TEATIME NEWS | Early Birds   Morning   Lunch   Afternoon |
Generative AI is revolutionizing cyberattacks on Active Directory, enabling faster and more targeted password breaches. Traditional password policies are no longer enough - find out how attackers are leveraging AI and what you can do to defend your organization.
Sedgwick Government Solutions, serving agencies like CISA and DHS, has confirmed a ransomware breach by TridentLocker. While core systems are said to be unaffected, the theft and leak of sensitive data highlight persistent cybersecurity risks for federal contractors.
#Ransomware | #Sedgwick Government Solutions | #TridentLocker
A new report reveals nearly half of employees are using AI tools through personal accounts, bypassing company safeguards and creating fresh security headaches. How can organizations close the gap?
Jaguar Land Rover suffered a massive cyberattack, leading to a 43% drop in sales and exposing deep vulnerabilities in its global supply chain. The incident cost billions and serves as a stark warning for industries reliant on digital infrastructure.
A new wave of cyberattacks targets the hospitality sector using fake Booking.com emails and bogus blue screens to deliver malware. Learn how the PHALT#BLYX campaign exploits trusted Windows tools and evades detection.
A dormant flaw in the TOTOLINK EX200 Wi-Fi extender enables attackers to seize full control via a root-level telnet service. With no patch available and the product abandoned, users are left exposed. Here’s what happened - and what you can do.
Phishing is no longer obvious or static. In 2026, only interactive analysis - where SOC analysts safely engage with suspicious emails and attachments - can reveal the full attack chain in minutes. Discover how this hands-on approach outpaces modern threats.
A new cybercrime campaign is using commodity loaders and steganography to slip malware into manufacturing and government networks, hiding in seemingly ordinary emails and images.
When pilots are incapacitated, modern autopilots like Garmin’s Emergency Autoland can take command and land safely. We investigate the technology, its history, and whether passengers should trust machines to save the day.
Ultrasound, once limited to imaging, is now being harnessed to non-invasively destroy cancerous tumors. Discover how innovative techniques like histotripsy are changing the landscape of cancer therapy.
Qilin ransomware has struck again, targeting Health Bridge Chiropractic and other healthcare providers in a fresh wave of cyberattacks. Discover how these breaches expose ongoing vulnerabilities in medical data security and what this means for the future of healthcare.
Ledger customers are under attack after a breach at Global-e exposed contact and order data, fueling sophisticated phishing campaigns. Here’s what happened, what’s at risk, and how to stay safe.
In 2026, cyber resilience - not just defense - will define survival. With AI-powered attacks, quantum threats, and third-party risks on the rise, organizations must focus on recovery and trust. Here’s how the best are preparing.
Katie Paxton-Fear’s journey from self-taught gamer to cybersecurity PhD reveals how neurodiversity and a black-and-white moral code can redefine what it means to be a hacker. Her story challenges the gray areas of hacker ethics.
Britain’s government has made a rare public admission: years of cybersecurity policy have failed, leaving the public sector exposed to escalating threats. Now, officials promise a sweeping reset - but critics warn that without funding and real accountability, the overhaul may fall short.
A shadowy ransomware group known as Mill-Brothers is shaking up the cybercrime world with tailored attacks and ruthless extortion. Here’s how they operate and why experts are alarmed.
The ransomware attack on Due-Doyle-Fanning reveals the vulnerabilities of educational institutions and the evolving tactics of cybercriminals. This feature uncovers how the breach unfolded, its impact, and what it signals for the future of digital security in schools.
When ransomware locked down Autohaus Pichel GmbH, the incident exposed new vulnerabilities in Germany's automotive sector. We investigate the attack, its impact, and the rising tide of cyber threats facing car dealerships.
A ransomware group has breached Baja California's government portal, bajagobmx, encrypting files and demanding ransom. This feature investigates the attack, its implications, and what it reveals about the digital vulnerabilities facing public institutions in Mexico.
AFTERNOON NEWS | Early Birds   Morning   Lunch   [top] |
Cyber insurance is entering a tougher era. In 2026, CISOs will have to prove their security measures with real-time data, as insurers raise demands and scrutinize coverage. Are organizations ready for the insurance industry's hard turn?
Advisor360 faces down the chaos of shadow AI adoption, turning to automation and partnerships with Harmonic Security to secure its fintech operations. Discover how automation is changing the rules of cybersecurity in wealth management.
In 2025, the browser is the new frontline of cybersecurity. Startups are leveraging Manifest V3 extensions and AI-driven agents to transform browser security, SOC automation, and application security - reshaping the digital defense landscape.
A new investigation reveals how popular AI-powered VS Code forks inadvertently exposed developers to malware by recommending unclaimed extensions in Open VSX, highlighting a hidden supply chain vulnerability.
A new phishing campaign is targeting European hotels with convincing fake Booking.com emails. Victims are tricked into following bogus blue screen recovery steps that install DCRat, a potent Russian remote access trojan. The attack leverages social engineering and abuses trusted Windows tools to evade detection and persist on infected systems.
2026 marks a critical year for company cybersecurity. As digital innovation accelerates and cybercrime costs skyrocket, businesses must weave security into every facet of operations to survive and thrive.
A wave of phishing attacks is targeting European hotels with fake Booking.com emails and simulated BSOD crashes, tricking users into running Russian remote access malware. Here’s how the ClickFix campaign works - and how to stay safe.
A configuration oversight in Cursor, Windsurf, and Google Antigravity IDEs enabled attackers to upload malware disguised as official extensions. Researchers demonstrated the risk, prompting urgent fixes - except from Windsurf, which remains silent.
A critical macOS flaw in the ScreenReader accessibility framework allowed attackers to bypass Apple’s TCC privacy controls, execute unauthorized scripts, and access sensitive data - without requiring admin rights. Apple has since patched the vulnerability.
#macOS vulnerability | #Apple privacy | #accessibility exploit
AccuKnox and Connex join forces to deliver Zero Trust Cloud Native Application Protection across Southeast Asia, targeting surging cloud adoption and rising cyber threats in the region.
Cybercriminals are exploiting commodity loaders and advanced evasion techniques in a sophisticated phishing operation targeting industrial and government organizations in Europe and the Middle East.
#Phishing Attack | #Cybersecurity Threats | #Malware Techniques
A newly discovered vulnerability in AdonisJS's file upload handling lets attackers write files outside intended locations, exposing organizations to severe risks. Immediate patching and code audits are essential.
A newly discovered vulnerability in n8n’s Python Code Node enables authenticated users to execute arbitrary system commands, threatening data and system integrity. Here’s what you need to know.
#n8n vulnerability | #automation security | #command execution
An unprecedented cyberattack has weaponized Office Assistant, a trusted AI productivity app, to distribute a malicious browser plugin and compromise nearly one million devices across China. Here’s how the campaign unfolded - and why it signals a new era of software supply chain threats.
RemoveWindowsAI is a new open-source project that allows Windows 11 users to disable or remove integrated AI features like Copilot, Recall, and more - restoring privacy and control for power users.
CloudEyE has triggered a 30-fold surge in global malware infections, exploiting modular design and heavy obfuscation. Discover how this MaaS platform is reshaping cybercrime and what it means for enterprise security.
A sophisticated ClickFix campaign is targeting the European hospitality sector with fake Booking.com emails and technical trickery, deploying resilient remote access trojans to compromise hotel networks.
A flaw in the Dolby Digital Plus decoder allowed hackers to remotely attack Android devices without user interaction. Google’s January 2026 patch has now secured billions of phones.
#Dolby vulnerability | #Android devices | #zero-click attacks
In a dramatic reversal, Resecurity lured the Scattered Lapsus$ Hunters into a honeypot, turning the tables on the cybercrime group and exposing their attack methods and infrastructure.
Italgrafica-Systems, a key Italian printing solutions provider, has been named on Ransomfeed as a ransomware victim. The attack highlights growing cyber risks for specialized suppliers in the manufacturing sector.
Health-Bridge Chiropractic has reportedly fallen victim to a ransomware attack, with cybercriminals claiming to have accessed sensitive patient data. This incident highlights the urgent cybersecurity challenges facing healthcare providers.
Ransomware gangs are escalating their attacks on hospitals by targeting medical asset management systems, endangering both patient care and the security of life-saving equipment. This feature investigates how these attacks unfold and why urgent defenses are needed.
A gripping investigation into how Secorp-Industries fell victim to a sophisticated ransomware attack - unpacking the technical tactics, the fallout, and what it means for the future of industrial cybersecurity.
LUNCH NEWS | Early Birds   Morning   [top] |
Microsoft Copilot’s prompt injection issues have sparked a fierce debate: are these security vulnerabilities or just the unavoidable weaknesses of AI? Netcrook unpacks the controversy and what it means for the future of AI security.
Identity dark matter represents the unmanaged and invisible accounts, bots, and service identities lurking beyond traditional security controls. This investigative feature reveals the scope of the problem, its risks, and the emerging solutions for true identity observability.
#Identity Dark Matter | #Cybersecurity Crisis | #Identity Observability
A new breed of cyber attacks is using stolen cloud credentials and infostealer malware to hijack business websites, creating a self-sustaining feedback loop that’s difficult to shut down.
A newly discovered AdonisJS flaw allows unauthenticated attackers to write arbitrary files to servers, potentially leading to remote code execution. Immediate patching is urged.
A sophisticated ClickFix phishing attack is exploiting fake Windows errors to trick hotel staff into infecting systems with Russian DCRat malware, using advanced evasion and Living-off-the-Land techniques.
A hacker has modified Super Mario 64 to require real coins for play, transforming the classic into a microtransaction-powered arcade machine. The project blurs the line between nostalgia, satire, and commentary on modern gaming economics.
Chaos ransomware group has breached CEIVA Logic, exfiltrating 1000 GB of data from the digital photo frame pioneer. The attack raises urgent questions about the security of connected consumer devices and the protection of personal memories.
Nova ransomware has struck Saplog Group, a major player in European logistics, threatening the integrity of supply chains and raising the stakes for cyber defense in the transport sector.
Lynx ransomware has struck Tecno Electric S.A., a major energy solutions provider in Paraguay. This attack highlights growing threats to critical infrastructure and underscores the urgent need for bolstered cyber defenses across the region.
On January 6, 2026, the Brotherhood ransomware gang claimed responsibility for a cyberattack on Italian printing company Italgrafica Sistemi. This incident highlights growing ransomware threats to European manufacturers and the urgent need for stronger cyber defenses.
#Ransomware | #Italgrafica Sistemi | #European Manufacturing
The Play ransomware group has listed Autohaus Pichel GmbH and other companies as its latest victims, signaling an ongoing threat to businesses worldwide. Discover the details behind this latest cybercrime wave.
The Tengu ransomware group has struck the Baja California State Government’s website, threatening critical e-services and public trust. Here’s what happened and why it matters.
VVS Stealer, a Python-based malware, is targeting Discord users by disguising itself as a system error. Sold on Telegram as a subscription, it steals tokens, browser data, and more. Learn how it operates and what you can do to protect yourself.
Phishing emails are evolving beyond detection in 2026, forcing CISOs to adopt automated, behavior-based analysis and smarter workflows. Explore how security leaders can reduce risk, accelerate response, and regain confidence against next-gen phishing threats.
NordVPN faces hacker allegations of a breach after data is leaked online, but the company insists no production systems or customer data were compromised. Investigation reveals the leak stemmed from a third-party test environment.
A shadowy hacker known as Zestix exploited stolen credentials to breach dozens of major organizations, exposing the vulnerabilities of modern enterprise security.
MORNING NEWS | Early Birds   [top] |
A newly discovered vulnerability in macOS’s accessibility features let attackers bypass security and access private data. This feature unpacks the flaw, the exploit, and Apple’s urgent fix.
#macOS vulnerability | #data theft | #accessibility features
A newly disclosed critical flaw in n8n's Python Code Node exposes business servers to arbitrary command execution. Investigate the risks, the technical details, and how to secure your automation workflows.
A rare teardown of the 1985 Photophone CP220 reveals the bold ambitions and dramatic failures of early videoconferencing technology, years before video calls became commonplace.
December 2025 witnessed a record-breaking surge in cybersecurity mergers and acquisitions, as companies raced to secure dominance in AI, edge computing, and identity security. With 30 deals - eight surpassing $1 billion - this wave of consolidation is transforming the industry’s landscape and its approach to digital defense.
As the EU’s Cyber Resilience Act nears, Advantech, MediaTek, and Bureau Veritas achieve a landmark IEC 62443-4-2 certification for an Arm-based industrial SBC, signaling a new era in industrial cybersecurity compliance.
#Cybersecurity | #Industrial Compliance | #Arm-based Systems
Chinese cyberattacks on Taiwan’s vital sectors have soared 113% daily since 2023, targeting energy, healthcare, and more. This feature investigates the evolving tactics behind the digital onslaught and Taiwan’s fight to defend its infrastructure.
Scattered Lapsus$ has re-emerged with a commission-based access broker model, targeting global enterprises and critical infrastructure by recruiting insiders and selling privileged credentials. Investigative analysis reveals a new era of organized cybercrime.
A critical bug in AdonisJS's bodyparser module (CVSS 9.2) lets attackers write files anywhere on vulnerable servers - potentially leading to remote code execution. Immediate updates and filename sanitization are urged.
#AdonisJS | #security vulnerability | #remote code execution
HP’s EliteBoard G1a hides a full Windows PC inside a keyboard, targeting enterprise users with AI hardware, security features, and a minimalist setup. Is this the future of workplace computing?
Chrome for Android tablets is rolling out the classic desktop bookmark bar, giving users faster access to favorite sites and hinting at Google’s new focus on productivity and desktop-like features for larger mobile devices.
Hollow Knight: Silksong swept Steam’s 2025 Game of the Year, signaling a player-driven shift toward challenge and indie innovation. Discover how the Steam Awards reveal a new hierarchy in PC gaming.
Google Workspace's new migration tool lets organizations move directly from Dropbox Business to Google Drive - preserving permissions and minimizing disruption. Here's how this feature could accelerate the end of third-party migration headaches for IT teams.
A hidden flaw in WhatsApp’s encryption lets attackers identify users’ devices, fueling targeted cyberattacks. Despite a partial fix, major risks remain as Meta skips full disclosure.
A cyberattack has forced Higham Lane School in Nuneaton to close its doors, leaving students and staff locked out and highlighting the urgent need for better cyber defenses in UK education.
Google’s quiet discontinuation of POP3 mail fetching and Gmailify spells the end of the unified Gmail inbox for millions. Find out what this means, how to adapt, and why Google is making the change.
A U.S. real estate giant was almost breached by Tuoni, a fileless AI-infused malware that evaded detection using memory-only execution and steganography. Discover how the attack was stopped and what it means for the future of cyber defense.
When Sydney Marquez went missing, police hit a digital wall: her phone’s security features and a stranger’s demand for payment delayed critical access. The case spotlights how modern technology can both help and hinder urgent investigations.
#Missing Person | #Digital Privacy | #Multi-Factor Authentication
AccuKnox and Connex IT unite to bring next-generation Zero Trust CNAPP security to Southeast Asia, betting on local partnerships to combat the region’s cloud security challenges.
A ransomware attack on wwwswautomationat has shaken the industrial automation sector, revealing critical weaknesses in legacy systems and supply chains. Explore the anatomy of the breach and its industry-wide implications.
A newly discovered vulnerability in n8n gives authenticated users the power to execute system commands, exposing organizations to insider threats. Find out what went wrong, who’s at risk, and how to secure your automation workflows.
GravityRAT, a Pakistan-linked cyber-espionage tool, has evolved to target Windows, Android, and macOS devices. With new stealth tactics and persistent campaigns against Indian defense and government agencies, the malware poses a growing threat across platforms.
Former Lapsus$ hackers have regrouped as ShinySp1d3r, merging ransomware, insider recruitment, and credential trading in a new RaaS platform. Their aggressive tactics and focus on enterprise insiders could trigger a wave of large-scale cyberattacks.
Curious hackers and artists are transforming JPEGs into glitchy masterpieces by editing their raw bytes. Learn how this practice - known as datamoshing - works, its risks, and why it's captivating digital experimenters.
Swiss scientists have revealed that raindrops, captured with high-speed cameras, are far more effective at eroding soil than previously thought, challenging long-held assumptions and environmental models.
EARLY BIRDS | [top] |
A maker’s 3D-printed actuator using a rope drive challenges industry norms, offering powerful, affordable robotics solutions while revealing the hurdles of DIY engineering.
Saplog-Group is shaking up the ransomware landscape with aggressive double extortion tactics and public victim shaming on Ransomfeed. This feature unpacks their methods, motivations, and the chilling impact on today’s digital economy.
Crimson Collective claims to have stolen sensitive data from over 1 million Brightspeed customers, putting the spotlight on cybersecurity challenges in America's rural broadband networks.
A new ClickFix campaign is targeting European hospitality workers with fake Booking.com emails and convincing BSOD screens, tricking them into installing remote access malware. Discover the tactics behind this social engineering threat.
A new wave of cybercriminals is targeting cloud file-sharing platforms, selling stolen data from dozens of major companies. Learn how weak security practices and info-stealing malware are fueling this underground marketplace.
A supply chain breach in December 2025 saw EmEditor’s official download replaced with malware, targeting IT professionals and organizations. Here’s how the attack happened - and what it means for software trust.
Interpol’s Operation Sentinel dismantled a sprawling cybercrime network across 19 African nations, resulting in hundreds of arrests, millions in blocked losses, and a decisive blow against business email compromise, ransomware, and digital extortion.
Popular PDF generation libraries have been found to harbor critical vulnerabilities, from unauthorized file access to server-side request forgery. Discover how routine document creation can become a major cybersecurity threat - and what every organization needs to know.
Over 70,000 XSpeeder network devices have been exposed to a critical flaw allowing attackers to seize root access with one web request. After seven months, the manufacturer has issued no fix, leaving global infrastructure at risk.
#XSpeeder devices | #cybersecurity vulnerability | #root access
A stealthy malware campaign is targeting macOS developers through malicious VS Code plugins, stealing passwords and crypto after a hidden delay. Discover how GlassWorm exploits trust in the plugin ecosystem.
Coupang’s insider data breach exposed over 33 million users and revealed deep flaws in South Korea’s fragmented cybersecurity framework, sparking national outrage and calls for reform.
#Coupang breach | #insider threat | #cybersecurity governance
A 15-hour AWS outage left millions stranded without smart devices or essential services, exposing the hidden vulnerabilities of our cloud-dependent lives.
Two American cybersecurity pros have pled guilty to running ransomware attacks as BlackCat affiliates, exploiting their insider skills for profit. Their downfall exposes the dangerous duality of expertise in the cyber underworld.
The MongoBleed bug is enabling hackers to steal passwords and sensitive data from MongoDB servers with alarming ease. Discover how this flaw works, why it’s so dangerous, and what organizations must do now to stay secure.
A new investigation exposes Kimwolf, an Android botnet infecting millions of devices by exploiting exposed ADB services and proxy networks. Discover how cybercriminals profit from hijacked smart TVs and set-top boxes, and what this means for the future of digital security.
A Russia-aligned hacking group is turning Viber into a weapon, targeting Ukraine’s government and military with stealthy malware campaigns that exploit trusted messaging apps.
The Raspberry Pi Compute Module Zero quietly targets OEMs in China with its tiny form factor and robust Linux support. We investigate its potential impact, technical specs, and market challenges.
The Commodore 1541 disk drive, long considered a simple peripheral, has been exposed as a hidden computer capable of running standalone programs - all without hardware changes. Discover how retro hackers unlocked its potential.
UNI-T’s MSO oscilloscopes promise powerful mixed-signal analysis - but only if you spring for pricey digital probes. We investigate the real value, hidden costs, and practical alternatives for electronics enthusiasts and professionals.
California’s new DROP law makes it easy for residents to delete their personal data from all registered data brokers with a single request, upending the data industry and setting a new standard for privacy rights.
Anthropic’s Claude Chrome extension, designed for automated web browsing, may expose users to unprecedented data leaks and cyberattacks, researchers warn. The AI inherits your digital identity and can be manipulated to perform harmful actions, raising urgent questions about browser security in the age of automation.
A ransomware attack on Sedgwick Government Solutions, which serves key US agencies, has led to the public leak of sensitive data and renewed fears about the cybersecurity of government contractors.
Brightspeed is probing a potential data breach after the Crimson Collective hacking group claims to have stolen sensitive information from over 1 million customers. Here’s what we know so far.
A mysterious radio communication failure forced Greece to ground over 120 flights, stranding thousands. While officials rule out cyberattack, the crisis reveals deep vulnerabilities in critical aviation infrastructure.
Russian-linked hackers are targeting European hotels with a clever scam involving fake reservation cancellations and a counterfeit 'Blue Screen of Death,' tricking staff into installing malware that steals data and disables security.
CEIVA-Logic has stormed onto the ransomware scene, wielding custom code and double-extortion tactics to devastate victims across industries. This feature unpacks their operations, negotiation ploys, and the broader threat landscape.
Dunkirk, France faced a crippling ransomware attack that froze its municipal website and disrupted essential services, exposing the rising threat to European local governments.
A major ransomware attack has paralyzed www.grainsandcereals.com.co, a leading Colombian grain supplier, disrupting food distribution and exposing the agricultural sector's cyber weaknesses.
An in-depth look at the ransomware attack that paralyzed sjevicedu.au, revealing the tactics used by cybercriminals and the urgent cybersecurity lessons for educational institutions.