Cybersecurity News and Headlines

Fake Employee Reports Spread Guloader and Remcos RAT Malware
NewsJan 12, 2026

Fake Employee Reports Spread Guloader and Remcos RAT Malware

AhnLab Security Intelligence Center uncovered a phishing campaign that disguises malicious attachments as fake employee performance reports. The email, posing as HR, includes a compressed file named "staff record pdf.exe" which, when executed, deploys the Guloader loader. Guloader then retrieves...

By HackRead
Cybersecurity in the Public Sector: Challenges, Strategies and Best Practices
NewsJan 12, 2026

Cybersecurity in the Public Sector: Challenges, Strategies and Best Practices

Cyber attacks on government entities have surged, rising more than 40% in recent years, driven by motives ranging from political influence to lucrative data theft. Legacy platforms, chronic under‑funding, and a shortage of skilled analysts leave the public sector vulnerable....

By HackRead
Apple Confirms Google Gemini Will Power Siri, Says Privacy Remains a Priority
NewsJan 12, 2026

Apple Confirms Google Gemini Will Power Siri, Says Privacy Remains a Priority

Apple announced that its upcoming Siri will be powered by Google’s Gemini large‑language models, marking a multi‑year collaboration between the two rivals. The partnership moves Siri away from Apple’s in‑house AI, which has lagged behind competitors like GPT and Copilot,...

By BleepingComputer
Dutch Court Sentences Hacker Who Used Port Systems to Smuggle Cocaine to 7 Years
NewsJan 12, 2026

Dutch Court Sentences Hacker Who Used Port Systems to Smuggle Cocaine to 7 Years

An Amsterdam appeals court sentenced a 44‑year‑old hacker to seven years in prison for facilitating cocaine smuggling through European ports. The defendant installed malware via a USB stick on a terminal employee’s computer, creating a backdoor that allowed the criminal...

By DataBreaches.net
Hidden Telegram Proxy Links Can Reveal Your IP Address in One Click
NewsJan 12, 2026

Hidden Telegram Proxy Links Can Reveal Your IP Address in One Click

Security researchers have shown that Telegram’s proxy links (t.me/proxy) automatically trigger a direct connection to the specified server before the user confirms adding the proxy. This behavior lets an attacker‑controlled proxy log the user’s real IP address with a single...

By BleepingComputer
Everest Ransomware Claims Breach at Nissan, Says 900GB of Data Stolen
NewsJan 12, 2026

Everest Ransomware Claims Breach at Nissan, Says 900GB of Data Stolen

Everest ransomware announced on Jan 10, 2026 that it breached Nissan Motor Corp and exfiltrated roughly 900 GB of data, posting screenshots of ZIP archives, spreadsheets and CSV files on its dark‑web leak site. The leaked directory structure suggests access to dealership records,...

By HackRead
NDSS 2025 – Mens Sana In Corpore Sano: Sound Firmware Corpora For Vulnerability Research
NewsJan 12, 2026

NDSS 2025 – Mens Sana In Corpore Sano: Sound Firmware Corpora For Vulnerability Research

The NDSS 2025 paper "Mens Sana In Corpore Sano" examines the difficulty of building scientifically sound firmware corpora for vulnerability research. It identifies practical obstacles such as proprietary, encrypted samples and inadequate documentation that hinder replicability. The authors derive a...

By Security Boulevard
Spanish Energy Giant Endesa Discloses Data Breach Affecting Customers
NewsJan 12, 2026

Spanish Energy Giant Endesa Discloses Data Breach Affecting Customers

Spanish utility Endesa disclosed a data breach affecting its Energía XXI customers, with hackers obtaining contract‑related personal information such as IDs, contact details, and IBANs. The company says passwords were not exposed and no fraudulent use has been detected so far....

By BleepingComputer
Predict 2026: AI, Trust and the Security Reckoning Ahead
NewsJan 12, 2026

Predict 2026: AI, Trust and the Security Reckoning Ahead

Predict 2026 declares AI the defining technology of the year, emphasizing that security leaders must now focus on protecting, governing, and trusting autonomous AI systems. The event highlights how agentic AI reshapes risk, from evolving models to data pipelines that become...

By Security Boulevard
Booz Allen Hamilton and Andreessen Horowitz Accelerate Commercial Tech for Government
NewsJan 12, 2026

Booz Allen Hamilton and Andreessen Horowitz Accelerate Commercial Tech for Government

Booz Allen Hamilton announced a partnership with Andreessen Horowitz, designating Booz Allen as the a16z Technology Acceleration Partner for Governments. The alliance will connect a16z’s portfolio startups with Booz Allen’s deep mission expertise, secure‑network capabilities, and engineering talent to fast‑track...

By Help Net Security
Prevent Cloud Data Leaks with Microsoft 365 Access Reviews
NewsJan 12, 2026

Prevent Cloud Data Leaks with Microsoft 365 Access Reviews

Microsoft 365’s frictionless sharing fuels productivity but also creates oversharing risks that security teams struggle to monitor. Native Microsoft tools provide no centralized view of shared files across Teams, OneDrive and SharePoint, leaving a blind spot for data leakage. Tenfold’s identity‑governance...

By BleepingComputer
World Economic Forum: Cyber-Fraud Overtakes Ransomware as Business Leaders' Top Cyber-Security Concern
NewsJan 12, 2026

World Economic Forum: Cyber-Fraud Overtakes Ransomware as Business Leaders' Top Cyber-Security Concern

The World Economic Forum’s Global Cybersecurity Outlook for 2026 reveals that phishing attacks have eclipsed ransomware as the chief concern for business leaders. Seventy‑seven percent of respondents reported a rise in cyber‑enabled fraud, and 73 percent said they or a...

By Infosecurity Magazine
Max Severity Ni8mare Flaw Impacts Nearly 60,000 N8n Instances
NewsJan 12, 2026

Max Severity Ni8mare Flaw Impacts Nearly 60,000 N8n Instances

Security researchers have identified a maximum‑severity vulnerability, dubbed “Ni8mare,” affecting the open‑source automation platform n8n. Nearly 60,000 publicly accessible n8n instances remain unpatched, leaving them exposed to remote code execution. The flaw stems from improper input validation in the workflow...

By BleepingComputer
Web3 Dev Environments Hit by Fake Interview Software Scam
NewsJan 12, 2026

Web3 Dev Environments Hit by Fake Interview Software Scam

Web3 developers are being targeted by a new inbound scam where attackers pose as legitimate hiring firms on sites like youbuidl.dev. They lure candidates with senior‑level job postings and then require the download of a fake interview or coding‑test application....

By GBHackers On Security
Another Plastic Surgery Practice Fell Prey to a Cyberattack with Extortion Attempt
NewsJan 12, 2026

Another Plastic Surgery Practice Fell Prey to a Cyberattack with Extortion Attempt

Patients of Manhattan plastic surgeon Dr. Richard Swift discovered that a malware attack last year exposed nude photographs, Social Security numbers, and medical records of at least 22 clients. The data appeared on a Russian‑hosted leak site, and the attackers...

By DataBreaches.net
Second NZ Health Provider, Canopy Health, Reveals Cyberattack
NewsJan 12, 2026

Second NZ Health Provider, Canopy Health, Reveals Cyberattack

Canopy Health, New Zealand's largest private oncology provider, disclosed a cyberattack that occurred on 18 July 2025 but only notified patients and the public six months later. The breach involved unauthorized access to an administrative server, with forensic experts indicating that data...

By DataBreaches.net
CrazyHunter Ransomware Escalates with Advanced Intrusion Tactics, Six Taiwan Healthcare Victims Confirmed
NewsJan 12, 2026

CrazyHunter Ransomware Escalates with Advanced Intrusion Tactics, Six Taiwan Healthcare Victims Confirmed

CrazyHunter ransomware has rapidly evolved, employing multi‑vector intrusion tactics that bypass traditional defenses. Trellix’s research confirms six Taiwanese healthcare organizations have been breached, exposing patient data and operational systems. The group now combines encryption with data exfiltration, demanding double‑extortion payments....

By DataBreaches.net
India Remains Top Target for Mobile Attacks as Threats Surge 38%
NewsJan 12, 2026

India Remains Top Target for Mobile Attacks as Threats Surge 38%

India has become the world’s leading target for mobile cyber‑attacks, recording a 38% year‑over‑year surge and now representing 26% of global mobile malware traffic. Zscaler’s ThreatLabz report identified 239 malicious Android apps downloaded 42 million times, with retail and hospitality sectors...

By GBHackers On Security
Unlock Remote Work’s GRC Impact: Challenges to Opportunities
NewsJan 12, 2026

Unlock Remote Work’s GRC Impact: Challenges to Opportunities

Remote work has become a permanent fixture, forcing organizations to overhaul traditional governance, risk, and compliance (GRC) frameworks. Distributed workforces increase cyber‑risk exposure, fragment data environments, and create overlapping regulatory obligations across jurisdictions. Companies are turning to centralized GRC platforms,...

By Security Boulevard
PoC Released for Atarim Plugin Auth Bypass Vulnerability
NewsJan 12, 2026

PoC Released for Atarim Plugin Auth Bypass Vulnerability

A proof‑of‑concept for CVE‑2025‑60188 reveals a critical authentication bypass in the Atarim WordPress plugin. The flaw stems from using the publicly exposed site_id as the HMAC‑SHA256 secret, allowing attackers to forge valid admin requests. Exploit code published by researcher m4sh‑wacker...

By GBHackers On Security
Turkish Security Researcher Gets Nod From NASA Over Vulnerability Discoveries
NewsJan 12, 2026

Turkish Security Researcher Gets Nod From NASA Over Vulnerability Discoveries

Turkish researcher Hasan İsmail Gülkaya identified four security flaws in NASA’s systems and reported them through the agency’s Vulnerability Disclosure Program. NASA promptly patched the issues and sent the researcher a formal thank‑you letter, highlighting the success of its responsible‑disclosure framework. Industry...

By Security Boulevard
Iran-Linked MuddyWater APT Deploys Rust-Based Implant in Latest Campaign
NewsJan 12, 2026

Iran-Linked MuddyWater APT Deploys Rust-Based Implant in Latest Campaign

Iran‑linked APT MuddyWater has launched a new espionage campaign using a Rust‑based implant named RustyWater. The group delivered the malware through spear‑phishing emails that contain ZIP archives with decoy PDFs and executable files masquerading as PDFs. RustyWater replaces the group’s...

By CSO Online
Debian 13.3 Is Now Available with Targeted Corrections, Updates
NewsJan 12, 2026

Debian 13.3 Is Now Available with Targeted Corrections, Updates

Debian 13.3, the third point release for the stable “trixie” branch, is now available. It bundles over one hundred package adjustments and multiple security patches, covering core services such as Apache HTTP Server, GNOME components, and container tools. Existing Debian...

By Help Net Security
Operation Cronos Leader Gets Nod From King Charles
NewsJan 12, 2026

Operation Cronos Leader Gets Nod From King Charles

British law enforcement officer Gavin Webb received an OBE from King Charles for his leadership of Operation Cronos. The National Crime Agency‑led operation seized LockBit ransomware’s infrastructure, source code and decryption keys, crippling a gang that accounted for roughly 25%...

By Security Boulevard
Anthropic Brings Claude to Healthcare with HIPAA-Ready Enterprise Tools
NewsJan 12, 2026

Anthropic Brings Claude to Healthcare with HIPAA-Ready Enterprise Tools

Anthropic announced that its Claude large‑language model is now HIPAA‑ready and equipped with enterprise tools for the health‑care sector. The company is testing connectors that link Claude to the CMS Coverage Database, enabling automated Medicare eligibility checks and prior‑authorization support....

By BleepingComputer
The Identity Theft Risk Profile of NBA and NFL Draft Prospects
NewsJan 12, 2026

The Identity Theft Risk Profile of NBA and NFL Draft Prospects

A SentiLink analysis of NBA (2020‑2024) and NFL (2020‑2024) draft lists reveals that roughly 10% of listed prospects experience high‑risk identity‑theft applications, climbing to over 20% for NBA identities with active applications and nearly 15% for NFL prospects. These rates...

By Security Magazine (Cybersecurity)
Kyowon Group Confirms Cyberattack as Multiple Systems Go Offline
NewsJan 12, 2026

Kyowon Group Confirms Cyberattack as Multiple Systems Go Offline

Kyowon Group disclosed a cyberattack that began on the morning of Jan 10, prompting the company to isolate affected systems and shut down parts of its internal network. The breach forced the main website and several affiliate sites offline, with service...

By The Cyber Express
Rethinking OT Security for Project Heavy Shipyards
NewsJan 12, 2026

Rethinking OT Security for Project Heavy Shipyards

Hans Quivooij, CISO of Damen Shipyards, explains how the project‑driven, contractor‑heavy nature of modern shipyards expands the OT threat surface and renders traditional perimeter security ineffective. He advocates passive network monitoring and strict segmentation to gain visibility into legacy PLCs...

By Help Net Security
PfSense: Open-Source Firewall and Routing Platform
NewsJan 12, 2026

PfSense: Open-Source Firewall and Routing Platform

pfSense Community Edition (CE) is a free, open‑source firewall and routing platform that runs on standard x86 hardware, virtual machines, and select embedded devices. It offers stateful firewalling, IPv4/IPv6 support, VLAN tagging, and multi‑WAN capabilities through an intuitive web interface....

By Help Net Security
What Security Teams Can Learn From Torrent Metadata
NewsJan 12, 2026

What Security Teams Can Learn From Torrent Metadata

A new research paper demonstrates how open‑source intelligence can turn public torrent metadata into actionable threat intelligence. By harvesting file descriptors, tracker‑provided peer lists and enriching over 60,000 IP addresses with geolocation, ISP and VPN indicators, the authors built network...

By Help Net Security
EU’s Chat Control Could Put Government Monitoring Inside Robots
NewsJan 12, 2026

EU’s Chat Control Could Put Government Monitoring Inside Robots

EU’s proposed Chat Control regulation, originally targeting online child sexual abuse, now extends to robots that facilitate interpersonal communication. By defining any interactive service as a communication service, the law obliges robot providers to conduct risk assessments and potentially embed...

By Help Net Security
Hackers Accessed University of Hawaii Cancer Center Patient Data; They Weren’t Immediately Notified
NewsJan 12, 2026

Hackers Accessed University of Hawaii Cancer Center Patient Data; They Weren’t Immediately Notified

Hackers infiltrated the University of Hawaiʻi Cancer Center’s servers in August, exfiltrating participants' Social Security numbers and other personal data. The university delayed reporting the ransomware attack to the state legislature until December, missing the statutory 20‑day notification window. UH...

By SecurityWeek
NDSS 2025 – EMIRIS: Eavesdropping On Iris Information Via Electromagnetic Side Channel
NewsJan 11, 2026

NDSS 2025 – EMIRIS: Eavesdropping On Iris Information Via Electromagnetic Side Channel

Researchers at Shandong University presented EMIRIS at NDSS 2025, demonstrating that electromagnetic emissions from near‑infrared iris sensors can be captured and used to reconstruct iris patterns. By reverse‑engineering the sensor’s data transmission format and applying a diffusion‑based inverse‑problem solver, the...

By Security Boulevard
California Bans Data Broker Reselling Health Data of Millions
NewsJan 11, 2026

California Bans Data Broker Reselling Health Data of Millions

California's Privacy Protection Agency fined data‑broker Datamasters $45,000 and barred it from selling Californians' personal health information after it failed to register under the California Delete Act. The agency also ordered the firm to delete millions of records by the...

By BleepingComputer
AI Agents and the Data Lake (W/ Lauren Anderson)
NewsJan 11, 2026

AI Agents and the Data Lake (W/ Lauren Anderson)

In this episode, Tristan Handy talks with Lauren Anderson, head of Okta's enterprise data platform, about how identity underpins the emerging challenges of AI agents and open data lakes. Lauren explains the need for central governance and a shared semantic...

By dbt Roundup (Transform) – Newsletter
Europol Raids Disrupt Black Axe Cybercrime Ring in Spain
NewsJan 11, 2026

Europol Raids Disrupt Black Axe Cybercrime Ring in Spain

International law enforcement, led by Spain’s National Police, German authorities, and Europol, raided Black Axe cells in Spain, arresting 34 suspects across Seville, Madrid, Málaga and Barcelona. The criminal syndicate, originating in Nigeria with about 30,000 members, is responsible for...

By HackRead
Most Popular Cybersecurity Blogs From 2025
NewsJan 11, 2026

Most Popular Cybersecurity Blogs From 2025

Dan Lohrmann’s January 2026 roundup lists the ten most‑viewed cybersecurity blogs of 2025, featuring stories on state bans of human microchip implants, humanoid robots, AI‑driven human verification, federal employee resilience, government cloud security, AI career impacts, and nation‑state threat assessments. The data...

By Security Boulevard
Week in Review: PoC for Trend Micro Apex Central RCE Released, Patch Tuesday Forecast
NewsJan 11, 2026

Week in Review: PoC for Trend Micro Apex Central RCE Released, Patch Tuesday Forecast

The week’s security roundup highlighted a critical proof‑of‑concept for an unauthenticated remote‑code execution flaw in Trend Micro Apex Central (CVE‑2025‑69258) and a newly disclosed exploit of HPE OneView (CVE‑2025‑37164). The UK government unveiled a £210 million Cyber Action Plan to harden public‑service...

By Help Net Security
Database of 323,986 BreachForums Users Leaked as Admin Disputes Scope
NewsJan 10, 2026

Database of 323,986 BreachForums Users Leaked as Admin Disputes Scope

On January 9 2026 a database containing 323,986 BreachForums user records was posted on the ShinyHunters site. The dump includes MySQL metadata, email addresses, display names, Argon2i password hashes and links to external accounts such as Telegram. BreachForums administrators claim the data...

By HackRead
Massive Instagram Data Breach Exposes Personal Details of 17.5 Million Users
NewsJan 10, 2026

Massive Instagram Data Breach Exposes Personal Details of 17.5 Million Users

A dark‑web marketplace is selling personal data from 17.5 million Instagram accounts, marking one of the largest social‑media breaches to date. Malwarebytes first reported the leak on X, confirming that usernames, email addresses, phone numbers and partial location data are being...

By GBHackers On Security
Security News This Week: ICE Can Now Spy on Every Phone in Your Neighborhood
NewsJan 10, 2026

Security News This Week: ICE Can Now Spy on Every Phone in Your Neighborhood

This week’s security roundup highlighted ICE’s deployment of Penlink’s Tangles and Webloc tools, enabling block‑level phone tracking across neighborhoods. Meanwhile, xAI’s Grok chatbot drew criticism for generating graphic sexual imagery, prompting X to restrict access to verified users. Iran imposed...

By WIRED (Security)
What Is Application Security Testing? Detail Explanation
NewsJan 10, 2026

What Is Application Security Testing? Detail Explanation

Application security testing (AST) is a set of processes and tools that identify vulnerabilities throughout the software development lifecycle, enabling organizations to shift security left and remediate issues before deployment. The global AST market now exceeds $33 billion, reflecting the critical...

By Security Boulevard
Ireland Recalls Almost 13,000 Passports over Missing 'IRL' Code
NewsJan 10, 2026

Ireland Recalls Almost 13,000 Passports over Missing 'IRL' Code

Ireland's Department of Foreign Affairs has recalled nearly 13,000 passports after a software update omitted the mandatory "IRL" issuing‑state code in the machine‑readable zone. The defect affects passports issued between 23 December 2025 and 6 January 2026, potentially causing eGate and border‑control rejections worldwide....

By BleepingComputer
Cybercriminals Exploit Maduro Arrest News to Spread Backdoor Malware
NewsJan 10, 2026

Cybercriminals Exploit Maduro Arrest News to Spread Backdoor Malware

Cybercriminals are exploiting news of Venezuelan President Nicolás Maduro’s alleged arrest to distribute a backdoor malware via spear‑phishing ZIP attachments. The ZIP contains a weaponized KuGou executable that loads a malicious DLL through DLL search‑order hijacking, creates a hidden Technology360NB...

By GBHackers On Security
Microsoft May Soon Allow IT Admins to Uninstall Copilot
NewsJan 9, 2026

Microsoft May Soon Allow IT Admins to Uninstall Copilot

Microsoft is testing a new RemoveMicrosoftCopilotApp policy that lets IT administrators uninstall the AI‑powered Copilot app from managed Windows 11 devices. The policy rolls out to Dev and Beta Insider channels on build 26220.7535 and works with Intune or SCCM. It targets...

By BleepingComputer
Why AI-Powered Cyber Defense Is No Longer Optional for Modern Businesses
NewsJan 9, 2026

Why AI-Powered Cyber Defense Is No Longer Optional for Modern Businesses

AI-driven cyber defense has shifted from optional to essential as threats become faster, more sophisticated, and harder to detect with legacy tools. Machine‑learning models analyze massive network and user‑behavior data in real time, flagging anomalies and enabling automated response. Companies...

By HackRead
Top 10 Privileged Access Management  Solutions for 2026
NewsJan 9, 2026

Top 10 Privileged Access Management Solutions for 2026

Privileged Access Management has shifted from a compliance checkbox to a critical security control as organizations adopt hybrid cloud, SaaS, DevOps pipelines, and AI agents. The 2026 guide evaluates ten leading PAM vendors, highlighting capabilities such as Zero Standing Privileges,...

By Security Boulevard
AI Deployments Targeted in 91,000+ Attack Sessions
NewsJan 9, 2026

AI Deployments Targeted in 91,000+ Attack Sessions

Researchers observed more than 91,000 attack sessions targeting AI infrastructure over a four‑month window, highlighting a shift from experimental probing to systematic exploitation. The first campaign leveraged server‑side request forgery against Ollama and Twilio webhooks, using a uniform JA4H TLS...

By eSecurity Planet