Aggregator
CVE-2026-0528 | Elastic Metricbeat up to 7.17.29/8.19.9/9.1.9/9.2.3 Prometheus Helper array index (EUVD-2026-2032)
Webinar | Beat the Breach: Outsmart Attackers and Secure the Cloud
US Officials Urge Congress to Reauthorize Key Quantum Law
Federal scientists told Congress that failure to reauthorize the National Quantum Initiative threatens to unravel coordinated research and development progress, stall commercialization and allow China to surpass U.S. leadership as adversaries accelerate post-quantum capabilities.
Breach Roundup: DOGE Uploaded Social Security Data to Cloud
This week, DOGE posted sensitive data on an outside server. A phishing attack affected 750,000 Canadians. A hacktivism warning from the U.K. NCSC. An Ingram Micro breach. CVEs surged in 2025. SK Telecom challenged a fine. Researchers disclosed Chainlit flaws. North Korean hackers abused VS Code.
HHS Watchdog Urges Cyber Governance Overhaul
Auditors say the U.S. Department of Health and Human Services should buttress its ability to respond to cyberthreats by standardizing governance and controls across its many divisions - and also do a better job of overseeing its many contractors and the risk they introduce.
Akamai Block Storage Makes Block Disk Encryption the Default in Terraform
Route leak incident on January 22, 2026
How Hidden Blind Spots Quietly Became Cybersecurity’s Biggest Vulnerability
Hackers Can Use GenAI to Change Loaded Clean Page Into Malicious within Seconds
A new and alarming threat has emerged in the cybersecurity landscape where attackers combine artificial intelligence with web-based attacks to transform innocent-looking webpages into dangerous phishing tools in real time. Security researchers discovered that cybercriminals are now leveraging generative AI systems to create malicious code that loads dynamically after users visit seemingly safe websites. This […]
The post Hackers Can Use GenAI to Change Loaded Clean Page Into Malicious within Seconds appeared first on Cyber Security News.
eBay 禁止 AI 智能体自动购物
Тестовое задание с «сюрпризом». Хакеры маскируются под рекрутеров, чтобы взломать ваш macOS
Microsoft: Outlook for iOS crashes, freezes due to coding error
G.O.S.S.I.P 阅读推荐 2026-01-23 DualLM
Germany expels Russian diplomat accused of spying on Ukraine war effort
Опухоли без гравитации, клетки без искажений, лекарства без догадок. Европа запускает первую орбитальную лабораторию для изучения рака
This Week in Scams: Netflix Phishing and QR Code Espionage
This week in scams, attackers are leaning hard on familiar brands, everyday tools, and routine behavior to trigger fast, unthinking reactions. From fake Netflix...
The post This Week in Scams: Netflix Phishing and QR Code Espionage appeared first on McAfee Blog.
Okta users under attack: Modern phishing kits are turbocharging vishing attacks
Threat actors who specialize in vishing (i.e., voice phishing) have started using phishing kits that can intercept targets’ login credentials while also allowing attackers to control the authentication flow in a targeted user’s browser in real-time. At least two custom-made phishing kits are currently used by a number of threat actors that go after credentials and authentication factors to gain access to corporate systems and assets. “These custom kits are made available on an as-a-service … More →
The post Okta users under attack: Modern phishing kits are turbocharging vishing attacks appeared first on Help Net Security.