Emergency Microsoft update fixes in-the-wild Office zero-day
Emergency Microsoft update fixes in-the-wild Office zero-day Pierluigi Paganini January 26, 2026 Microsoft issued emergency updates to fix an actively...
Emergency Microsoft update fixes in-the-wild Office zero-day Pierluigi Paganini January 26, 2026 Microsoft issued emergency updates to fix an actively...
What Are Non-Human Identities and Why Do They Matter in Complex Enterprise Environments? Where digital transformation accelerates work processes, the...
Are Organizations Prepared for the Challenges of Non-Human Identities? Understanding Non-Human Identities in Cybersecurity How do organizations safeguard their machine...
Security starts with intent – the intent to protect people and systems, without slowing down everyday work. Data breaches almost...
What Is CVE-2026-21962? CVE-2026-21962 is a critical (CVSS 10.0) vulnerability in the Oracle HTTP Server and the WebLogic Server Proxy...
via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink *** This is a Security Bloggers...
ShinyHunters claims 2 Million Crunchbase records; company confirms breach Pierluigi Paganini January 26, 2026 Crunchbase confirms a data breach after...
Energy sector targeted in multi-stage phishing and BEC campaign using SharePoint Pierluigi Paganini January 26, 2026 Microsoft warns of a...
The race to standardize agentic commerce just accelerated dramatically. Google’s Universal Commerce Protocol (UCP) is positioning itself as connective tissue...
Terraform has become the de facto standard for infrastructure as code (IaC). From cloud-native startups to global enterprises, teams rely...
Ravie LakshmananJan 26, 2026Cyber Espionage / Malware Cybersecurity researchers have discovered an ongoing campaign that's targeting Indian users with a...
Ravie LakshmananJan 26, 2026AI Security / Vulnerability Cybersecurity researchers have discovered two malicious Microsoft Visual Studio Code (VS Code) extensions...
We discovered two threat campaigns that used PeckBirdy in their operations. Based on victimology and the tools, tactics, and procedures...
Image: Simon Ray/Unsplash Microsoft is under scrutiny after it emerged that the company shared encryption keys with US law enforcement,...
AI has dominated cybersecurity headlines for years, but as we enter 2026, the conversation is shifting from hype to hard...