Beyond the Device: Exploring the New Security Risks of Interconnected IoT at CES 2026
Attending CES over the last several years has provided me with a valuable opportunity to observe how rapidly IoT technology continues to evolve across...
Europol Leads Global Crackdown on Black Axe Cybercrime Gang, 34 Arrested
Europol-backed operation targets group behind numerous BEC attacks and romance scams - Read more
Ni8mare: Kritische n8n-Lücke bedroht 100.000 Server
srcset="https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2695413081.jpg?quality=50&strip=all 6000w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2695413081.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2695413081.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2695413081.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2695413081.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2695413081.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2695413081.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2695413081.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2695413081.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2695413081.jpg?resize=640%2C360&quality=50&strip=all...
World Economic Forum: Deepfake Face-Swapping Tools Are Creating Critical Security Risks
Researchers at the World Economic Forum have shown that threat actors can use commercial deepfake tools to bypass corporate security protections - Read...
Data Security Firm Cyera Raises $400M, Hits $9B Valuation
This represents a 50% jump from its $6 billion valuation achieved seven months ago, signaling investor confidence in AI security solutions.
The post Data Security...
From promise to proof: making AI security adoption tangible
The Security Think Tank considers what CISOs and buyers need to know to cut through the noise around AI and figure out which AI...
Chromium: CVE-2026-0628 Insufficient policy enforcement in WebView tag
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see (https://chromereleases.googleblog.com/2024 ) for more information. -...
Computer Misuse Act reform is overdue – not all anniversaries should be celebrated
Let's not have any further anniversaries for the UK's outdated cyber security laws - the government has dragged its heels for too long and...
n8n Unauthenticated Remote Code Execution
What is the Vulnerability? CVE-2026-21858 arises from a Content-Type confusion flaw...






