Live Feeds
-

UMMC ransomware attack forces closure of 35 Mississippi clinics
UMMC ransomware attack: University of Mississippi Medical Center closed all 35 statewide clinics after a ransomware infection took information systems offline, forcing cancellations of appointments and non‑urgent care.
-

Critical BeyondTrust Remote Support flaw abused by ransomware gangs
BeyondTrust Remote Support vulnerability CVE-2026-1731 is under active exploitation by ransomware operators, CISA confirms. The flaw allows pre-auth command execution and has been used to stage web shells and exfiltrate data.
-

Critical Ivanti Vulnerability Exploited Since Last Summer in Attacks
Critical Ivanti EPMM vulnerability actively exploited since last summer.
-

Critical RCE in Grandstream GXP1600 VoIP phones enables silent eavesdropping (CVE-2026-2329)
Grandstream GXP1600 vulnerability (CVE-2026-2329): critical unauthenticated RCE affecting GXP1600 series; Rapid7 provides PoC and vendor patch 1.0.7.81 is available—apply immediately.
-

Amnesty finds Predator spyware on Angolan journalist’s iPhone
Predator spyware: Amnesty’s Security Lab confirms a 2024 infection of an Angolan journalist’s iPhone, documenting data access and repeated re-infection attempts. The report links the incident to known exploitation chains and highlights the human-rights risks of unregulated surveillance technology.
-

Belgian hospital restores systems a month after ransomware attack
AZ Monica ransomware recovery: Systems at AZ Monica are largely restored a month after a ransomware attack; the hospital says no ransom was paid and there are no confirmed indications of data exfiltration.
-

AI Weaponization: State Hackers Using Google Gemini for Espionage and Malware Generation
What Happened Google’s Threat Intelligence Group (GTIG) has confirmed that multiple state-sponsored hacking groups are actively using its Gemini large language model (LLM) to enhance their cyber espionage and attack capabilities. The activity spans reconnaissance, social engineering, vulnerability analysis, and the dynamic generation of malicious code. North Korean (UNC2970/Lazarus Group), Chinese (Mustang Panda, APT31, APT41),…
-

D-Knife Spyware: China-Linked APT Hijacks Routers for Cyber Espionage
Unveiling the D-Knife spyware campaign, a sophisticated China-linked APT operation hijacking internet routers for persistent surveillance and data exfiltration. Discover its techni
-

Iran Revolution 2026: Reza Pahlavi Calls for Nightly Nationwide Protests from January 17–19 at 8 PM
A new message issued by Reza Pahlavi directly challenges claims that conditions inside Iran have returned to normal, calling such narratives a deliberate attempt by the Islamic Republic to deceive the world and buy time. In his statement, Pahlavi says there is “a sea of blood” between the Iranian people and what he describes as…
-

SİPER-1 air and missile defense system: Turkey’s new Steel Dome milestone
Turkey completes SİPER-1 air and missile defense system test, confirming operational readiness for national deployment and marking a milestone in indigenous layered air defense.