Cybersecurity News and Headlines

The Email Insider Threat Has Evolved in the Era of Generative AI
NewsJan 21, 2026

The Email Insider Threat Has Evolved in the Era of Generative AI

The article warns that generative AI is reshaping email insider threats, turning everyday tools like grammar checkers into vectors for intellectual property loss. Attackers now use AI‑crafted phishing emails and malicious attachments that bypass traditional filters, while browser extensions silently...

By Security Magazine (Cybersecurity)
NSFOCUS Enters the Global Top Tier of DDoS Security: NSFOCUS DDoS Solutions Positioned in the MarketsandMarkets™ Star Quadrant
NewsJan 21, 2026

NSFOCUS Enters the Global Top Tier of DDoS Security: NSFOCUS DDoS Solutions Positioned in the MarketsandMarkets™ Star Quadrant

NSFOCUS has been placed in the Star Quadrant of MarketsandMarkets' Global DDoS Protection and Mitigation Security Market Forecast to 2030, marking its entry into the industry’s top tier. The ranking reflects NSFOCUS’s mature technology stack, broad solution portfolio, and expanding...

By Security Boulevard
Attribute-Based Access Control (ABAC): Complete Guide with Policy Examples
NewsJan 21, 2026

Attribute-Based Access Control (ABAC): Complete Guide with Policy Examples

Businesses are abandoning passwords for B2C apps, citing high friction and security risks. Password resets cost about $70 each and cause significant support expenses, while passwordless solutions can boost conversion rates by more than 10%. The CIAM market is expanding,...

By Security Boulevard
Data Destruction: Why Secure ITAD and Certified Partners Matter More Than Ever
NewsJan 20, 2026

Data Destruction: Why Secure ITAD and Certified Partners Matter More Than Ever

Data destruction is now a strategic imperative, requiring more than simple file deletion. Certified IT asset disposition (ITAD) vendors, especially those with R2v3, Appendix B, and Appendix C credentials, guarantee logical sanitization, physical destruction, and secure refurbishment. These certifications provide...

By TechBullion
Coherent and Quside Demonstrate Scalable, Verifiable Quantum Entropy for Data Security
NewsJan 20, 2026

Coherent and Quside Demonstrate Scalable, Verifiable Quantum Entropy for Data Security

Coherent Corp. and Quside have demonstrated a mass‑manufacturable quantum entropy source using Coherent’s 6‑inch VCSEL line combined with Quside’s QRNG technology. The system generates true, verifiable randomness by measuring VCSEL phase fluctuations and includes real‑time entropy monitoring to detect tampering....

By Quantum Computing Report
Everest Ransomware Claims McDonalds India Breach Involving Customer Data
NewsJan 20, 2026

Everest Ransomware Claims McDonalds India Breach Involving Customer Data

Everest ransomware announced a breach of McDonald’s India, claiming to have stolen 861 GB of customer and internal data. The leaked material reportedly contains financial reports, ERP migration files, investor contact lists, and store‑level employee details. HackRead published screenshots to substantiate...

By HackRead
Brazen Scheme Combines Fraud, Visiting Customers' Homes
NewsJan 20, 2026

Brazen Scheme Combines Fraud, Visiting Customers' Homes

Barnegat Township Police warned New Jersey residents of a hybrid fraud scheme that combines phone spoofing with a physical courier pickup to steal debit cards. Criminals pose as bank fraud agents, claim unauthorized out‑of‑state activity, and arrange a courier to...

By American Banker Technology
Integrating Enzoic Alerts Into Microsoft Sentinel with Azure Logic Apps
NewsJan 20, 2026

Integrating Enzoic Alerts Into Microsoft Sentinel with Azure Logic Apps

Enzoic’s real‑time breach alerts can now be piped into Microsoft Sentinel using Azure Logic Apps, turning each webhook into a Sentinel incident. The guide walks through provisioning a Log Analytics workspace, creating a consumption‑based Logic App, parsing Enzoic’s JSON payload,...

By Security Boulevard
UStrive Security Lapse Exposed Personal Data of Its Users, Including Children
NewsJan 20, 2026

UStrive Security Lapse Exposed Personal Data of Its Users, Including Children

UStrive, a nonprofit mentoring platform for students, fixed a security lapse that let any logged‑in user view personal data of others, including children. The flaw stemmed from a vulnerable Amazon‑hosted GraphQL endpoint, exposing at least 238,000 records containing names, emails,...

By TechCrunch (Cybersecurity)
Introducing Mend.io’s AI Security Maturity Survey + Compliance Checklist Available Today
NewsJan 20, 2026

Introducing Mend.io’s AI Security Maturity Survey + Compliance Checklist Available Today

Mend.io launched an interactive AI Security Maturity Survey and a companion Compliance Checklist to help organizations assess and document AI risk. The tools map to OWASP AIMA, NIST AI RMF, ISO 42001 and the upcoming EU AI Act, delivering a personalized...

By Security Boulevard
Airlock Digital Announces Independent TEI Study Quantifying Measurable ROI & Security Impact
NewsJan 20, 2026

Airlock Digital Announces Independent TEI Study Quantifying Measurable ROI & Security Impact

Airlock Digital released an independent Total Economic Impact study by Forrester Consulting showing a 224% return on investment and a $3.8 million net present value over three years for its allow‑listing solution. The research reports more than a 25% reduction in...

By HackRead
Mass Spam Attacks Leverage Zendesk Instances
NewsJan 20, 2026

Mass Spam Attacks Leverage Zendesk Instances

Zendesk reported a wave of mass spam campaigns that exploit its customer‑service platform to send phishing emails. The messages appear to originate from legitimate Zendesk subdomains, tricking recipients into opening malicious links. Zendesk clarified that the campaigns are not linked...

By Dark Reading
NDSS 2025 – Studying the Defensive Registration Practices of the Fortune 500
NewsJan 20, 2026

NDSS 2025 – Studying the Defensive Registration Practices of the Fortune 500

Researchers at NDSS 2025 examined defensive domain registrations by Fortune 500 firms, uncovering 19,523 domains registered across 447 companies. The study found most firms register only a handful of domains, yet they collectively rely heavily on online brand protection (OBP)...

By Security Boulevard
The Zero Risk Trap: How to Ditch Perfection and Prioritize Real Cyber Resilience
NewsJan 20, 2026

The Zero Risk Trap: How to Ditch Perfection and Prioritize Real Cyber Resilience

Cybersecurity leaders are trapped in a zero‑risk mindset, chasing perfect audit scores while real threats evolve. The article argues that this pursuit leads to burnout, misallocated resources, and a false sense of security. It proposes a shift toward ruthless risk...

By Security Boulevard
EU Plans Cybersecurity Overhaul to Block Foreign High-Risk Suppliers
NewsJan 20, 2026

EU Plans Cybersecurity Overhaul to Block Foreign High-Risk Suppliers

The European Commission has unveiled a comprehensive cybersecurity package that gives it authority to conduct EU‑wide risk assessments and restrict high‑risk foreign suppliers in critical telecom infrastructure. The proposal builds on the voluntary 5G Security Toolbox and expands the Cybersecurity...

By BleepingComputer
10 Defining Moments in Space and Cybersecurity in 2025
NewsJan 20, 2026

10 Defining Moments in Space and Cybersecurity in 2025

2025 marked a turning point for space cybersecurity as the National Reconnaissance Office unveiled a centralized Space Cyber Program, while Ukraine publicly confirmed a 2023 hack on Russia’s Dozor‑Teleport satellite network. Academic research revealed that low‑cost satellite receivers can capture...

By Via Satellite
The Data Center Is Secure, But Your Users Are Not
NewsJan 20, 2026

The Data Center Is Secure, But Your Users Are Not

Data centers now feature layered physical safeguards, redundant systems and zero‑trust digital controls, creating a robust perimeter. Despite these defenses, most breaches stem from human error, especially phishing and weak passwords. The article highlights that 90 % of 2021 data breaches...

By Security Boulevard
Beyond the Interface: Assessing the Security and Payment Infrastructure of Today’s Top Digital Wallets
NewsJan 20, 2026

Beyond the Interface: Assessing the Security and Payment Infrastructure of Today’s Top Digital Wallets

Digital wallets are evolving beyond UI to prioritize security architecture, payment infrastructure, and regulatory intelligence for 2026. Agentic commerce will enable AI agents to execute transactions autonomously, requiring cryptographic consent and continuous trust orchestration. Multi‑biometric authentication, AI‑driven predictive security, and...

By TechBullion
Zero-Trust UTM: TII, VentureOne, and High Lander Join Forces at UMEX to Forge New Airspace Security Standards in the UAE
PodcastJan 20, 2026

Zero-Trust UTM: TII, VentureOne, and High Lander Join Forces at UMEX to Forge New Airspace Security Standards in the UAE

High Lander Aviation, Abu Dhabi’s Technology Innovation Institute (TII) and venture builder VentureOne announced a strategic collaboration at UMEX 2026 to develop national‑level zero‑trust security standards for unmanned traffic management (UTM) in the UAE. The partnership will focus on end‑to‑end security...

By sUAS News
ECommerce Outsourcing Philippines: Battling Cyber Threats with Next-Gen Fraud Detection Systems in BPO
NewsJan 20, 2026

ECommerce Outsourcing Philippines: Battling Cyber Threats with Next-Gen Fraud Detection Systems in BPO

E‑commerce retailers are shifting Philippine outsourcing from a pure cost play to a fraud‑resilience strategy as cyber threats intensify. Leading BPOs now embed machine‑learning, behavioral analytics, device intelligence and seasoned fraud analysts, delivering 40‑60% lower fraud losses, 50‑70% fewer false...

By Digital Commerce 360
Why Smart Contract Security Can’t Wait for “Better” AI Models
NewsJan 20, 2026

Why Smart Contract Security Can’t Wait for “Better” AI Models

In 2024, smart‑contract vulnerabilities cost the Web3 ecosystem $1.42 billion across 149 incidents, with access‑control flaws alone responsible for $953.2 million. While the community debates perfect AI solutions, current AI‑powered static analysis tools already capture roughly 80 % of known issues, and models...

By Security Boulevard
Cybersecurity in the Age of AIOps: Proactive Defense Strategies for IT Leaders
NewsJan 20, 2026

Cybersecurity in the Age of AIOps: Proactive Defense Strategies for IT Leaders

Cybersecurity AIOps combines AI, machine learning, and automation to transform traditional security operations. It enables real‑time threat detection, reduces human error, and shifts defenses from reactive to proactive. Key strategies include predictive analytics, automated response, alert prioritization, cross‑team collaboration, and...

By Security Boulevard
The Hidden Cybersecurity Risk of “Integrated” Security Platforms
NewsJan 20, 2026

The Hidden Cybersecurity Risk of “Integrated” Security Platforms

Security vendors increasingly market ‘integrated’ platforms as a way to simplify protection, but most are merely stitched collections of separate tools. This architectural shortcut leaves each product with its own data model, causing delayed correlation and siloed response actions that...

By Security Boulevard
Signaloid Successfully Achieves SOC 2 Type II Attestation
NewsJan 20, 2026

Signaloid Successfully Achieves SOC 2 Type II Attestation

Signaloid announced that it has earned a SOC 2 Type II attestation, concluding a three‑month audit of its cloud infrastructure, data‑processing pipelines, and operational controls. The audit, performed by compliance specialist A‑LIGN, covered the period from July 1 to September 30, 2025,...

By AI-TechPark
Sprocket Security Appoints Eric Sheridan as Chief Technology Officer
NewsJan 20, 2026

Sprocket Security Appoints Eric Sheridan as Chief Technology Officer

Sprocket Security announced the appointment of Eric Sheridan as its new Chief Technology Officer. Sheridan brings decades of cybersecurity and software engineering experience, along with multiple patents, to guide the firm’s technology vision. In his role, he will oversee engineering...

By HackRead
Make Identity Threat Detection Your Security Strategy for 2026
NewsJan 20, 2026

Make Identity Threat Detection Your Security Strategy for 2026

Identity Threat Detection & Response (ITDR) is positioned as the core security strategy for 2026, shifting focus from perimeter defenses to monitoring compromised accounts. The article highlights that identity‑based attacks are the most common threat, and traditional controls like MFA...

By BleepingComputer
UPM and Q*Bird Launch Spain’s First Multi-Node MDI-QKD Network in Madrid
NewsJan 20, 2026

UPM and Q*Bird Launch Spain’s First Multi-Node MDI-QKD Network in Madrid

Universidad Politécnica de Madrid and Q*Bird have deployed Spain’s first operational multi‑node measurement‑device‑independent quantum key distribution (MDI‑QKD) network in Madrid. The hub‑and‑spoke architecture links two INTA facilities and the Ministry of the Interior’s SGSICS site, using Q*Bird’s Falqon® MQX4000 hub...

By Quantum Computing Report
Ping Identity Launches Universal Services for Ongoing Identity Assurance
NewsJan 20, 2026

Ping Identity Launches Universal Services for Ongoing Identity Assurance

Ping Identity introduced Universal Services, a continuous identity assurance suite that extends trust beyond the login event to every digital interaction. The offering integrates with any existing identity provider via standard APIs, allowing enterprises to validate, re‑verify, and adapt protections...

By Help Net Security
SK Telecom Files Lawsuit to Revoke Record 135 Bln-Won Fine over Data Breach
NewsJan 20, 2026

SK Telecom Files Lawsuit to Revoke Record 135 Bln-Won Fine over Data Breach

South Korea’s largest mobile carrier, SK Telecom, has filed a lawsuit with the Seoul Administrative Court to overturn a record 135 billion‑won (US$91 million) fine imposed by the Personal Information Protection Commission for a massive data breach. The breach, disclosed belatedly, exposed...

By DataBreaches.net
How Crypto Criminals Stole $700 Million From People – Often Using Age-Old Tricks
NewsJan 20, 2026

How Crypto Criminals Stole $700 Million From People – Often Using Age-Old Tricks

Crypto criminals are increasingly buying stolen consumer databases to pinpoint high‑net‑worth individuals and siphon cryptocurrency. A breach at luxury conglomerate Kering exposed millions of shopper records, which a hacker purchased for $300,000 and cross‑referenced with other leaks. Using the combined...

By DataBreaches.net
UK: Secret Gagging Order Should Not Have Been Used to Cover up Afghan Data Breach, Sir Ben Wallace Says
NewsJan 20, 2026

UK: Secret Gagging Order Should Not Have Been Used to Cover up Afghan Data Breach, Sir Ben Wallace Says

Former defence secretary Sir Ben Wallace criticised the use of a secret gagging order to conceal a massive data breach at the Ministry of Defence that exposed the personal details of thousands of Afghan collaborators. The breach occurred after an...

By DataBreaches.net
Cyber Risks Among CEOs’ Top Worries Amid Weak Short Term Growth Outlook
NewsJan 20, 2026

Cyber Risks Among CEOs’ Top Worries Amid Weak Short Term Growth Outlook

PwC’s 29th Global CEO Survey reveals cyber risk has risen to a top‑three threat alongside macroeconomic volatility, with 31 % of CEOs rating their firms as highly or extremely exposed to significant financial loss from cyber attacks in the coming year....

By Infosecurity Magazine
HackerOne Launches Good Faith AI Research Safe Harbor to Protect Responsible AI Testing
NewsJan 20, 2026

HackerOne Launches Good Faith AI Research Safe Harbor to Protect Responsible AI Testing

HackerOne introduced the Good Faith AI Research Safe Harbor, a framework that grants legal protection to researchers testing AI systems in good faith. Building on its 2022 Gold Standard Safe Harbor for traditional software, the new program clarifies authorization, limits...

By SiliconANGLE
AI Framework Flaws Put Enterprise Clouds at Risk of Takeover
NewsJan 20, 2026

AI Framework Flaws Put Enterprise Clouds at Risk of Takeover

Two critical flaws were discovered in the open‑source AI framework Chainlit, allowing arbitrary file reads (CVE‑2026‑22218) and server‑side request forgery (CVE‑2026‑22219). The vulnerabilities can expose environment variables, API keys and cloud credentials, and enable attackers to forge authentication tokens for...

By The Register
City of London Police Launches Fraud Reporting Service
NewsJan 20, 2026

City of London Police Launches Fraud Reporting Service

The City of London Police has unveiled a national "Report Fraud" service, replacing the older Action Fraud programme. The platform offers victims and businesses across England, Wales and Northern Ireland a single gateway to report cyber crime and fraud. By centralising...

By Finextra
2025: Double the Breaches, but Less Patient Data Compromised
NewsJan 20, 2026

2025: Double the Breaches, but Less Patient Data Compromised

In 2025 the healthcare sector saw breach incidents more than double, yet the total number of patient records exposed dropped sharply. The Fortified Health Security report, based on HHS OCR data, its own NIST Cybersecurity Framework assessments, and incident‑response experience,...

By DataBreaches.net
UK: North West Ambulance Service’s Increased Breach Reports May Reflect Better Reporting
NewsJan 20, 2026

UK: North West Ambulance Service’s Increased Breach Reports May Reflect Better Reporting

North West Ambulance Service NHS Trust disclosed nearly 400 data‑breach incidents over the past three years, with reports climbing from 75 breaches in 2022/23 to 143 the following year and 172 in the most recent period. Confidentiality failures dominated, accounting...

By DataBreaches.net
Webinar: Aligning Cybersecurity Purchases with What Your SOC Team Needs
NewsJan 20, 2026

Webinar: Aligning Cybersecurity Purchases with What Your SOC Team Needs

Security operations centers are plagued by alert fatigue because many tools are selected by executives without input from analysts. A BleepingComputer webinar on Jan. 29 will feature Sumo Logic experts discussing the disconnect between purchasing decisions and SOC needs. The session...

By BleepingComputer
RansomHouse Claims Data Breach at Major Apple Contractor Luxshare
NewsJan 20, 2026

RansomHouse Claims Data Breach at Major Apple Contractor Luxshare

RansomHouse, a ransomware‑extortion group, alleges it breached Luxshare Precision Industry, a major Apple manufacturing partner, and accessed sensitive engineering data such as 3D CAD and PCB files. The group posted a victim profile on its dark‑web leak site, listing Apple...

By HackRead
Anthropic Quietly Fixed Flaws in Its Git MCP Server that Allowed for Remote Code Execution
NewsJan 20, 2026

Anthropic Quietly Fixed Flaws in Its Git MCP Server that Allowed for Remote Code Execution

Anthropic has patched three critical flaws in its Git MCP server that could be chained with the Filesystem MCP server to achieve remote code execution via prompt injection. The vulnerabilities – CVE‑2025‑68145 (path‑validation bypass), CVE‑2025‑68143 (unrestricted git_init), and CVE‑2025‑68144 (git_diff...

By The Register
Apache Airflow Flaws Expose Sensitive Workflow Data to Potential Attackers
NewsJan 20, 2026

Apache Airflow Flaws Expose Sensitive Workflow Data to Potential Attackers

Apache Airflow released version 3.1.6 to fix two credential‑exposure flaws (CVE‑2025‑68675 and CVE‑2025‑68438). The first flaw logged proxy URLs with embedded usernames and passwords, while the second allowed unmasked API keys and tokens in the Rendered Templates UI. Both issues affect...

By GBHackers On Security
Endace Pushes Packet Capture Into Real-Time Security Workflows
NewsJan 20, 2026

Endace Pushes Packet Capture Into Real-Time Security Workflows

Endace released OSm 7.3, a major update that dramatically speeds packet‑capture search and adds a Vault REST API for automated forensic data access. The new search engine delivers up to 50‑fold performance gains, cutting typical query times from nearly a minute...

By Help Net Security
AI Supercharges Attacks in Cybercrime's New 'Fifth Wave'
NewsJan 20, 2026

AI Supercharges Attacks in Cybercrime's New 'Fifth Wave'

Group‑IB warns that cybercrime has entered a fifth wave powered by weaponized AI, accelerating attacks with generative tools. Dark‑web marketplaces now sell synthetic identity kits and deep‑fake‑as‑a‑service for as little as $5, while AI‑enhanced phishing kits automate victim targeting and...

By Infosecurity Magazine
The Hidden Risk of Orphan Accounts
NewsJan 20, 2026

The Hidden Risk of Orphan Accounts

Orchid Security highlights the growing threat of orphan accounts—unused human, service, and AI identities that remain active across enterprise environments due to fragmented IAM and IGA processes. These hidden credentials, often with elevated privileges, have been leveraged in high‑profile breaches...

By The Hacker News
Radware Targets API Blind Spots with Real-Time Lifecycle Protection
NewsJan 20, 2026

Radware Targets API Blind Spots with Real-Time Lifecycle Protection

Radware announced its API Security Service, an end‑to‑end platform that safeguards APIs throughout their entire lifecycle using live production traffic. The solution tackles OWASP Top 10 API risks, including sophisticated Layer 7 DDoS attacks, by delivering continuous discovery, runtime posture management, and...

By Help Net Security
Makina Loses $4.1 Million in Exploit Tied to Price-Feed Manipulation
NewsJan 20, 2026

Makina Loses $4.1 Million in Exploit Tied to Price-Feed Manipulation

Makina, a DeFi execution platform, suffered a $4.13 million exploit after an attacker used a flash loan to manipulate the price‑feed of its DUSD/USDC Curve pool. By inflating the MachineShareOracle’s reported prices, the hacker swapped roughly 110 million USDC against a pool holding...

By CoinDesk
OPNsense 25.7.11 Enhances Network Visibility With Host Discovery Feature
NewsJan 20, 2026

OPNsense 25.7.11 Enhances Network Visibility With Host Discovery Feature

OPNsense 25.7.11 introduces a native host discovery service that automatically resolves and stores MAC addresses for IPv4 and IPv6 hosts. The feature feeds live data to MAC‑based firewall aliases and captive‑portal client tracking, improving policy accuracy and device visibility. IPv6...

By GBHackers On Security
Sophos Introduces Workspace Protection to Simplify Hybrid and Remote Work Security
NewsJan 20, 2026

Sophos Introduces Workspace Protection to Simplify Hybrid and Remote Work Security

Sophos Group launched Workspace Protection, a browser‑centric security service designed for hybrid and remote work. The offering combines a purpose‑built protected browser with Sophos ZTNA, DNS Protection and an email monitoring add‑on, all managed through the Sophos Central console. By...

By SiliconANGLE