View as Webpage

Cyber Security Review Newsletter
Cyber Security Review Banner - new

15 January 2026 | Issue 257

TOP NEWS

DeadLock Ransomware: Smart Contracts for Malicious Purposes

 

Microsoft disrupts global cybercrime subscription service responsible for millions in fraud losses

 

Phishing scammers are posting fake “account restricted” comments on LinkedIn

 

US cargo tech company publicly exposed its shipping systems and customer data to the web

 

Online shoppers at risk as Magecart skimming hits major payment networks

 

Patch Tuesday – January 2026

 

Secure connectivity principles for Operational Technology (OT)

 

China: Authorities tell domestic companies to stop using US and Israeli cybersecurity software

 

Hackers claim to have Target source code for sale following recent cyberattack

 

Man to plead guilty to hacking US Supreme Court filing system

 

Analyzing a Multi-Stage AsyncRAT Campaign via Managed Detection and Response

 

New Zealand: Second health provider, Canopy Health, hit in major cyber attack

 

UK government exempting itself from flagship cyber law inspires little confidence

 

Europol: 34 arrests in Spain during action against the ‘Black Axe’ criminal organisation

‘ZombieAgent’ zero click vulnerability allows for silent account takeover

 

CVE-2026-21858: Maximum-severity n8n flaw lets randos run your automation server

 

North Korean Kimsuky Actors Leverage Malicious QR Codes in Spearphishing Campaigns Targeting U.S. Entities

 

Patch Cisco ISE bug now before attackers abuse proof-of-concept exploit

 

Internet collapses in Iran amid protests over economic crisis

 

CISA warns of active attacks on HPE OneView and legacy PowerPoint

 

Illinois health department exposed over 700,000 residents’ personal data for years

 

Fake WinRAR downloads hide malware behind a real installer

 

One million customers on alert as extortion group claims massive Brightspeed data haul

 

UK unveiled new cyber action plan to tackle threats and strengthen public services

 

Hackers use ‘Blue Screen of Death’ malware to target victims

 

Hacktivist deletes white supremacist websites live onstage during hacker conference

 

2025 was a terrible year for the ‘Four Families’ accused of running global cyber scam operations

 

US cyber attacks plunged Caracas into darkness

 

Cybercrook claims to be selling infrastructure info about three major US utilities

Business continuity isn’t keeping pace with cyber threats



Cognizant hit with multiple US class-action lawsuits after TriZetto data breach

 

US removes 3 spyware-linked executives from sanctions list

 

European Space Agency confirms data breach

 

U.S. DOJ: Two Americans Plead Guilty to Targeting Multiple U.S. Victims Using ALPHV BlackCat Ransomware

 

The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor

 

CVE-2025-14847: Critical Memory Leak in MongoDB Allowing Attackers to Extract Sensitive Data

 

Meet the team that investigates when journalists and activists get hacked with government spyware

 

South Korea: Shinhan Card reports massive data breaches

 

Threat landscape for industrial automation systems in Q3 2025

 

Hackers stole over $2.7B in crypto in 2025, data shows

 

Nissan says Red Hat breach affected thousands of customers

 

US insurance giant Aflac says hackers stole personal and health data of 22.6 million people

 

From cheats to exploits: Webrat spreading via GitHub

 

France’s postal and banking services disrupted by suspected DDoS attack

 

Evasive Panda APT poisons DNS requests to deliver MgBot

MAIN TOPICS

ADVANCED PERSISTENT THREAT


ARTIFICIAL INTELLIGENCE


CRITICAL INFRASTRUCTURE PROTECTION


CYBERCRIME


DDoS


MALWARE


NETWORK SECURITY

ARTICLES

A BEGINNER’S ROADMAP: HOW TO START YOUR AI SOC AGENT IMPLEMENTATION

By Kirsten Doyle

HOW TO MAXIMIZE EXCHANGE SERVER UPTIME? - SOME BEST PRACTICES

KEY METRICS TO TRACK WHEN IMPLEMENTING AI IN YOUR SOC

By Josh Breaker-Rolfe

CALL FOR PAPERS


Cyber Security Review editorial team invites government departments, intergovernmental organisations, researchers, academics and industry experts to contribute their articles, case studies and white papers for publication. For more information visit: www.cybersecurity-review.com/editorial

Enquiries, abstracts and articles should be submitted to: editorial@deltabusinessmedia.com

 

*Fees apply for publication of articles submitted by commercial and for-profit organisations. All articles are subject to editor's approval.

ADVERTISE WITH US



Reach 1000's of Cyber Security professionals, decision makers and stakeholders worldwide by sharing your content and advertising on our website and e-newsletter. For more information please visit website or email us.

EVENTS

For more information please contact:  

Cyber Security Review Team

Tel: +44 (0) 20 3627 1985 

marcom@cybersecurity-review.com

X

www.cybersecurity-review.com

© 2014-2026 Cyber Security Review. Powered by Delta Business Media. All Rights Reserved.