65Articles
8Categories
2026-01-05Date
🚨
CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 EntriesWith 24 new vulnerabilities known to be exploited by ransomware groups, the list now includes 1,484 software and hardware flaws. The post CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries appeared first on SecurityWeek .
KEV
🐛
Ten thousand firewalls are vulnerable to old vulnerability
⚠️
Was bei der Cloud-Konfiguration schiefläuft – und wie es besser geht
⚠️
Cybersecurity leaders’ resolutions for 2026
⚠️
New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code
⚠️
Why are cybersecurity predictions so bad? - ESW #440
⚠️
Researcher Spotlights WhatsApp Metadata Leak as Meta Begins Rolling Out Fixes
⚠️
The State of Cybersecurity in 2025: Key Segments, Insights, and Innovations
⚠️
How the Organizational Risk Culture Standard can supercharge your cybersecurity culture
⚠️
⚡ Weekly Recap: IoT Exploits, Wallet Breaches, Rogue Extensions, AI Abuse & More
⚠️
Kimwolf Botnet Exploits 2 Million Devices to Build a Global Proxy Infrastructure
⚠️
ProfileHound: Post-Escalation Tool Designed to Achieve Red Team Objectives
⚠️
GHOSTCREW: AI-Powered Red Team Toolkit Integrating Metasploit, Nmap, and More
⚠️
Multiple Flaws in QNAP Tools Allow Attackers to Steal Sensitive Data
⚠️
NordVPN denies breach claims, says attackers have "dummy data"
⚠️
Over 10K Fortinet firewalls exposed to actively exploited 2FA bypass
KEV
⚠️
Stress caused by cybersecurity threats is taking its toll
⚠️
5 myths about DDoS attacks and protection
⚠️
Why Arbor Edge Defense and CDN-Based DDoS protection are better together
⚠️
Why cybersecurity needs to focus more on investigation and less on just detection and response
⚠️
New ransomware tactics to watch out for in 2026
📢
IBM security advisory (AV25-867)
📢
Eaton Vulnerabilities Allow Attackers to Execute Arbitrary Code on Host Systems
🔥
Infrastructure Under Attack: Cybersecurity Today for Monday January 5, 2026
🔥
Cybersecurity firm turns tables on threat actors with decoy data trap
🔥
Telegram Hosting World’s Largest Darknet Market
🔥
Cryptocurrency theft attacks traced to 2022 LastPass breach
🔥
Covenant Health data breach impacted 478,000+ people | Cybernews
🔥
Sedgwick confirms cyber incident affecting its major federal contractor subsidiary | The Record from Recorded Future News
🔥
Hackers Steal $35M in Cryptocurrency Following LastPass Breach
🔥
Crimson Collective Claims Alleged Breach of Brightspeed Fiber Network
🔥
Ledger customers impacted by third-party Global-e data breach
🔥
NordVPN denies breach claims, says attackers have "dummy data"
🔥
Sedgwick Confirms Cyberattack on Government Subsidiary
🔥
Taiwan subjected to 2.6 million Chinese cyberattacks a day in 2025
🔥
European Space Agency Confirms Server Breach - Infosecurity Magazine
🔥
Brightspeed Investigating Cyberattack
🔥
Cyberattack Unlikely in Communications Failure That Grounded Flights in Greece
🔥
Ledger customers impacted by third-party Global-e data breach
🔥
US broadband provider Brightspeed investigates breach claims
🔥
Cloud file-sharing sites targeted for corporate data theft attacks
🕵️
ISC Stormcast For Monday, January 5th, 2026 https://isc.sans.edu/podcastdetail/9752, (Mon, Jan 5th)
🕵️
New GlassWorm malware wave targets Macs with trojanized crypto wallets
🕵️
Hackers claim to hack Resecurity, firm says it was a honeypot
🕵️
What is happening to the Internet in Venezuela?
🕵️
Leak exposes Knownsec’s role in state cyber targeting | Cybernews
🕵️
Kimwolf Android Botnet Grows Through Residential Proxy Networks
🕵️
Adobe ColdFusion Servers Targeted in Coordinated Campaign - SecurityWeek
🕵️
Attackers Leverage FortiWeb Vulnerabilities to Deploy Sliver C2 for Long-Term Access
🕵️
PyArmor Obfuscation as a Method to Hinder Static and Signature-Based Analysis
🕵️
Threat Actors Abuse Trusted Business Infrastructure to Host Infostealers
🕵️
AI: Faster, Not Better
🕵️
VSCode IDE forks expose users to "recommended extension" attacks
🕵️
Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign
🕵️
Several countries investigate Elon Musk’s Grok after sexualized deepfakes on women and children
🕵️
VVS Stealer Uses Advanced Obfuscation to Target Discord Users - Infosecurity Magazine
🕵️
Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government
🕵️
AI Can't Replace Human Value
🕵️
Palo Alto Networks Announces Support for NVIDIA Enterprise AI Factory
🌐
Kimwolf Android Botnet Infects Over 2 Million Devices via Exposed ADB and Proxy Networks
🌐
ClickFix attack uses fake Windows BSOD screens to push malware
📡
Bitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act
📡
Agentic AI Is an Identity Problem and CISOs Will Be Accountable for the Outcome
📡
Risks of OOB Access via IP KVM Devices, (Mon, Jan 5th)
📡
Hacktivist deletes white supremacist websites live on stage during hacker conference