When ransomware gets physical: cybercriminals turn to threats of violence on May 14, 2026 Posted by Graham Cluley
Windows Zero-Days Expose BitLocker Bypasses And CTFMON Privilege Escalation on May 14, 2026 Posted by The Hacker News
The Biometric AuthToken Heist: Cracking PINs and Bypassing CE via a Long-Ignored Attack Surface on May 14, 2026 Posted by DARKNAVY
New Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruption on May 14, 2026 Posted by The Hacker News
Posted in Hacking news Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances on January 8, 2026 The Hacker News
Posted in Hacking news OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controls on January 7, 2026 The Hacker News
Posted in Hacking news CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited on January 7, 2026 The Hacker News
ISC Stormcast For Thursday, January 8th, 2026 https://isc.sans.edu/podcastdetail/9758, (Thu, Jan 8th) on January 7, 2026 SANS Internet Storm Center, InfoCON: green
Posted in careers Smashing Security podcast #449: How to scam someone in seven days on January 7, 2026 Graham Cluley
Analysis using Gephi with DShield Sensor Data, (Wed, Jan 7th) on January 7, 2026 SANS Internet Storm Center, InfoCON: green
Posted in Hacking news Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches on January 7, 2026 The Hacker News
Posted in Hacking news Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control on January 7, 2026 The Hacker News
Inside GoBruteforcer: AI-Generated Server Defaults, Weak Passwords, and Crypto-Focused Campaigns on January 7, 2026 alexeybu