2026-01-30
Schneier on Security
Friday Squid Blogging: New Squid Species Discovered
Microsoft Security
Case study: Securing AI application supply chains
Ars Technica Security
Web portal leaves kids' chats with AI toy open to anyone with Gmail account
Dark Reading
OpenClaw AI Runs Wild in Business Environments
Offensive Security
CVE-2026-24061 – GNU InetUtils telnetd Authentication Bypass Vulnerability
watchTowr Labs
Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 & CVE-2026-1340)
Schneier on Security
AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities
Trail of Bits
Celebrating our 2025 open-source contributions
2026-01-29
Microsoft Security
Turning threat reports into detection insights with AI
Amazon Security
How to get started with security response automation on AWS
Talos Intelligence
I'm locked in!
Ars Technica Security
County pays $600,000 to pentesters it arrested for assessing courthouse security
Microsoft Security
New Microsoft Data Security Index report explores secure AI adoption to protect sensitive data
Trail of Bits
Building cryptographic agility into Sigstore
Talos Intelligence
Dissecting UAT-8099: New persistence mechanisms and regional focus
Talos Intelligence
IR Trends Q4 2025: Exploitation remains dominant, phishing campaign targets Native American tribal organizations
TrustedSec
LDAP Channel Binding and LDAP Signing
Datadog HQ
Debug PostgreSQL query latency faster with EXPLAIN ANALYZE in Datadog Database Monitoring
Teleport Blog
Inside Teleport: Why Our People Love Working Here
2026-01-28
Malwr Analysis
Tycoon 2FA Campaign Abusing *.contractors Domains for Gmail and Microsoft 365 Credential Harvesting
Ars Technica Security
Site catering to online criminals has been seized by the FBI
ISC SANS
Odd WebLogic Request. Possible CVE-2026-21962 Exploit Attempt or AI Slop?, (Wed, Jan 28th)
Black Hills Info Sec
Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions
Palo Alto Networks
2026 Public Sector Cyber Outlook: Identity, AI and the Fight for Trust
Searchlight Cyber
January 28th – This Week’s Top Cybersecurity and Dark Web Stories
Datadog HQ
Datadog acquires Propolis
2026-01-27
Ars Technica Security
There's a rash of scam spam coming from a real Microsoft address
Dark Reading
Vibe-Coded 'Sicarii' Ransomware Can't Be Decrypted
Palo Alto Networks
Introducing Palo Alto Networks Quantum-Safe Security
Dark Reading
Microsoft Rushes Emergency Patch for Office Zero-Day
Black Lantern Security
Introducing CloudCheck: Comprehensive Cloud Provider Detection
Microsoft Security
Microsoft announces the 2026 Security Excellence Awards winners
Google Security Blog
New Android Theft Protection Feature Updates: Smarter, Stronger
Searchlight Cyber
Enriched Actor Profiles in Cerberus
Bad Privacy
Is TikTok Suddenly the Most Transparent App?
Meta Security
Rust at Scale: An Added Layer of Security for WhatsApp
Dark Reading
Hand CVE Over to the Private Sector
Schneier on Security
The Constitutionality of Geofence Warrants
Eye Security Research
From Helper to Adversary: The Dual-Use Risks of AI Canvases
Troy Hunt
Weekly Update 488
Elastic Security Labs
How Elastic Infosec Optimizes Defend for Cost and Performance
2026-01-26
Ars Technica Security
Why has Microsoft been routing example.com traffic to a company in Japan?
Amazon Security
IAM Identity Center now supports IPv6
The Citizen Lab
People’s Consultation on AI Now Accepting Submissions
Ars Technica Security
How to encrypt your PC's disk without giving the keys to Microsoft
Microsoft Security
Security strategies for safeguarding governmental data
The Citizen Lab
Perpetrators and Methods of Transnational Repression and Possible Counter Strategies
Schneier on Security
Ireland Proposes Giving Police New Digital Surveillance Powers
Malwarebytes
A week in security (January 19 – January 25)
Rosecurify
Gakido - CRLF Injection
Rosecurify
Seclog - #162