Skip to content
Threat Note Threat Note

Aggregating Cyber Insights

  • Articles
  • Breaches
  • Learning
  • News
  • Podcast
  • Research
  • Toolkit
  • Vulnerabilities
  • Webinars
  • About Us

Articles

  • Home
  • Articles
From Schneier on Security – AI and the Corporate Capture of Knowledge
Posted inArticles

From Schneier on Security – AI and the Corporate Capture of Knowledge

 More than a decade after Aaron Swartz’s death, the United States is still living inside the contradiction that destroyed him. Swartz believed that knowledge, especially publicly funded knowledge, should be…
Posted by Samir K January 16, 2026
From Graham Cluley – WEF: AI overtakes ransomware as fastest-growing cyber risk
Posted inArticles

From Graham Cluley – WEF: AI overtakes ransomware as fastest-growing cyber risk

We can no longer say that artificial intelligence is a "future risk", lurking somewhere on a speculative threat horizon. The truth is that it is a fast-growing cybersecurity risk that…
Posted by Samir K January 15, 2026
From Graham Cluley – Smashing Security podcast #450: From Instagram panic to Grok gone wild
Posted inArticles

From Graham Cluley – Smashing Security podcast #450: From Instagram panic to Grok gone wild

Confusion reigns after claims that data linked to 17.5 million Instagram accounts is up for sale - sparked by a vague post, contradictory statements, and a flood of password reset…
Posted by Samir K January 15, 2026
From Schneier on Security – New Vulnerability in n8n
Posted inArticles

From Schneier on Security – New Vulnerability in n8n

 This isn’t good: We discovered a critical vulnerability (CVE-2026-21858, CVSS 10.0) in n8n that enables attackers to take over locally deployed instances, impacting an estimated 100,000 servers globally. No official…
Posted by Samir K January 15, 2026
From Schneier on Security – Hacking Wheelchairs over Bluetooth
Posted inArticles

From Schneier on Security – Hacking Wheelchairs over Bluetooth

 Researchers have demonstrated remotely controlling a wheelchair over Bluetooth. CISA has issued an advisory. CISA said the WHILL wheelchairs did not enforce authentication for Bluetooth connections, allowing an attacker who…
Posted by Samir K January 15, 2026
From Schneier on Security – Upcoming Speaking Engagements
Posted inArticles

From Schneier on Security – Upcoming Speaking Engagements

 This is a current list of where and when I am scheduled to speak: I’m speaking at the David R. Cheriton School of Computer Science in Waterloo, Ontario, Canada on…
Posted by Samir K January 14, 2026
From Krebs on Security – Patch Tuesday, January 2026 Edition
Posted inArticles

From Krebs on Security – Patch Tuesday, January 2026 Edition

Microsoft today issued patches to plug at least 113 security holes in its various Windows operating systems and supported software. Eight of the vulnerabilities earned Microsoft's most-dire "critical" rating, and…
Posted by Samir K January 14, 2026
From Graham Cluley – The AI Fix #83: ChatGPT Health, Victorian LLMs, and the biggest AI bluffers
Posted inArticles

From Graham Cluley – The AI Fix #83: ChatGPT Health, Victorian LLMs, and the biggest AI bluffers

In episode 83 of The AI Fix, Graham reveals he's taken up lying to LLMs, and shows how a journalist exposed AI bluffers with a made-up idiom. Meanwhile Mark invents…
Posted by Samir K January 13, 2026
From Schneier on Security – 1980s Hacker Manifesto
Posted inArticles

From Schneier on Security – 1980s Hacker Manifesto

 Forty years ago, The Mentor—Loyd Blankenship—published “The Conscience of a Hacker” in Phrack. You bet your ass we’re all alike… we’ve been spoon-fed baby food at school when we hungered…
Posted by Samir K January 13, 2026
From Graham Cluley – Hackers get hacked, as BreachForums database is leaked
Posted inArticles

From Graham Cluley – Hackers get hacked, as BreachForums database is leaked

Have you ever stolen data, traded a hacking tool, or just lurked on a dark web forum believing that you are anonymous? If so, I might have some unsettling news…
Posted by Samir K January 13, 2026
From Schneier on Security – Corrupting LLMs Through Weird Generalizations
Posted inArticles

From Schneier on Security – Corrupting LLMs Through Weird Generalizations

 Fascinating research: Weird Generalization and Inductive Backdoors: New Ways to Corrupt LLMs. AbstractLLMs are useful because they generalize so well. But can you have too much of a good thing?…
Posted by Samir K January 12, 2026
From Schneier on Security – Friday Squid Blogging: The Chinese Squid-Fishing Fleet off the Argentine Coast
Posted inArticles

From Schneier on Security – Friday Squid Blogging: The Chinese Squid-Fishing Fleet off the Argentine Coast

 The latest article on this topic. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation…
Posted by Samir K January 10, 2026
From Schneier on Security – Palo Alto Crosswalk Signals Had Default Passwords
Posted inArticles

From Schneier on Security – Palo Alto Crosswalk Signals Had Default Passwords

 Palo Alto’s crosswalk signals were hacked last year. Turns out the city never changed the default passwords. Read More    
Posted by Samir K January 9, 2026
From Graham Cluley – pcTattletale founder pleads guilty in rare stalkerware prosecution
Posted inArticles

From Graham Cluley – pcTattletale founder pleads guilty in rare stalkerware prosecution

The founder of a spyware company that encouraged customers to secretly monitor their romantic partners has pleaded guilty to federal charges - marking one of the few successful US prosecutions…
Posted by Samir K January 9, 2026
From Krebs on Security – Who Benefited from the Aisuru and Kimwolf Botnets?
Posted inArticles

From Krebs on Security – Who Benefited from the Aisuru and Kimwolf Botnets?

Our first story of 2026 revealed how a destructive new botnet called Kimwolf rapidly grew to infect more than two million devices by mass-compromising a vast number of unofficial Android…
Posted by Samir K January 9, 2026

Posts pagination

1 2 3 … 89 Next page

Latest Posts

  • From Cybersecurity Help – Critical Fortinet FortiSIEM flaw actively exploited in the wildJanuary 19, 2026
  • From Cyber Security News – Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop ConnectionsJanuary 18, 2026
  • From Cyber Security News – Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password HackingJanuary 18, 2026
  • From The Hacker News – Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red NoticeJanuary 17, 2026
  • From Cyber Security News – Let’s Encrypt has made 6-day IP-based TLS certificates Generally AvailableJanuary 17, 2026
Total Visitors
0965382

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • December 2022
  • November 2022
  • May 2022
Copyright 2026 — Threat Note. All rights reserved. Bloghash WordPress Theme
Scroll to Top