Preview
Open Original

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Physical attacks on crypto holders – wrench assaults rising?
- Europeans quietly shift away from US tech services, share lists of local alternatives
- [Platforms restrict access to 4.7 million under-16 accounts across Australia](https://www.esafety.gov.au/newsroom/media-releases/platforms-restrict-access-to-47-…

Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy!
For the less technical
- Physical attacks on crypto holders – wrench assaults rising?
- Europeans quietly shift away from US tech services, share lists of local alternatives
- Platforms restrict access to 4.7 million under-16 accounts across Australia
- Italy fines Cloudflare €14 million for refusing to block pirate sites on public 1.1.1.1 DNS
- Ilya Lichtenstein, Bitcoin hacker behind massive crypto theft, credits Trump for early prison release
- Record $17 billion estimated stolen in crypto scams and fraud in 2025 as impersonation tactics and AI enablement surge
For the more technical
- January 2026 Patch Tuesday: 114 CVEs patched including 3 zero-days
- Multiple Cisco products Snort 3 Distributed Computing Environment/Remote Procedure Call vulnerabilities
- CVE-2025-64155: Three years of remotely rooting the Fortinet FortiSIEM
- Hackers now exploiting critical Fortinet FortiSIEM flaw in attacks
- Reprompt: The single-click Microsoft Copilot attack that silently steals your personal data
- The unfriending truth: How to spot a Facebook phishing scam before it’s too late
- Hidden Telegram proxy links can reveal your IP address in one click
- A broken system fueling botnets
- Free converter software – convert any system from clean to infected in seconds
- How real software downloads can hide remote backdoors
- RMM tools (Syncro, SuperOps, NinjaOne, etc.) being distributed disguised as video files
- Unveiling VoidLink – a stealthy, cloud-native Linux malware framework
- Inside RedVDS: How a single virtual desktop provider fueled worldwide cybercriminal operations
- New Magecart network: Disrupting online shoppers worldwide
- Shadow#Reactor – text-only staging, .NET Reactor, and in-memory Remcos RAT deployment
- Predator’s kill switch: undocumented anti-analysis techniques in iOS spyware
- CastleLoader analysis: A deep dive into stealthy loader targeting government sector
- German manufacturing under phishing attacks: Tracking a stealthy AsyncRAT campaign
- Sicarii ransomware: Truth vs myth
- LotusLite: Targeted espionage leveraging geopolitical themes
- The Knownsec leak: Yet another leak of China’s contractor-driven cyber-espionage ecosystem
- UAT-8837 targets critical infrastructure sectors in North America
- COMmand & evade: Turla’s Kazuar v3 loader
Did you enjoy this list? You can subscribe to one of our feeds on Twitter, Facebook or RSS.