Posted inTechnology Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud Microsoft on Wednesday announced that it has taken a "coordinated legal action" in the U.S. and the U.K.… Posted by admin January 15, 2026
Posted inTechnology Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers The Black Lotus Labs team at Lumen Technologies said it null-routed traffic to more than 550 command-and-control (C2)… Posted by admin January 14, 2026
Posted inTechnology AI Agents Are Becoming Privilege Escalation Paths AI agents have quickly moved from experimental tools to core components of daily workflows across security, engineering, IT,… Posted by admin January 14, 2026
Posted inTechnology Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware Security experts have disclosed details of an active malware campaign that's exploiting a DLL side-loading vulnerability in a… Posted by admin January 14, 2026
Posted inTechnology Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited Microsoft on Tuesday rolled out its first security update for 2026, addressing 114 security flaws, including one vulnerability… Posted by admin January 14, 2026
Posted inTechnology Fortinet Fixes Critical FortiSIEM Flaw Allowing Unauthenticated Remote Code Execution Jan 14, 2026Ravie LakshmananVulnerability / Patch Management Fortinet has released updates to fix a critical security flaw impacting… Posted by admin January 14, 2026
Posted inTechnology 64% of 3rd-Party Applications Access Sensitive Data Without Justification Research analyzing 4,700 leading websites reveals that 64% of third-party applications now access sensitive data without business justification,… Posted by admin January 14, 2026
Posted inTechnology Critical Node.js Vulnerability Can Cause Server Crashes via async_hooks Stack Overflow Jan 14, 2026Ravie LakshmananApplication Security / Vulnerability Node.js has released updates to fix what it described as a… Posted by admin January 14, 2026
Posted inTechnology PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces Jan 14, 2026Ravie LakshmananCyber Espionage / Threat Intelligence The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed… Posted by admin January 14, 2026
Posted inTechnology Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages Jan 13, 2026Ravie Lakshmanan Web Security / Data Theft Cybersecurity researchers have discovered a major web skimming campaign… Posted by admin January 13, 2026