Predator Spyware Sample Indicates ‘Vendor-Controlled’ C2

Researchers detailed how Intellexa, Predator’s owner, uses failed deployments and thwarted infections to strengthen its commercial spyware and generate more effective attacks.

darkreading – ​Read More

Anchorage police department takes servers offline after cyberattack on service provider

The police department said there “is no evidence indicating that APD systems have been compromised or that any APD data has been acquired by the threat actor.”

The Record from Recorded Future News – ​Read More

Your Bluetooth headphones could be vulnerable to attack – here’s what to do next

Google Fast Pair offers the convenience of one-click accessory pairing, but its improper implementation has created a new security risk. See if your device is patched yet.

Latest news – ​Read More

Elon Musk’s Grok ‘Undressing’ Problem Isn’t Fixed

X has placed more restrictions on Grok’s ability to generate explicit AI images, but tests show that the updates have created a patchwork of limitations that fail to fully address the issue.

Security Latest – ​Read More

How to get free high-speed Wi-Fi on your American Airlines flights – no subscription needed

AT&T has partnered with the airline to provide free high-speed Wi-Fi on more than 2 million flights a year.

Latest news – ​Read More

New StackWarp Attack Threatens Confidential VMs on AMD Processors

Researchers have disclosed technical details on a new AMD processor attack that allows remote code execution inside confidential VMs.

The post New StackWarp Attack Threatens Confidential VMs on AMD Processors appeared first on SecurityWeek.

SecurityWeek – ​Read More

Your Raspberry Pi 5 just got a big AI upgrade – thanks to this new add-on

The new $130 AI HAT+ 2 unlocks generative AI for the Raspberry Pi 5.

Latest news – ​Read More

GhostPoster Browser Malware Hid for 5 Years With 840,000 Installs

Researchers uncover a 5-year malware campaign using browser extensions on Chrome, Firefox and Edge, relying on hidden payloads and shared infrastructure.

Hackread – Cybersecurity News, Data Breaches, AI, and More – ​Read More

Researchers Reveal Reprompt Attack Allowing Single-Click Data Exfiltration From Microsoft Copilot

Cybersecurity researchers have disclosed details of a new attack method dubbed Reprompt that could allow bad actors to exfiltrate sensitive data from artificial intelligence (AI) chatbots like Microsoft Copilot in a single click, while bypassing enterprise security controls entirely.
“Only a single click on a legitimate Microsoft link is required to compromise victims,” Varonis security

The Hacker News – ​Read More

BreachLock Expands Adversarial Exposure Validation (AEV) to Web Applications

New York, United States, 15th January 2026, CyberNewsWire

Hackread – Cybersecurity News, Data Breaches, AI, and More – ​Read More