CYBERSECURITY

RCE Attacks via Spreadsheet Formulas Are Made Possible by a Critical Grist-Core Vulnerability

RCE Attacks via Spreadsheet Formulas Are Made Possible by a Critical Grist-Core Vulnerability

Grist-Core, an open-source, self-hosted version of the Grist relational spreadsheet database, has been found to have a serious security flaw that

Five Useful Strategies for Security AI Without Losing Control

Five Useful Strategies for Security AI Without Losing Control

According to the report, there has been a 1,200% increase in phishing attacks since generative AI became popular, and there is an increasing

Emergency Patch for Active Exploitation of Microsoft Office Zero-Day (CVE-2026-21509)

Emergency Patch for Active Exploitation of Microsoft Office Zero-Day (CVE-2026-21509)

Out-of-band security patches for a high-severity Microsoft Office zero-day vulnerability that has been used in attacks were released by Microsoft

Wiper Attack on Polands Power Grid Caused by Sandworm

Wiper Attack on Polands Power Grid Caused by Sandworm

Last month, Russia's Sandworm advanced persistent threat (APT) group was blamed for a devastating cyberattack against Poland's electrical grid.

A Tax Phishing Campaign Targets Indian Users Blackmoon Malware Delivery

A Tax Phishing Campaign Targets Indian Users Blackmoon Malware Delivery

As part of a suspected cyber espionage campaign, cybersecurity researchers have found an ongoing campaign that targets Indian users with a multi-stage

With 1.5 million installs, malicious VS Code AI extensions steal developer source code.

With 1.5 million installs, malicious VS Code AI extensions steal developer source code.

Two malicious Microsoft Visual Studio Code (VS Code) extensions have been found by cybersecurity researchers This article explores code extensions

Winning Against AI-Based Attacks Requires a Combined Defensive Approach

Winning Against AI-Based Attacks Requires a Combined Defensive Approach

When it comes to cybersecurity, one thing is certain: adversaries are constantly coming up with new ideas This article explores ai orchestrated cyber. .

Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers

Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers

PowerShell malware created with artificial intelligence (AI) tools has been seen to be used by the North Korean threat actor Konni to target blockchain

Additional Fortinet Issues: Exploited Critical FortiSIEM Flaw

Additional Fortinet Issues: Exploited Critical FortiSIEM Flaw

Fortinet customers are already familiar with 2026 even though the year has only just begun because a new vulnerability has been exploited This article explores fortisiem vulnerabilities cv

Security Leaders: CISOs Gain Notoriety Enter the Executive Suite.

Security Leaders: CISOs Gain Notoriety Enter the Executive Suite.

Because of the world's growing reliance on technology, companies are increasingly designating top cybersecurity leaders as Chief Information Security Officers (CISOs) and treating them as

An AI system cuts the time it takes to reconstruct an attack from weeks to hours.

An AI system cuts the time it takes to reconstruct an attack from weeks to hours.

In order to enable security teams to more rapidly determine whether their systems are resistant to the most recent attacks, a federal lab seeks to improve the efficiency of threat emulatio

2025 served as a reminder to safeguard human judgment rather than just systems.

2025 served as a reminder to safeguard human judgment rather than just systems.

COMMENTARY I keep returning to one unsettling realization about 2025 as 2026 gets underway. Attackers were not misinterpreted by us. We misinterpreted failure.

The majority of the d

The malware GootLoader uses 500–1,000 Concatenated ZIP Files to Avoid Recognition

The malware GootLoader uses 500–1,000 Concatenated ZIP Files to Avoid Recognition

GootLoader, a JavaScript (also known as JScript) malware loader, has been seen to use a corrupted ZIP file that is intended to evade detection by concatenating between 500 and 1,000 archiv

APT Associated with China Used Sitecore Zero-Day to Infiltrate Critical Infrastructure

APT Associated with China Used Sitecore Zero-Day to Infiltrate Critical Infrastructure

Since at least last year, critical infrastructure sectors in North America have been the target of a threat actor that is probably affiliated with China This article explores ttps uat 8837

Five Dangerous Chrome Add-ons Workday and NetSuite impersonation for account theft

Five Dangerous Chrome Add-ons Workday and NetSuite impersonation for account theft

"The extensions work in concert to steal authentication tokens, block incident response capabilities, and enable complete account takeover through session hijacking," stated Socket securit

Your Digital Footprint Can Lead Right to Your Front Door

Your Digital Footprint Can Lead Right to Your Front Door

At night, you lock your doors This article explores hazardous personal data. . You steer clear of dubious phone calls.

You exercise caution when posting anything on social media. Ho

Winter Olympics Could Share Podium With Cyberattackers

Winter Olympics Could Share Podium With Cyberattackers

Cybercriminals will also be vying for gold when the Milano Cortina Winter Games start on February 6. Experts caution that everything is possible, from ransomware and distributed denial-of-

Vulnerabilities Surge, But Messy Reporting Blurs Picture

Vulnerabilities Surge, But Messy Reporting Blurs Picture

Vulnerability reports set yet another record this year This article explores cve identified vulnerabilities. . According to data analyzed from the National Vulnerability Database (NVD), 48

Predator Spyware Sample Indicates 'Vendor-Controlled' C2

Predator Spyware Sample Indicates 'Vendor-Controlled' C2

For a long time, commercial spyware vendors have defended their companies by arguing that they sell their products to government agencies in support of national security and law enforcemen

LOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishing

LOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishing

Security experts have revealed information about a new campaign that uses politically themed lures to deliver a backdoor known as LOTUSLITE to U.S. government and policy entities. The targ

Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways

Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways

Almost a month after the company revealed that a China-nexus advanced persistent threat (APT) actor codenamed UAT-9686 had exploited a maximum-severity security flaw affecting Cisco AsyncO

APT Associated with China Uses Sitecore Zero-Day to Attack American Critical Infrastructure

APT Associated with China Uses Sitecore Zero-Day to Attack American Critical Infrastructure

Since at least last year, critical infrastructure sectors in North America have been the target of a threat actor that is probably affiliated with China This article explores ttps uat 8837

ThreatsDay Bulletin: AI Voice Cloning Exploit, Wi-Fi Kill Switch, PLC Vulns, and 14 More Stories

ThreatsDay Bulletin: AI Voice Cloning Exploit, Wi-Fi Kill Switch, PLC Vulns, and 14 More Stories

There is never a quiet moment on the internet This article explores apple intelligence uphold. . There are new security issues, scams, and hacks every week.

The stories this week de

Model Security Is the Wrong Frame – The Real Risk Is Workflow Security

Model Security Is the Wrong Frame – The Real Risk Is Workflow Security

Security teams continue to concentrate on safeguarding the models themselves even as AI copilots and assistants are integrated into daily tasks This article explores safeguarding models ai

Four Antiquated Practices That Will Destroy Your SOCs MTTR in 2026

Four Antiquated Practices That Will Destroy Your SOCs MTTR in 2026

Even in 2026, a lot of SOCs are still using procedures and tools that were created for a completely different threat environment This article explores security tools soc. . Outdated proced

Trio of Critical Bugs Spotted in Delta Industrial PLCs

Trio of Critical Bugs Spotted in Delta Industrial PLCs

One high-severity vulnerability and three critical-severity vulnerabilities have been found in a brand of programmable logic controller (PLC) that is widely used in Asian industrial settin

Top 5 this week

Page 19 of 22