Victim and Big Brother Watch will argue the Met’s policies are incompatible with human rights law The High Court will hear from privacy campaigners this week who want to reshape the way the Metropolitan Police is allowed to use live…
WhatsApp Faces Increased EU Oversight
EU designates Meta’s WhatsApp as very large online platform, after Channels feature crosses key usage threshold in the region This article has been indexed from Silicon UK Read the original article: WhatsApp Faces Increased EU Oversight
Samsung To Ship Next-Gen Memory To Nvidia In February
Following delays, Samsung reportedly plans to begin shipping next-gen HBM4 memory chips to Nvidia, AMD in February for use with AI chips This article has been indexed from Silicon UK Read the original article: Samsung To Ship Next-Gen Memory To…
Office zero-day exploited in the wild forces Microsoft OOB patch
Another actively abused Office bug, another emergency patch – Office 2016 and 2019 users are left with registry tweaks instead of fixes. Microsoft has issued an emergency Office patch after confirming a zero-day flaw is already being used in real…
Organizations Warned of Exploited Linux Vulnerabilities
The flaws allow threat actors to obtain root privileges or bypass authentication via Telnet and gain shell access as root. The post Organizations Warned of Exploited Linux Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Microsoft Releases Patch for Office Zero Day Amid Evidence of Exploitation
Microsoft urged customers running Microsoft Office 2016 and 2019 to apply the patch to be protected This article has been indexed from www.infosecurity-magazine.com Read the original article: Microsoft Releases Patch for Office Zero Day Amid Evidence of Exploitation
IT Security News Hourly Summary 2026-01-27 12h : 6 posts
6 posts were published in the last hour 10:34 : Amnesia RAT deployed in multi-stage phishing attacks against Russian users 10:34 : He Who Controls the Key Controls the World – Microsoft “Often” Provides BitLocker Keys to Law Enforcement 10:5…
Amnesia RAT deployed in multi-stage phishing attacks against Russian users
A multi-stage phishing campaign targets users in Russia with ransomware and Amnesia RAT using fake business documents as lures. FortiGuard Labs researchers uncovered a multi-stage malware campaign mainly targeting users in Russia. The attack uses fake business documents as social…
He Who Controls the Key Controls the World – Microsoft “Often” Provides BitLocker Keys to Law Enforcement
Encryption doesn’t guarantee privacy—key ownership does. This article explains how cloud-stored encryption keys let third parties unlock your data, exposing the hidden risks behind “secure” services like BitLocker and Gmail. The post He Who Controls the Key Controls the World…
France Lower House Approves Social Media Ban
France’s National Assembly approves key measures in social media ban for under-15s amid international momentum for restrictions This article has been indexed from Silicon UK Read the original article: France Lower House Approves Social Media Ban
China-Aligned APTs Use PeckBirdy C&C Framework in Multi-Vector Attacks, Exploiting Stolen Certificates
Since 2023, a dangerous malware framework called PeckBirdy has emerged as a primary weapon used by Chinese-aligned hacking groups. This JavaScript-based tool serves as a command-and-control platform designed to work across multiple system environments, giving attackers remarkable flexibility in how…
Multiple Vulnerabilities in React Server Components Enable DoS Attacks
Multiple critical security vulnerabilities have recently been disclosed in React Server Components, enabling threat actors to launch Denial-of-Service (DoS) attacks against vulnerable servers. The flaws, tracked as CVE-2026-23864 with a CVSS score of 7.5, are due to incomplete patches from…
APT Hackers Attacking Indian Government Using GOGITTER Tool and GITSHELLPAD Malware
Advanced persistent threat actors operating from Pakistan have launched coordinated attacks against Indian government organizations using newly discovered tools and malware designed to bypass security defenses. The campaign, identified as Gopher Strike, emerged in September 2025 and represents a significant…
Critical Vulnerability in Python PLY Library Enables Remote Code Execution – PoC Published
A critical vulnerability has been identified in the PyPI-distributed version of PLY (Python Lex-Yacc) 3.11, allowing arbitrary code execution through unsafe deserialization of untrusted pickle files. The vulnerability, assigned CVE-2025-56005, affects the undocumented picklefile parameter in the yacc() function, which remains absent from official…
Caminho Loader-as-a-Service Using Steganography to Conceal .NET Payloads within Image Files
Caminho Loader is a new Loader-as-a-Service threat that blends steganography, fileless execution, and cloud abuse to quietly deliver malware across several regions. First seen in March 2025 and believed to originate from Brazil, this service hides .NET payloads inside harmless-looking…
World Leaks Ransomware Group Claims 1.4TB Nike Data Breach
Nike is investigating after the World Leaks ransomware group posted a 1.4TB data dump This article has been indexed from www.infosecurity-magazine.com Read the original article: World Leaks Ransomware Group Claims 1.4TB Nike Data Breach
Germany To Strengthen Cyber Countermeasures
Germany plans to enable and deploy stronger cyber-attack countermeasures to take action against foreign powers such as Russia This article has been indexed from Silicon UK Read the original article: Germany To Strengthen Cyber Countermeasures
Microsoft reveals actively exploited Office zero-day, provides emergency fix (CVE-2026-21509)
Microsoft released emergency Office security updates to fix a security feature bypass vulnerability (CVE-2026-21509) that its threat intelligence and security teams spotted being exploited in the wild in zero-day attacks. Users and admins are advised to review the associated advisory…
Microsoft Begins Deploying Next-Gen AI Chip
Microsoft now beginning to deploy new in-house AI chip Maia 200 within its own AI team and to power Copilot, following delays This article has been indexed from Silicon UK Read the original article: Microsoft Begins Deploying Next-Gen AI Chip
Microsoft Patches Office Zero-Day Likely Exploited in Targeted Attacks
The vulnerability is tracked as CVE-2026-21509 and it can be exploited to bypass security features. The post Microsoft Patches Office Zero-Day Likely Exploited in Targeted Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Why Cyber Fusion Centers and Zero-Trust Work Better Together
Cyber fusion centers make zero-trust more effective by improving visibility, automating response, and shrinking the window for attacks. The post Why Cyber Fusion Centers and Zero-Trust Work Better Together appeared first on Security Boulevard. This article has been indexed from…
Microsoft Office Zero-Day (CVE-2026-21509) – Emergency Patch Issued for Active Exploitation
Microsoft on Monday issued out-of-band security patches for a high-severity Microsoft Office zero-day vulnerability exploited in attacks. The vulnerability, tracked as CVE-2026-21509, carries a CVSS score of 7.8 out of 10.0. It has been described as a security feature bypass…
Google Pays $68m To Settle Assistant Privacy Claims
Google agrees to pay $68m to settle class action claiming digital assistant recorded private conversations, passed data to advertisers This article has been indexed from Silicon UK Read the original article: Google Pays $68m To Settle Assistant Privacy Claims
Zscaler expands AI security capabilities to deliver visibility, control, and governance
Zscaler has announced new AI security innovations designed to empower enterprises to secure the fast growing use of AI, while maintaining visibility, control, and governance. As organizations adopt generative AI and prepare for the use of agentic AI, they face…