Garmin Quatix 8 Pro Launched With Satellite, LTE Connectivity and Marine Tools: Price, Features

Garmin Quatix 8 Pro nautical smartwatch has been launched with built-in inReach support, adding satellite and LTE communication for use on and off the water. The smart wearable supports two-way messaging, voice calls, SOS alerts, and marine controls without a smartphone. It features a 1.4-inch AMOLED display, sapphire glass, titanium elements, advanced boat mode, mult…

Continue Reading

Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware

Security experts have disclosed details of an active malware campaign that’s exploiting a DLL side-loading vulnerability in a legitimate binary associated with the open-source c-ares library to bypass security controls and deliver a wide range of commodity trojans and stealers. “Attackers achieve evasion by pairing a malicious libcares-2.dll with any signed version of the legitimate […]

Continue Reading

CERT-In Urges Android Users to Update Smartphones After Google Patches Critical Dolby Vulnerability

CERT-In (or the Indian Computer Emergency Response Team) issued a new advisory note (CIVN–2026-0016) on Wednesday, warning Android users about a vulnerability that could be exploited by bad actors to execute code and gain access to their devices remotely. The cybersecurity watchdog advised users to download the January 2026 Android security update, which patches the…

Continue Reading

Fortinet Fixes Critical FortiSIEM Flaw Allowing Unauthenticated Remote Code Execution

Jan 14, 2026Ravie LakshmananVulnerability / Patch Management Fortinet has released updates to fix a critical security flaw impacting FortiSIEM that could allow an unauthenticated attacker to achieve code execution on susceptible instances. The operating system (OS) injection vulnerability, tracked as CVE-2025-64155, is rated 9.4 out of 10.0 on the CVSS scoring system. “An improper neutralization […]

Continue Reading

New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification

Research analyzing 4,700 leading websites reveals that 64% of third-party applications now access sensitive data without business justification, up from 51% in 2024. Government sector malicious activity spiked from 2% to 12.9%, while 1 in 7 Education sites show active compromise. Specific offenders: Google Tag Manager (8% of violations), Shopify (5%), Facebook Pixel (4%). Download […]

Continue Reading

PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces

Jan 14, 2026Ravie LakshmananCyber Espionage / Threat Intelligence The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of new cyber attacks targeting its defense forces with malware known as PLUGGYAPE between October and December 2025. The activity has been attributed with medium confidence to a Russian hacking group tracked as Void Blizzard (aka […]

Continue Reading

Carl Pei Explains Why Your Next Smartphone Will Cost More; Also Teases Upcoming Storage Upgrades

Nothing appears to be gearing up for a price increase across its upcoming smartphone lineup. According to a company executive, this development aligns with broader smartphone industry trends, where rising memory component costs are said to be putting pressure on manufacturers’ margins, translating into higher retail prices for consumers. Nothing is also expected to …

Continue Reading

Critical Node.js Vulnerability Can Cause Server Crashes via async_hooks Stack Overflow

Jan 14, 2026Ravie LakshmananApplication Security / Vulnerability Node.js has released updates to fix what it described as a critical security issue impacting “virtually every production Node.js app” that, if successfully exploited, could trigger a denial-of-service (DoS) condition. “Node.js/V8 makes a best-effort attempt to recover from stack space exhaustion with a catchable error, which frameworks have […]

Continue Reading