Hacker pleads guilty to hacking Supreme Court, AmeriCorps, and VA Systems Security An actor who goes online with the alias @ihackthegovernment posted… rooter January 19, 2026 2 min read 0
GootLoader uses malformed ZIP files to bypass security controls Security GootLoader malware uses malformed ZIP files made of hundreds of… rooter January 18, 2026 4 min read 0
Security Affairs newsletter Round 559 by Pierluigi Paganini – INTERNATIONAL EDITION Security A new round of the weekly Security Affairs newsletter has… rooter January 18, 2026 3 min read 0
Weekly Update 487 Security Presently sponsored by: Report URI: Guarding you from rogue JavaScript!… rooter January 18, 2026 1 min read 0
Ukraine–Germany operation targets Black Basta, Russian leader wanted Security Police in Ukraine and Germany identified Black Basta suspects and… rooter January 17, 2026 3 min read 0
South African Seniors are Prime Target for Cyber Attacks Security Threat actors are well-aware of the fact that many older… rooter January 17, 2026 1 min read 0
Data breach at Canada’s Investment Watchdog Canadian Investment Regulatory Organization impacts 750,000 people Security A data breach at Canada’s investment watchdog, Canadian Investment Regulatory… rooter January 16, 2026 2 min read 0
AI and the Corporate Capture of Knowledge Security More than a decade after Aaron Swartz’s death, the United… rooter January 16, 2026 5 min read 0
How Compromised Code Signing Keys Lead to Real-World Malware Incidents Security Code signing exists because modern operating systems cannot treat every… rooter January 16, 2026 1 min read 0
Actively exploited critical flaw in Modular DS WordPress plugin enables admin takeover Security A critical Modular DS WordPress flaw (CVE-2026-23550) is actively exploited,… rooter January 16, 2026 3 min read 0