** Ravie Lakshmanan ** Jan 27, 2026 Vulnerability / Cloud Security A critical security flaw has been disclosed in Grist‑Core , an open-source, self-hosted version of the Grist relational …
Homepage-Fragments
** Ravie Lakshmanan ** Jan 27, 2026 Web Security / Malware Cybersecurity researchers have discovered a JScript -based command-and-control (C2) framework called PeckBirdy that has been put to use by …
Rising Ballers founders Brendon Shabani (left), Eni Shabani (centre), and Jamie Pollitt (right). Football publisher Rising Ballers has grown to a 30-plus strong team with its focus on putting out …
Launching a missile from a Heimars rocket launcher. Picture: Shutterstock/Anelo Journalists rarely name the explosive weapon used when reporting on armed conflict. And the minority of cases in which …
Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation
** Ravie Lakshmanan ** Jan 27, 2026 Zero-Day / Vulnerability Microsoft on Monday issued out-of-band security patches for a high-severity Microsoft Office zero-day vulnerability exploited in attacks. …
ISC Stormcast For Tuesday, January 27th, 2026 https://isc.sans.edu/podcastdetail/9782, (Tue, Jan 27th)
ISC Stormcast For Tuesday, January 27th, 2026 https://isc.sans.edu/podcastdetail/9782
[This is a Guest Diary by Fares Azhari, an ISC intern as part of the SANS.edu BACS program] Romance scams are a form of social-engineering fraud that causes both financial and emotional harm. They …
California is a ‘news desert’ says Post editor-in-chief Keith Poole as new title launched
California Post first front page on 26 January 2026 California may be the home of big tech but News Corp is hoping that the state will support a newsbrand grounded in 20th century media technology. …
How Totogi automated change request processing with Totogi BSS Magic and Amazon Bedrock
This post is cowritten by Nikhil Mathugar, Marc Breslow and Sudhanshu Sinha from Totogi. This blog post describes how Totogi automates change request processing. Totogi is an AI company focused on …
AWS AppSync Events can help you create more secure, scalable Websocket APIs. In addition to broadcasting real-time events to millions of Websocket subscribers, it supports a crucial user experience …
** Ravie Lakshmanan ** Jan 26, 2026 AI Security / Vulnerability Cybersecurity researchers have discovered two malicious Microsoft Visual Studio Code (VS Code) extensions that are advertised as …
** Ravie Lakshmanan ** Jan 26, 2026 Cyber Espionage / Malware Cybersecurity researchers have discovered an ongoing campaign that’s targeting Indian users with a multi-stage backdoor as part of a …
Accurate weather forecasting helps save lives and protect environments — and is a cornerstone of decision-making in agriculture, energy, public health and other industries. Researchers, weather …
** Ravie Lakshmanan ** Jan 26, 2026 Hacking News / Cybersecurity Security failures rarely arrive loudly. They slip in through trusted tools, half-fixed problems, and habits people stop questioning. …
News diary 26 January – 1 February: Meta results, Australian Open finals, Grammy Awards
Facebook and Meta logos. Picture: Shutterstock Results from tech giants Meta, Apple, Samsung and Microsoft are set to be released this week, indicating the current status of the global technology …
As airstrikes intensified on Gaza after October 7, 2023, international reporters were barred from entering the territory, leaving Palestinian journalists, medical workers, and civilians as the primary …
** The Hacker News ** Jan 26, 2026 Endpoint Security / Artificial Intelligence If there’s a constant in cybersecurity, it’s that adversaries are always innovating. The rise of offensive AI …
Ireland Proposes Giving Police New Digital Surveillance Powers This is coming : The Irish government is planning to bolster its police’s ability to intercept communications, including encrypted …
Future plans 45 editorial redundancies at titles including Techradar and Tom’s Guide
Tom’s Guide and Techradar homepages on Friday 23 January 2026 Future plc has proposed to make 45 editorial redundancies at its technology titles. Some 15 new roles are being created at the same time, …
** Ravie Lakshmanan ** Jan 26, 2026 Malware / Endpoint Security The North Korean threat actor known as Konni has been observed using PowerShell malware generated using artificial intelligence (AI) …
Based on the sensors reporting to ISC, this activity started on the 13 Jan 2026. My own sensor started seeing the first scan on the 21 Jan 2026 with limited probes. So far, this activity has been …
ISC Stormcast For Monday, January 26th, 2026 https://isc.sans.edu/podcastdetail/9780, (Mon, Jan 26th)
ISC Stormcast For Monday, January 26th, 2026 https://isc.sans.edu/podcastdetail/9780
A new multi-stage phishing campaign has been observed targeting users in Russia with ransomware and a remote access trojan called Amnesia RAT. “The attack begins with social engineering lures …
Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents
AI agents are accelerating how work gets done. They schedule meetings, access data, trigger workflows, write code, and take action in real time, pushing productivity beyond human speed across the …
** Ravie Lakshmanan ** Jan 24, 2026 Malware / Critical Infrastructure The Russian nation-state hacking group known as Sandworm has been attributed to what has been described as the “largest …