CYBERSECURITY
Software Security & Vulnerabilities
CVE-2026-23745: Node-tar Path TraversalCritical path traversal vulnerability in node-tar allows arbitrary file overwrites. Patch available in v7.5.3. Read more
StealC Malware Control Panel XSSCybersecurity researchers discovered cross-site scripting vulnerability in StealC malware's control panel. Read more
CVE-2026-1181: Stored XSS in Altium ForumCritical stored XSS vulnerability in Altium Forum due to missing server-side validation. Read more
User/Identity & Access Management (IAM)
ServiceNow BodySnatcher VulnerabilityCritical authentication flaw allows unauthenticated attackers to impersonate ANY ServiceNow user using only their email address. Read more
Identity access transformation identified as top 2026 cybersecurity priority for securing AI systems. Read more
Data Security & Privacy
CIRO Data Breach - 750,000 Canadian InvestorsCIRO confirmed data breach impacting 750,000 Canadian investors with sensitive personal information exposed. Read more
Multiple Database Leak ClaimsMultiple database leaks including JobsGO, MyVete, Pixpay exposed approximately 2.3 million records in early January. Read more
Threat Intelligence & Incident Response
Checkpoint Threat Intelligence Report - Jan 19Report indicates up to 9.6 million accounts potentially affected, with approximately 600 of 800 servers compromised. Read more
Sinobi Ransomware Targets National WasteRansomware group Sinobi claims responsibility for cyberattack on National Waste Associates on January 19, 2026. Read more
Everest Ransomware Hits NissanEverest ransomware group claims 900GB data theft from Japanese automaker Nissan in latest attack. Read more
Hardware Security & Cryptography
.NET 10 introduces native post-quantum cryptography APIs for developers enabling quantum-safe encryption. Read more
Project Eleven raises $20M Series A for post-quantum cryptography solutions as Q-Day awareness accelerates. Read more
Digital security entering new era with digital sovereignty, post-quantum cryptography, and AI-ready data protection. Read more
Cybersecurity Tools & Platforms
Top priorities include transforming identity access, strengthening email security, and leveraging AI for code discovery. Read more
Email security identified as critical focus area with emerging tools and approaches for preventing compromise. Read more
No comments:
Post a Comment