IT software company Ivanti released patches for its Endpoint Manager Mobile (EPMM) product to fix two new remote code execution vulnerabilities already…
Date Archives January 2026
Startup Amutable plotting Linux security overhaul to counter hacking threats
If there’s one thing guaranteed to grab attention in the computer security world, it’s announcing yourself without fully explaining what it is…
Identity Management and Information Security News for the Week of January 30th: MIND, Abstract Security, Descope, and More
The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week…
NIS2: Lieferketten als Risikofaktor
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?quality=50&strip=all 2500w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=444%2C250&quality=50&strip=all 444w”…
Hugging Face infra abused to spread Android RAT in a large-scale malware campaign
An Android malware campaign is reportedly abusing Hugging Face’s public hosting infrastructure to distribute a remote access trojan (RAT). The operation relies…
Human risk management: CISOs’ solution to the security awareness training paradox
Cybersecurity guru Bruce Scheier is often quoted as saying, “People are the weakest link in the security chain.” No more accurate words…
Roughly half of employees are using unsanctioned AI tools, and enterprise leaders are major culprits
Shadow AI, the secret, unapproved use of AI by employees, isn’t going away. In fact, workers are getting more brazen, and their…
ShinyHunters ramp up new vishing campaign with 100s in crosshairs
Notorious extortion group ShinyHunters released tens of GB of files it claims to have stolen from dating apps Hinge, Match, OkCupid and…
Identitäten im Fokus von Cyberkriminellen
Cyberkriminelle haben es inzwischen vermehrt auf digitale Identitäten abgesehen. khunkornStudio – shutterstock.com Der State of Incident Response Report 2026 von Eye Security…
Critical RCE bugs expose the n8n automation platform to host‑level compromise
Two critical sandbox escape flaws in the popular n8n workflow automation platform are allowing authenticated users to achieve remote code execution on…