From Triage to Threat Hunts: How AI Accelerates SecOps
If you work in security operations, the concept of the AI SOC…
Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
Ravie LakshmananJan 28, 2026Vulnerability / Workflow Automation Cybersecurity researchers have disclosed two…
Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
Ravie LakshmananFeb 02, 2026Developer Tools / Malware Cybersecurity researchers have disclosed details…
eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware
The update infrastructure for eScan antivirus, a security solution developed by Indian…
Russia-Aligned ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid
Ravie LakshmananJan 28, 2026Critical Infrastructure / Threat Intelligence The "coordinated" cyber attack…
Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware
Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS…
Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks
Google on Wednesday announced that it worked together with other partners to…
SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass
Ravie LakshmananJan 29, 2026Vulnerability / Software Security SolarWinds has released security updates…
3 Decisions CISOs Need to Make to Prevent Downtime Risk in 2026
The Hacker NewsJan 29, 2026Threat Intelligence / Incident Response Beyond the direct…
Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps
A study by OMICRON has revealed widespread cybersecurity gaps in the operational…
New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories
Ravie LakshmananJan 29, 2026Cybersecurity / Hacking News This week's updates show how…
