Microsoft is rolling out a new role-based access control (RBAC) role designed to simplify external collaboration management in Microsoft Teams. The Teams External Collaboration Administrator role will become available starting late January 2026, with full global deployment expected by mid-February 2026. The…
CISA Retires Ten Emergency Directives Following Milestone Achievement
The Cybersecurity and Infrastructure Security Agency (CISA) announced a significant milestone on January 8, 2026, by retiring ten Emergency Directives issued between 2019 and 2024. This marks the highest number of Emergency Directives retired by the agency simultaneously, reflecting progress…
Beware of Fake WinRAR Website That Delivers Malware with WinRAR Installer
A newly discovered malware campaign is using fake WinRAR download sites to deliver the dangerous Winzipper malware directly to unsuspecting users. The attack emerged from links distributed across various Chinese websites, targeting users who attempt to download the popular file…
Trend Micro Patches Critical Code Execution Flaw in Apex Central
Tenable has released PoC code and technical details after the vendor announced the availability of patches for three vulnerabilities. The post Trend Micro Patches Critical Code Execution Flaw in Apex Central appeared first on SecurityWeek. This article has been indexed…
377,000 Impacted In Texas Gas Data Breach
A Texas-based gas station operator recently informed the Maine Attorney General’s Office of a significant data breach that compromised the personal information of over 377,000 people. This article has been indexed from CyberMaterial Read the original article: 377,000 Impacted In…
Truebit Token Crashes After Hack
The Truebit TRU token lost nearly all of its value following a security breach that drained approximately 8,535 ether from the protocol’s reserves. This article has been indexed from CyberMaterial Read the original article: Truebit Token Crashes After Hack
Iran Cuts Internet Amid Protest Crackdown
Iran has implemented a total internet blackout across the country as widespread demonstrations continue to escalate in numerous cities. This article has been indexed from CyberMaterial Read the original article: Iran Cuts Internet Amid Protest Crackdown
Gmail New AI Inbox Uses Gemini
Google is launching AI Inbox, a feature that uses Gemini to summarize your emails and highlight your most important tasks. This article has been indexed from CyberMaterial Read the original article: Gmail New AI Inbox Uses Gemini
Russia Frees French Researcher In Swap
French researcher Laurent Vinatier has returned to France following his release from a three-year prison sentence in Russia as part of a high-profile prisoner exchange. This article has been indexed from CyberMaterial Read the original article: Russia Frees French Researcher…
From Code to Runtime: How AI Is Bridging the SAST–DAST Gap
Let’s start with two pillars that modern application security teams rely on: Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST). SAST is a method in which source code is analyzed early in the application development lifecycle to…
Opening the Automation Garden: API Request & Webhook Trigger in Infinity Playblocks
Today’s security teams work in complex, multi-tool environments. Alerts flow from SIEMs, tickets are created in ITSM platforms, actions occur in cloud and network controls, and workflows span countless third-party services. To keep pace, automation must be open, flexible, and…
China-linked cybercrims abused VMware ESXi zero-days a year before disclosure
Huntress analysis suggests VM escape bugs were already weaponized in the wild Chinese-linked cybercriminals were sitting on a working VMware ESXi hypervisor escape kit more than a year before the bugs it relied on were made public.… This article has…
CISA Closes 10 Emergency Directives as Vulnerability Catalog Takes Over
The Emergency Directives were retired because they achieved objectives or targeted vulnerabilities included in the KEV catalog. The post CISA Closes 10 Emergency Directives as Vulnerability Catalog Takes Over appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
NordPass streamlines two-factor authentication with a built-in Authenticator across devices
NordPass simplifies secure logins by including Authenticator on multiple devices in the application for personal use. The time-based one-time password (TOTP) support enables users to add an extra layer of security to their accounts with two-factor authentication, without the need…
IT Security News Hourly Summary 2026-01-09 15h : 12 posts
12 posts were published in the last hour 13:32 : CrowdStrike to Acquire Identity Security Startup SGNL in $740 Million Deal 13:32 : FBI Warns of Kimsuky Actors Leverage Malicious QR Codes to Target U.S. Organizations 13:32 : European Commission…
CrowdStrike to Acquire Identity Security Startup SGNL in $740 Million Deal
CrowdStrike announced its agreement to acquire SGNL, a leading identity-first security company, for $740 million. The acquisition marks a significant strategic move to strengthen CrowdStrike’s Falcon Next-Gen Identity Security platform. Address the growing complexity of protecting human, non-human, and AI…
FBI Warns of Kimsuky Actors Leverage Malicious QR Codes to Target U.S. Organizations
North Korean state‑sponsored group Kimsuky is running new spearphishing campaigns that abuse QR codes to compromise U.S. organizations. The FBI warns that think tanks, NGOs, academic bodies, and government‑linked entities with a North Korea focus are now being lured with…
European Commission opens consultation on EU digital ecosystems
The European Commission has opened a public call for evidence on European open digital ecosystems, a step toward a planned Communication that will examine the role of open source in EU’s digital infrastructure. The consultation runs from January 6 to…
Europol Leads Global Crackdown on Black Axe Cybercrime Gang, 34 Arrested
Europol-backed operation targets group behind numerous BEC attacks and romance scams This article has been indexed from www.infosecurity-magazine.com Read the original article: Europol Leads Global Crackdown on Black Axe Cybercrime Gang, 34 Arrested
CISA’s 7 Biggest Challenges in 2026
From infrastructure protection to improving morale, the cybersecurity agency has a lot on its plate — and it still lacks a leader. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: CISA’s 7 Biggest…
Are we ready for ChatGPT Health?
Linking your medical records to ChatGPT Health may give you personalized wellness answers, but it also comes with serious privacy implications. This article has been indexed from Malwarebytes Read the original article: Are we ready for ChatGPT Health?
‘ZombieAgent’ Attack Let Researchers Take Over ChatGPT
Radware bypassed ChatGPT’s protections to exfiltrate user data and implant a persistent logic into the agent’s long-term memory. The post ‘ZombieAgent’ Attack Let Researchers Take Over ChatGPT appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Sectigo New Public Roots and Issuing CAs Hierarchy [2025 Migration Guide]
The majority of certificate outages don’t begin with a breach alert. They are silent at first. One day, a browser warning appears when your website loads, causing users to hesitate and your traffic to decline. This is due to the…
Peek-A-Boo! 🫣 Emoji Smuggling and Modern LLMs – FireTail Blog
Jan 09, 2026 – Viktor Markopoulos – We often trust what we see. In cybersecurity, we are trained to look for suspicious links, strange file extensions, or garbled code. But what if the threat looked exactly like a smiling face…