Cybersecurity News and Headlines

Noction Adds Automatic Anomaly Detection to IRP v4.3 for Faster DDoS Mitigation
NewsJan 13, 2026

Noction Adds Automatic Anomaly Detection to IRP v4.3 for Faster DDoS Mitigation

Noction launched Intelligent Routing Platform (IRP) v4.3, adding Automatic Anomaly Detection (AAD) that spots abnormal traffic and triggers edge‑level DDoS mitigation. The system can automatically apply BGP FlowSpec filters or blackhole traffic, with optional operator review. IRP v4.3 also upgrades Commit Control...

By Help Net Security
Android Banking Malware deVixor Actively Targeting Users with Ransomware Capabilities.
NewsJan 13, 2026

Android Banking Malware deVixor Actively Targeting Users with Ransomware Capabilities.

Android banking trojan deVixor, active since October 2025, is distributing through counterfeit automotive‑sale websites targeting Iranian users. The malware harvests SMS OTPs, banking credentials, and cryptocurrency exchange data, and can remotely lock devices with a ransomware command demanding 50 TRX. Its...

By GBHackers On Security
Q4 2025 Malware Trends: Telegram Backdoor, Banking Trojans Surge, Joker Returns to Google Play
NewsJan 13, 2026

Q4 2025 Malware Trends: Telegram Backdoor, Banking Trojans Surge, Joker Returns to Google Play

Doctor Web’s Q4 2025 mobile‑malware report reveals a modified Telegram X app delivering the Android.Backdoor.Baohuo.1.origin backdoor, compromising roughly 58,000 Android devices across phones, tablets, smart TVs and in‑car systems. The same period saw a 65% surge in Android banking trojans and the re‑appearance...

By HackRead
ColorTokens Achieves FedRAMP® Moderate ATO for Xshield™
NewsJan 13, 2026

ColorTokens Achieves FedRAMP® Moderate ATO for Xshield™

ColorTokens announced that its Xshield Enterprise Microsegmentation Platform has received a FedRAMP® Moderate Authority to Operate, confirming compliance with hundreds of NIST SP 800‑53 controls. The authorization, validated by an accredited third‑party assessment organization, allows the solution to handle Controlled Unclassified Information...

By Security Boulevard
Minimal Ubuntu Pro Expands Canonical’s Cloud Security Offerings
NewsJan 13, 2026

Minimal Ubuntu Pro Expands Canonical’s Cloud Security Offerings

Canonical has launched Minimal Ubuntu Pro images for public cloud platforms, delivering a leaner base OS with only essential components. The images retain Ubuntu Pro’s extended security maintenance, covering core packages and critical cloud functionality. They are now available through...

By Help Net Security
CyRC Advisory: Vulnerability in Broadcom Chipset Causes Network Disruption and Client Disconnection on Wireless Routers
NewsJan 13, 2026

CyRC Advisory: Vulnerability in Broadcom Chipset Causes Network Disruption and Client Disconnection on Wireless Routers

The Black Duck Cybersecurity Research Center identified a high‑severity vulnerability in Broadcom’s wireless chipset used in ASUS RT‑BE86U routers. A single over‑the‑air frame can render the 5 GHz Wi‑Fi network unresponsive, forcing a manual router reset and potentially corrupting ongoing data...

By Security Boulevard
Key Learnings From the Latest CyRC Wi-Fi Vulnerabilities
NewsJan 13, 2026

Key Learnings From the Latest CyRC Wi-Fi Vulnerabilities

Black Duck Cybersecurity Research Center (CyRC) disclosed high‑risk Wi‑Fi vulnerabilities in ASUS and TP‑Link routers that allow network disruption with a single malformed frame. The flaws were identified through Defensics fuzz testing and bypass WPA2/WPA3 encryption, highlighting protocol‑level weaknesses. Vendors...

By Security Boulevard
New Advanced Linux VoidLink Malware Targets Cloud and Container Environments
NewsJan 13, 2026

New Advanced Linux VoidLink Malware Targets Cloud and Container Environments

Check Point Research has uncovered VoidLink, a sophisticated, cloud‑native Linux malware framework designed for long‑term stealth in cloud and container environments. First seen in December 2025, the platform includes custom loaders, rootkits, and more than 30 plug‑in modules written in Zig,...

By The Hacker News
Parliament Asks Security Pros to Shape Cyber Security and Resilience Bill
NewsJan 13, 2026

Parliament Asks Security Pros to Shape Cyber Security and Resilience Bill

The UK Parliament’s Public Bill Committee has opened a consultation for the Cyber Security and Resilience Bill (CSRB), the successor to the 2018 NIS Regulations and a NIS2‑style overhaul for critical infrastructure. After its second reading, the bill now enters...

By Infosecurity Magazine
For Application Security: SCA, SAST, DAST and MAST. What Next?
NewsJan 13, 2026

For Application Security: SCA, SAST, DAST and MAST. What Next?

Application security is moving beyond isolated scanners toward a unified posture, provenance, and proof framework. Gartner and OWASP now emphasize Application Security Posture Management (ASPM) that aggregates SAST, DAST, SCA, MAST and IaC findings into a single, context‑aware view. Provenance...

By CSO Online
Global Magecart Campaign Targets Six Card Networks
NewsJan 13, 2026

Global Magecart Campaign Targets Six Card Networks

Security firm Silent Push uncovered a long‑running Magecart skimming operation that has been active since 2022. The campaign injects malicious JavaScript into e‑commerce sites, targeting six major payment networks – American Express, Diners Club, Discover, JCB, Mastercard and UnionPay. Victims see a...

By Infosecurity Magazine
Threat Actors Exploit RMM Tools Through Weaponized PDF Files
NewsJan 13, 2026

Threat Actors Exploit RMM Tools Through Weaponized PDF Files

Threat actors are leveraging weaponized PDF attachments to install legitimate Remote Monitoring and Management (RMM) tools such as Syncro, SuperOps, NinjaOne, and ScreenConnect. The campaign, uncovered by ASEC, began with deceptive PDFs that display error messages or images, prompting users...

By GBHackers On Security
Your Personal Information Is on the Dark Web. What Happens Next?
NewsJan 13, 2026

Your Personal Information Is on the Dark Web. What Happens Next?

A surge in data breaches and cyber‑crime tools has flooded the dark web with personal and financial information, with 1,732 incidents reported in the first half of 2025 alone. Threat actors leverage infostealer malware, AI‑generated phishing, and supply‑chain attacks to...

By WeLiveSecurity
AI EdgeLabs Launches Compliance Center and Linux Audit for NIS2 and CRA Readiness
NewsJan 13, 2026

AI EdgeLabs Launches Compliance Center and Linux Audit for NIS2 and CRA Readiness

AI EdgeLabs unveiled its Compliance Center and Linux Audit suite, targeting organizations bound by the EU NIS2 directive and the Cyber Resilience Act. The platform replaces manual reporting with continuous, AI‑driven visibility, delivering a unified risk score and real‑time posture...

By Help Net Security
SAP January 2026 Security Patch Day Fixes Critical Injection and RCE Flaws
NewsJan 13, 2026

SAP January 2026 Security Patch Day Fixes Critical Injection and RCE Flaws

On January 13, 2026 SAP issued its monthly Security Patch Day, releasing 17 security notes that address 15 vulnerabilities across its product portfolio. Four critical‑severity flaws—CVE‑2026‑0501 (SQL injection in S/4HANA General Ledger), CVE‑2026‑0500 (remote code execution in Wily Introscope), and...

By GBHackers On Security
Parrot OS Shares Its 2026 Plans for Security Tools and Platform Support
NewsJan 13, 2026

Parrot OS Shares Its 2026 Plans for Security Tools and Platform Support

Parrot OS, the Debian‑based cybersecurity distribution, released version 7.0 in late 2025 and outlined its 2026 roadmap. The plan adds new security and AI‑focused tools, enhances lightweight, container and cloud deployment support, and expands documentation for repeatable labs. Development will...

By Help Net Security
Email Is Not Legacy. It’s Infrastructure.
NewsJan 13, 2026

Email Is Not Legacy. It’s Infrastructure.

Email remains the backbone of modern business, not a relic, because it operates as an open protocol that connects vendors, customers, and internal teams. A recent survey shows 82 % of IT leaders consider it the most important channel for external...

By Security Boulevard
Russia’s Crackdown on Probiv Data Leaks May Have Fed the Beast Instead
NewsJan 13, 2026

Russia’s Crackdown on Probiv Data Leaks May Have Fed the Beast Instead

Russia’s crackdown on the illegal probiv data‑leak market, spurred by a personal fraud incident involving President Putin’s associate, led to the arrest of Solaris platform founders but may have unintentionally strengthened the underground ecosystem. The probiv market, originally a convenient...

By Security Boulevard
DPRK Hackers Earn $600M Posing as Remote Workers
NewsJan 13, 2026

DPRK Hackers Earn $600M Posing as Remote Workers

North Korean state‑sponsored hackers are masquerading as remote IT workers, generating up to $600 million annually for the regime. They infiltrate Western firms by securing legitimate remote positions or creating fake front‑company job postings, then use living‑off‑the‑land techniques to embed persistent...

By GBHackers On Security
Rakuten Viber CISO/CTO on Balancing Encryption, Abuse Prevention, and Platform Resilience
NewsJan 13, 2026

Rakuten Viber CISO/CTO on Balancing Encryption, Abuse Prevention, and Platform Resilience

Rakuten Viber’s CISO/CTO Liad Shnell says the messenger is now critical infrastructure, so security priorities extend beyond confidentiality to availability, integrity and abuse resilience. The platform ships end‑to‑end encryption by default and relies on AI‑driven analysis of metadata, behavioral signals...

By Help Net Security
Top 10 Vendors for AI-Enabled Security — According to CISOs
NewsJan 13, 2026

Top 10 Vendors for AI-Enabled Security — According to CISOs

The CSO 2025 Security Priorities Study reveals that senior security executives continue to favor established, name‑brand vendors for AI‑enabled security solutions despite a flood of AI‑only startups. Cisco and Microsoft lead the list, with reputation, breach history, and integration ease...

By CSO Online
Turning Cyber Metrics Into Decisions Leaders Can Act On
NewsJan 13, 2026

Turning Cyber Metrics Into Decisions Leaders Can Act On

In a Help Net Security video, Myriad360 Field CISO Bryan Sacks argues that cybersecurity metrics should inform executive decisions rather than serve merely as reporting tools. He emphasizes aligning security initiatives with business priorities set by CEOs and boards, using...

By Help Net Security
Top 5 Best Free VPN for 2026 to Protect Your Anonymity on the Internet
NewsJan 13, 2026

Top 5 Best Free VPN for 2026 to Protect Your Anonymity on the Internet

The article lists the top five free VPN services projected for 2026, emphasizing their ability to safeguard anonymity during activities like torrenting. It highlights common pitfalls of free VPNs, such as data leaks, bandwidth limits, and ad injection. Each recommended...

By GBHackers On Security
Top 5 Best Cyber Attack Prevention Methods for Small Businesses With Breach & Attack Simulation
NewsJan 13, 2026

Top 5 Best Cyber Attack Prevention Methods for Small Businesses With Breach & Attack Simulation

Hackers now target small businesses, accounting for 43% of attacks, making cyber‑attack prevention a critical priority. Affordable cloud‑based antimalware and firewall services, along with Breach and Attack Simulation (BAS) platforms like Cymulate, give SMBs enterprise‑level protection. The article outlines five...

By GBHackers On Security
Teaching Cybersecurity by Letting Students Break Things
NewsJan 13, 2026

Teaching Cybersecurity by Letting Students Break Things

Airbus Cybersecurity and Dauphine University found that embedding structured hacking, social engineering, and capture‑the‑flag exercises into curricula dramatically increases student engagement and confidence. The study tracked participants as they assumed attacker, analyst, and insider roles, culminating in a mixed‑reality CTF...

By Help Net Security
Cybersecurity Jobs Available Right Now: January 13, 2026
NewsJan 13, 2026

Cybersecurity Jobs Available Right Now: January 13, 2026

The January 2026 cybersecurity job roundup lists more than 30 senior‑level openings across continents, from CISO roles at Australia’s CSIRO to GenAI security specialists in Israel. Positions span core disciplines such as threat hunting, vulnerability management, IAM governance, and OT network...

By Help Net Security
The Salary of a Chief Security Officer
NewsJan 13, 2026

The Salary of a Chief Security Officer

The 2025 Foushée Security & Compliance Compensation Survey, now run by ScottMadden, reveals notable pay shifts across 90 security roles. Chief Security Officers saw a modest 6.9% rise in base salary to $364,826, while total cash compensation slipped 2.9% and...

By Security Magazine (Cybersecurity)
Malicious Chrome Extension Steals Wallet Credentials, Enables Automated Trading Abuse
NewsJan 13, 2026

Malicious Chrome Extension Steals Wallet Credentials, Enables Automated Trading Abuse

Socket’s Threat Research Team uncovered a malicious Chrome extension, MEXC API Automator, that silently creates MEXC exchange API keys with withdrawal permissions. The extension exfiltrates the keys to a hard‑coded Telegram bot, enabling attackers to programmatically trade and drain wallets....

By GBHackers On Security
Apache Struts External Entity (XXE) Injection Vulnerability S2-069 (CVE-2025-68493)
NewsJan 13, 2026

Apache Struts External Entity (XXE) Injection Vulnerability S2-069 (CVE-2025-68493)

Apache Struts has been disclosed with a critical external entity injection flaw, S2‑069 (CVE‑2025‑68493), scoring 9.8 on the CVSS scale. The vulnerability resides in the XWork XML parser, enabling attackers to read files, perform SSRF, or launch DoS attacks. Affected...

By Security Boulevard
Why the Start of the Year Is Prime Time for Insider Risk
NewsJan 12, 2026

Why the Start of the Year Is Prime Time for Insider Risk

At the start of each year, security teams face heightened insider risk due to workforce transitions such as departures, role changes, and reorganizations. These shifts often create blind spots in identity and access management, leaving dormant or over‑privileged accounts vulnerable...

By eSecurity Planet
Why DNS Resiliency Is Critical as Outages Surge
NewsJan 12, 2026

Why DNS Resiliency Is Critical as Outages Surge

Service outages are rising, costing Global 2000 firms an estimated $400 billion annually, with DNS failures often at the core of prolonged downtime. The article argues that many organizations lack a true "Plan B" for DNS, relying on slow provider switches that...

By eSecurity Planet
CISA Orders Feds to Patch Gogs RCE Flaw Exploited in Zero-Day Attacks
NewsJan 12, 2026

CISA Orders Feds to Patch Gogs RCE Flaw Exploited in Zero-Day Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered all federal civilian agencies to patch a critical zero‑day vulnerability in the Gogs Git service, identified as CVE‑2025‑8110. The flaw allows authenticated attackers to exploit a path‑traversal weakness in the...

By BleepingComputer
NDSS 2025 – LLMPirate: LLMs For Black-Box Hardware IP Piracy
NewsJan 12, 2026

NDSS 2025 – LLMPirate: LLMs For Black-Box Hardware IP Piracy

Researchers from Texas A&M unveiled LLMPirate, a novel technique that leverages large language models to generate pirated variations of hardware circuit designs. The system successfully evaded detection by four state‑of‑the‑art IP piracy tools across all tested circuits, achieving 100% evasion....

By Security Boulevard
'Bad Actor' Hijacks Apex Legends Characters in Live Matches
NewsJan 12, 2026

'Bad Actor' Hijacks Apex Legends Characters in Live Matches

A weekend security incident in Apex Legends allowed a bad actor to hijack player characters, disconnect them, and rename teammates to “RSPN Admin.” Respawn clarified that the breach did not involve malware or remote code execution, suggesting the attacker used...

By BleepingComputer
5 Best Secure Container Images for Modern Applications (2026)
NewsJan 12, 2026

5 Best Secure Container Images for Modern Applications (2026)

Modern applications now treat secure container images as a prerequisite for rapid delivery, not a optional add‑on. By 2026, tools like Echo, Sysdig and Aqua Security automate CVE removal, risk prioritization, and policy enforcement across CI/CD pipelines. The article outlines...

By HackRead
Fintech Firm Betterment Confirms Data Breach After Hackers Send Fake Crypto Scam Notification to Users
NewsJan 12, 2026

Fintech Firm Betterment Confirms Data Breach After Hackers Send Fake Crypto Scam Notification to Users

Betterment confirmed that hackers breached its systems on Jan 9 through a social‑engineering attack on third‑party platforms, exposing customers' names, emails, addresses, phone numbers and dates of birth. The intruders used the stolen data to send a fraudulent crypto‑investment notification promising...

By TechCrunch (Cybersecurity)
Fake Employee Reports Spread Guloader and Remcos RAT Malware
NewsJan 12, 2026

Fake Employee Reports Spread Guloader and Remcos RAT Malware

AhnLab Security Intelligence Center uncovered a phishing campaign that disguises malicious attachments as fake employee performance reports. The email, posing as HR, includes a compressed file named "staff record pdf.exe" which, when executed, deploys the Guloader loader. Guloader then retrieves...

By HackRead
Cybersecurity in the Public Sector: Challenges, Strategies and Best Practices
NewsJan 12, 2026

Cybersecurity in the Public Sector: Challenges, Strategies and Best Practices

Cyber attacks on government entities have surged, rising more than 40% in recent years, driven by motives ranging from political influence to lucrative data theft. Legacy platforms, chronic under‑funding, and a shortage of skilled analysts leave the public sector vulnerable....

By HackRead
Apple Confirms Google Gemini Will Power Siri, Says Privacy Remains a Priority
NewsJan 12, 2026

Apple Confirms Google Gemini Will Power Siri, Says Privacy Remains a Priority

Apple announced that its upcoming Siri will be powered by Google’s Gemini large‑language models, marking a multi‑year collaboration between the two rivals. The partnership moves Siri away from Apple’s in‑house AI, which has lagged behind competitors like GPT and Copilot,...

By BleepingComputer
Dutch Court Sentences Hacker Who Used Port Systems to Smuggle Cocaine to 7 Years
NewsJan 12, 2026

Dutch Court Sentences Hacker Who Used Port Systems to Smuggle Cocaine to 7 Years

An Amsterdam appeals court sentenced a 44‑year‑old hacker to seven years in prison for facilitating cocaine smuggling through European ports. The defendant installed malware via a USB stick on a terminal employee’s computer, creating a backdoor that allowed the criminal...

By DataBreaches.net
Hidden Telegram Proxy Links Can Reveal Your IP Address in One Click
NewsJan 12, 2026

Hidden Telegram Proxy Links Can Reveal Your IP Address in One Click

Security researchers have shown that Telegram’s proxy links (t.me/proxy) automatically trigger a direct connection to the specified server before the user confirms adding the proxy. This behavior lets an attacker‑controlled proxy log the user’s real IP address with a single...

By BleepingComputer
Everest Ransomware Claims Breach at Nissan, Says 900GB of Data Stolen
NewsJan 12, 2026

Everest Ransomware Claims Breach at Nissan, Says 900GB of Data Stolen

Everest ransomware announced on Jan 10, 2026 that it breached Nissan Motor Corp and exfiltrated roughly 900 GB of data, posting screenshots of ZIP archives, spreadsheets and CSV files on its dark‑web leak site. The leaked directory structure suggests access to dealership records,...

By HackRead
NDSS 2025 – Mens Sana In Corpore Sano: Sound Firmware Corpora For Vulnerability Research
NewsJan 12, 2026

NDSS 2025 – Mens Sana In Corpore Sano: Sound Firmware Corpora For Vulnerability Research

The NDSS 2025 paper "Mens Sana In Corpore Sano" examines the difficulty of building scientifically sound firmware corpora for vulnerability research. It identifies practical obstacles such as proprietary, encrypted samples and inadequate documentation that hinder replicability. The authors derive a...

By Security Boulevard
Spanish Energy Giant Endesa Discloses Data Breach Affecting Customers
NewsJan 12, 2026

Spanish Energy Giant Endesa Discloses Data Breach Affecting Customers

Spanish utility Endesa disclosed a data breach affecting its Energía XXI customers, with hackers obtaining contract‑related personal information such as IDs, contact details, and IBANs. The company says passwords were not exposed and no fraudulent use has been detected so far....

By BleepingComputer
Predict 2026: AI, Trust and the Security Reckoning Ahead
NewsJan 12, 2026

Predict 2026: AI, Trust and the Security Reckoning Ahead

Predict 2026 declares AI the defining technology of the year, emphasizing that security leaders must now focus on protecting, governing, and trusting autonomous AI systems. The event highlights how agentic AI reshapes risk, from evolving models to data pipelines that become...

By Security Boulevard
Booz Allen Hamilton and Andreessen Horowitz Accelerate Commercial Tech for Government
NewsJan 12, 2026

Booz Allen Hamilton and Andreessen Horowitz Accelerate Commercial Tech for Government

Booz Allen Hamilton announced a partnership with Andreessen Horowitz, designating Booz Allen as the a16z Technology Acceleration Partner for Governments. The alliance will connect a16z’s portfolio startups with Booz Allen’s deep mission expertise, secure‑network capabilities, and engineering talent to fast‑track...

By Help Net Security
Prevent Cloud Data Leaks with Microsoft 365 Access Reviews
NewsJan 12, 2026

Prevent Cloud Data Leaks with Microsoft 365 Access Reviews

Microsoft 365’s frictionless sharing fuels productivity but also creates oversharing risks that security teams struggle to monitor. Native Microsoft tools provide no centralized view of shared files across Teams, OneDrive and SharePoint, leaving a blind spot for data leakage. Tenfold’s identity‑governance...

By BleepingComputer
World Economic Forum: Cyber-Fraud Overtakes Ransomware as Business Leaders' Top Cyber-Security Concern
NewsJan 12, 2026

World Economic Forum: Cyber-Fraud Overtakes Ransomware as Business Leaders' Top Cyber-Security Concern

The World Economic Forum’s Global Cybersecurity Outlook for 2026 reveals that phishing attacks have eclipsed ransomware as the chief concern for business leaders. Seventy‑seven percent of respondents reported a rise in cyber‑enabled fraud, and 73 percent said they or a...

By Infosecurity Magazine
Max Severity Ni8mare Flaw Impacts Nearly 60,000 N8n Instances
NewsJan 12, 2026

Max Severity Ni8mare Flaw Impacts Nearly 60,000 N8n Instances

Security researchers have identified a maximum‑severity vulnerability, dubbed “Ni8mare,” affecting the open‑source automation platform n8n. Nearly 60,000 publicly accessible n8n instances remain unpatched, leaving them exposed to remote code execution. The flaw stems from improper input validation in the workflow...

By BleepingComputer