IBM has warned organizations using its API Connect platform about a severe security vulnerability that could allow unauthorized individuals to access applications remotely. The company has urged customers to apply security updates immediately to reduce the risk of exploitation. API…
Tokyo FM Data Breach: Hacker Claims Over 3 Million Records Stolen
Tokyo FM is investigating claims of a massive data breach involving 3 million records. Learn what information was allegedly taken and how you can stay safe. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and…
Cybercrook claims to be selling infrastructure info about three major US utilities
For the bargain price of 6.5 bitcoin A cybercrook claims to have breached Pickett and Associates, a Florida-based engineering firm whose clients include major US utilities, and is selling what they claim to be about 139 GB of engineering data…
DarkSpectre Malware Hit 8.8M Browsers via Malicious Extensions
DarkSpectre infected over 8.8 million browser users by abusing trusted extensions and advanced evasion techniques. The post DarkSpectre Malware Hit 8.8M Browsers via Malicious Extensions appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…
5 Challenges and Solutions in Mobile App Testing
Testing is one of the final stages of mobile app development before you’re ready for launch. The finish line may seem close, but it might not be. If you encounter mobile app testing challenges unprepared, you may have to push…
IT Security News Hourly Summary 2026-01-02 18h : 4 posts
4 posts were published in the last hour 17:2 : Critical Flaw Puts WHILL Electric Wheelchairs at Risk of Hijacking 16:32 : Hacker Claims 200GB Data Theft From European Space Agency — Here’s What We Know 16:31 : Brit lands…
Critical Flaw Puts WHILL Electric Wheelchairs at Risk of Hijacking
A critical Bluetooth flaw could allow nearby attackers to remotely control WHILL electric wheelchairs, posing serious safety risks. The post Critical Flaw Puts WHILL Electric Wheelchairs at Risk of Hijacking appeared first on eSecurity Planet. This article has been indexed…
Hacker Claims 200GB Data Theft From European Space Agency — Here’s What We Know
The European Space Agency confirmed a cyber incident after a hacker claimed to access and steal data from external collaboration servers. The post Hacker Claims 200GB Data Theft From European Space Agency — Here’s What We Know appeared first on…
Brit lands invite-only Aussie visa after uncovering vuln in government systems
Jacob Riggs is set to swap London for Sydney some time in the next year A British security researcher has secured Australia’s strictest, invite-only visa after discovering a critical vulnerability in a government system.… This article has been indexed from…
Why Lightweight Browsers Are the Key to Faster, More Focused Web Productivity
As modern web browsers continue to expand into multifunctional platforms, they often sacrifice speed and efficiency in the process. What was once a simple tool for accessing the internet has become a complex workspace packed with features that many…
Debugging DNS response times with tshark, (Fri, Jan 2nd)
One of my holiday projects was to redo and optimize part of my home network. One of my homelab servers failed in November. I had only thrown the replacement in the rack to get going, but some cleanup was needed. In…
Covenant Health data breach after ransomware attack impacted over 478,000 people
Covenant Health suffered a ransomware attack by the Qilin group in May 2025, compromising data of over 478,000 individuals. Covenant Health, Inc., based in Andover, Massachusetts, is a healthcare organization that provides medical services and patient care. Covenant Health operates…
Best of 2025: Huge Food Wholesaler Paralyzed by Hack — is it Scattered Spider Again?
UNFInished business: We were warned this would happen. And now here we are. The post Best of 2025: Huge Food Wholesaler Paralyzed by Hack — is it Scattered Spider Again? appeared first on Security Boulevard. This article has been indexed…
South Africa Warns of Cybercrime Surge Amid Festive Season
South Africa is experiencing a sudden and deeply concerning rise in cybercrime this holiday season, with consumers and businesses being warned to prepare for more aggressive attacks on digital banking, mobile applications and online services. Surge in festive-season attacks The…
Cyber Briefing: 2026.01.02
ClickFix scams scale, Zoom Stealer hits millions, MongoBleed exploited, major data breaches surface, ESA hacked, big M&A, and arrests unfold. This article has been indexed from CyberMaterial Read the original article: Cyber Briefing: 2026.01.02
TriZetto Data Breach Triggers Class-Action Lawsuits Against Cognizant
Cognizant faces lawsuits after a prolonged TriZetto data breach exposed sensitive healthcare data. The post TriZetto Data Breach Triggers Class-Action Lawsuits Against Cognizant appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article:…
Hackers Abusing Google Tasks Notification for Sophisticated Phishing Attack
Hackers have launched a sophisticated phishing campaign exploiting Google Tasks notifications to target over 3,000 organizations worldwide, primarily in the manufacturing sector. The December 2025 attacks signal a dangerous shift in email-based threats, in which attackers abuse legitimate Google infrastructure…
Handala Hackers Targeted Israeli Officials by Compromising Telegram Accounts
In December 2025, the Iranian-linked hacking group Handala claimed to have fully compromised the mobile devices of two prominent Israeli political figures. However, detailed analysis by Kela cyber intelligence researchers revealed a more limited scope—the breaches targeted Telegram accounts specifically,…
10,000+ Fortinet Firewalls Still Exposed to 5-year Old MFA Bypass Vulnerability
Over 10,000 Fortinet firewalls worldwide remain vulnerable to CVE-2020-12812, a multi-factor authentication (MFA) bypass flaw disclosed over five and a half years ago. Shadowserver recently added the issue to its daily Vulnerable HTTP Report, highlighting persistent exposure amid active exploitation…
5 UC and collaboration trends reshaping the market in 2026
<p>If 2024 was the year generative AI arrived, then 2025 was the year of the AI agent. Almost every vendor in the unified communications and collaboration (UCC) space released an AI-powered agent, beginning the march toward agentic AI to give…
The Kimwolf Botnet is Stalking Your Local Network
The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide security advisory. The vulnerability at issue has been exploited for months already, and it’s time for a broader awareness of the threat. The…
Best of 2025: NIST Launches Updated Incident Response Guide
The National Institute of Standards and Technology (NIST) has released a long-awaited update to its incident response guidance: Special Publication 800-61 Revision 3 (SP 800-61r3). This new version, titled “Incident Response Recommendations and Considerations for Cybersecurity Risk Management,” aligns closely…
Antivirus vs Identity Protection Software: What to Choose and How?
Users often put digital security into a single category and confuse identity protection with antivirus, assuming both work the same. But they are not. Before you buy one, it is important to understand the difference between the two. This blog…
Amazon Links Five-Year Cloud Cyber Campaign to Russia’s Sandworm Group
Amazon is talking about a hacking problem that has been going on for a long time. This problem was targeting customers who use cloud services in countries. Amazon says that a group called Sandworm, which is linked to Russias…