Posted inTechnology From Triage to Threat Hunts: How AI Accelerates SecOps If you work in security operations, the concept of the AI SOC agent is likely familiar. Early narratives… Posted by admin January 28, 2026
Posted inTechnology Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution Ravie LakshmananJan 28, 2026Vulnerability / Open Source A critical sandbox escape vulnerability has been disclosed in the popular… Posted by admin January 28, 2026
Posted inTechnology Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution Ravie LakshmananJan 28, 2026Vulnerability / Workflow Automation Cybersecurity researchers have disclosed two new security flaws in the n8n… Posted by admin January 28, 2026
Posted inTechnology Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088 Ravie LakshmananJan 28, 2026Vulnerability / Threat Intelligence Google on Tuesday revealed that multiple threat actors, including nation-state adversaries… Posted by admin January 28, 2026
Posted inTechnology Password Reuse in Disguise: An Often-Missed Risky Workaround When security teams discuss credential-related risk, the focus typically falls on threats such as phishing, malware, or ransomware.… Posted by admin January 28, 2026
Posted inTechnology Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected Ravie LakshmananJan 28, 2026Network Security / Zero-Day Fortinet has begun releasing security updates to address a critical flaw… Posted by admin January 28, 2026
Posted inTechnology Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities Ravie LakshmananJan 27, 2026Threat Intelligence / Cyber Espionage Indian government entities have been targeted in two campaigns undertaken… Posted by admin January 27, 2026
Posted inTechnology WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware Ravie LakshmananJan 27, 2026Mobile Security / Spyware Meta on Tuesday announced it's adding Strict Account Settings on WhatsApp… Posted by admin January 27, 2026
Posted inTechnology China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023 Ravie LakshmananJan 27, 2026Web Security / Malware Cybersecurity researchers have discovered a JScript-based command-and-control (C2) framework called PeckBirdy… Posted by admin January 27, 2026
Posted inTechnology ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services Cybersecurity researchers have disclosed details of a new campaign that combines ClickFix-style fake CAPTCHAs with a signed Microsoft… Posted by admin January 27, 2026