Introduction
In recent weeks, Lumma Stealer infections have followed a specific pattern in follow-up activity. This pattern adds scheduled tasks for the same action, which increases traffic to the …
The Black Lotus Labs team at Lumen Technologies said it null-routed traffic to more than 550 command-and-control (C2) nodes associated with the AISURU/Kimwolf botnet since early October 2025.
AISURU …
Hacking Wheelchairs over Bluetooth Researchers have demonstrated remotely controlling a wheelchair over Bluetooth. CISA has issued an advisory .
CISA said the WHILL wheelchairs did not enforce …
Upcoming Speaking Engagements This is a current list of where and when I am scheduled to speak:
I’m speaking at the David R. Cheriton School of Computer Science in Waterloo, Ontario, Canada on January …
Security experts have disclosed details of an active malware campaign that’s exploiting a DLL side-loading vulnerability in a legitimate binary associated with the open-source c-ares library to …
AI agents have quickly moved from experimental tools to core components of daily workflows across security, engineering, IT, and operations. What began as individual productivity aids, like personal …
Cathy Newman picks up the Interviewer of the Year prize from Rob McGibbon and Jeremy Vine at the British Journalism Awards 2025. Picture: Press Gazette/Adam Duke Photography
Channel 4 News presenter …
Research analyzing 4,700 leading websites reveals that 64% of third-party applications now access sensitive data without business justification, up from 51% in 2024. Government sector malicious …
Microsoft on Tuesday rolled out its first security update for 2026 , addressing 114 security flaws, including one vulnerability that it said has been actively exploited in the wild.
Of the 114 flaws, …
**
Jan 14, 2026 **
Ravie Lakshmanan
Vulnerability / Patch Management
Fortinet has released updates to fix a critical security flaw impacting FortiSIEM that could allow an unauthenticated attacker to …
Picture: Shutterstock/GamePixel
There have been so many changes to Google’s search engine results pages (SERPs) in the last three years that publishers are still measuring SEO by keyword positions …
It is not easy to catch Ritu Sarin for an interview on the sidelines of journalism conferences, and almost not at all when she is busy in the newsroom. A familiar name in investigative journalism in …
Google AI Overviews shown in front of a Google webpage. Picture: Shutterstock/DIA TV
A leading Google public affairs executuive has admitted that the tech giant does not believe it should have to pay …
**
Jan 14, 2026 **
Ravie Lakshmanan
Application Security / Vulnerability
Node.js has released updates to fix what it described as a critical security issue impacting “virtually every production …
**
Jan 14, 2026 **
Ravie Lakshmanan
Cyber Espionage / Threat Intelligence
The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of new cyber attacks targeting its defense …
The adoption and implementation of generative AI inference has increased with organizations building more operational workloads that use AI capabilities in production at scale. To help customers …
January 2026 Microsoft Patch Tuesday Summary Published 2026-01-13. Last Updated 2026-01-13 19:05:41 UTC by Johannes Ullrich (Version: 1)
0 comment(s)
Today, Microsoft released patches for 113 …
**
Jan 13, 2026 **
Ravie Lakshmanan
Web Security / Data Theft
Cybersecurity researchers have discovered a major web skimming campaign that has been active since January 2022, targeting several major …
**
Jan 13, 2026 **
Ravie Lakshmanan
Web Security / Online Fraud
Cybersecurity researchers have disclosed details of a malicious Google Chrome extension that’s capable of stealing API keys …
**
Jan 13, 2026 **
The Hacker News
Artificial Intelligence / Automation Security
AI agents are no longer just writing code. They are executing it.
Tools like Copilot, Claude Code, and Codex can now …
Paul Morgan-Bentley of The Times picks up the Scoop of the Year prize at the British Journalism Awards 2023. Picture: ASV Photography for Press Gazette
Award-winning Times head of investigations Paul …
**
Jan 13, 2026 **
Ravie Lakshmanan
Malware / Endpoint Security
Cybersecurity researchers have disclosed details of a new campaign dubbed SHADOW#REACTOR that employs an evasive multi-stage attack …
1980s Hacker Manifesto Forty years ago, The Mentor— Loyd Blankenship —published “ The Conscience of a Hacker ” in Phrack .
You bet your ass we’re all alike… we’ve been spoon-fed baby food at school …