
Vulnerabilities
Critical Vulnerability in Schneider Electric EcoStruxure Process Expert: CISA Issues Urgent Advisory
1/22/2026

Security
Cloudflare's Security Edge: How Automated Protection Blocks Legitimate Users
1/22/2026

Vulnerabilities
Hackers Exploit 29 Zero-Days on Second Day of Pwn2Own Automotive
1/22/2026

Vulnerabilities
The VS Code Trust Dialog: A Vector for Malicious Code Execution
1/22/2026

Vulnerabilities
SmarterMail Auth Bypass Exploited in the Wild Two Days After Patch Release
1/22/2026

Security
Malicious PyPI Package Impersonates SymPy, Deploys XMRig Miner on Linux Hosts
1/22/2026

Security
Unofficial Windows 7 and Vista ISOs with All Updates Surface Online
1/22/2026

Vulnerabilities
Computer Scientists Issue Unified Warning: Internet Voting Remains Fundamentally Insecure
1/22/2026

Vulnerabilities
Critical Chainlit Vulnerabilities Expose Cloud Environments to Data Theft
1/22/2026

Vulnerabilities
Chainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs
1/21/2026

Regulation
UK Treasury Committee Demands AI Stress Testing for Financial Services as Accountability Gaps Threaten Systemic Risk
1/21/2026

Cybersecurity
AI-Generated Linux Malware VoidLink Targets Cloud Environments with 37 Plugins
1/21/2026

Security
ICE protesters are increasingly turning to data leaks, surveillance
1/21/2026