The company in December warned of recent attacks targeting a 2020 vulnerability. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Thousands of firewalls at risk as legacy flaw in Fortinet faces renewed threat
IT Security News Hourly Summary 2026-01-05 18h : 8 posts
8 posts were published in the last hour 16:32 : Windows Users at Risk as Critical Zoom Vulnerability Exploited 16:32 : ALPRs are recording your daily drive (Lock and Code S06E26) 16:32 : Chinese Robotaxis May Launch UK Trials in…
Windows Users at Risk as Critical Zoom Vulnerability Exploited
A critical Zoom vulnerability put Windows users at risk of data theft and system compromise. Zoom has patched the flaw. Users should update immediately. The post Windows Users at Risk as Critical Zoom Vulnerability Exploited appeared first on TechRepublic. This…
ALPRs are recording your daily drive (Lock and Code S06E26)
This week on the Lock and Code podcast, we speak with Will Freeman about Automated License Plate Reader (ALPR) surveillance. This article has been indexed from Malwarebytes Read the original article: ALPRs are recording your daily drive (Lock and Code…
Chinese Robotaxis May Launch UK Trials in 2026 as Uber and Lyft Partner With Baidu
Chinese autonomous taxis could begin operating on UK roads by 2026 after Uber and Lyft announced plans to partner with Chinese technology company Baidu to trial driverless vehicles in London. Both companies are seeking government approval to test Baidu’s…
India Steps Up AI Adoption Across Governance and Public Services
India is making bold moves to embed artificial intelligence (AI) in governance, with ministries utilizing AI instruments to deliver better public services and boost operational efficiency. From weather prediction and disease diagnosis to automated court document translation and meeting transcription, AI…
India’s Fintech Will Focus More on AI & Compliance in 2026
India’s Fintech industry enters the new year 2026 with a new set of goals. The industry focused on rapid expansion through digital payments and aggressive customer acquisition in the beginning, but the sector is now focusing more towards sustainable growth,…
Nissan Says Customer Data Exposed After Breach at Red Hat Systems
Nissan Motor Co Ltd said that personal information of thousands of customers was exposed following a cyber breach at Red Hat, the US based software company it had engaged to develop customer management systems. The Japanese automaker said it…
Malicious NPM Package Masquerading as WhatsApp Web API Steals Messages and Account Access
A harmful package hosted on the Node Package Manager (NPM) registry has been found impersonating a genuine WhatsApp Web API library, with the intent to spy on user activity. Disguised as a legitimate developer tool, the package is designed…
Thousands of firewalls at risk as legacy flaw in Fortinet under renewed threat
The company in December warned of recent attacks targeting a 2020 vulnerability. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Thousands of firewalls at risk as legacy flaw in Fortinet under renewed threat
NordVPN Denies Breach After Hacker Claims Access to Salesforce Dev Data
A hacker using the alias 1011 has claimed to breach a NordVPN development server, posting what appears to… This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the original article: NordVPN Denies Breach…
Kimwolf botnet leverages residential proxies to hijack 2M+ Android devices
The Kimwolf botnet has infected over 2 million Android devices, spreading mainly through residential proxy networks, researchers say. The Kimwolf botnet has compromised more than 2 million Android devices, spreading primarily via residential proxy networks, according to cybersecurity firm Synthient.…
VVS Stealer Uses Advanced Obfuscation to Target Discord Users
A new Python-based malware called VVS stealer has been identified, targeting Discord users with stealthy techniques to steal data This article has been indexed from www.infosecurity-magazine.com Read the original article: VVS Stealer Uses Advanced Obfuscation to Target Discord Users
Cyber risks grow as manufacturers turn to AI and cloud systems
Manufacturing has been the most-attacked sector for four years straight, according to a recent IBM report. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Cyber risks grow as manufacturers turn to AI and…
California Unveils DROP Tool for Personal Data Deletion
The platform gives residents the ability to request deletion of their personal information from 500+ registered data brokers with a single submission. The post California Unveils DROP Tool for Personal Data Deletion appeared first on TechRepublic. This article has been…
Google Tasks Used to Deliver Stealth Phishing Attacks
Attackers are abusing Google Tasks notifications to deliver trusted-domain phishing emails that bypass traditional email security controls. The post Google Tasks Used to Deliver Stealth Phishing Attacks appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…
Handala Leak Shows Telegram Account Risk, Not iPhone Hacks
The Handala incident shows how Telegram account takeovers can expose sensitive data without compromising entire devices. The post Handala Leak Shows Telegram Account Risk, Not iPhone Hacks appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…
CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries
With 24 new vulnerabilities known to be exploited by ransomware groups, the list now includes 1,484 software and hardware flaws. The post CISA KEV Catalog Expanded 20% in 2025, Topping 1,480 Entries appeared first on SecurityWeek. This article has been…
Vulnerability Summary for the Week of December 29, 2025
High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info Patch Info SmarterTools–SmarterMail Successful exploitation of the vulnerability could allow an unauthenticated attacker to upload arbitrary files to any location on the mail server, potentially enabling remote code execution.…
New Zealand Orders Review of Manage My Health Breach Affecting 100,000+ Patients
A breach affecting Manage My Health could have exposed sensitive data for up to 120,000 New Zealand patients This article has been indexed from www.infosecurity-magazine.com Read the original article: New Zealand Orders Review of Manage My Health Breach Affecting 100,000+…
Cyber Briefing: 2026.01.05
India-targeted espionage, IoT botnets, credential abuse, disputed breaches, crypto wallet hacks, massive healthcare exposure, cyber M&A, and arrests dominated. This article has been indexed from CyberMaterial Read the original article: Cyber Briefing: 2026.01.05
Ransomware Profits Shrink Forcing Criminal Gangs to Innovate
Ransomware networks are increasingly using unconventional recruitment channels to recruit new operators. Using blatant job-style announcements online, these networks are enlisting young, inexperienced operators with all sorts of job experience in order to increase their payouts. There is a…
Palo Alto Networks Eyes $400M Acquisition of Koi Security
A high-profile acquisition by a global cybersecurity leader could help signal renewed confidence in Israeli cyber startups. The post Palo Alto Networks Eyes $400M Acquisition of Koi Security appeared first on TechRepublic. This article has been indexed from Security Archives…
Gmail preparing to drop POP3 mail fetching
It’s January 2026, and Google is finding innovative new ways to make one of its services worse Important news for Gmail power users: Google is dropping the feature whereby Gmail can collect mail from other email accounts over POP3.… This…