ISC Stormcast For Friday, January 30th, 2026 https://isc.sans.edu/podcastdetail/9788, (Fri, Jan 30th)
ISC Stormcast For Friday, January 30th, 2026 https://isc.sans.edu/podcastdetail/9788
ISC Stormcast For Friday, January 30th, 2026 https://isc.sans.edu/podcastdetail/9788
A new joint investigation by SentinelOne SentinelLABS, and Censys has revealed that the open-source artificial intelligence (AI) deployment has created a vast “unmanaged, publicly accessible …
Editor’s note: This post is part of Into the Omniverse , a series focused on how developers, 3D practitioners and enterprises can transform their workflows using the latest advancements in OpenUSD and …
Ben Smith, co-founder and editor-in-chief of Semafor. Picture: Semafor Semafor will “double down on what’s working” in 2026 with new editorial investment in London and Washington DC after reporting …
Get ready to game — the native GeForce NOW app for Linux PCs is now available in beta, letting Linux desktops tap directly into GeForce RTX performance from the cloud. Alongside the expansion comes …
** Ravie Lakshmanan ** Jan 29, 2026 Cybersecurity / Hacking News This week’s updates show how small changes can create real problems. Not loud incidents, but quiet shifts that are easy to miss …
ISC Stormcast For Thursday, January 29th, 2026 https://isc.sans.edu/podcastdetail/9786
A study by OMICRON has revealed widespread cybersecurity gaps in the operational technology (OT) networks of substations, power plants, and control centers worldwide. Drawing on data from more than …
** The Hacker News ** Jan 29, 2026 Threat Intelligence / Incident Response Beyond the direct impact of cyberattacks, enterprises suffer from a secondary but potentially even more costly risk: …
** Ravie Lakshmanan ** Jan 29, 2026 Vulnerability / Software Security SolarWinds has released security updates to address multiple security vulnerabilities impacting SolarWinds Web Help Desk, …
Press Gazette’s investigation which uncovered 1,000 articles in the British press attributed to 50 fake, non-existent and AI-enhanced experts has spurred PR trade bodies into action. Britain’s two …
Associate director of Hacked Off, Evan Harris. Picture: Reuters/Neil Hall A former MP and ex-director of campaign group Hacked Off has told the High Court that he did not pay for witness testimony. …
In many African countries, perpetrators of crime or illegal activities bank on being able to act with impunity, emboldened by the perception that the communities affected, advocacy groups, or even …
Google on Wednesday announced that it worked together with other partners to disrupt IPIDEA, which it described as one of the largest residential proxy networks in the world. To that end, the company …
Quantum technologies are rapidly emerging as foundational capabilities for economic competitiveness, national security and scientific leadership in the 21st century. Sustained U.S. leadership in …
The Houses of Parliament building in Westminster, London, UK. Picture: Nigel J Harris/Shutterstock National newspaper editors from across the political spectrum have come together to call for the …
** Ravie Lakshmanan ** Jan 28, 2026 Critical Infrastructure / Threat Intelligence The “coordinated” cyber attack targeting multiple sites across the Polish power grid has been attributed …
Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS Code) extension for Moltbot (formerly Clawdbot) on the official Extension Marketplace that claims to be a free …
I was looking for possible exploitation of CVE-2026-21962, a recently patched WebLogic vulnerability. While looking for related exploit attempts in our data, I came across the following request: `GET …
** Ravie Lakshmanan ** Jan 28, 2026 Vulnerability / Open Source A critical sandbox escape vulnerability has been disclosed in the popular vm2 Node.js library that, if successfully exploited, could …
(Left to right) Goalhanger co-founders Jack Davenport, Tony Pastor and Gary Lineker. Picture: Garry Jones Podcast production company Goalhanger has taken on outside investment for the first time …
** Ravie Lakshmanan ** Jan 28, 2026 Vulnerability / Workflow Automation Cybersecurity researchers have disclosed two new security flaws in the n8n workflow automation platform, including a crucial …
Threat actors with ties to China have been observed using an updated version of a backdoor called COOLCLIENT in cyber espionage attacks in 2025 to facilitate comprehensive data theft from infected …
If you work in security operations, the concept of the AI SOC agent is likely familiar. Early narratives promised total autonomy. Vendors seized on the idea of the “Autonomous SOC” and …
In 2025, authoritarian rulers and oligarchs across this region intensified their struggle not only for power and wealth but also for citizens’ minds in the digital space, forcing journalists to …