A medium-severity vulnerability in the Iconics Suite SCADA system that could allow attackers to trigger denial-of-service conditions on critical industrial control systems. The flaw, tracked as CVE-2025-0921, affects supervisory control and data acquisition infrastructure widely deployed across automotive, energy, and…
Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
Google-owned Mandiant on Friday said it identified an “expansion in threat activity” that uses tradecraft consistent with extortion-themed attacks orchestrated by a financially motivated hacking group known as ShinyHunters. The attacks leverage advanced voice phishing (aka vishing) and bogus credential…
IT Security News Hourly Summary 2026-01-31 09h : 2 posts
2 posts were published in the last hour 7:33 : CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms 7:7 : Quantifying cyber risk at Netflix, Highmark Health: Case studies
CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms
CERT Polska, the Polish computer emergency response team, revealed that coordinated cyber attacks targeted more than 30 wind and photovoltaic farms, a private company from the manufacturing sector, and a large combined heat and power plant (CHP) supplying heat to…
Quantifying cyber risk at Netflix, Highmark Health: Case studies
<p>In 2019, CISO Omar Khawaja set out to transform the compliance-driven security culture at Highmark Health — a nonprofit healthcare company based in Pittsburgh — to one focused on business outcomes and risk.</p> <p>Khawaja turned to the <a href=”https://www.techtarget.com/searchsecurity/tip/Using-the-FAIR-model-to-quantify-cyber-risk”>Factor Analysis…
2026-01-31: Traffic analysis exercise: Lumma in the room-ah!
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Malware-Traffic-Analysis.net – Blog Entries Read the original article: 2026-01-31: Traffic analysis exercise: Lumma in the room-ah!
In-Depth Look at Phishing and Cybersecurity Culture with David Shipley | Cybersecurity Today
In this episode of Cybersecurity Today, host Jim Love welcomes David Shipley, CEO of Beauceron Security, as a guest. Together, they delve into the latest research from Beauceron Security with assistance from he University of Montreal. They discuss the effectiveness…
2026-01-30: PhantomStealer infection
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Malware-Traffic-Analysis.net – Blog Entries Read the original article: 2026-01-30: PhantomStealer infection
We Keep Hearing the Same Question: Morpheus (AI SOC) vs. Traditional SOAR
SOC teams keep asking how the AI SOC differs from traditional SOAR. Here’s what Morpheus does differently—from integration maintenance to false negatives. The post We Keep Hearing the Same Question: Morpheus (AI SOC) vs. Traditional SOAR appeared first on D3…
IT Security News Hourly Summary 2026-01-31 03h : 3 posts
3 posts were published in the last hour 1:34 : DynoWiper update: Technical analysis and attribution 1:34 : This month in security with Tony Anscombe – January 2026 edition 1:34 : Friday Squid Blogging: New Squid Species Discovered
DynoWiper update: Technical analysis and attribution
ESET researchers present technical details on a recent data destruction incident affecting a company in Poland’s energy sector This article has been indexed from WeLiveSecurity Read the original article: DynoWiper update: Technical analysis and attribution
This month in security with Tony Anscombe – January 2026 edition
The trends that emerged in January offer useful clues about the risks and priorities that security teams are likely to contend with throughout the year This article has been indexed from WeLiveSecurity Read the original article: This month in security…
Friday Squid Blogging: New Squid Species Discovered
A new species of squid. pretends to be a plant: Scientists have filmed a never-before-seen species of deep-sea squid burying itself upside down in the seafloor—a behavior never documented in cephalopods. They captured the bizarre scene while studying the depths…
How is Agentic AI changing healthcare security
How Does Agentic AI Revolutionize Healthcare Security? Are you prepared to explore the transformative power of Agentic AI in securing the healthcare industry? The intersection of artificial intelligence and cybersecurity has opened doors to innovative methodologies. This sector is under…
What future trends will define Agentic AI governance
How Are Non-Human Identities Shaping Cloud Security? What does it take to bridge the gap between security and R&D teams when managing non-human identities in cloud environments? Non-human identities (NHIs) are pivotal in modern cybersecurity frameworks, acting as machine identities…
Can Agentic AI ensure full IAM compliance
Why Are Non-Human Identities Crucial for Cloud Security? Does your organization fully understand the importance of Non-Human Identities (NHIs) in cybersecurity? With a crucial component of cloud security, managing these machine identities effectively can be the key to minimizing risks…
How secure are secrets vaults in cloud environments
Are You Overlooking Non-Human Identities in Cloud Security? Machine identities have emerged as critical components that require immediate attention and robust management. Where organizations increasingly rely on digital transformations and cloud environments, the security of Non-Human Identities (NHIs) and their…
Guidance from the Frontlines: Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS
Introduction Mandiant is tracking a significant expansion and escalation in the operations of threat clusters associated with ShinyHunters-branded extortion. As detailed in our companion report, ‘Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft’, these campaigns leverage evolved…
Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft
Introduction Mandiant has identified an expansion in threat activity that uses tactics, techniques, and procedures (TTPs) consistent with prior ShinyHunters-branded extortion operations. These operations primarily leverage sophisticated voice phishing (vishing) and victim-branded credential harvesting sites to gain initial access to…
Privileged File System Vulnerability Present in a SCADA System
We detail our discovery of CVE-2025-0921, a privileged file system flaw in Iconics Suite (SCADA) that attackers could exploit to cause a denial-of-service (DoS) attack. The post Privileged File System Vulnerability Present in a SCADA System appeared first on Unit…
News brief: Patch critical and high-severity vulnerabilities now
<p>More than 48,000 Common Vulnerabilities and Exposures were tracked in the CVE database in 2025, up approximately 20% from 2024 and 66% from 2023. If these trends continue, the number of CVEs in 2026 could reach anywhere from 57,600 to…
IT Security News Hourly Summary 2026-01-31 00h : 4 posts
4 posts were published in the last hour 22:55 : IT Security News Daily Summary 2026-01-30 22:36 : Informant told FBI that Jeffrey Epstein had a ‘personal hacker’ 22:13 : January blues return as Ivanti coughs up exploited EPMM zero-days…
IT Security News Daily Summary 2026-01-30
128 posts were published in the last hour 22:36 : Informant told FBI that Jeffrey Epstein had a ‘personal hacker’ 22:13 : January blues return as Ivanti coughs up exploited EPMM zero-days 22:13 : NDSS 2025 – Silence False Alarms…
Informant told FBI that Jeffrey Epstein had a ‘personal hacker’
The hacker allegedly developed zero-day exploits and offensive cyber tools and sold them to several countries, including an unnamed central African government, the U.K., and the United States. This article has been indexed from Security News | TechCrunch Read the…