Tag: service
-
Iran’s partial internet shutdown may be a windfall for cybersecurity intel
only available launchpads. A connection from the Ministry of Agriculture might not be a farmer. It’s likely a tunnel for a state actor who needs an exit node.”Ranjbar said the removal of the traffic from millions of routine Iranian business and residential users allows a powerful visibility into Iranian government traffic patterns, thereby allowing SOCs…
-
Microsoft disrupts RedVDS cybercrime platform behind $40 million in scam losses
Microsoft and law enforcement partners took down a popular cybercriminal subscription service called RedVDS that was used to enable more than $40 million in fraud losses in the United States alone. First seen on therecord.media Jump to article: therecord.media/microsoft-redvds-cybercrime-scam
-
Verizon Outage Knocks Out US Mobile Service, Including Some 911 Calls
A major Verizon outage appeared to impact customers across the United States starting around noon ET on Wednesday. Calls to Verizon customers from other carriers may also be impacted. First seen on wired.com Jump to article: www.wired.com/story/verizon-outage-knocks-out-us-mobile-service-including-some-911-calls/
-
Verizon Wireless outage puts phones in SOS mode without cell service
Verizon Wireless is suffering a massive outage in the US, with customers reporting their phones stuck in SOS mode with no cellular service. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/mobile/verizon-wireless-outage-puts-phones-in-sos-mode-without-cell-service/
-
January 2026 Microsoft Patch Tuesday: Actively exploited zero day needs attention
More priorities: Executives should also prioritize rapid patching and risk reduction efforts this month around the Windows Local Security Authority Subsystem Service Remote Code Execution, Windows Graphics Component Elevation of Privilege, and Windows Virtualization Based Security Enclave Elevation of Privilege flaws, Bicer said, as these vulnerabilities directly enable full system or trust boundary compromise.Strategic focus…
-
Ugandan officials turn off internet on eve of national elections
The Uganda Communication Commission (UCC) started turning off internet and mobile phone services on Tuesday, according to Amnesty International. First seen on therecord.media Jump to article: therecord.media/uganda-internet-shutdown-elections
-
Ukraine appoints digital chief as defense minister to drive military reform
Ukraine’s parliament appointed Mykhailo Fedorov, the digital transformation minister who modernized public services and helped develop drone programs for the war effort, as the country’s new defense chief. First seen on therecord.media Jump to article: therecord.media/ukraine-digital-chief-transformation
-
Microsoft seizes RedVDS infrastructure, disrupts fast-growing cybercrime marketplace
Tags: attack, credentials, cybercrime, infrastructure, marketplace, microsoft, phishing, service, theft, toolThe service became a prolific tool for cybercriminals in the past year, as it facilitated thousands of attacks involving credential theft, account takeovers, mass phishing and payment diversion fraud. First seen on cyberscoop.com Jump to article: cyberscoop.com/microsoft-seizes-disrupts-redvds-cybercrime-marketplace/
-
Eurail passengers taken for a ride as data breach spills passports, bank details
Travel biz tells customers to change passwords beyond its own services First seen on theregister.com Jump to article: www.theregister.com/2026/01/14/eurail_breach/
-
Microsoft DCU uses UK courts to hunt down cyber criminals
Microsoft has taken down the RedDVS cyber crime-as-a-service network after obtaining a UK court order, marking its first civil legal action outside of the US First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637353/Microsoft-DCU-uses-UK-courts-to-hunt-down-cyber-criminals
-
Microsoft updates Windows DLL that triggered security alerts
Microsoft has resolved a known issue that was causing security applications to incorrectly flag a core Windows component, the company said in a service alert posted this week. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-updates-windows-dll-that-triggered-security-alerts/
-
Multiple Elastic Vulnerabilities Could Lead to File Theft and DoS
Elastic has released urgent security patches addressing four significant vulnerabilities in Kibana that could enable attackers to steal sensitive files, trigger service outages, and exhaust system resources. The advisories, published on January 14, 2026, affect multiple Kibana versions spanning from 7.x through 9.2.3. Critical File Disclosure and SSRF Vulnerability The most severe flaw, CVE-2026-0532, has…
-
Critical Node.js Vulnerability Can Cause Server Crashes via async_hooks Stack Overflow
Node.js has released updates to fix what it described as a critical security issue impacting “virtually every production Node.js app” that, if successfully exploited, could trigger a denial-of-service (DoS) condition.”Node.js/V8 makes a best-effort attempt to recover from stack space exhaustion with a catchable error, which frameworks have come to rely on for service availability,” Node.js’s…
-
Criminal Subscription Service Behind AI-Powered Cyber-Attacks Taken Out By Microsoft
RedVDS cyber-crime-as-a-service platform powering phishing, BEC attacks and other fraud has cost victims millions First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/criminal-subscription-service/
-
AppOmni Surfaces BodySnatcher AI Agent Security Flaw Affecting ServiceNow Apps
AppOmni, a provider of a platform for securing software-as-a-service (SaaS) applications, this week disclosed it has discovered a flaw in the ServiceNow platform that could be used to create a malicious artificial intelligence (AI) agent. Dubbed BodySnatcher (CVE-2025-12420), AppOmni researchers discovered it was possible for an unauthenticated intruder to impersonate any ServiceNow user using only..…
-
SpyCloud Launches Supply Chain Solution to Combat Rising Third-Party Identity Threats
Tags: access, ai, authentication, breach, business, communications, compliance, credentials, cybercrime, cybersecurity, dark-web, data, data-breach, defense, government, grc, group, identity, incident response, infosec, infrastructure, malware, monitoring, phishing, ransomware, risk, risk-management, service, supply-chain, technology, theft, threat, toolFor government agencies and critical infrastructure operators, supply chain threats present national security risks that demand heightened vigilance. Public sector organizations managing sensitive data and critical services increasingly rely on contractors and technology vendors whose compromised credentials could provide adversaries with pathways into classified systems or essential infrastructure. Last year alone, the top 98 Defense…
-
Service Providers Help Pig Butcher Scammers Scale Operations: Infoblox
Service providers are delivering infrastructure, tools, and expertise and giving rise to pig-butchering-as-a-service models that are enabling the Asian crime syndicates running massive investment and romance scams to through industrial-scale compounds around the world at a larger scale and for a lower cost. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/service-providers-help-pig-butcher-scammers-scale-operations-infoblox/
-
Cybersecurity risk will accelerate this year, fueled in part by AI, says World Economic Forum
Tags: ai, attack, automation, business, ceo, ciso, control, country, cryptography, cyber, cybercrime, cybersecurity, data, detection, exploit, finance, framework, fraud, governance, healthcare, incident, infrastructure, international, middle-east, phishing, ransomware, resilience, risk, service, skills, software, strategy, supply-chain, technology, threat, tool, vulnerabilityAI is anticipated to be the most significant driver of change in cybersecurity in 2026, according to 94% of survey respondents;87% of respondents said AI-related vulnerabilities had increased in the past year. Other cyber risks that had increased were (in order) cyber-enabled fraud and phishing, supply chain disruption, and exploitation of software vulnerabilities;confidence in national cyber…
-
Ukraine parliament approves resignation of security service chief in major reshuffle
Vasyl Maliuk, chief of the Security Service of Ukraine (SBU), said he would step down from the post but remain in the agency to continue operations against Russia. First seen on therecord.media Jump to article: therecord.media/ukraine-parliament-approves-resignation-sbu-chief
-
What Is a DNS Attack? Understanding the Risks and Threats
In 2026, when websites, apps, and online services drive nearly every aspect of daily life, the Domain Name System (DNS) acts as the internet’s unsung hero. It serves as the bridge between humans and machines, effortlessly translating memorable domain names like www.thecyberexpress.com, the same website you’re reading this article on. First seen on thecyberexpress.com Jump…
-
Hexaware Partners with AccuKnox for Cloud Security Services
Menlo Park, USA, January 13th, 2026, CyberNewsWire AccuKnox has entered into a partnership with Hexaware Technologies to expand its Zero Trust cloud security platform into enterprise accounts managing hybrid and multi-cloud infrastructure. With rising complexity across hybrid, multi-cloud, and agentic-AI environments, organizations are prioritizing robust cloud security infrastructure that can scale. The AccuKnox and Hexaware partnership…
-
Threat Actors Exploit RMM Tools Through Weaponized PDF Files
Threat actors are exploiting legitimate Remote Monitoring and Management (RMM) tools as part of a sophisticated campaign distributing weaponized PDF files to unsuspecting users. AhnLab Security Intelligence Center (ASEC) recently uncovered multiple attack chains utilizing Syncro, SuperOps, NinjaOne, and ScreenConnect tools commonly used by managed service providers and IT teams for legitimate system administration. The…
-
CISA Flags Actively Exploited Gogs Vulnerability With No Patch
A high-severity security flaw in the Gogs Git service is being actively exploited, leading to remote code execution First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cisa-flags-exploited-gogs-flaw-no/
-
1980s Hacker Manifesto
Forty years ago, The Mentor”, Loyd Blankenship”, published “The Conscience of a Hacker” in Phrack. You bet your ass we’re all alike”¦ we’ve been spoon-fed baby food at school when we hungered for steak”¦ the bits of meat that you did let slip through were pre-chewed and tasteless. We’ve been dominated by sadists, or ignored…
-
Attackers Abuse Python, Cloudflare to Deliver AsyncRAT
The phishing campaign shows how attackers continue to weaponize legitimate cloud services and open source tools to evade detection and gain trust. First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/attackers-abuse-python-cloudflare-deliver-asyncrat
-
When the Marketing Graph Becomes the Target Map
Ad tech platforms likely know more about your executives than your security team does… and that information is available to anyone willing to pay for it. A recent investigation by Wired revealed that Google’s ad service hosted audience segments tied to highly sensitive groups, allowing marketers (and potential adversaries) to target mobile devices linked to..…

