
Microsoft Disrupts RedVDS Cybercrime Platform
The takedown marks a significant blow to the cybercrime-as-a-service ecosystem, which fuels large-scale, automated fraud.

The takedown marks a significant blow to the cybercrime-as-a-service ecosystem, which fuels large-scale, automated fraud.
January 14, 2026 | 3 min read

From their roles as the driving forces behind pioneering web appsec firm WhiteHat Security to building out enterprise security programs to breaking large portions of the web, Jeremiah Grossman and Robert Hansen have unique viewpoints on what works and what doesn’t.
January 13, 2026 | 1 min read

Active since at least 2022, UAT-7290 demonstrates a significant capacity for conducting deep-seated espionage while simultaneously functioning as an initial access group.
January 9, 2026 | 2 min read
Microsoft Disrupts RedVDS Cybercrime Platform
January 14, 2026 | 3 min read
‘We Fail a Lot’: How Two Security Pioneers Keep Innovating
January 13, 2026 | 1 min read
A New Chinese APT Takes the Stage
January 9, 2026 | 2 min read
January 13, 2026 | 1 min read
January 9, 2026 | 0 min read
From their roles as the driving forces behind pioneering web appsec firm WhiteHat Security to building out enterprise security programs to breaking large portions of the web, Jeremiah Grossman and Robert Hansen have unique viewpoints on what works and what doesn’t.
Read More ‘We Fail a Lot’: How Two Security Pioneers Keep Innovating
Active since at least 2022, UAT-7290 demonstrates a significant capacity for conducting deep-seated espionage while simultaneously functioning as an initial access group.
After a peak of more than 430,000 attack sessions in late December, daily volumes targeting React2Shell have stabilized in the 300,000 to 400,000 range.
IBM published updates for the affected versions of API Connect on Jan. 2., and urged organizations to update affected versions as soon as possible.
Read More IBM Warns of Critical Auth Bypass Bug in API Connect
MongoDB disclosed the vulnerability (CVE-2025-14847) on Dec. 19 and a few days later, a public exploit for it appeared online.
Read More Serious MongoDB Flaw CVE-2025-14847 Under Exploitation
There may not be any computers in Home Alone, but few movie characters embody the old-school hacker ethos like Kevin McCallister does.
Read More Is Kevin McCallister the Greatest Hacker in Movie History?