (LLMs) to lower the barrier of entry for effective…
How safe are kids using social media? We did the groundwork
Our research found that mainstream platforms often protect children well—until curiosity or the wrong settings get in the way. This article has been indexed from Malwarebytes Read the original article: How safe are kids using social media? We did the…