In many African countries, perpetrators of crime or illegal activities bank on being able to act with impunity, emboldened by the perception that the communities affected, advocacy groups, or even …
Google on Wednesday announced that it worked together with other partners to disrupt IPIDEA, which it described as one of the largest residential proxy networks in the world.
To that end, the company …
Quantum technologies are rapidly emerging as foundational capabilities for economic competitiveness, national security and scientific leadership in the 21st century. Sustained U.S. leadership in …
The Houses of Parliament building in Westminster, London, UK. Picture: Nigel J Harris/Shutterstock
National newspaper editors from across the political spectrum have come together to call for the …
**
Ravie Lakshmanan **
Jan 28, 2026
Critical Infrastructure / Threat Intelligence
The “coordinated” cyber attack targeting multiple sites across the Polish power grid has been attributed …
Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS Code) extension for Moltbot (formerly Clawdbot) on the official Extension Marketplace that claims to be a free …
I was looking for possible exploitation of CVE-2026-21962, a recently patched WebLogic vulnerability. While looking for related exploit attempts in our data, I came across the following request:
`GET …
**
Ravie Lakshmanan **
Jan 28, 2026
Vulnerability / Open Source
A critical sandbox escape vulnerability has been disclosed in the popular vm2 Node.js library that, if successfully exploited, could …
(Left to right) Goalhanger co-founders Jack Davenport, Tony Pastor and Gary Lineker. Picture: Garry Jones
Podcast production company Goalhanger has taken on outside investment for the first time …
**
Ravie Lakshmanan **
Jan 28, 2026
Vulnerability / Workflow Automation
Cybersecurity researchers have disclosed two new security flaws in the n8n workflow automation platform, including a crucial …
Threat actors with ties to China have been observed using an updated version of a backdoor called COOLCLIENT in cyber espionage attacks in 2025 to facilitate comprehensive data theft from infected …
If you work in security operations, the concept of the AI SOC agent is likely familiar. Early narratives promised total autonomy. Vendors seized on the idea of the “Autonomous SOC” and …
In 2025, authoritarian rulers and oligarchs across this region intensified their struggle not only for power and wealth but also for citizens’ minds in the digital space, forcing journalists to …
Google AI Overviews shown in front of a Google webpage. Picture: Shutterstock/DIA TV
The UK’s competition watchdog has said publishers should be able to opt out of their content being used in …
**
Ravie Lakshmanan **
Jan 28, 2026
Supply Chain Security / Malware
Cybersecurity researchers have discovered two malicious packages in the Python Package Index (PyPI) repository that masquerade as …
When security teams discuss credential-related risk, the focus typically falls on threats such as phishing, malware, or ransomware. These attack methods continue to evolve and rightly command …
**
Ravie Lakshmanan **
Jan 28, 2026
Vulnerability / Threat Intelligence
Google on Tuesday revealed that multiple threat actors, including nation-state adversaries and financially motivated groups, are …
Mirror front page on 28 January 2026
Dozens of people’s claims against the publisher of the Mirror over allegations of unlawful information gathering should be allowed to continue as they were not …
The Hill website homepage on morning of 27 January 2026
The Hill has “fortified” its breaking news team to make the most of a “bonkers” news cycle in US politics.
The US political news site recorded …
**
Ravie Lakshmanan **
Jan 28, 2026
Network Security / Zero-Day
Fortinet has begun releasing security updates to address a critical flaw impacting FortiOS that has come under active exploitation in …
Sir Simon Hughes outside the Rolls Building in London in 2021. Picture: PA Media
Former Lib Dem MP Sir Simon Hughes has spoken out about how his private life became a target for tabloid reporting …
This post was co-written wit h Saurabh Gupta and Todd Colby
from Pushpay.
Pushpay is a market-leading digital giving and engagement platform designed to help churches and faith-based organizations …
Organizations managing hundreds of contracts annually face significant inefficiencies, with fragmented systems and complex workflows that require teams to spend hours on contract review cycles. This …
**
Ravie Lakshmanan **
Jan 27, 2026
Mobile Security / Spyware
Meta on Tuesday announced it’s adding Strict Account Settings on WhatsApp to secure certain users against advanced cyber attacks …