When ransomware cripples a business’s systems or stealthy malware slips past defenses, the first instinct is to get everything back online as quickly as possible. That urgency is understandable — Cybersecurity Ventures estimates ransomware damage costs $156 million per day.…
Cyber Briefing: 2026.01.23
GitLab auth bypasses, phishing installs RMM backdoors, new ransomware strains, supply-chain leaks, DeFi hacks, GDPR fines surge, and policy shifts emerge. This article has been indexed from CyberMaterial Read the original article: Cyber Briefing: 2026.01.23
Why Asia’s Public Sector Is Rethinking Cyber Resilience
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Why Asia’s Public Sector Is Rethinking Cyber Resilience
Akamai Block Storage Makes Block Disk Encryption the Default in Terraform
Learn about the early 2026 Terraform update, how the change will affect your workflow, and how to successfully navigate any issues that may arise. This article has been indexed from Blog Read the original article: Akamai Block Storage Makes Block…
CISA Updates KEV Catalog with 4 Critical Vulnerabilities Following Ongoing Exploits
The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) Catalogue with four critical security flaws affecting widely-used enterprise software and development tools. All vulnerabilities were added on January 22, 2026, with a standardized deadline of…
20,000 WordPress Sites Compromised by Backdoor Vulnerability Enabling Malicious Admin Access
A critical backdoor vulnerability discovered in the LA-Studio Element Kit for the Elementor plugin poses an immediate threat to more than 20,000 WordPress installations. The vulnerability, tracked as CVE-2026-0920 with a CVSS severity rating of 9.8 (Critical), enables unauthenticated attackers…
Fake Captcha Exploits Trusted Web Infrastructure to Distribute Malware
Fake Captcha and “ClickFix” lures have emerged as among the most persistent and deceptive malware-delivery mechanisms on the modern web. These pages mimic legitimate verification challenges from trusted services like Cloudflare, tricking users into executing malicious commands disguised as security…
TrustAsia Pulls 143 Certificates Following Critical LiteSSL ACME Vulnerability
TrustAsia has revoked 143 SSL/TLS certificates following the discovery of a critical vulnerability in its LiteSSL ACME service. The flaw, disclosed on January 21, 2026, permitted the reuse of domain validation data across different ACME accounts, allowing unauthorized certificate issuance…
Fortinet Confirms Active Exploitation of FortiCloud SSO Bypass Vulnerability
Fortinet has officially confirmed active exploitation of critical FortiCloud single sign-on (SSO) authentication bypass vulnerabilities affecting multiple enterprise security appliances. The company disclosed two vulnerabilities CVE-2025-59718 and CVE-2025-59719 discovered during internal code audits in December 2025, with exploitation attempts now…
Okta Uncovers Custom Phishing Kits Built for Vishing Callers
They can intercept user credentials while providing real-time context that helps attackers convince victims to approve MFA challenges during phone calls.. The post Okta Uncovers Custom Phishing Kits Built for Vishing Callers appeared first on TechRepublic. This article has been…
Fortinet Firewalls Targeted as Attackers Bypass Patch for Critical FortiGate Flaw
Critical vulnerabilities in FortiGate systems continue to be exploited, even after fixes were deployed, users now confirm. Though updates arrived aiming to correct the problem labeled CVE-2025-59718, they appear incomplete. Authentication safeguards can still be sidestepped by threat actors…
NHS Issues Open Letter Demanding Improved Cybersecurity Standards from Suppliers
Open letter by NHS technology leaders outlines plans to identify risks to software supply chain security across health and social care system This article has been indexed from www.infosecurity-magazine.com Read the original article: NHS Issues Open Letter Demanding Improved Cybersecurity…
Everest Ransomware Hits Under Armour
Approximately 72.7 million Under Armour accounts have been added to the Have I Been Pwned database following an alleged ransomware attack. This article has been indexed from CyberMaterial Read the original article: Everest Ransomware Hits Under Armour
Europe GDPR Fines Hit 1.2B Euros
Europe’s data protection landscape shifted significantly in 2025 as total annual fines exceeded 1.2 billion euros amid a surge in reported security incidents. This article has been indexed from CyberMaterial Read the original article: Europe GDPR Fines Hit 1.2B Euros
Saga Falls Victim To DeFi Hack
Saga has halted its EVM blockchain following an exploit that resulted in the theft of approximately $7 million. This article has been indexed from CyberMaterial Read the original article: Saga Falls Victim To DeFi Hack
UK Launches New Report Fraud Service
British authorities have officially introduced Report Fraud, a central national service designed to modernize how the public reports cybercrime and improve subsequent police investigations. This article has been indexed from CyberMaterial Read the original article: UK Launches New Report Fraud…
eBay Bans Illicit Automated Shopping
eBay recently updated its User Agreement to explicitly forbid unauthorized third-party buy-for-me agents and AI chatbots from placing orders on its platform. This article has been indexed from CyberMaterial Read the original article: eBay Bans Illicit Automated Shopping
Building Cyber Readiness Early: Why Youth Education Is a Security Imperative
Cyber security is often framed as a problem for enterprises, governments, and seasoned professionals. But by the time organizations begin searching for talent, the damage has often already been done. Threat actors don’t wait for workforce pipelines to catch up…
Hackers Can Use GenAI to Change Loaded Clean Page Into Malicious within Seconds
A new and alarming threat has emerged in the cybersecurity landscape where attackers combine artificial intelligence with web-based attacks to transform innocent-looking webpages into dangerous phishing tools in real time. Security researchers discovered that cybercriminals are now leveraging generative AI…
Top 10 Best Data Security Companies in 2026
Data security companies are essential in 2026 for protecting sensitive information amid rising cyber threats and complex cloud environments. In 2026, data security has become a top priority for organizations of all sizes as cyber threats, regulatory pressure, and cloud…
In Other News: €1.2B GDPR Fines, Net-NTLMv1 Rainbow Tables, Rockwell Security Notice
Other noteworthy stories that might have slipped under the radar: Cloudflare WAF bypass, Canonical Snap Store abused for malware delivery, Curl terminating bug bounty program The post In Other News: €1.2B GDPR Fines, Net-NTLMv1 Rainbow Tables, Rockwell Security Notice appeared…
Fortinet Confirms FortiCloud SSO Exploitation Against Patched Devices
Similar to recent FortiCloud single sign-on (SSO) login vulnerabilities, the attacks bypass authentication. The post Fortinet Confirms FortiCloud SSO Exploitation Against Patched Devices appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Fortinet Confirms…
Teaching Cyber: Building the Bridge Between Education and Industry
A practical roadmap for preparing the next generation of cybersecurity professionals through education–industry collaboration. This article has been indexed from CyberMaterial Read the original article: Teaching Cyber: Building the Bridge Between Education and Industry
IT Security News Hourly Summary 2026-01-23 15h : 12 posts
12 posts were published in the last hour 13:34 : Phishers Abuse SharePoint in New Campaign Targeting Energy Sector 13:34 : Kimwolf Botnet Hijacks 1.8M Android Devices for DDoS Chaos 13:7 : New Watering Hole Attacking EmEditor User with Stealer…