Category Spotlight

Pro

The latest stories, reviews, and analysis curated by the CoreTechDaily editorial team.

Subcategories

Evolving Cyber Threats: Strategies for Defenders to Stay Ahead

Evolving Cyber Threats: Strategies for Defenders to Stay Ahead

As cyber attackers adopt stealthier tactics, defenders must evolve their strategies to detect and mitigate sophisticated threats.

Jan 21, 2026

North Korean Hackers Exploit Visual Studio Code in Contagious Interview Campaign

North Korean Hackers Exploit Visual Studio Code in Contagious Interview Campaign

North Korean hackers are leveraging Visual Studio Code to deploy malware in their Contagious Interview campaign targeting developers.

Jan 21, 2026

LastPass Alerts Users to New Phishing Campaign Targeting Master Passwords

LastPass Alerts Users to New Phishing Campaign Targeting Master Passwords

LastPass warns users of a phishing campaign aiming to steal master passwords through fake maintenance emails.

Jan 21, 2026

UStrive Data Breach Exposes Personal Information of 238,000 Users, Including Children

UStrive Data Breach Exposes Personal Information of 238,000 Users, Including Children

UStrive, an online mentoring platform, has acknowledged a security lapse that exposed sensitive personal data of approximately 238,000 users, including minors.

Jan 21, 2026

EU Proposes Overhaul of Cybersecurity Act to Exclude High-Risk Foreign Entities

EU Proposes Overhaul of Cybersecurity Act to Exclude High-Risk Foreign Entities

The European Commission has proposed revisions to the Cybersecurity Act, aiming to enhance the EU's resilience against cyber threats by excluding high-risk foreign suppliers from critical infrastructure.

Jan 21, 2026

Google Gemini Vulnerability Allows Data Theft via Calendar Invites

Google Gemini Vulnerability Allows Data Theft via Calendar Invites

A newly discovered prompt injection vulnerability in Google Gemini enables hackers to exploit calendar invites for data theft, though the issue has been mitigated.

Jan 20, 2026

Beware of New ClickFix Attacks: Fake Chrome Extensions Crash Browsers to Install Malware

Beware of New ClickFix Attacks: Fake Chrome Extensions Crash Browsers to Install Malware

Learn how to protect yourself from the latest ClickFix variant that crashes browsers and installs malware.

Jan 20, 2026

Ransomware Group NightSpire Claims Data Breach at Hyatt, Offers Stolen Files for Sale

Ransomware Group NightSpire Claims Data Breach at Hyatt, Offers Stolen Files for Sale

NightSpire alleges it has stolen nearly 50GB of sensitive data from Hyatt, including employee credentials, raising concerns over potential phishing attacks.

Jan 20, 2026

Enhancing Cybersecurity: The Critical Need for Real Observability

Enhancing Cybersecurity: The Critical Need for Real Observability

To combat cyber threats effectively, organizations must prioritize deep observability to detect and respond to intrusions promptly.

Jan 20, 2026

Urgent Action Required: New Botnet Exploits HPE OneView Vulnerability

Urgent Action Required: New Botnet Exploits HPE OneView Vulnerability

Experts warn of a critical HPE OneView vulnerability being exploited by the RondoDox botnet, urging immediate patching.

Jan 20, 2026

Ingram Micro's Ransomware Attack Affects Over 42,000 Individuals

Ingram Micro's Ransomware Attack Affects Over 42,000 Individuals

Ingram Micro discloses a ransomware attack impacting 42,521 people, with SafePay claiming responsibility for the breach.

Jan 20, 2026

Ransomware Attack Exposes Confidential Files of Major Apple, Nvidia, and Tesla Supplier

Ransomware Attack Exposes Confidential Files of Major Apple, Nvidia, and Tesla Supplier

A significant ransomware attack has reportedly targeted Luxshare, a key supplier for Apple, Tesla, and Nvidia, risking the exposure of sensitive data.

Jan 20, 2026