π Report Fraud Promises to Streamline Fight Against Economic Crime π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
City of London Police has launched the UKs national Report Fraud service.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π Risk of AI Model Collapse to Drive Zero Trust Data Governance, Gartner Says π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Gartner predicts 50 of organizations will adopt zero trust data governance by 2028.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π Chainlit Security Flaws Highlight Infrastructure Risks in AI Apps π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
2 security vulnerabilities in the Chainlit framework expose risks from web flaws in AI applications.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Chainlit Security Flaws Highlight Infrastructure Risks in AI Apps
2 security vulnerabilities in the Chainlit framework expose risks from web flaws in AI applications
ποΈ North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
As many as 3,136 individual IP addresses linked to likely targets of the Contagious Interview activity have been identified, with the campaign claiming 20 potential victim organizations spanning artificial intelligence AI, cryptocurrency, financial services, IT services, marketing, and software development sectors in Europe, South Asia, the Middle East, and Central America. The new findings.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cisco has released fresh patches to address what it described as a "critical" security vulnerability impacting multiple Unified Communications CM products and Webex Calling Dedicated Instance that it has been actively exploited as a zeroday in the wild. The vulnerability, CVE202620045 CVSS score 8.2, could permit an unauthenticated remote attacker to execute arbitrary commands on the.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity company Arctic Wolf has warned of a "new cluster of automated malicious activity" that involves unauthorized firewall configuration changes on Fortinet FortiGate devices. The activity, it said, commenced on January 15, 2026, adding it shares similarities with a December 2025 campaign in which malicious SSO logins on FortiGate appliances were recorded against the admin account from.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A new multistage phishing campaign has been observed targeting users in Russia with ransomware and a remote access trojan called Amnesia RAT. "The attack begins with social engineering lures delivered via businessthemed documents crafted to appear routine and benign," Fortinet FortiGuard Labs researcher Cara Lin said in a technical breakdown published this week. "These documents and.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
β€1
ποΈ New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Russian nationstate hacking group known as Sandworm has been attributed to what has been described as the "largest cyber attack" targeting Poland's power system in the last week of December 2025. The attack was unsuccessful, the country's energy minister, Milosz Motyka, said last week. "The command of the cyberspace forces has diagnosed in the last days of the year the strongest attack on.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
AI agents are accelerating how work gets done. They schedule meetings, access data, trigger workflows, write code, and take action in real time, pushing productivity beyond human speed across the enterprise. Then comes the moment every security team eventually hits Wait who approved this? Unlike users or applications, AI agents are often deployed quickly, shared broadly,.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The U.S. Cybersecurity and Infrastructure Security Agency CISA on Friday added a critical security flaw affecting Broadcom VMware vCenter Server that was patched in June 2024 to its Known Exploited Vulnerabilities KEV catalog, citing evidence of active exploitation in the wild. The vulnerability in question is CVE202437079 CVSS score 9.8, which refers to a heap overflow in the.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π’ How can businesses make their cybersecurity training stick? π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Who in the modern business needs cybersecurity training and what key factors should firms keep in mind?.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
How can businesses make their cybersecurity training stick?
Who in the modern business needs cybersecurity training β and what key factors should firms keep in mind?
β€1
π’ Thousands of Microsoft Teams users are being targeted in a new phishing campaign π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Microsoft Teams users should be on the alert, according to researchers at Check Point.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Thousands of Microsoft Teams users are being targeted in a new phishing campaign
Microsoft Teams users should be on the alert, according to researchers at Check Point
π¦Ώ Microsoft Shared BitLocker Keys With FBI, Raising Privacy Fears π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Microsoft confirmed it can hand over BitLocker recovery keys stored in the cloud under warrant, reviving debate over who controls encrypted data. The post Microsoft Shared BitLocker Keys With FBI, Raising Privacy Fears appeared first on TechRepublic.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Microsoft Shared BitLocker Keys With FBI, Raising Privacy Fears
Microsoft confirmed it can hand over BitLocker recovery keys stored in the cloud under warrant, reviving debate over who controls encrypted data.
π¦Ώ Gmail Spam Filter Breakdown Affects 1.8B Users π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
The disruption began Saturday 5am Pacific time, Jan .24 affecting approximately 1.8 billion Gmail users worldwide with widespread email misclassification. The post Gmail Spam Filter Breakdown Affects 1.8B Users appeared first on TechRepublic.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Gmail Spam Filter Breakdown Affects 1.8B Users
The disruption began Saturday (5am Pacific time, Jan .24) affecting approximately 1.8 billion Gmail users worldwide with widespread email misclassification.
ποΈ Malicious VS Code AI Extensions with 1.5 Million Installs Steal Developer Source Code ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have discovered two malicious Microsoft Visual Studio Code VS Code extensions that are advertised as artificial intelligence AIpowered coding assistants, but also harbor covert functionality to siphon developer data to Chinabased servers. The extensions, which have 1.5 million combined installs and are still available for download from the official Visual Studio.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ β‘ Weekly Recap: Firewall Flaws, AI-Built Malware, Browser Traps, Critical CVEs & More ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Security failures rarely arrive loudly. They slip in through trusted tools, halffixed problems, and habits people stop questioning. This weeks recap shows that pattern clearly. Attackers are moving faster than defenses, mixing old tricks with new paths. Patched no longer means safe, and every day, software keeps becoming the entry point. What follows is a set of small but telling signals.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Winning Against AI-Based Attacks Requires a Combined Defensive Approach ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
If theres a constant in cybersecurity, its that adversaries are always innovating. The rise of offensive AI is transforming attack strategies and making them harder to detect. Googles Threat Intelligence Group, recently reported on adversaries using Large Language Models LLMs to both conceal code and generate malicious scripts on the fly, letting malware shapeshift in realtime to evade.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The North Korean threat actor known as Konni has been observed using PowerShell malware generated using artificial intelligence AI tools to target developers and engineering teams in the blockchain sector. The phishing campaign has targeted Japan, Australia, and India, highlighting the adversary's expansion of the targeting scope beyond South Korea, Russia, Ukraine, and European nations, Check.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π CISA Releases List of Post-Quantum Cryptography Product Categories π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
CISA released initial list of PQCcapable hardware and software to guide companies amid quantum threats.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π Researchers Uncover βHaxorβ SEO Poisoning Marketplace π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Fortra researchers have discovered a new SEO poisoning operation known as HaxorSEO.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π Law Firm Investigates Coupang Security Failures Ahead of Class Action Deadline π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The US law firm Hagens Berman will lead a class action lawsuit against Coupang over security failures that led to a June 2025 data breach.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
β€1