Cybersecurity News and Headlines

Promptware Kill Chain – Five-Step Kill Chain Model For Analyzing Cyberthreats
NewsJan 15, 2026

Promptware Kill Chain – Five-Step Kill Chain Model For Analyzing Cyberthreats

The Promptware Kill Chain introduces a five‑step framework that treats malicious prompts and poisoned content as a distinct class of AI malware. It maps the lifecycle of attacks on large language model applications from initial access through privilege escalation, persistence,...

By GBHackers On Security
CISO Role Reaches “Inflexion Point” With Executive-Level Titles
NewsJan 15, 2026

CISO Role Reaches “Inflexion Point” With Executive-Level Titles

The 2026 State of the CISO Report shows a structural shift, with 46% of North American CISOs now holding executive titles such as EVP or SVP. Over half of respondents say their role has expanded to cover SecOps, architecture, GRC,...

By Infosecurity Magazine
ThreatsDay Bulletin: AI Voice Cloning Exploit, Wi-Fi Kill Switch, PLC Vulns, and 14 More Stories
NewsJan 15, 2026

ThreatsDay Bulletin: AI Voice Cloning Exploit, Wi-Fi Kill Switch, PLC Vulns, and 14 More Stories

The latest ThreatsDay bulletin spotlights a wave of high‑severity, unauthenticated remote code execution flaws—from Redis’s XACKDEL buffer overflow affecting roughly 2,900 servers to AI‑ML libraries that execute malicious model metadata. It also flags a Broadcom Wi‑Fi chipset kill‑switch that can...

By The Hacker News
AI Security Platform WitnessAI Raises $58m to Expand Globally
NewsJan 15, 2026

AI Security Platform WitnessAI Raises $58m to Expand Globally

WitnessAI secured $58 million in strategic funding led by Sound Ventures, aiming to accelerate global expansion and broaden its AI security suite. The platform provides enterprises with real‑time visibility and control over large‑language models and autonomous AI agents, addressing governance gaps...

By Fintech Global
Meeting the New ETSI Standard for AI Security
NewsJan 15, 2026

Meeting the New ETSI Standard for AI Security

ETSI has released EN 304 223, the first globally applicable European standard that defines baseline security requirements for AI systems across enterprises. The standard aligns with the EU AI Act and introduces concrete provisions covering deep neural networks, generative AI,...

By Artificial Intelligence News
JPMorgan Claims Ex-Advisor In Fla. Stole Trade Secrets To Poach Clients For LPL
NewsJan 15, 2026

JPMorgan Claims Ex-Advisor In Fla. Stole Trade Secrets To Poach Clients For LPL

JPMorgan has filed a federal lawsuit seeking a temporary restraining order against former private‑client advisor Kevin J. Sercia. The bank alleges Sercia accessed roughly 175 client profiles on its Advisor Central system after hours and stole confidential information to solicit...

By DataBreaches.net
New CastleLoader Variant Linked to 469 Infections Across Critical Sectors
NewsJan 15, 2026

New CastleLoader Variant Linked to 469 Infections Across Critical Sectors

Cyber‑security firm ANY.RUN has identified a new, more stealthy variant of the CastleLoader malware, now linked to 469 compromised devices across U.S. government agencies and European critical infrastructure. The loader uses a social‑engineering “ClickFix” prompt and Inno Setup/AutoIt to gain...

By HackRead
Delinea Acquries StrongDM to Secure Access to IT Infrastructure
NewsJan 15, 2026

Delinea Acquries StrongDM to Secure Access to IT Infrastructure

Delinea announced it will acquire StrongDM, a platform that provides just‑in‑time (JIT) access to IT infrastructure for both human operators and non‑human identities. The deal expands Delinea’s privileged access management suite to cover dynamic, AI‑driven workloads and supports a zero...

By Security Boulevard
7 Reasons to Get Certified in API Security
NewsJan 15, 2026

7 Reasons to Get Certified in API Security

Wallarm University now offers a free, hands‑on API security certification that lets participants run real attacks and practice defenses. The program is built by seasoned API security experts and covers emerging threats such as AI‑driven and agentic APIs. Recent Wallarm...

By Security Boulevard
Data Privacy Teams Face Staffing Shortages and Budget Constraints, ISACA Warns
NewsJan 15, 2026

Data Privacy Teams Face Staffing Shortages and Budget Constraints, ISACA Warns

ISACA’s State of Privacy 2026 report reveals that median privacy team size dropped to five members, down from eight the previous year, while technical privacy roles face the steepest shortages. Budget pressures persist, with only 36% of respondents feeling adequately...

By Infosecurity Magazine
Classroom Device Management: 8 Strategies for K-12 Success
NewsJan 15, 2026

Classroom Device Management: 8 Strategies for K-12 Success

Classroom device management is essential for K‑12 schools integrating laptops, tablets, and BYOD. The article outlines eight practical strategies, including clear rules, mobile device management tools, app whitelisting, screen monitoring, scheduled access, BYOD integration, activity tracking, and continuous teacher development....

By Security Boulevard
Hundreds of Millions of Audio Devices Need a Patch to Prevent Wireless Hacking and Tracking
NewsJan 15, 2026

Hundreds of Millions of Audio Devices Need a Patch to Prevent Wireless Hacking and Tracking

Researchers at KU Leuven uncovered critical Fast Pair flaws in 17 audio accessories from ten manufacturers, enabling a WhisperPair attack that silently hijacks Bluetooth earbuds, headphones, and speakers within 50 feet. The vulnerability lets attackers take control of audio streams, activate...

By WIRED (Security)
Model Security Is the Wrong Frame – The Real Risk Is Workflow Security
NewsJan 15, 2026

Model Security Is the Wrong Frame – The Real Risk Is Workflow Security

Security teams are still focusing on protecting AI models, but recent incidents show the real risk lies in the workflows surrounding them. Malicious Chrome extensions harvested chat data from over 900,000 users, and prompt‑injection attacks can coerce AI coding assistants...

By The Hacker News
Years-Old Vulnerable Apache Struts 2 Versions See 387K Weekly Downloads
NewsJan 15, 2026

Years-Old Vulnerable Apache Struts 2 Versions See 387K Weekly Downloads

Sonatype researchers reported that over 387,000 downloads of Apache Struts 2 occurred in a single week, and 98% of those were for end‑of‑life versions vulnerable to CVE‑2025‑68493. The flaw, a high‑severity (8.8) unsafe XML parsing issue affecting versions 2.0.0 through 6.1.0,...

By HackRead
4 Outdated Habits Destroying Your SOC's MTTR in 2026
NewsJan 15, 2026

4 Outdated Habits Destroying Your SOC's MTTR in 2026

Many security operations centers still rely on outdated, manual processes that slow incident response. The article highlights four habits—manual sample review, sole reliance on static scans, fragmented toolsets, and excessive alert escalations—that inflate mean time to respond. It shows how...

By The Hacker News
Trio of Critical Bugs Spotted in Delta Industrial PLCs
NewsJan 15, 2026

Trio of Critical Bugs Spotted in Delta Industrial PLCs

Researchers from OPSWAT’s Unit 515 uncovered four serious flaws in Delta Electronics’ DVP‑12SE11T programmable logic controller, including three critical CVSS 9+ vulnerabilities. Delta issued a firmware patch just before the 2026 New Year, but many OT environments may delay updates due to...

By Dark Reading
FTC Bans GM From Selling Drivers' Location Data for Five Years
NewsJan 15, 2026

FTC Bans GM From Selling Drivers' Location Data for Five Years

The U.S. Federal Trade Commission finalized an order against General Motors and its OnStar subsidiary for collecting and selling precise geolocation and driver‑behavior data without consent. The settlement bans GM from sharing such data with consumer reporting agencies for five...

By BleepingComputer
Guarding Europe’s Hidden Lifelines: How AI Could Protect Subsea Infrastructure
PodcastJan 15, 2026

Guarding Europe’s Hidden Lifelines: How AI Could Protect Subsea Infrastructure

The episode explores how AI can safeguard Europe’s extensive subsea cables and pipelines, focusing on the EU‑funded VIGIMARE project led by researcher Johanna Karvonen. It details how machine‑learning models will fuse satellite imagery, AIS data, radar and acoustic signals from...

By AIhub
Cyb3r Operations Raises $5.4M in Financing
NewsJan 15, 2026

Cyb3r Operations Raises $5.4M in Financing

London‑based Cyb3r Operations secured $5.4 million in a financing round led by Octopus Ventures, bringing its total capital to $6.75 million after a follow‑on from Pi Labs. The startup provides continuous, automated third‑party cyber risk visibility across tech stacks, flagging vulnerabilities, sanctions,...

By FinSMEs
AWS Flips Switch on Euro Cloud as Customers Fret About Digital Sovereignty
NewsJan 15, 2026

AWS Flips Switch on Euro Cloud as Customers Fret About Digital Sovereignty

Amazon Web Services launched its European Sovereign Cloud to general availability, promising a fully EU‑located environment that is physically and logically separate from other AWS regions. The offering initially includes 90 services spanning compute, storage, networking, security, and AI, and...

By The Register
Bitwarden Advances Passkeys and Credential Risk Controls
NewsJan 15, 2026

Bitwarden Advances Passkeys and Credential Risk Controls

Bitwarden unveiled Access Intelligence, delivering application‑level visibility into weak, reused or exposed credentials and guiding remediation, cutting average resolution time from nine days. The company also expanded passkey support, adding native Windows 11 integration, cross‑platform portability via the FIDO Credential Exchange...

By Help Net Security
Arcjet Python SDK Sinks Teeth Into Application-Layer Security
NewsJan 15, 2026

Arcjet Python SDK Sinks Teeth Into Application-Layer Security

Arcjet has released a Python SDK that brings its application‑layer security platform directly into Python services and APIs. The SDK provides built‑in bot protection, rate limiting, email validation and signup spam prevention, and works with both FastAPI and Flask with...

By Security Boulevard
F5 Targets AI Runtime Risk with New Guardrails and Adversarial Testing Tools
NewsJan 15, 2026

F5 Targets AI Runtime Risk with New Guardrails and Adversarial Testing Tools

F5 announced the general availability of two AI‑runtime security products—F5 AI Guardrails and F5 AI Red Team. The Guardrails solution provides model‑agnostic, real‑time protection for AI agents, while the Red Team offers automated adversarial testing using a continuously updated threat...

By Help Net Security
ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Aveva, Phoenix Contact
NewsJan 15, 2026

ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Aveva, Phoenix Contact

Industrial control system vendors Siemens, Schneider Electric, Phoenix Contact and Aveva issued a dozen Patch Tuesday advisories on Jan. 15, 2026, addressing critical and high‑severity flaws across edge devices, process automation platforms, routers and optimization software. Siemens released five advisories,...

By SecurityWeek
Palo Alto Networks Warns of DoS Bug Letting Hackers Disable Firewalls
NewsJan 15, 2026

Palo Alto Networks Warns of DoS Bug Letting Hackers Disable Firewalls

Palo Alto Networks disclosed a high‑severity flaw, CVE‑2026‑0227, that lets unauthenticated attackers trigger a denial‑of‑service condition on PAN‑OS firewalls and Prisma Access gateways when GlobalProtect is enabled. The bug forces the appliance into maintenance mode, effectively disabling protection. Palo Alto...

By BleepingComputer
Asimily Extends Cisco ISE Integration to Turn Device Risk Into Segmentation Policy
NewsJan 15, 2026

Asimily Extends Cisco ISE Integration to Turn Device Risk Into Segmentation Policy

Asimily announced new microsegmentation capabilities that add Security Group Access Control List (SGACL) support to Cisco Identity Services Engine (ISE). The integration lets organizations automatically translate device classification, behavior analysis, and risk scores into enforceable segmentation policies. By extending its...

By Help Net Security
DeFi Quietly Breaks up with Discord as Scams Overwhelm Public Channels
NewsJan 15, 2026

DeFi Quietly Breaks up with Discord as Scams Overwhelm Public Channels

DeFi protocols are pulling back from public Discord servers as scam activity overwhelms community channels. Morpho announced its Discord is now read‑only and redirected users to ticket‑based tools like Intercom, while data platform DefiLlama is shifting to live chat and...

By Cointelegraph
Modern Executive Protection: Digital Exposure & Physical Risk
NewsJan 15, 2026

Modern Executive Protection: Digital Exposure & Physical Risk

Executive protection is expanding beyond physical guards to include digital exposure analysis. Executives and their households generate extensive online footprints that adversaries exploit to shape targeting before any physical action. The article argues that most security teams have abundant data...

By Security Boulevard
Microsoft Shuts Down RedVDS Cybercrime Subscription Service Tied to Millions in Fraud Losses
NewsJan 15, 2026

Microsoft Shuts Down RedVDS Cybercrime Subscription Service Tied to Millions in Fraud Losses

Microsoft announced a coordinated legal operation in the United States and United Kingdom, backed by Europol and German authorities, to dismantle RedVDS, a subscription‑based cybercrime platform. Since March 2025, RedVDS has enabled fraudsters to rent disposable virtual machines for $24...

By Help Net Security
From Typos to Takeovers: Inside the Industrialization of Npm Supply Chain Attacks
NewsJan 15, 2026

From Typos to Takeovers: Inside the Industrialization of Npm Supply Chain Attacks

The npm ecosystem has moved from simple typosquatting to coordinated credential‑driven attacks that compromise maintainers and CI/CD pipelines. Attackers now hijack trusted packages, inject malicious post‑install scripts, and use stolen tokens as a "master key" to reach millions of downstream...

By CSO Online
Cyb3r Operations Raises £4M to Address Third-Party Risk Blind Spots
NewsJan 15, 2026

Cyb3r Operations Raises £4M to Address Third-Party Risk Blind Spots

London‑based Cyb3r Operations secured £4 million in a round led by Octopus Ventures, bringing its total funding to £5 million. The capital will accelerate its platform that delivers continuous, automated visibility into third‑party cyber risk for large enterprises. As SaaS, cloud and...

By Tech.eu
New Cloudflare Report Warns of a ‘Technical Glass Ceiling’ Stifling AI Growth and Weakening Cybersecurity
NewsJan 15, 2026

New Cloudflare Report Warns of a ‘Technical Glass Ceiling’ Stifling AI Growth and Weakening Cybersecurity

Cloudflare’s inaugural 2026 App Innovation Report finds that organizations that modernize their application stacks are three times more likely to realize tangible AI returns, while legacy‑bound firms face heightened security exposure. The study shows 93% of leaders credit software updates...

By AiThority
LinkedIn Wants to Make Verification a Portable Trust Signal
NewsJan 15, 2026

LinkedIn Wants to Make Verification a Portable Trust Signal

LinkedIn is launching a self‑serve API that lets its Verified on LinkedIn badge be displayed on third‑party platforms, turning the verification badge into a portable trust signal. The company reports that 75 members verify each minute, now exceeding 100 million verified...

By Help Net Security
GoLogin vs MultiLogin vs VMLogin – What’s the Anti-Detect Browsers Difference?
NewsJan 15, 2026

GoLogin vs MultiLogin vs VMLogin – What’s the Anti-Detect Browsers Difference?

Anti-detect browsers let users conceal fingerprints and manage multiple online identities. The article compares three leading solutions—GoLogin, MultiLogin, and VMLogin—detailing their core features, user bases, and pricing models. GoLogin distinguishes itself with cloud‑based profile storage, multilingual support, and a seven‑day...

By GBHackers On Security
QR Codes Are Getting Colorful, Fancy, and Dangerous
NewsJan 15, 2026

QR Codes Are Getting Colorful, Fancy, and Dangerous

QR codes have evolved from plain black‑and‑white squares to colorful, logo‑embedded designs, making them a popular yet risky communication channel. Researchers at Deakin University identified a surge in "quishing" attacks that exploit these stylized codes to bypass traditional URL‑based security...

By Help Net Security
How the OWASP Application Security Verification Standard Helps Improve Software Security
NewsJan 15, 2026

How the OWASP Application Security Verification Standard Helps Improve Software Security

Centraleyes recently integrated the OWASP Application Security Verification Standard (ASVS) into its cyber‑risk platform, enabling structured, repeatable assessments for web and cloud services. ASVS defines three verification levels—opportunistic, standard, and advanced—allowing organizations to match security controls to application risk. The...

By Security Boulevard
Cybersecurity Spending Keeps Rising, so Why Is Business Impact Still Hard to Explain?
NewsJan 15, 2026

Cybersecurity Spending Keeps Rising, so Why Is Business Impact Still Hard to Explain?

Cybersecurity budgets are set to increase again, yet security leaders still struggle to demonstrate clear business value. Finance executives express uneven trust in security teams’ ability to translate risk mitigation into financial outcomes, creating friction in budget approvals. Divergent definitions...

By Help Net Security
The NSA Lays Out the First Steps for Zero Trust Adoption
NewsJan 15, 2026

The NSA Lays Out the First Steps for Zero Trust Adoption

The National Security Agency has published the first two documents in its Zero Trust Implementation Guidelines series—a Primer and a Discovery Phase guide. The Primer explains the structure and principles of the series, while the Discovery Phase directs organizations to...

By Help Net Security
Microsoft, Law Enforcement Disrupt RedVDS Global Cybercrime Service
NewsJan 15, 2026

Microsoft, Law Enforcement Disrupt RedVDS Global Cybercrime Service

Microsoft and international law‑enforcement agencies, including Europol, dismantled RedVDS, a cybercrime‑as‑a‑service platform that has stolen roughly $40 million since March 2025. The operation seized the service’s marketplace, customer portal, and associated domains, cutting off access to cheap virtual dedicated servers rented for...

By Security Boulevard
Depthfirst Secures $40M to Expand Agentic Approach to Software Security
NewsJan 14, 2026

Depthfirst Secures $40M to Expand Agentic Approach to Software Security

Depthfirst Inc. announced a $40 million Series A round led by Accel to accelerate its AI‑native security platform. The startup’s General Security Intelligence platform deploys custom AI agents that continuously analyze code, infrastructure and workflows, delivering context‑aware vulnerability detection. In its first...

By SiliconANGLE
Aikido Security Raises $60M Series B at $1B Valuation to Unify Application Security
NewsJan 14, 2026

Aikido Security Raises $60M Series B at $1B Valuation to Unify Application Security

Belgian cybersecurity firm Aikido Security announced a $60 million Series B round that values the company at $1 billion, making it Europe’s fastest unicorn in the sector. The funding will accelerate its unified application security platform, which combines static and dynamic testing, software...

By SiliconANGLE
How to Build a Stateless, Secure, and Asynchronous MCP-Style Protocol for Scalable Agent Workflows
NewsJan 14, 2026

How to Build a Stateless, Secure, and Asynchronous MCP-Style Protocol for Scalable Agent Workflows

The tutorial demonstrates how to construct a Minimal Communication Protocol (MCP) that is stateless, cryptographically signed, and capable of handling asynchronous, long‑running tasks. Using Python, Pydantic models enforce strict schema validation for every request and response, while HMAC signatures guarantee...

By MarkTechPost
Project Eleven Scores $20M Series A
NewsJan 14, 2026

Project Eleven Scores $20M Series A

Project Eleven, a post‑quantum security and digital‑asset migration startup, announced a $20 million Series A financing round. The round was led by Castle Island Ventures and included investors such as Coinbase Ventures, Balaji Srinivasan, Fin Capital, Variant, and several other venture funds....

By VC News Daily
Secure Your Spot at RSAC 2026 Conference
NewsJan 14, 2026

Secure Your Spot at RSAC 2026 Conference

The RSA Conference (RSAC) will convene cybersecurity leaders in San Francisco from March 23‑26, 2026, offering a platform to explore emerging strategies and bold technologies. Simultaneously, GISEC GLOBAL 2026 will gather CISOs, government officials, and ethical hackers across the Middle East and Africa...

By Dark Reading
NDSS 2025 – PolicyPulse:Precision Semantic Role Extraction For Enhanced Privacy Policy Comprehension
NewsJan 14, 2026

NDSS 2025 – PolicyPulse:Precision Semantic Role Extraction For Enhanced Privacy Policy Comprehension

Researchers from the University of Denver introduced PolicyPulse, an information‑extraction pipeline that converts natural‑language privacy policies into structured, machine‑readable formats. The system combines a specialized XLNet classifier with a BERT‑based semantic role labeler, processing sentences to preserve predicate‑argument relationships. Trained...

By Security Boulevard
Iran’s Partial Internet Shutdown May Be a Windfall for Cybersecurity Intel
NewsJan 14, 2026

Iran’s Partial Internet Shutdown May Be a Windfall for Cybersecurity Intel

Iran’s near‑total internet blackout, begun Jan 8, has stripped millions of residential users offline, leaving only government‑controlled networks visible. Cybersecurity analysts say this creates a rare window to fingerprint Iranian state‑linked IPs and map their digital infrastructure. Vendors like Whisper Security...

By CSO Online
Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
NewsJan 14, 2026

Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers

Black Lotus Labs at Lumen Technologies announced that it has null‑routed traffic to more than 550 command‑and‑control nodes used by the AISURU/Kimwolf botnet since early October 2025. The botnet now controls over two million Android devices, primarily unsecured TV boxes, and...

By The Hacker News
Structure and Reliability in E-Commerce Platforms
NewsJan 14, 2026

Structure and Reliability in E-Commerce Platforms

E‑commerce platforms depend on a robust technical foundation that goes beyond aesthetics. Scalability, security, speed, and continuous uptime are essential to handle traffic spikes, protect customer data, and maintain conversion rates. Managed hosting and automated backups simplify maintenance while platform‑specific...

By HackRead
From Backup to Business Resilience: Inside Cognizant and Rubrik’s New BRaaS Model
NewsJan 14, 2026

From Backup to Business Resilience: Inside Cognizant and Rubrik’s New BRaaS Model

Cognizant and Rubrik have launched a Business Resilience as a Service (BRaaS) platform that merges Rubrik’s cyber‑resilience technology with Cognizant’s delivery expertise. The service addresses modern threats such as ransomware, cloud‑infrastructure attacks, and AI‑driven disruptions by providing unified data protection,...

By CIO.com