A threat actor operating under the moniker “RedTeam” has begun advertising a new brute-force attack tool, “Brutus,” designed to target Fortinet services, according to recent dark web intelligence. The tool is priced at $1,500, signaling growing interest in automated credential-stuffing…
New Sophisticated Phishing Attack Mimic as Google Support to Steal Logins
Cybersecurity researchers have uncovered a dangerous new phishing campaign that tricks users into surrendering their credentials by impersonating legitimate Google support and notifications. The attack combines vishing (voice phishing), spoofed domains, and Google’s own trusted infrastructure to achieve exceptional success…
AI, Quantum, and the New Threat Frontier: What Will Define Cybersecurity in 2026?
AI, Quantum, and the New Threat Frontier: What Will Define Cybersecurity in 2026? madhav Tue, 01/06/2026 – 04:44 If we think 2025 has been fast-paced, it’s going to feel like a warm-up for the changes on the horizon in 2026.…
Qualcomm Debuts Lower-Cost Desktop Chip
Qualcomm Snapdragon X2 Plus ARM-based chip to power lower-cost Windows 11 laptops, as company pushes beyond smartphones This article has been indexed from Silicon UK Read the original article: Qualcomm Debuts Lower-Cost Desktop Chip
European hospitality blue screen of death, Brightspeed investigates breach, Convicted Bitfinex launderer freed
European hospitality blue screen of death Brightspeed investigates breach Convicted Bitfinex launderer freed Huge thanks to our sponsor, Hoxhunt Traditional security training fails because it treats employees like the problem. Hoxhunt treats them like the solution. AI-powered simulations mirror actual…
IT Security News Hourly Summary 2026-01-06 09h : 7 posts
7 posts were published in the last hour 8:2 : Meta Buys China-Founded AI Start-Up Manus 8:2 : Connex IT Partners with AccuKnox for Zero Trust CNAPP Security in Southeast Asia 8:2 : WhiteDate – 6,076 breached accounts 8:2 :…
Meta Buys China-Founded AI Start-Up Manus
Facebook parent Meta Platforms buys China-founded, Singapore-based AI agent start-up Manus to expand tech capabilities This article has been indexed from Silicon UK Read the original article: Meta Buys China-Founded AI Start-Up Manus
Connex IT Partners with AccuKnox for Zero Trust CNAPP Security in Southeast Asia
Menlo Park, India, 6th January 2026, CyberNewsWire This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the original article: Connex IT Partners with AccuKnox for Zero Trust CNAPP Security in Southeast Asia
WhiteDate – 6,076 breached accounts
In December 2025, the dating website “for a Europid vision” WhiteDate suffered a data breach that exposed 6k unique email addresses. The breach exposed extensive further personal information including data related to physical appearance, income, education and IQ. This article…
Scattered Lapsus$ Hunters Resurface with New RaaS Platform ‘ShinySp1d3r’ and Aggressive Insider Recruitment
The notorious Scattered Lapsus$ Hunters threat group has returned to active operations after a period of silence following their high-profile supply chain attack targeting Salesforce third-party integrations, including Gainsight and Salesloft. Recent activity observed across underground Telegram channels and credential-trading…
Stealthy Tuoni C2 Malware Targets Major U.S. Real Estate Firm with AI-Enhanced Tactics
Cybercriminals have shifted their approach to infiltration. Rather than launching quick attacks, they now work silently within networks, stealing important information, and waiting weeks or months before striking. This is exactly what happened in a recent attack discovered by Morphisec…
Threat Actors Hacked Global Companies via Leaked Cloud Credentials from Infostealer Infections
Dozens of major global enterprises have been breached through a surprisingly simple yet devastating attack vector: stolen credentials extracted from infostealer malware. A threat actor operating under the nickname “Zestix” and his alias “Sentap” has been systematically accessing corporate cloud…
Turning plain language into firewall rules
Firewall rules often begin as a sentence in someone’s head. A team needs access to an application. A service needs to be blocked after hours. Translating those ideas into vendor specific firewall syntax usually involves detailed knowledge of zones, objects,…
One criminal, 50 hacked organizations, and all because MFA wasn’t turned on
Crim used infostealer to get cloud credentials If you don’t say “yes way” to MFA, the consequences can be disastrous. Sensitive data belonging to about 50 global enterprises is listed for sale – and, in some cases, has already been…
$35M Cryptocurrency Theft Linked to LastPass Password Manager DataBreach
Blockchain intelligence firm TRM Labs has traced over $35 million in stolen cryptocurrency to the 2022 LastPass breach, revealing a sophisticated Russian cybercriminal laundering operation that remains active into 2025. In 2022, hackers breached LastPass and stole encrypted password vaults…
Product showcase: Blokada for Android gives users control over network traffic
Blokada is a network privacy and ad-blocking application available on Android, iOS, Windows, macOS, and Linux. It is designed to reduce ads, block trackers, and limit unwanted network connections at the system level. Getting started Blokada’s interface is simple. A…
The roles and challenges in moving to quantum-safe cryptography
A new research project examines how organizations, regulators, and technical experts coordinate the transition to quantum safe cryptography. The study draws on a structured workshop with public sector, private sector, and academic participants to document how governance, security, and innovation…
GravityRAT with Remote Access Capabilities Attacking Windows, Android, and macOS Systems
GravityRAT is a remote access trojan that has been targeting government agencies and military organizations since 2016. This malware originated as a Windows-only threat but has evolved into a cross-platform tool that can attack Windows, Android, and macOS systems. The…
What security teams miss in email attacks
Email remains the most common entry point for attackers. This article examines how phishing, impersonation, and account takeover continue to drive email breaches and expose growing security gaps across industries. Email blind spots are back to bite security teams Email…
Passwords are still breaking compliance programs
The security stack has grown, but audits still stumble on passwords. CISOs see this every year. An organization may have strong endpoint tools, layered network defenses, and a documented access policy. Then the audit turns to shared credentials, spreadsheet-based password…
New n8n Vulnerability (9.9 CVSS) Lets Authenticated Users Execute System Commands
A new critical security vulnerability has been disclosed in n8n, an open-source workflow automation platform, that could enable an authenticated attacker to execute arbitrary system commands on the underlying host. The vulnerability, tracked as CVE-2025-68668, is rated 9.9 on the…
IT Security News Hourly Summary 2026-01-06 06h : 1 posts
1 posts were published in the last hour 4:31 : Post-Quantum Cryptographic Agility in MCP Tool Definition Schemas
Post-Quantum Cryptographic Agility in MCP Tool Definition Schemas
Learn how to implement post-quantum cryptographic agility within Model Context Protocol (MCP) tool definition schemas to secure AI infrastructure against quantum threats. The post Post-Quantum Cryptographic Agility in MCP Tool Definition Schemas appeared first on Security Boulevard. This article has…
WhatsApp Vulnerabilities Leak Users’ Metadata Including Device’s Operating System Details
WhatsApp’s multi-device encryption protocol has long leaked metadata, allowing attackers to fingerprint users’ device operating systems, aiding targeted malware delivery. Recent research highlights partial fixes by Meta, but transparency issues persist. Meta’s WhatsApp, with over 3 billion monthly active users,…