Microsoft is rolling out a new role-based access control (RBAC) role designed to simplify external collaboration management in Microsoft Teams. The Teams External Collaboration Administrator role will become available starting late January 2026, with full global deployment expected by mid-February 2026. The…
Tag: Cyber Security News
CISA Retires Ten Emergency Directives Following Milestone Achievement
The Cybersecurity and Infrastructure Security Agency (CISA) announced a significant milestone on January 8, 2026, by retiring ten Emergency Directives issued between 2019 and 2024. This marks the highest number of Emergency Directives retired by the agency simultaneously, reflecting progress…
Beware of Fake WinRAR Website That Delivers Malware with WinRAR Installer
A newly discovered malware campaign is using fake WinRAR download sites to deliver the dangerous Winzipper malware directly to unsuspecting users. The attack emerged from links distributed across various Chinese websites, targeting users who attempt to download the popular file…
CrowdStrike to Acquire Identity Security Startup SGNL in $740 Million Deal
CrowdStrike announced its agreement to acquire SGNL, a leading identity-first security company, for $740 million. The acquisition marks a significant strategic move to strengthen CrowdStrike’s Falcon Next-Gen Identity Security platform. Address the growing complexity of protecting human, non-human, and AI…
FBI Warns of Kimsuky Actors Leverage Malicious QR Codes to Target U.S. Organizations
North Korean state‑sponsored group Kimsuky is running new spearphishing campaigns that abuse QR codes to compromise U.S. organizations. The FBI warns that think tanks, NGOs, academic bodies, and government‑linked entities with a North Korea focus are now being lured with…
10 Best Automatic WiFi Security Providers – 2026
In 2026, pinpointing top automatic WiFi security providers demands emphasis on ironclad encryption, unwavering reliability, and multifaceted defenses against public hotspot dangers. Automatic WiFi Security embedded in VPNs or dedicated apps auto-engages upon detecting unsecured networks, shielding traffic from eavesdropping,…
5 Sandbox Tools for Phishing Analysis in 2026
Analysts have numerous options for probing phishing attacks, but a single malware analysis sandbox often suffices. Blending static and dynamic analysis, these tools excel against even the most elusive phishing threats. Discover five top sandbox solutions to elevate your investigations.…
10 Best Web Security Scanners For Vulnerability Scanning – 2026
Vulnerability scanning anchors any robust cybersecurity strategy, pinpointing and patching flaws before exploitation leads to breaches. From startups to global enterprises, selecting the optimal web security scanner determines resilience against costly incidents. This guide spotlights the 10 leading web vulnerability…
Top 10 Best Managed Service Providers (MSP) for CISO, CTO & IT Managers – 2026
Managed Service Providers (MSPs) deliver streamlined IT services to multiple clients via centralized platforms that automate core operations. These solutions handle user provisioning, software licensing, patch management, and uniform service rollout across diverse customer environments. They provide real-time system health…
How U.S K-12 Schools Can Solve Their Top 10 Cybersecurity Challenges – Free E-Book
K-12 IT teams face intensifying pressure to deliver affordable cybersecurity, as attackers exploit schools as “soft targets” rich in sensitive student data. Beyond students’ skills tests, educators must counter ransomware, phishing, and breaches head-on. Explore the top 10 challenges in…
Top 10 Most Common Cyber Attacks of 2026
2026 stood as a turning point in cybersecurity, with cyberattacks surging in frequency, sophistication, and disruption. Rapid digital transformation and hyper-connected systems handed attackers unprecedented opportunities to exploit flaws. From ransomware paralyzing critical infrastructure to AI-powered phishing schemes, cybercriminals blended…
Microsoft Defender’s Blocks Legitimate MAS Amid Fake Script Hunt
In a classic “Microsoft moment,” Windows Defender has started blocking the popular open-source Microsoft Activation Scripts (MAS) tool while targeting fake impostors, without verifying whether it’s also snaring the real deal. Users running the genuine PowerShell command now receive “Trojan:PowerShell/FakeMas.DA!MTB”…
Trend Micro Apex Central Vulnerabilities Enables Remote Code Execution Attacks
Critical security patches to address three severe vulnerabilities affecting Apex Central (on-premise) that could allow remote attackers to execute malicious code or launch denial-of-service attacks on vulnerable systems. Trend Micro issued the patches on January 7, 2026, urging all affected…
OWASP CRS Vulnerability Allows Attackers to Bypass Charset Validation
A critical vulnerability in the OWASP Core Rule Set (CRS) has been discovered that allows attackers to bypass important security protections designed to prevent charset-based attacks. The vulnerability, tracked as CVE-2026-21876, affects rule 922110 and carries a severity score of…
10 Best Bot Protection Software – 2026
Automated bot attacks in 2026 have surged in sophistication, hitting websites, APIs, and mobile apps with credential stuffing, scraping, DDoS, and fake account floods driving breaches, outages, revenue hits, and reputational harm. Leading bot protection platforms counter with AI, machine…
New Ghost Tapped Attack Uses Your Android Device to Drain Your Bank Account
Chinese threat actors have developed a dangerous new way to steal money directly from bank accounts using specially crafted Android applications. Known as Ghost Tapped, these malicious apps exploit Near Field Communication (NFC) technology, the same wireless technology that powers…
Hackers Actively Exploiting AI Deployments – 91,000+ Attack Sessions Observed
Security researchers have identified over 91,000 attack sessions targeting AI infrastructure between October 2025 and January 2026, exposing systematic campaigns against large language model deployments. GreyNoise’s Ollama honeypot infrastructure captured 91,403 attack sessions during this period, revealing two distinct threat…
SmarterTools SmarterMail Vulnerability Enables Remote Code Execution Attack – PoC Released
A critical pre-authentication remote code execution vulnerability, identified as CVE-2025-52691, has been discovered in SmarterTools’ SmarterMail solution. The flaw received a maximum CVSS score of 10.0, indicating its severe nature and potential impact on affected systems. SmarterTools describes SmarterMail as…
Cisco Small Business Switches Face Global DNS Crash Outage
Network administrators worldwide reported widespread crashes in Cisco small business switches on January 8, 2026, triggered by fatal errors in the DNS client service. Devices entered reboot loops every few minutes, disrupting operations until DNS configurations were removed. The issue…
What tools help reduce fraud or friendly fraud for online businesses?
A customer buys. You ship. Everyone seems happy. Then, a few weeks later, you get a chargeback. Or you notice the same card being tried again and again in a few seconds, failing at first and then working. It can…