The most useful smart home gadgets I’ve seen at CES 2026

I’m back on the CES show floor, narrowing down the most compelling smart home devices I’ve spotted so far.

Latest news – ​Read More

Hacker Conversations: Katie Paxton-Fear Talks Autism, Morality and Hacking

From dismantling online games as a child to uncovering real-world vulnerabilities, Katie Paxton-Fear explains how autism, curiosity, and a rejection of ambiguity shaped her path into ethical hacking.

The post Hacker Conversations: Katie Paxton-Fear Talks Autism, Morality and Hacking appeared first on SecurityWeek.

SecurityWeek – ​Read More

Cyber Risk Trends for 2026: Building Resilience, Not Just Defenses

We can’t outpace the adversary by trying to stop every attack, but we can outlast them by engineering systems and culture to take a punch and try to quickly rebound.

The post Cyber Risk Trends for 2026: Building Resilience, Not Just Defenses appeared first on SecurityWeek.

SecurityWeek – ​Read More

Researchers Trap Scattered Lapsus$ Hunters in Honeypot

Using fake accounts and synthetic data to lure the hackers, the researchers gathered information on their servers.

The post Researchers Trap Scattered Lapsus$ Hunters in Honeypot appeared first on SecurityWeek.

SecurityWeek – ​Read More

These XR glasses gave me a 174-inch screen to work with – and a shockingly wide field of view

With a bright Sony micro-OLED display and 120Hz refresh rate, the Beast XR are Viture’s best glasses yet.

Latest news – ​Read More

Critical Dolby Vulnerability Patched in Android

The flaw is tracked as CVE-2025-54957 and its existence came to light in October 2025 after it was discovered by Google researchers.

The post Critical Dolby Vulnerability Patched in Android appeared first on SecurityWeek.

SecurityWeek – ​Read More

Fake Booking Emails Redirect Hotel Staff to Fake BSoD Pages Delivering DCRat

Source: Securonix
Cybersecurity researchers have disclosed details of a new campaign dubbed PHALT#BLYX that has leveraged ClickFix-style lures to display fixes for fake blue screen of death (BSoD) errors in attacks targeting the European hospitality sector.
The end goal of the multi-stage campaign is to deliver a remote access trojan known as DCRat, according to cybersecurity company Securonix.

The Hacker News – ​Read More

The 6 Linux distros I expect to rule 2026 – and why

Which Linux distributions will rise above the competition in 2026 to dethrone the old guard? These are my picks.

Latest news – ​Read More

Dozens of Major Data Breaches Linked to Single Threat Actor

The initial access broker (IAB) relies on credentials exfiltrated using information stealers to hack organizations.

The post Dozens of Major Data Breaches Linked to Single Threat Actor appeared first on SecurityWeek.

SecurityWeek – ​Read More

What is Identity Dark Matter?

The Invisible Half of the Identity Universe
Identity used to live in one place – an LDAP directory, an HR system, a single IAM portal.
Not anymore. Today, identity is fragmented across SaaS, on-prem, IaaS, PaaS, home-grown, and shadow applications. Each of these environments carries its own accounts, permissions, and authentication flows.
Traditional IAM and IGA tools govern only the nearly

The Hacker News – ​Read More