Pondurance launched RansomSnare, a new module for its MDR service that halts ransomware attacks at the moment the malicious process attempts to encrypt files and prevents threat actors from exfiltrating sensitive data. RansomSnare is a next-generation ransomware prevention capability that…
US cyber chief uploaded sensitive files into public ChatGPT, Vibe-coded ‘Sicarii’ ransomware can’t be decrypted, WhatsApp account feature combats spyware
US cyber chief uploaded sensitive files into public ChatGPT Vibe-coded ‘Sicarii’ ransomware can’t be decrypted WhatsApp account feature combats spyware Huge thanks to our episode sponsor, Conveyor Ever dream of giving customers instant answers to their security questions without ever…
Report Of High-Level UK China Hack Questioned
Commentators question Telegraph report that China-backed hacking group targeted mobile phones of senior UK officials for several years This article has been indexed from Silicon UK Read the original article: Report Of High-Level UK China Hack Questioned
Critical OpenSSL Vulnerabilities Allow Remote Attackers to Execute Malicious Code
OpenSSL patched 12 vulnerabilities on January 27, 2026, including one high-severity flaw that could lead to remote code execution. Most issues cause denial-of-service attacks but highlight risks in parsing untrusted data. The most serious issue, CVE-2025-15467, hits CMS AuthEnvelopedData parsing…
Fortinet Disables FortiCloud SSO Following 0-day Vulnerability Exploited in the Wild
Fortinet temporarily disabled its FortiCloud Single Sign-On (SSO) service after confirming active exploitation of a zero-day authentication bypass vulnerability in multiple products. The issue, tracked as FG-IR-26-060, allows attackers with a malicious FortiCloud account to log into devices registered to…
IT Security News Hourly Summary 2026-01-28 09h : 7 posts
7 posts were published in the last hour 8:5 : HoneyMyte Hacker Group Updates CoolClient Malware to Deploy Browser Login Data Stealer 8:4 : WhatsApp New Strict Account Settings Option to Protect Your Account from Hackers 8:4 : High-Severity Remote…
16 Malicious Chrome Extensions as ChatGPT Enhancements Steals ChatGPT Logins
Researchers have uncovered a significant security threat targeting ChatGPT users through deceptive browser extensions. A coordinated campaign involving 16 malicious Chrome extensions has been discovered, all designed to appear as legitimate productivity tools and ChatGPT enhancement applications. These malware extensions…
HoneyMyte Hacker Group Updates CoolClient Malware to Deploy Browser Login Data Stealer
The HoneyMyte threat group, also known as Mustang Panda or Bronze President, continues to pose a significant risk to government organizations across Asia and Europe. Recent security research has revealed that this advanced hacker collective is actively upgrading its digital…
WhatsApp New Strict Account Settings Option to Protect Your Account from Hackers
WhatsApp has introduced Strict Account Settings, a lockdown-style security feature designed to protect users from highly sophisticated cyber-attacks. The new privacy feature is specifically tailored for individuals who may be targets of advanced threats, including journalists, activists, and public figures…
High-Severity Remote Code Execution Vulnerability Patched in OpenSSL
A total of 12 vulnerabilities have been fixed in OpenSSL, all discovered by a single cybersecurity firm. The post High-Severity Remote Code Execution Vulnerability Patched in OpenSSL appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Another Credential Leak, Another Dollar
A 149M-credential breach shows why encryption alone isn’t enough. Infostealer malware bypasses cloud security by stealing passwords at the endpoint—where encryption offers no protection. The post Another Credential Leak, Another Dollar appeared first on Security Boulevard. This article has been…
Android just got smarter at stopping snatch-and-run phone thefts
Google announced updates to the Android theft protection features that expand existing safeguards and make stolen devices harder to use. These updates are available on Android 16 and later. One update builds on Failed Authentication Lock, a feature introduced in…
WhatsApp Introduces High-Security Mode for Users Facing Advanced Threats
WhatsApp has announced a new optional security feature aimed at users who face a higher risk of targeted cyberattacks. The mode, called Strict Account Settings, adds an extra layer of protection by […] Thank you for being a Ghacks reader.…
CERT UEFI Parser: Open-source tool exposes UEFI architecture to uncover vulnerabilities
CERT UEFI Parser, a new open-source security analysis tool from the CERT Coordination Center has been released to help researchers and defenders examine the structure of Unified Extensible Firmware Interface (UEFI) software and identify classes of vulnerabilities that are often…
Google Warns of WinRAR Vulnerability Exploited to Gain Control Over Windows System
A critical security flaw in WinRAR, one of the most widely used file compression tools for Windows, has become a favorite weapon for attackers seeking unauthorized access to computer systems. The vulnerability, tracked as CVE-2025-8088, allows threat actors to place…
OpenSSL Vulnerabilities Allow Remote Attackers to Execute Malicious Code
OpenSSL patched 12 vulnerabilities on January 27, 2026, including one high-severity flaw that could lead to remote code execution. Most issues cause denial-of-service attacks but highlight risks in parsing untrusted data. The most serious issue, CVE-2025-15467, hits CMS AuthEnvelopedData parsing…
Microsoft Issues Emergency Patch for Actively Exploited Office Zero-Day (CVE-2026-21509)
In a critical “out-of-band” security update released on January 26, 2026, Microsoft confirmed that threat actors are actively… The post Microsoft Issues Emergency Patch for Actively Exploited Office Zero-Day (CVE-2026-21509) appeared first on Hackers Online Club. This article has been…
Why prevention-first secrets security will define enterprise scale: Learnings from a leading telecom
Once a secret enters Git, it’s expensive to remediate. But the real problem runs deeper than cost. Grégory Maitrallain, Solution Architect at Orange Business, discovered this reality during their implementation: “Once a secret is pushed to GitLab or GitHub, you…
Audits for AI systems that keep changing
Security and risk teams often rely on documentation and audit artifacts that reflect how an AI system worked months ago. ETSI’s continuous auditing based conformity assessment specification (ETSI TS 104 008) describes a different approach, where conformity is evaluated through…
Grammarly and QuillBot are among widely used Chrome extensions facing serious privacy questions
A new study shows that some of the most widely used AI-powered browser extensions are a privacy risk. They collect lots of data and require a high level of browser access. The research was conducted by Incogni, which analyzed 442…
Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected
Fortinet has begun releasing security updates to address a critical flaw impacting FortiOS that has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2026-24858 (CVSS score: 9.4), has been described as an authentication bypass related…
What’s App Privacy Lawsuit
Cybersecurity Today: WhatsApp Privacy Lawsuit, Google’s Personal AI, Canada Computers Breach, and Mass Password Leak In this episode, host Jim Love discusses pressing cybersecurity issues, including a lawsuit against WhatsApp for allegedly misleading users about message privacy, concerns over Google’s…
IT Security News Hourly Summary 2026-01-28 06h : 5 posts
5 posts were published in the last hour 4:34 : Cryptographic Agility for Contextual AI Resource Governance 4:9 : How does Agentic AI reduce risks in digital environments? 4:9 : Can compliance automation keep regulators satisfied? 4:9 : How does…
Cryptographic Agility for Contextual AI Resource Governance
Master cryptographic agility for AI resource governance. Learn how to secure Model Context Protocol (MCP) with post-quantum security and granular policy control. The post Cryptographic Agility for Contextual AI Resource Governance appeared first on Security Boulevard. This article has been…