Category Spotlight

Security

The latest stories, reviews, and analysis curated by the CoreTechDaily editorial team.

CIOs Urged to Transition from Reactive Patching to Proactive Risk Management in Software Updates

CIOs Urged to Transition from Reactive Patching to Proactive Risk Management in Software Updates

Recent incidents highlight the dangers of reactive software updates. Experts advocate for CIOs to adopt proactive, risk-based approaches to software changes.

Jan 22, 2026

Hackers Hijack Zendesk Support Systems in Massive Spam Campaign

Hackers Hijack Zendesk Support Systems in Massive Spam Campaign

Cybercriminals exploit Zendesk's support platform to flood inboxes with spam emails, affecting major companies.

Jan 22, 2026

1Password Enhances Phishing Protection with New URL Detection Tool

1Password Enhances Phishing Protection with New URL Detection Tool

1Password introduces a built-in phishing protection feature to prevent users from entering credentials on malicious websites.

Jan 22, 2026

Fortinet's 2026 Cloud Security Report Highlights Growing Complexity and Security Challenges

Fortinet's 2026 Cloud Security Report Highlights Growing Complexity and Security Challenges

Fortinet's latest report reveals that as cloud adoption accelerates, organizations face significant security challenges due to increased complexity and fragmented defenses.

Jan 22, 2026

PcComponentes Addresses Credential Stuffing Attack, Assures Customer Data Security

PcComponentes Addresses Credential Stuffing Attack, Assures Customer Data Security

PcComponentes clarifies recent security incident, confirming no major data breach occurred.

Jan 22, 2026

Sophisticated LinkedIn Phishing Targets Executives with Fake Job Offers

Sophisticated LinkedIn Phishing Targets Executives with Fake Job Offers

A new phishing campaign on LinkedIn is targeting executives with fake job offers to steal credentials.

Jan 21, 2026

Critical Vulnerability in ACF Extended Plugin Exposes 50,000 WordPress Sites to Potential Takeover

Critical Vulnerability in ACF Extended Plugin Exposes 50,000 WordPress Sites to Potential Takeover

A severe flaw in the ACF Extended plugin allows unauthenticated users to gain administrative access, affecting approximately 50,000 WordPress sites.

Jan 21, 2026

VoidLink: AI-Generated Malware Developed in Just Seven Days

VoidLink: AI-Generated Malware Developed in Just Seven Days

VoidLink, a sophisticated Linux malware framework, was developed by a single individual using AI, reaching 88,000 lines of code in under a week.

Jan 21, 2026

Trump Administration Acknowledges DOGE's Misuse of Social Security Data

Trump Administration Acknowledges DOGE's Misuse of Social Security Data

The Department of Government Efficiency (DOGE), led by Elon Musk, improperly accessed and shared sensitive Social Security data, violating federal privacy laws.

Jan 21, 2026

Evolving Cyber Threats: Strategies for Defenders to Stay Ahead

Evolving Cyber Threats: Strategies for Defenders to Stay Ahead

As cyber attackers adopt stealthier tactics, defenders must evolve their strategies to detect and mitigate sophisticated threats.

Jan 21, 2026

North Korean Hackers Exploit Visual Studio Code in Contagious Interview Campaign

North Korean Hackers Exploit Visual Studio Code in Contagious Interview Campaign

North Korean hackers are leveraging Visual Studio Code to deploy malware in their Contagious Interview campaign targeting developers.

Jan 21, 2026

LastPass Alerts Users to New Phishing Campaign Targeting Master Passwords

LastPass Alerts Users to New Phishing Campaign Targeting Master Passwords

LastPass warns users of a phishing campaign aiming to steal master passwords through fake maintenance emails.

Jan 21, 2026