admin

Follow:
142 Articles

From Triage to Threat Hunts: How AI Accelerates SecOps

If you work in security operations, the concept of the AI SOC…

admin

Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

Ravie LakshmananJan 28, 2026Vulnerability / Workflow Automation Cybersecurity researchers have disclosed two…

admin

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

Ravie LakshmananFeb 02, 2026Developer Tools / Malware Cybersecurity researchers have disclosed details…

admin

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

The update infrastructure for eScan antivirus, a security solution developed by Indian…

admin

Russia-Aligned ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid

Ravie LakshmananJan 28, 2026Critical Infrastructure / Threat Intelligence The "coordinated" cyber attack…

admin

Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware

Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS…

admin

Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks

Google on Wednesday announced that it worked together with other partners to…

admin

SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass

Ravie LakshmananJan 29, 2026Vulnerability / Software Security SolarWinds has released security updates…

admin

3 Decisions CISOs Need to Make to Prevent Downtime Risk in 2026

The Hacker NewsJan 29, 2026Threat Intelligence / Incident Response Beyond the direct…

admin

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

A study by OMICRON has revealed widespread cybersecurity gaps in the operational…

admin

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

Ravie LakshmananJan 29, 2026Cybersecurity / Hacking News This week's updates show how…

admin