CVE-2025-55131: Node.js Memory Exposure Risk

Node.js patched a serious vulnerability (CVE-2025-5513) that could expose uninitialized memory and leak secrets like tokens or application data due to a race condition in the buffer allocation logic. This vulnerability affects the vm module with timeouts and is part of a broader coordinated security update across all active Node.js release lines.

CVE-2026-21962: Maximum-severity Vulnerability in Oracle HTTP Server/WebLogic Proxy Plug-In

On January 20, 2026, Oracle patched a maximum‑severity vulnerability in its Fusion Middleware suite affecting Oracle HTTP Server and the WebLogic Server Proxy Plug‑in, tracked as CVE‑2026‑21962. An unauthenticated remote threat actor can exploit this flaw to gain unauthorized creation, deletion, or modification access to critical data. The issue stems from improper handling of incoming requests by the WebLogic Server Proxy Plug‑ins for Apache HTTP Server and Microsoft IIS.

The Rise of DLL Side-Loading Cyber Attacks and Browser Data Theft

Content originally created and published by Venak Security. Cybercriminals are increasingly adopting stealthy and advanced techniques, notably Dynamic-Link Library (DLL) side-loading and browser memory scraping, to install malware that stealthily harvests users’ passwords, credit card data, cookies, session tokens and more. These attacks blend social engineering, search manipulation and memory-level exploitation to bypass traditional defenses and compromise victims at scale.

Smart Contract Hacks And Real World Blockchain Uses

Recent figures from a DeFi agency show hundreds of millions lost in a quarter, with a significant share linked to smart contract vulnerabilities. The conversation accepts serious security gaps in decentralised finance yet also notes blockchains improving land registries in corrupt environments, where public smart contracts help protect ownership records.

What's the first security tool your small business should buy?

Small business (SMB) cybersecurity has never been simple, but it’s become even more complex in recent years. Today’s businesses have to deal with an ever-growing number of apps and tools to secure, and this complexity is naturally going to be far harder for small teams to manage. Particularly for very small businesses.

How Protecto Delivers Format Preserving Masking to Support Generative AI

Generative AI systems are designed to work with real data that expects structure, rely on patterns, and infer meaning from formats, relationships, and consistency across inputs. While real data facilitates better outputs and advanced training, making these systems useful has a tradeoff – it carries privacy, security, and compliance risk. This puts business on a difficult conundrum – either you block sensitive data entirely and lose context, or accept the privacy risks of using real data.

As online fraud expands, here's how you can stay ahead

Globally, companies lost an average of 7.7% of their annual revenue to fraud, according to TransUnion’s 2025 Digital Identity Risk Accelerates Fraud Losses report. In the US, companies reported revenue losses of 9.8%, a 46% increase from the previous year. That’s hundreds of billions of dollars heading into the hands of fraudsters. And those stats don’t account for the loss of trust, hit to brand reputation, and time and resources spent on mitigating and resolving the fraud.

What is identity muling, and how can you prevent this new fraud vector?

An identity mule is someone who is compensated for sharing their identity. They may be asked for pictures of their identification documents and video selfies. Or, instructed to create an account and complete an identity verification flow before handing over the account’s credentials to a bad actor. The fraud cat-and-mouse game is taking a new turn. As organizations get better at detecting deepfakes, some bad actors are using real people’s identities to commit fraud.

Cyber Resilience in 2026: Why Supply Chains Are the New Front Line

"When cyber risk is treated as an internal problem, governments miss where most modern attacks actually begin: in their vendors, their service providers, digital dependencies that sit outside their direct control." SecurityScorecard's Head of Public Policy Michael Centrella shares his key takeaways and insights from the latest World Economic Forum’s Global Cybersecurity Outlook 2026 which states a simple, clear truth: cyber risk no longer lives inside the firewall.

7 AI Video Tools Security Teams Are Using for Training and Awareness Campaigns

Security awareness isn't just about policies and procedures anymore. Modern security teams know that engaging visual content dramatically improves message retention and behaviour change among employees. The challenge has always been production. Creating professional training videos and awareness content traditionally required budgets and expertise most security departments don't have. Static presentations and wall-of-text emails get ignored, but quality alternatives seemed out of reach.