
Researchers at the University of Oslo have unveiled an adaptive post‑quantum cryptography framework designed for 6G vehicle‑to‑everything (V2X) networks. By predicting short‑term mobility, channel conditions, weather, and message urgency, the system dynamically selects lattice, code, or hash‑based PQC schemes. A monotonic‑upgrade protocol ensures secure transitions between algorithms, preventing downgrade and replay attacks. Experimental tests using realistic mobility traces and weather data show up to 27% lower latency and 65% reduced communication overhead compared with static PQC solutions.

Researchers at Johns Hopkins introduced QCL‑IDS, a quantum‑centric continual‑learning framework for intrusion detection that balances adaptation to new attacks with retention of historic threat knowledge. The system leverages Quantum Fisher Anchors and privacy‑preserved quantum generative replay to achieve mean Attack‑F1...

Researchers introduced FedGraph‑VASP, a privacy‑preserving federated graph learning framework that enables virtual asset service providers to jointly detect money‑laundering without sharing raw transaction data. The system exchanges compressed graph embeddings secured with Kyber‑512 key encapsulation and AES‑256‑GCM, delivering quantum‑resistant protection....

Researchers demonstrated quantum key distribution (QKD) on IBM's superconducting quantum platform by implementing the BB84 and E91 protocols with SX‑gate operations. Using a 133‑qubit device and 128‑shot runs, they achieved zero error for BB84 and a 0.094 error rate for...

The author argues that AI did not break cybersecurity; longstanding governance failures did. AI merely amplified existing shadow‑IT practices and unclear risk ownership, exposing gaps that boards and CISOs have ignored. The piece calls for a shift from treating security...
The Scattered Lapsus ShinyHunters (SLSH) extortion gang blends data theft with aggressive personal harassment, including swatting, DDoS attacks, and media pressure. Operating through chaotic Telegram channels linked to The Com cyber‑crime network, they target executives via phone‑based phishing and MFA...
Didier Stevens published a concise January roundup highlighting two Python tool updates—zipdump.py 0.0.33 and hash.py 0.0.14—and three SANS Internet Storm Center diary entries covering a basic geography quiz, the release of Wireshark 4.6.3, and YARA‑X 1.11.0’s new hash function warnings....

Researchers from Georgia Tech and collaborators introduced a quantum‑memory‑free Quantum Secure Direct Communication (QSDC) protocol that relies on universal hashing and privacy amplification of coded sequences. The information‑theoretic analysis proves security against collective attacks without requiring quantum storage or complex...

WISeKey International announced proof‑of‑concept testing of post‑quantum cryptography on satellites in late 2025, with a fully operational quantum‑resistant satellite slated for launch in the second quarter of 2026. The initiative combines hybrid Triple Key Encapsulation Mechanisms that blend PQC algorithms with...

Researchers experimentally validated post‑quantum cryptography on the 5G O‑RAN E2 interface using ML‑KEM (CRYSTALS‑Kyber) within IPsec. Their open‑source testbed compared baseline, traditional ECDH, and ML‑KEM IPsec configurations, measuring tunnel‑setup latency and xApp behavior. Results show only a 3–5 ms overhead for...

SmarterTools released build 9511 to remediate two critical SmarterMail flaws, CVE-2026-24423 and CVE-2026-23760, each scoring 9.3 on the CVSS scale. The first vulnerability allowed unauthenticated attackers to execute arbitrary OS commands via the ConnectToHub API, while the second bypassed authentication...

The U.S. Department of Defense announced a $15.1 billion cyber budget for fiscal 2026, a sharp increase aimed at countering AI‑driven attacks and the emerging quantum computing threat. The plan prioritizes quantum‑resilient encryption, AI‑native defenses, and rapid cryptographic agility across military...

Researchers from the University of Waterloo and NUS uncovered a critical flaw in existing Quantum Key Distribution (QKD) security proofs: they assume perfectly reliable authentication. They introduced a reduction theorem that shows protocols proven secure under ideal authentication remain secure...

Researchers at Shenzhen University have unveiled a quantum‑safe key‑exchange protocol that modifies the Anshel‑Anshel‑Goldfeld (AAG) scheme by drawing private keys from Mihailova subgroups of braid groups. The security hinges on the unsolvable membership problem for these subgroups, making the protocol...

Researchers unveiled a functional blockchain prototype that can interchangeably employ three lattice‑based post‑quantum signature schemes—CRYSTALS‑Dilithium, Falcon and Hawk. The single‑node system decouples application logic from the cryptographic layer, allowing seamless algorithm swaps without altering core code. Comprehensive testing measured key...

The new doctoral guide by Darlan Noetzold, Valderi Reis Quietinho Leithardt and co‑authors delivers a comprehensive overview of post‑quantum cryptography, mapping lattice, code, hash‑based, multivariate and isogeny schemes while dissecting the NIST standardisation process. It details the practical hurdles of...

Unclaimed assets from the 2016 DAO hack are being pooled into a $220 million Ethereum security endowment called TheDAO Security Fund. About $13.5 million in DAO tokens and 69,420 ETH, which will be staked, form the core capital, generating roughly $8 million in annual...

Google and partners disrupted the IPIDEA residential proxy network, one of the world’s largest, by taking down domains, sharing intelligence, and enforcing Play Protect. The operation removed SDKs embedded in millions of Android, Windows, iOS, and WebOS apps, sharply reducing...
Brian Honan’s article in the Irish Examiner warns Irish small businesses and families that dependence on US‑based technology platforms can jeopardise digital sovereignty. He cites scenarios where tariffs, sanctions or policy shifts could abruptly block access to email, documents or...
BH Consulting’s CEO Brian Honan was featured in Security Week, outlining the firm’s view of the top cybersecurity priorities for 2026. The piece highlights BH Consulting’s 20‑year track record, ISO‑27001 certification, and its portfolio of services including CISO/DPO as‑a‑service, audits...

The SEC is drafting rules that will require public companies to disclose their cybersecurity controls as part of regular financial reporting. This links cyber risk directly to compliance, forcing firms to treat security as a core reporting element. The article...

Researchers from Korea Institute of Science and Technology and Yonsei University introduced a universal operational privacy framework for distributed quantum sensing. The framework defines privacy through the experimentally accessible classical Fisher information matrix, making it protocol‑independent and applicable to singular...

SEALSQ Corp (NASDAQ: LAES) will display its post‑quantum cybersecurity portfolio at Tech&Fest 2026 in Grenoble on February 4‑5, highlighting hardware‑based roots of trust. The French subsidiary, SEALSQ France, builds on three decades of secure‑semiconductor expertise inherited from Gemplus and employs nearly 200 staff...

A new ResearchAndMarkets.com report projects the satellite quantum‑internet market to reach $1.82 billion in 2026, up from $1.37 billion in 2025, representing a 32.9% compound annual growth rate. The market is expected to expand to $5.63 billion by 2030 with a sustained 32.6%...

The Data Protection Day 2026 blog highlights six persistent GDPR challenges—stale ROPAs, weak retention schedules, overlooked paper records, unprepared DSAR processes, outdated accountability documentation, and insufficient vendor risk controls. It explains how each issue creates hidden exposure and offers concrete...

Governor Greg Abbott announced an expanded ban on Chinese‑linked technology for Texas state employees, prohibiting hardware, software, and AI tools from firms such as Alibaba, Shein, Temu, TP‑Link and CATL. The measure, framed as a privacy safeguard against foreign surveillance,...

SuperQ Quantum Computing Inc. announced the appointment of Brian Beveridge, a 30‑year cybersecurity veteran, as Director of Post‑Quantum Cybersecurity and Partnerships, effective Jan 22 2026. Beveridge will lead the commercialization of the company’s SuperPQC™ suite, which protects against “Harvest Now, Decrypt Later”...

The U.S. Treasury Department announced it is terminating all 31 contracts with consulting firm Booz Allen Hamilton, representing $4.8 million in annual spend and $21 million in obligations, after a Booz Allen contractor, Charles Littlejohn, stole and leaked more than 400,000 taxpayer records,...

Reliance Global Group announced a non‑binding term sheet to acquire a controlling interest in post‑quantum cryptography firm Enquantum Ltd. through its new EZRA International subsidiary. Enquantum’s hardware‑accelerated, FPGA‑based solutions promise terabit‑level, quantum‑resistant encryption, addressing performance concerns of software‑only PQC. The...

Extremist groups are increasingly targeting children on platforms such as Discord, Instagram, Reddit, and gaming chats, turning these digital third spaces into recruitment hubs. In 2024, teenagers accounted for roughly two‑thirds of ISIS‑linked arrests in Europe, and similar patterns are...
The episode explains how e‑commerce businesses can curb account takeovers by integrating a dedicated IP VPN into their admin workflows. It outlines an access‑control playbook that routes all Shopify and financial dashboard logins through an encrypted VPN tunnel, reducing false...
Microsoft released emergency out‑of‑band updates to remediate CVE‑2026‑21509, a zero‑day flaw actively exploited in the wild. The vulnerability bypasses OLE security controls in Office 2016 through 2024 and Microsoft 365 Apps, allowing attackers to execute malicious code via crafted Office...

01 Quantum Inc., rebranded from 01 Communique Laboratory, reported FY 2025 revenue of $767,993—up 86% from the prior year—driven by commercial deployments of post‑quantum cryptography (PQC) solutions such as DoMobile Ver.5. The company raised $3.78 million in equity financing and continues to...

Nike announced it is probing a potential cyber incident after the WorldLeaks group claimed to have accessed and exfiltrated roughly 1.4 TB of company data. The hacker collective, which evolved from the Hunters International ransomware gang, posted the alleged breach on...

Coinbase announced the creation of an Independent Advisory Board on Quantum Computing and Blockchain, staffed by leading researchers from Stanford University and the University of Texas at Austin, including Scott Aaronson and Dan Boneh. The board will develop position papers...

Security Affairs’ Malware Newsletter Round 81 curates the latest threats and research across the malware landscape. Highlights include the emergence of AI‑generated malware frameworks such as VoidLink, sophisticated evasion tactics like PDFSIDER’s DLL side‑loading, and supply‑chain abuse via a malicious...

Carahsoft Technology Corp. has signed a Master Government Aggregator partnership with Cyber Intell Solution to distribute the patented CISEN‑SDN‑PQC quantum‑resistant platform to U.S. federal, state and local agencies. The collaboration leverages the ITES‑SW2 contract (W52P1J‑20‑D‑0042) and additional procurement vehicles to...
Ilya Grigorik explains that over half of web traffic now comes from bots, dividing them into good (search), grey (AI training/fetchers) and bad (malicious scrapers) and urging e‑commerce teams to treat this "post‑human" reality as a core business concern. He...
The article contrasts two CISO archetypes—the Watchmaker, who builds tightly controlled, auditable security frameworks, and the Gardener, who cultivates an adaptive, culture‑driven security ecosystem. Each style offers distinct strengths: predictability and strong foundations versus flexibility and empowerment. However, both suffer...

Global Board Advisors Corp and BoardroomEducation.com introduced the Quantum Strategic Intelligence (QSI) framework at the World Economic Forum in Davos, positioning it as an open Sovereignty Standard for quantum‑computing and agentic‑AI risks. QSI extends existing ERM models such as COSO,...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the critical VMware vCenter Server flaw CVE-2024-37079 to its Known Exploited Vulnerabilities (KEV) catalog. The heap‑overflow bug in the DCERPC implementation carries a CVSS score of 9.8 and enables remote...

Researchers at Université Paris‑Saclay and Université Côte d’Azur have demonstrated a device‑independent quantum key distribution (DIQKD) protocol using a photonic circuit identified through machine learning. By introducing a block‑hierarchy semidefinite programming method and a finite‑size security analysis, they show that...

At the end of December, a wiper‑type malware dubbed DynoWiper attempted to compromise Poland’s power generation and distribution systems. European security firm ESET traced the code to the Russian Sandworm group with medium confidence, noting similarities to previous attacks on...

Researchers at the Technical University of Munich present a post‑quantum secure aggregation protocol built on code‑based homomorphic encryption under the Learning Parity with Noise (LPN) assumption. The design features a key‑ and message‑additive homomorphic scheme, a committee‑based decryptor realized via...

PwC‑affiliated firm A.F. Ferguson & Co. hosted a one‑day masterclass titled “Governing Cybersecurity in the AI Era – Digital Trust, Risk & Resilience” on 22 January 2026 in Karachi. More than 100 senior technology and business leaders, including CISOs, CIOs and CFOs,...
Kasada, a bot management and fraud protection company, unveiled AI Agent Trust, a solution designed to secure automated traffic on digital commerce sites. The platform provides a searchable directory that verifies AI agents and lets brands apply policy‑based controls to...
Canada’s Federal Court has overturned a government directive that would have forced TikTok to shut down its Canadian operations. Judge Russell Zinn set aside the order and instructed Industry Minister Melanie Joly to conduct a new security review. The ruling...
Zoom released security patches that fix a critical command‑injection flaw (CVE‑2026‑22844) in its Node Multimedia Routers (MMR). The vulnerability, rated 9.9 on the CVSS scale, could let a meeting participant execute arbitrary code on affected MMRs. Versions prior to 5.2.1716.0...
The episode explains why continuous, delta‑only replication is evolving from a backup shortcut into a core cyber‑resilience control, enabling near‑real‑time data availability across hybrid environments and reducing reliance on fragile, manual recovery steps. It highlights how this approach mitigates both...

The paper outlines a roadmap for transitioning X.509 PKI to post‑quantum cryptography, detailing required changes to certificates, CRLs, and OCSP. It evaluates leading PQ algorithm families—lattice, code, hash, multivariate, and isogeny—against NIST security levels, highlighting Kyber, Dilithium, Falcon, and SPHINCS+...