Cisco 0-Day RCE Secure Email Gateway Vulnerability Exploited in the Wild
Cisco has confirmed active exploitation of a critical zero-day remote code execution vulnerability in its Secure Email Gateway and Secure
Google Rolls Out Long-Awaited @gmail.com Email Change Featurefor Users
Google is gradually rolling out the ability to change the @gmail.com email address associated with a Google Account to a
China-Linked APT Exploited Sitecore Zero-Day in Critical Infrastructure Intrusions
Ravie LakshmananJan 16, 2026Zero-Day / Cyber Espionage A threat actor likely aligned with China has been observed targeting critical infrastructure
Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways
Jan 16, 2026Ravie LakshmananVulnerability / Web Security Cisco on Thursday released security updates for a maximum-severity security flaw impacting Cisco
Google now lets you change your @gmail.com address, rolling out
Google has confirmed that it’s now possible to change your @gmail.com address. This means that if your current email is
Gootloader now uses 1,000-part ZIP archives for stealthy delivery
The Gootloader malware, typically used for initial access, is now using a malformed ZIP archive designed to evade detection by
Hackers Abusing Legitimate Cloud and CDN Platforms to Host Phishing Kits
Threat actors are increasingly using trusted cloud and content delivery network platforms to host phishing kits, creating major detection challenges
AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks
A critical misconfiguration in Amazon Web Services (AWS) CodeBuild could have allowed complete takeover of the cloud service provider’s own
Cloudflare Acquires Human Native to Strengthen AI Data Security
Cloudflare, the San Francisco-based cybersecurity and internet infrastructure giant, has acquired Human Native, a UK-based AI data marketplace. The deal
Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access
Jan 15, 2026Ravie LakshmananWeb Security /Vulnerability A maximum-severity security flaw in a WordPress plugin called Modular DS has come under
Researchers Reveal Reprompt Attack Allowing Single-Click Data Exfiltration From Microsoft Copilot
Ravie LakshmananJan 15, 2026Prompt Injection / Enterprise Security Cybersecurity researchers have disclosed details of a new attack method dubbed Reprompt
How to automate just-in-time access to applications with Tines
Whether it’s logging into email, provisioning a virtual machine, or accessing a CRM platform, Identity and Access Management (IAM) is