RSA Group Announces New $135 Million Capital Infusion and Debt Refinancing to Accelerate AI Product Innovation and Organic Growth
RSA Group announced a $135 million capital infusion backed by its existing lenders, coupled with a refinancing of its first‑ and second‑lien debt. The deal extends debt maturities, de‑leverages the balance sheet, and improves liquidity. Proceeds will fund AI‑driven enhancements to RSA’s passwordless, fraud‑management, and identity‑governance products. The company expects the stronger financial footing to accelerate organic growth and innovation across its RSA and Outseer brands.
Kazakhstan Considers Criminal Liability for Mass Leaks of Personal Data
Kazakhstan is drafting legislation to impose criminal liability for mass leaks of personal data, as proposed by the Ministry of Artificial Intelligence and Digital Development. The same proposal would dramatically increase administrative fines for organizations that fail to meet information‑security...

Searchlight Cyber Adds Ransomware Leak Site Visibility with Ransomware File Explorer
Searchlight Cyber introduced Ransomware File Explorer, a new feature in its Cerberus platform that provides searchable visibility into file‑tree data posted on ransomware leak sites. The tool indexes file‑tree metadata, enabling instant keyword searches without handling malicious archives. It helps...
Salt Security Expands “Universal Visibility” With Specialized API Security for Databricks and Rapid Edge Support for Netlify
Salt Security announced two strategic integrations that broaden its Universal Visibility platform: the Salt Databricks Connector and the Salt Netlify Collector. The Databricks connector provides dedicated API‑security discovery for the Agentic AI Action Layer, mapping AI agents’ API calls and...

NVIDIA CUDA Toolkit Flaw Allows Command Injection, Arbitrary Code Execution
NVIDIA released a patch on January 20 2026 for four critical vulnerabilities in its CUDA Toolkit, affecting Nsight Systems and Nsight Visual Studio tools. The flaws enable local command injection and arbitrary code execution through inadequate input validation and insecure DLL loading,...

BIND 9 Flaw Lets Attackers Crash Servers With Malicious DNS Records
A critical vulnerability identified as CVE‑2025‑13878 affects BIND 9 DNS servers, allowing remote attackers to crash the named process using malformed BRID or HHIT records. The flaw impacts several stable branches—9.18.40‑9.18.43, 9.20.13‑9.20.17, and 9.21.12‑9.21.16—and carries a CVSS v3.1 score of 7.5,...

Energy Sector Orgs Targeted with AiTM Phishing Campaign
Microsoft has identified a sophisticated AiTM phishing campaign targeting energy‑sector organizations. Attackers use compromised trusted email accounts to send “NEW PROPOSAL – NDA” messages containing a malicious SharePoint link that leads to a fake login page. The page captures credentials...

Keyfactor and IBM Consulting Launch Joint Solution to Accelerate Post-Quantum Cryptography Readiness
Keyfactor and IBM Consulting have unveiled a joint solution that streamlines post‑quantum cryptography (PQC) readiness for enterprises. The offering blends Keyfactor’s automated cryptographic discovery, PKI lifecycle management, and digital signing with IBM Consulting’s cybersecurity governance, quantum‑safe delivery frameworks, and AI‑driven...

Obsidian Security Targets Rising Tide of SaaS Integration Threats
Obsidian Security unveiled a new suite that provides end‑to‑end protection for SaaS‑to‑SaaS integrations, addressing a surge in supply‑chain attacks that exploit OAuth tokens and blind spots in traditional tools. The platform offers real‑time breach detection, visibility into unauthorized “shadow” connections,...

PNB MetLife Phishing Attack: Multi-Stage Scheme Steals Data, Triggers UPI Payments
A sophisticated multi‑stage phishing campaign is targeting PNB MetLife insurance customers through mobile‑optimized fake payment‑gateway pages hosted on free EdgeOne Pages. The first stage harvests personal details and forces fraudulent UPI payments using dynamically generated QR codes and clipboard manipulation. A...

JA3 Fingerprinting Tool Exposes Attackers’ Infrastructure
JA3 fingerprinting, once considered outdated, is re‑emerging as a potent tool for tracking malicious infrastructure. By hashing TLS ClientHello parameters, JA3 creates a stable identifier that persists across malware variants. Recent threat‑intel investigations linked specific JA3 hashes to Remcos RAT,...
Flipit Reveals the “Back of the Internet,” A New Layer for Trust and Transparency
Flipit launched a Chrome extension that overlays a “back of the internet” layer, allowing users to post and view real‑time reviews on any website. The platform stores review data on IPFS via a distributed network of Flipit Cores, providing decentralized,...

ZEST Security Adds AI Agents to Identify Vulnerabilities That Pose No Actual Risk
ZEST Security introduced AI Sweeper Agents that assess whether discovered vulnerabilities can actually be exploited in a given IT environment. The solution uses three specialized agents—Analysis, Environment‑Evaluation, and Validation—to match exploit requirements against an organization’s configuration. ZEST reports that more...

Finextra Launches NextGen FinCrime, a New Leadership Event Redefining Trust in Finance
Finextra announced NextGen FinCrime: Dirty Money, Clean Systems, an executive‑level conference slated for 8 July 2026 at the London Conference Centre. The event targets senior finance leaders, regulators and technology providers to confront the growing threat of sophisticated financial crime amid rapid...

Filling the Most Common Gaps in Google Workspace Security
Google Workspace’s default security leaves critical gaps, especially in Gmail where Business Email Compromise and sophisticated spear‑phishing thrive. Native protections lack contextual awareness of VIP contacts and cannot fully safeguard years‑long email archives. The article recommends enabling advanced scanning, enforcing...

Silent Push Launches Traffic Origin to Expose the True Source of Obfuscated Web Traffic
Silent Push, a preemptive cyber‑defense startup, unveiled Traffic Origin, a solution that pinpoints the true upstream source of obfuscated web traffic such as residential proxies, VPNs, and bot farms. The platform delivers high‑confidence risk indicators, country‑connected data, and visual context...

OpenWrt One Gains Support for Running Debian
Debian now runs on the OpenWrt One router hardware. Engineers added low‑level platform support, bootloader tweaks, and system initialization scripts to enable Debian to boot directly without abstraction layers. The OpenWrt One serves as a reference device for the OpenWrt...

Over 160,000 Companies Notify Regulators of GDPR Breaches
Over 160,000 companies reported GDPR breaches in 2025, a 22% increase year‑over‑year. Daily average notifications jumped to 443, the first time since 2018 that the figure exceeded 400. Germany, the Netherlands and Poland accounted for the highest breach counts, while...
Common Apple Pay Scams, and How to Stay Safe
Apple Pay processes trillions of transactions annually, yet scammers exploit its popularity through social‑engineering tricks and NFC‑based malware. The most common frauds include phishing, marketplace overpayment, fake receipts, unsolicited payments, and public‑Wi‑Fi credential harvesting. Researchers observed a near‑doubling of NFC‑abusing...

SmarterMail Auth Bypass Exploited in the Wild Two Days After Patch Release
A critical authentication‑bypass flaw in SmarterTools' SmarterMail was patched on Jan 15, 2026, but attackers began exploiting it by Jan 17, 2026. The vulnerability allows unauthenticated users to reset the system administrator password via the /api/v1/auth/force-reset-password endpoint and then execute OS commands, yielding a...

EaseUS Disk Copy 7.0.0 Enables Backup, Restore, and Migration without Multiple Drives Connected
EaseUS released Disk Copy 7.0.0, adding full disk‑imaging capabilities to its previously cloning‑only tool. Users can now create compressed image files, store them independently, and restore them to physical or virtual disks without needing both drives connected. The update also...

New ClickFix Campaign Exploits Fake Verification Pages to Hijack Facebook Sessions
A new ClickFix campaign is hijacking Facebook accounts by luring users into fake verification and appeal pages that instruct them to extract live session tokens (c_user and xs) from their browsers. The operation spans 115 phishing pages hosted on abuse‑friendly...

Malicious PyPI Package Impersonates Sympy-Dev, Targeting Millions of Users
A malicious PyPI package named sympy-dev impersonates the popular SymPy library, using typosquatting to lure developers into installing it. Four versions (1.2.3‑1.2.6) were released on Jan 17 2026 and amassed over 1,000 downloads within the first day. The package embeds a memory‑only...

Saga Pauses Chainlet After $7M Exploit that Depegged Its Stablecoin
Saga announced a pause of its Ethereum‑compatible chainlet after a $7 million exploit that de‑pegged its US‑dollar stablecoin to $0.75. The attack involved coordinated contract deployments and cross‑chain activity, prompting the team to halt the chain at block 6,593,800 while investigating. Saga’s...

Unbounded AI Use Can Break Your Systems
James Wickett, CEO of DryRun Security, warns that organizations are rapidly embedding large‑language‑model (LLM) features into live products without adequate safeguards. He highlights the danger of AI‑generated code being trusted for critical business logic and access control. The video stresses...

One in Ten UK Businesses Fear They Would Not Survive a Major Cyberattack
A Vodafone Business survey of 1,000 UK senior leaders reveals that one in ten believe their company would not survive a major cyberattack. While 63% say the risk of attack has risen over the past year, only 45% have ensured...

What Background Checks Miss: The Human Layer Behind Modern Screening
Modern hiring increasingly relies on fast, automated background checks that often limit employment history, address data, and education verification to a few days. The article argues that this speed comes at the expense of critical human‑focused layers such as rigorous...

ClearFake Malware Exploits Proxy Execution to Run Malicious PowerShell Commands via Trusted Windows Feature
ClearFake, a JavaScript‑based malware distribution framework, has upgraded its evasion tactics by abusing the legitimate Windows script SyncAppvPublishingServer.vbs to execute hidden PowerShell commands via proxy execution. The campaign retrieves multi‑stage payloads from smart contracts on the BNB Smart Chain testnet,...

Securing the Future: Practical Approaches to Digital Sovereignty in Google Workspace
The recent Thales‑Google Workspace webinar highlighted practical ways to achieve digital sovereignty through client‑side encryption and Thales CipherTrust. It underscored how Google Workspace’s zero‑trust architecture, regional data storage, and external key management give organizations control over encryption keys. The discussion...

NSFOCUS AI-Scan Gains Recognition From Authoritative Institution
International Data Corporation (IDC) highlighted NSFOCUS AI‑SCAN in its October 2025 report, ranking it highly across six core LLM‑security dimensions. The platform offers comprehensive model, data, content, and application security, plus industry‑specific adaptation and unified management. AI‑SCAN currently supports more than...

MacOS Tahoe Improves Privacy and Communication Safety
Apple’s macOS Tahoe introduces a suite of privacy‑focused features that screen unwanted calls, messages, and online tracking. Native Phone, Messages and FaceTime now offer system‑level unknown‑contact controls, while Safari extends Advanced Fingerprinting Protection to every browsing session. Parental tools let...
Show HN: Dotenv Mask Editor: No More Embarrassing Screen Leaks of Your .env
The Dotenv Mask Editor is a Visual Studio Code extension that provides a grid‑based interface for editing .env files while automatically masking any value longer than six characters. Masked entries appear as asterisks in the view and only reveal their...

Scammers Impersonate Nabtrade's Tom Piotrowsk to Endorse Bogus Investments
Australian bank NAB warns that scammers are impersonating its analyst Tom Piotrowsk, contributing to a 15 percent rise in investment fraud. The bank says 70 percent of losses start on social‑media platforms, where fraudsters use urgency and fake endorsements to lure victims. Scams...

Microsoft Updates the Security Baseline for Microsoft 365 Apps for Enterprise
Microsoft has released security baseline version 2512 for Microsoft 365 Apps for enterprise, providing recommended policy settings across Word, Excel, PowerPoint, Outlook, and Access. The baseline addresses macros, add‑ins, ActiveX, Protected View, and update behavior, and is delivered as Group Policy objects...

New Android Malware Uses AI to Click on Hidden Browser Ads
A new Android click‑fraud trojan family uses TensorFlow.js to run AI models inside a hidden WebView, visually identifying and tapping ads instead of relying on static JavaScript code. The malware is distributed through Xiaomi’s GetApps store, third‑party mod APK sites,...

Online Retailer PcComponentes Says Data Breach Claims Are Fake
PcComponentes, a leading Spanish tech retailer, denied a claim that a breach exposed 16 million customers, stating the figure was inflated. The company confirmed a credential‑stuffing attack that compromised a limited set of accounts, revealing names, addresses and contact details. Threat...

NDSS 2025 – Tweezers
The NDSS 2025 paper introduces Tweezers, a framework that leverages an event attribution‑centric tweet embedding to detect security events on Twitter. By focusing on semantic attribution rather than simple keyword matching, Tweezers achieves higher precision and broader coverage than prior...

Expert Insight on Under Armour’s Exposed Customer Data
In November 2025 Under Armour fell victim to the Everest ransomware gang, which claimed to have exfiltrated 343 GB of data. On January 21, 2026 a hacking forum published a 72‑million‑record customer dataset containing emails, names, birthdates, genders, locations and purchase...
Hong Kong Issues Code of Practice Under the Protection of Critical Infrastructures (Computer Systems) Ordinance
On 1 January 2026 Hong Kong’s Office of the Commissioner of Critical Infrastructure (Computer‑system Security) released a Code of Practice (CoP) under the Protection of Critical Infrastructures (Computer Systems) Ordinance, which also took effect that day. The CoP translates the Ordinance’s high‑level...

Surveillance and ICE Are Driving Patients Away From Medical Care, Report Warns
A new EPIC report warns that the U.S. health‑privacy crisis is deepening as data brokers sell medical information and ICE agents operate inside hospitals. Outdated privacy statutes and lax enforcement let private firms and government agencies harvest, share, and repurpose...
Fortinet Admins Report Patched FortiGate Firewalls Getting Hacked
Fortinet’s latest FortiOS releases (7.4.9 and 7.4.10) failed to fully remediate the critical CVE‑2025‑59718 authentication bypass, allowing attackers to create privileged admin accounts via crafted SAML messages. Administrators have reported successful exploits on patched firewalls, prompting Fortinet to announce emergency...

GNU InetUtils Telnetd Flaw Lets Attackers Log In as Root
A critical vulnerability has been discovered in GNU InetUtils telnetd versions 1.9.3 through 2.7 that allows remote attackers to obtain root privileges without a password. The flaw stems from an unsanitized USER environment variable that can inject the "-f root"...

How to Protect Your Brand From Web Privacy Lawsuits
Retailers are increasingly targeted by web privacy lawsuits, with 43% of recent claims focused on the consumer discretionary sector. Smaller stores under $100 million in revenue account for nearly 60% of filings, often leveraging outdated statutes like California’s 1967 Invasion of...

Two Unique DHS Cyber Incidents Exposed 1M People’s Data
Within weeks, two state Departments of Human Services suffered separate data breaches, exposing personal information for nearly one million residents. In Illinois, a misconfigured map inadvertently displayed details of about 700,000 individuals, including Medicaid recipients, while Minnesota’s MnCHOICES system was...
Professional Crypto Recovery: Essential Steps & Services
A New York Times report highlighted an early Bitcoin investor who lost access to a $220 million stash after forgetting his wallet password, underscoring the high‑stakes nature of self‑custody. The article explains that only when the encrypted wallet file is available can a...
Oracle WebLogic Proxy Bug Enables Unauthenticated Remote Compromise
Oracle has disclosed CVE‑2026‑21962, a critical flaw in its Fusion Middleware WebLogic proxy plug‑ins that permits unauthenticated attackers to compromise Oracle HTTP Server over HTTP. The vulnerability affects Oracle HTTP Server versions 12.2.1.4.0, 14.1.1.0.0 and 14.1.2.0.0, as well as the...

CyberNut Closes $5M Growth Capital for K-12 Security Awareness Training
CyberNut, a Miami‑based startup, closed a $5 million minority growth equity round led by Growth Street Partners to scale its K‑12 cybersecurity awareness platform. The company, which emerged from stealth in May 2024 after raising $800,000 in pre‑seed capital, already serves over...

NDSS 2025 – Dissecting Payload-Based Transaction Phishing On Ethereum
The paper presented at NDSS 2025 reveals a new, sophisticated phishing vector on Ethereum called payload‑based transaction phishing (PTXPHISH). Researchers built the first ground‑truth dataset of 5,000 phishing transactions and identified four main tactics across eleven sub‑categories. Their rule‑based detection...

What SaaS Security ROI Looks Like in Practice
AppOmni released an ROI report showing SaaS security delivers tangible operational benefits quickly. Customers reported saving roughly 146 manual hours each month and a 24% reduction in audit findings after gaining visibility. The study found measurable value within two weeks...