
Google Targets IPIDEA in Crackdown on Global Residential Proxy Networks
Google and partners disrupted the IPIDEA residential proxy network, one of the world’s largest, by taking down domains, sharing intelligence, and enforcing Play Protect. The operation removed SDKs embedded in millions of Android, Windows, iOS, and WebOS apps, sharply reducing the pool of compromised devices. Researchers found IPIDEA’s SDKs power multiple proxy services and were leveraged by over 550 threat groups in January 2026. Google’s coordinated effort with Cloudflare, Spur, and Black Lotus Labs aims to curb the gray‑market residential proxy ecosystem.
Why a Gradual Move Away From US Tech Is a Good Idea
Brian Honan’s article in the Irish Examiner warns Irish small businesses and families that dependence on US‑based technology platforms can jeopardise digital sovereignty. He cites scenarios where tariffs, sanctions or policy shifts could abruptly block access to email, documents or...
Forget Predictions: True 2026 Cybersecurity Priorities From Leaders
BH Consulting’s CEO Brian Honan was featured in Security Week, outlining the firm’s view of the top cybersecurity priorities for 2026. The piece highlights BH Consulting’s 20‑year track record, ISO‑27001 certification, and its portfolio of services including CISO/DPO as‑a‑service, audits...

Bridging Compliance and Cybersecurity in Financial Reporting in 2026
The SEC is drafting rules that will require public companies to disclose their cybersecurity controls as part of regular financial reporting. This links cyber risk directly to compliance, forcing firms to treat security as a core reporting element. The article...

Universal Privacy Framework Achieves Untrusted Data Security in Distributed Quantum Sensing
Researchers from Korea Institute of Science and Technology and Yonsei University introduced a universal operational privacy framework for distributed quantum sensing. The framework defines privacy through the experimentally accessible classical Fisher information matrix, making it protocol‑independent and applicable to singular...

SEALSQ to Showcase Post-Quantum Cybersecurity Solutions at Tech&Fest 2026 in Grenoble
SEALSQ Corp (NASDAQ: LAES) will display its post‑quantum cybersecurity portfolio at Tech&Fest 2026 in Grenoble on February 4‑5, highlighting hardware‑based roots of trust. The French subsidiary, SEALSQ France, builds on three decades of secure‑semiconductor expertise inherited from Gemplus and employs nearly 200 staff...

Satellite Quantum-Internet to Reach $1.82B in 2026 with 32.9% CAGR
A new ResearchAndMarkets.com report projects the satellite quantum‑internet market to reach $1.82 billion in 2026, up from $1.37 billion in 2025, representing a 32.9% compound annual growth rate. The market is expected to expand to $5.63 billion by 2030 with a sustained 32.6%...

Data Protection Day 2026: Addressing Common Challenges
The Data Protection Day 2026 blog highlights six persistent GDPR challenges—stale ROPAs, weak retention schedules, overlooked paper records, unprepared DSAR processes, outdated accountability documentation, and insufficient vendor risk controls. It explains how each issue creates hidden exposure and offers concrete...

Texas Declares War on Chinese Tech — And It’s Getting Weird
Governor Greg Abbott announced an expanded ban on Chinese‑linked technology for Texas state employees, prohibiting hardware, software, and AI tools from firms such as Alibaba, Shein, Temu, TP‑Link and CATL. The measure, framed as a privacy safeguard against foreign surveillance,...

SuperQ Quantum Appoints Cybersecurity Veteran to Lead Post-Quantum Commercialization in 2026
SuperQ Quantum Computing Inc. announced the appointment of Brian Beveridge, a 30‑year cybersecurity veteran, as Director of Post‑Quantum Cybersecurity and Partnerships, effective Jan 22 2026. Beveridge will lead the commercialization of the company’s SuperPQC™ suite, which protects against “Harvest Now, Decrypt Later”...

Booz Allen Tech Contractor Took IRS Job Specifically to Leak Trump's Tax Records
The U.S. Treasury Department announced it is terminating all 31 contracts with consulting firm Booz Allen Hamilton, representing $4.8 million in annual spend and $21 million in obligations, after a Booz Allen contractor, Charles Littlejohn, stole and leaked more than 400,000 taxpayer records,...

Reliance Global Group Acquires Stake in Post-Quantum Cybersecurity Firm Enquantum
Reliance Global Group announced a non‑binding term sheet to acquire a controlling interest in post‑quantum cryptography firm Enquantum Ltd. through its new EZRA International subsidiary. Enquantum’s hardware‑accelerated, FPGA‑based solutions promise terabit‑level, quantum‑resistant encryption, addressing performance concerns of software‑only PQC. The...

They're Coming for Our Kids: How Extremists Target Children Online
Extremist groups are increasingly targeting children on platforms such as Discord, Instagram, Reddit, and gaming chats, turning these digital third spaces into recruitment hubs. In 2024, teenagers accounted for roughly two‑thirds of ISIS‑linked arrests in Europe, and similar patterns are...
Reduce Ecommerce Account Takeovers: Where a VPN Actually Helps
The episode explains how e‑commerce businesses can curb account takeovers by integrating a dedicated IP VPN into their admin workflows. It outlines an access‑control playbook that routes all Shopify and financial dashboard logins through an encrypted VPN tunnel, reducing false...
Emergency Microsoft Update Fixes In-the-Wild Office Zero-Day
Microsoft released emergency out‑of‑band updates to remediate CVE‑2026‑21509, a zero‑day flaw actively exploited in the wild. The vulnerability bypasses OLE security controls in Office 2016 through 2024 and Microsoft 365 Apps, allowing attackers to execute malicious code via crafted Office...

01 Quantum Reports Q4 2025 Revenue Growth & PQC Deployments
01 Quantum Inc., rebranded from 01 Communique Laboratory, reported FY 2025 revenue of $767,993—up 86% from the prior year—driven by commercial deployments of post‑quantum cryptography (PQC) solutions such as DoMobile Ver.5. The company raised $3.78 million in equity financing and continues to...

Nike Is Investigating a Possible Data Breach, After WorldLeaks Claims
Nike announced it is probing a potential cyber incident after the WorldLeaks group claimed to have accessed and exfiltrated roughly 1.4 TB of company data. The hacker collective, which evolved from the Hunters International ransomware gang, posted the alleged breach on...

Coinbase Establishes Quantum Computing Advisory Board with Stanford & UT Austin Experts
Coinbase announced the creation of an Independent Advisory Board on Quantum Computing and Blockchain, staffed by leading researchers from Stanford University and the University of Texas at Austin, including Scott Aaronson and Dan Boneh. The board will develop position papers...

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 81
Security Affairs’ Malware Newsletter Round 81 curates the latest threats and research across the malware landscape. Highlights include the emergence of AI‑generated malware frameworks such as VoidLink, sophisticated evasion tactics like PDFSIDER’s DLL side‑loading, and supply‑chain abuse via a malicious...

Carahsoft Expands Quantum-Resilient Cybersecurity Offerings with Cyber Intell
Carahsoft Technology Corp. has signed a Master Government Aggregator partnership with Cyber Intell Solution to distribute the patented CISEN‑SDN‑PQC quantum‑resistant platform to U.S. federal, state and local agencies. The collaboration leverages the ITES‑SW2 contract (W52P1J‑20‑D‑0042) and additional procurement vehicles to...
What Is A Website Crawler? 12 Bot Management Strategies
Ilya Grigorik explains that over half of web traffic now comes from bots, dividing them into good (search), grey (AI training/fetchers) and bad (malicious scrapers) and urging e‑commerce teams to treat this "post‑human" reality as a core business concern. He...
The CISO's Craft: Watchmaker or Gardener?
The article contrasts two CISO archetypes—the Watchmaker, who builds tightly controlled, auditable security frameworks, and the Gardener, who cultivates an adaptive, culture‑driven security ecosystem. Each style offers distinct strengths: predictability and strong foundations versus flexibility and empowerment. However, both suffer...

GBAC Launches Quantum Strategic Intelligence Standard at World Economic Forum
Global Board Advisors Corp and BoardroomEducation.com introduced the Quantum Strategic Intelligence (QSI) framework at the World Economic Forum in Davos, positioning it as an open Sovereignty Standard for quantum‑computing and agentic‑AI risks. QSI extends existing ERM models such as COSO,...

U.S. CISA Adds a Flaw in Broadcom VMware vCenter Server to Its Known Exploited Vulnerabilities Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the critical VMware vCenter Server flaw CVE-2024-37079 to its Known Exploited Vulnerabilities (KEV) catalog. The heap‑overflow bug in the DCERPC implementation carries a CVSS score of 9.8 and enables remote...

Device-Independent QKD Achieves Key Generation with Photonic Devices, Overcoming 1 Challenge
Researchers at Université Paris‑Saclay and Université Côte d’Azur have demonstrated a device‑independent quantum key distribution (DIQKD) protocol using a photonic circuit identified through machine learning. By introducing a block‑hierarchy semidefinite programming method and a finite‑size security analysis, they show that...

Cyberattack Targeting Poland’s Energy Grid Used a Wiper
At the end of December, a wiper‑type malware dubbed DynoWiper attempted to compromise Poland’s power generation and distribution systems. European security firm ESET traced the code to the Russian Sandworm group with medium confidence, noting similarities to previous attacks on...

Advances Post-Quantum Aggregation with Code-Based Homomorphic Encryption and LPN
Researchers at the Technical University of Munich present a post‑quantum secure aggregation protocol built on code‑based homomorphic encryption under the Learning Parity with Noise (LPN) assumption. The design features a key‑ and message‑additive homomorphic scheme, a committee‑based decryptor realized via...

Governing Cybersecurity in the AI Era -Pwc Workshop 2026
PwC‑affiliated firm A.F. Ferguson & Co. hosted a one‑day masterclass titled “Governing Cybersecurity in the AI Era – Digital Trust, Risk & Resilience” on 22 January 2026 in Karachi. More than 100 senior technology and business leaders, including CISOs, CIOs and CFOs,...
Kasada Launches AI Agent Trust to Secure Agentic Commerce
Kasada, a bot management and fraud protection company, unveiled AI Agent Trust, a solution designed to secure automated traffic on digital commerce sites. The platform provides a searchable directory that verifies AI agents and lets brands apply policy‑based controls to...
Canada Court Overturns Order to Close TikTok Operations
Canada’s Federal Court has overturned a government directive that would have forced TikTok to shut down its Canadian operations. Judge Russell Zinn set aside the order and instructed Industry Minister Melanie Joly to conduct a new security review. The ruling...
Zoom Fixed Critical Node Multimedia Routers Flaw
Zoom released security patches that fix a critical command‑injection flaw (CVE‑2026‑22844) in its Node Multimedia Routers (MMR). The vulnerability, rated 9.9 on the CVSS scale, could let a meeting participant execute arbitrary code on affected MMRs. Versions prior to 5.2.1716.0...
EnduraData and the Rise of Continuous Replication as a Cyber-Resilience Standard
The episode explains why continuous, delta‑only replication is evolving from a backup shortcut into a core cyber‑resilience control, enabling near‑real‑time data availability across hybrid environments and reducing reliance on fragile, manual recovery steps. It highlights how this approach mitigates both...

Advances Post-Quantum PKI: Defining Requirements for Secure X.509 Certificate Transition
The paper outlines a roadmap for transitioning X.509 PKI to post‑quantum cryptography, detailing required changes to certificates, CRLs, and OCSP. It evaluates leading PQ algorithm families—lattice, code, hash, multivariate, and isogeny—against NIST security levels, highlighting Kyber, Dilithium, Falcon, and SPHINCS+...

WISeKey Unveils Space-Based Quantum-Resistant Crypto Transactions at Davos 2026
WISeKey International unveiled SEALCOIN, a space‑based, quantum‑resistant crypto platform, at Davos 2026. The system uses the WISeSat low‑Earth‑orbit constellation to generate cryptographic signatures directly onboard satellites, extending blockchain transactions beyond terrestrial networks. Its native QAIT token will fuel machine‑to‑machine value exchange,...
Internet Voting Is Too Insecure for Use in Elections
A recent open letter warns that internet voting remains fundamentally insecure, with no existing or foreseeable technology able to guarantee its safety. Despite decades of academic consensus, vendors continue to market online voting solutions as secure. The letter specifically calls...

Qers Achieves Universal Post-Quantum Cryptography Resilience Scoring for IoT and IIoT Systems
Researchers at Luleå University of Technology introduced QERS, a Quantum Encryption Resilience Score that evaluates post‑quantum cryptography (PQC) suitability for IoT and IIoT devices. The framework aggregates six normalized metrics—latency, packet reliability, CPU load, energy use, RSSI, and key size—into...

Crooks Impersonate LastPass in Campaign to Harvest Master Passwords
LastPass disclosed an active phishing campaign that began around January 19, 2026, in which attackers impersonated the service with urgent‑maintenance emails to harvest master passwords. The messages contain links to an Amazon S3‑hosted page that redirects to a counterfeit LastPass...

IonQ Appoints New SVP to Lead Quantum Networking and Security Division
IonQ announced the appointment of Domenico Di Mola as Senior Vice President of Engineering for its Quantum Networking, Security, and Sensing (QNSS) division. Di Mola will steer engineering and strategy for quantum‑secure networking, distributed‑sensing architectures, and the integration of quantum processors with...

QuProtect R3 Delivers Rapid Crypto-Agility for Cloud and On-Prem Environments
QuSecure unveiled QuProtect R3, an end‑to‑end cryptographic platform built for the quantum era, offering rapid visibility across cloud, on‑premise, and edge environments. The solution’s crypto‑agility engine enables one‑click rotation of ciphers, keys, and algorithms without code changes or downtime. QuProtect R3 unifies...
AI-Powered Surveillance in Schools
AI-powered surveillance systems are being installed in U.S. high schools, exemplified by Beverly Hills High School's deployment of facial-recognition cameras, behavioral-analysis software, audio monitors, drones, and license-plate readers. The technology claims to identify violent behavior, locate distressed students, and track...

Hacktivists Hijacked Iran ’S State TV to Air Anti-Regime Messages and an Appeal to Protest From Reza Pahlavi
Hackers seized control of Iran’s Badr satellite on Jan 18, 2026, broadcasting a ten‑minute anti‑regime video featuring exiled Crown Prince Reza Pahlavi. The clip urged citizens to keep protesting and called on the military to join demonstrators. The intrusion occurred amid a...

Amera IoT Unveils Quantum-Proof Encryption Backed by 14 US Patents
Amera IoT introduced AmeraKey® Encryption, a quantum‑proof solution backed by 14 U.S. patents. The system creates identical encryption keys on both ends of a link using a Picture‑and‑PIN method, eliminating the need to transmit keys or ciphertext. By leveraging transmission‑free...

NEXCOM Unveils Quantum-Resistant Platforms at MWC Barcelona 2026
NEXCOM announced at MWC Barcelona 2026 a suite of quantum‑resistant platforms that embed post‑quantum cryptography (PQC) frameworks for long‑term data protection. The rollout targets telecom, enterprise and industrial networks, emphasizing edge security and resilient networking. Alongside the PQC platforms, the...
Update: hash.py Version 0.0.14
Didier Stevens released hash.py version 0.0.14 on 17 January 2026. The update is labeled a bug‑fix release and is available as a zip archive. The post provides both MD5 (66A205915A280CC474541053739B8EDD) and SHA‑256 (C459B75F132BB4AA394D8EA27A79F409C446AAA67536946673EC824EA9219F9F) checksums for verification. No additional features are announced, emphasizing stability...

Data Breach at Canada’s Investment Watchdog Canadian Investment Regulatory Organization Impacts 750,000 People
Canada’s self‑regulatory body, the Canadian Investment Regulatory Organization (CIRO), disclosed a data breach affecting roughly 750,000 individuals. The breach stemmed from a phishing attack in August 2025 that allowed threat actors to copy a limited set of investigative, compliance and...

AppGuard Critiques AI Hyped Defenses; Expands Its Insider Release for Its Next-Generation Platform
The episode highlights AppGuard’s critique of AI‑driven detection, arguing that endless AI‑generated alerts cannot keep pace with AI‑enhanced malware that adapts in real time. CEO Fatih Comlekoglu advocates a shift to a default‑deny, controls‑based endpoint strategy that dramatically reduces the attack...

Aembit Announces Agenda and Speaker Lineup for NHIcon 2026 on Agentic AI Security
The NHIcon 2026 virtual conference, organized by Aembit, will explore the emerging security challenges of agentic AI in enterprises, featuring keynotes from Phil Venables, Misam Abbas, and Anthropic’s deputy CISO Jason Clinton. Sessions will cover practical topics such as LLM...
New Vulnerability in N8n
Security researchers have identified a critical vulnerability in the n8n automation platform (CVE‑2026‑21858) with a CVSS rating of 10.0, allowing attackers to take over locally deployed instances. The flaw potentially impacts around 100,000 servers worldwide and currently has no official...

China Bans U.S. and Israeli Cybersecurity Software over Security Concerns
China has ordered domestic firms to stop using cybersecurity software from more than a dozen U.S. and Israeli companies, citing national security risks. The list includes major U.S. vendors such as VMware, Palo Alto Networks, Fortinet, CrowdStrike and Israeli firms...
Upcoming Speaking Engagements
Bruce Schneier’s events page lists a packed speaking itinerary through March 2026, spanning academic venues in Canada, a book‑signing at Chicago Public Library, and high‑profile industry conferences in Europe and the United States. He will appear at the University of...