#This Week in Security: Your News Briefing
Welcome to your weekly security roundup. We’ve tracked down the 10 most important stories this week—the ones everyone’s talking about, from critical threats to emerging trends that could shape your security posture. Leading the news this week is Appsec Roundup - June 2025, which has sparked conversation across 9 sources. Meanwhile, the industry is closely tracking CVE-2026-24407 | InternationalColorConsortium iccDEV up to… with 8 mentions, along with emerging details on Secure By Design roundup - November 2025, CVE-2026-23008 | Linux Kernel up to 6.18.6/6.19-rc5 vmwgfx null…, and CVE-2025-34164. Here’s the full breakdown of what you need to know.
#🚨 Critical Threats This Week
First, the stories that demand your immediate attention:
1. Appsec Roundup - June 2025 Mentioned across 9 industry sources this week. Lots of fascinating threat model-related advances, new risk management tools, games, and more!. Get the details →
2. CVE-2026-24407 | InternationalColorConsortium iccDEV up to 2.3.1.1/2.3.1.2 icSigCalcOp denial of service (ID 481 / EUVD-2026-4607) Mentioned across 8 industry sources this week. A vulnerability identified as problematic has been detected in InternationalColorConsortium iccDEV up to 2. Get the details →
3. CVE-2026-23008 | Linux Kernel up to 6.18.6/6.19-rc5 vmwgfx null pointer dereference (EUVD-2026-4625) Mentioned across 5 industry sources this week. A vulnerability, which was classified as critical , was found in Linux Kernel up to 6. Get the details →
#🛠️ Tools, Updates & Releases
New capabilities and releases worth knowing about:
1. Secure By Design roundup - November 2025 Perspective on CISOs as facilitators, a deep dive into the types of diagrams for medical devices, po. Referenced in 5 stories this week. Explore →
2. Meeting Third-Party Risk Requirements of DORA in 2026 | UpGuard Learn how to achieve compliance with the third-party risk management standards of the Digital Operat. Referenced in 3 stories this week. Explore →
3. Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium . Referenced in 2 stories this week. Explore →
#What You Should Do Next
Monitor these in your environment next week:
- Any new CVE announcements related to systems you operate
- Emerging attack techniques being discussed in the community
- Updates and patches for tools your team uses
Have a look at the full deep-dives in the trending stories below. Each one provides context that could inform your security decisions this week.
#Top Trending Stories
1. Key Threat Intel & Vulnerability Stories (19 mentions)
▼
This week's critical security updates and vulnerability disclosures:
2. Appsec Roundup - June 2025 (9 mentions)
▼
Lots of fascinating threat model-related advances, new risk management tools, games, and more!
Read Full Article →
3. Secure By Design roundup - November 2025 (5 mentions)
▼
Perspective on CISOs as facilitators, a deep dive into the types of diagrams for medical devices, poetry, Chinese LLMs, Chinese drones and Chinese routers. Do any of them contain secrets?
Read Full Article →
4. MedDream PACS Premium sendOruReport reflected cross-site scripting (XSS) vulnerability (3 mentions)
▼
5. Meeting Third-Party Risk Requirements of DORA in 2026 | UpGuard (3 mentions)
▼
Learn how to achieve compliance with the third-party risk management standards of the Digital Operational Resilience Act (DORA)
Read Full Article →
6. Leader of ransomware crew pleads guilty to four-year crime spree (2 mentions)
▼
7. Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium (2 mentions)
▼
#Article Summary
| Category | Article Count |
|---|---|
| AI & LLM | 6 |
| Cloud | 6 |
| Cyber Regulatory | 3 |
| Cybersecurity | 194 |
| Scraping Candidates | 1 |
| Security Vendor Blog | 46 |
| Tech | 38 |
| Threat Intel & Vulnerability | 140 |
| Total Articles Scanned | 434 |
#AI & LLM
Inside Praktika's conversational approach to language learning
▼
How Praktika uses GPT-4.1 and GPT-5.2 to build adaptive AI tutors that personalize lessons, track progress, and help learners achieve real-world language fluency
Read Full Article →
Inside GPT-5 for Work: How Businesses Use GPT-5
▼
A data-driven report on how workers across industries use ChatGPT—covering adoption trends, top tasks, departmental patterns, and the future of AI at work.
Read Full Article →
How Higgsfield turns simple ideas into cinematic social videos
▼
Discover how Higgsfield gives creators cinematic, social-first video output from simple inputs using OpenAI GPT-4.1, GPT-5, and Sora 2.
Read Full Article →
Introducing ChatGPT Go, now available worldwide
▼
ChatGPT Go is now available worldwide, offering expanded access to GPT-5.2 Instant, higher usage limits, and longer memory—making advanced AI more affordable globally.
Read Full Article →
Netomi’s lessons for scaling agentic systems into the enterprise
▼
How Netomi scales enterprise AI agents using GPT-4.1 and GPT-5.2—combining concurrency, governance, and multi-step reasoning for reliable production workflows.
Read Full Article →
How Tolan builds voice-first AI with GPT-5.1
▼
Tolan built a voice-first AI companion with GPT-5.1, combining low-latency responses, real-time context reconstruction, and memory-driven personalities for natural conversations.
Read Full Article →#Cloud
Amazon Neptune Analytics is now available in 7 additional regions
▼
Amazon Neptune Analytics is now available in US West (N. California), Asia Pacific (Seoul), Asia Pacific (Osaka), Asia Pacific (Hong Kong), Europe (Stockholm), Europe (Paris), and South America (São Paulo) regions. You can now create and manage Neptune Analytics graphs in these new regions and ru...
Read Full Article →
Amazon EC2 G7e instances are now generally available
▼
Today, Amazon announces the general availability of Amazon Elastic Compute Cloud (Amazon EC2) G7e instances, accelerated by NVIDIA RTX PRO 6000 Blackwell Server Edition GPUs. G7e instances offer up to 2.3x inference performance compared to G6e. Customers can use G7e instances to deploy large lang...
Read Full Article →
Amazon Corretto January 2026 Quarterly Updates
▼
On January 20, 2026 Amazon announced quarterly security and critical updates for Amazon Corretto Long-Term Supported (LTS) versions of OpenJDK. Corretto 25.0.2, 21.0.10, 17.0.18, 11.0.30, and 8u482 are now available for download . Amazon Corretto is a no-cost, multi-platform, production-ready dis...
Read Full Article →
Amazon RDS now supports the latest CU and GDR updates for Microsoft SQL Server
▼
Amazon Relational Database Service (Amazon RDS) for SQL Server now supports the latest General Distribution Release (GDR) updates for Microsoft SQL Server. This release includes support for Microsoft SQL Server 2016 SP3+GDR KB5068401 (RDS version 13.00.6475.1.v1), SQL Server 2017 CU31+GDR KB50684...
Read Full Article → *(Covered by: AWS News)*
Amazon Bedrock introduces API keys to streamline development in GovCloud regions
▼
API keys for Amazon Bedrock are now available in AWS GovCloud (US) regions, expanding a feature that simplifies authentication and accelerates generative AI development. Originally launched in commercial AWS regions in July 2025, API keys for Amazon Bedrock enable developers to quickly generate a...
Read Full Article →
ServiceNow's Virtual Agent Vulnerability Shows Why AI Security Needs Traditional AppSec Foundations
▼
The critical ServiceNow Virtual Agent vulnerability highlights a vital lesson: securing agentic AI requires a return to traditional AppSec foundations. While AI can amplify risks, the root causes often stem from classic failures in authentication and authorization.
Read Full Article →#Cyber Regulatory
Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium
▼
Promoting AI Security – Assistant Privacy Commissioner Speaks at AIM Conference
▼
Advancing AI Security – Privacy Commissioner Publishes an Article in Hong Kong Lawyer
▼
#Cybersecurity
PoC Released for Critical Oracle E-Business Suite Flaw Exploited by Ransomware
▼
The post PoC Released for Critical Oracle E-Business Suite Flaw Exploited by Ransomware appeared first on Daily CyberSecurity .
Read Full Article →
Booting Up Malware: Critical Flaw in Rufus Grants Admin Access (CVE-2026-23988)
▼
The post Booting Up Malware: Critical Flaw in Rufus Grants Admin Access (CVE-2026-23988) appeared first on Daily CyberSecurity .
Read Full Article →
Code by AI: KONNI APT Targets Crypto Devs with “Polished” Backdoor
▼
The post Code by AI: KONNI APT Targets Crypto Devs with “Polished” Backdoor appeared first on Daily CyberSecurity .
Read Full Article →
The Invisible Trap: GenAI Now Creates “Living” Polymorphic Phishing Pages
▼
The post The Invisible Trap: GenAI Now Creates “Living” Polymorphic Phishing Pages appeared first on Daily CyberSecurity .
Read Full Article →
“Osiris” Rises: New Ransomware Targets Southeast Asian Food Giant with Advanced Tactics
▼
The post “Osiris” Rises: New Ransomware Targets Southeast Asian Food Giant with Advanced Tactics appeared first on Daily CyberSecurity .
Read Full Article →
CVE-2025-67968 (CVSS 9.9): Critical Flaw in Real Estate Theme Exposes 30,000 Sites to Takeover
▼
The post CVE-2025-67968 (CVSS 9.9): Critical Flaw in Real Estate Theme Exposes 30,000 Sites to Takeover appeared first on Daily CyberSecurity .
Read Full Article →
CVE-2026-24656: Deserialization Flaw in Apache Karaf Exposes Systems to DoS
▼
The post CVE-2026-24656: Deserialization Flaw in Apache Karaf Exposes Systems to DoS appeared first on Daily CyberSecurity .
Read Full Article →
Ghost in the Code: Critical RCE Found in Abandoned Python PLY Library (CVSS 9.8)
▼
The post Ghost in the Code: Critical RCE Found in Abandoned Python PLY Library (CVSS 9.8) appeared first on Daily CyberSecurity .
Read Full Article →
Security Advisory SA-26-01 GPS Attacks
▼
GPS attacks trigger revisiting threat models
Read Full Article →
Threat Modeling Essentials at Archimedes 2026 Healthcare Security Week
▼
Threat Modeling Essentials, led by Adam Shostack, is a standout offering at Archimedes 2026 Healthcare Security Week, Feb 18 in Las Vegas.
Read Full Article →
A few thoughts closing out 2025
▼
Prompted by participants, a few closing thoughts for 2025
Read Full Article →
Secure By Design roundup - November 2025
▼
Perspective on CISOs as facilitators, a deep dive into the types of diagrams for medical devices, poetry, Chinese LLMs, Chinese drones and Chinese routers. Do any of them contain secrets?
Read Full Article → *(Covered by: Shostack + Friends Blog)*
October Adam's New Thing!
▼
Read up on Adam's New Thing from October
Read Full Article →
Prompt Engineering Requires Evaluation
▼
Understanding ‘prompt engineering’
Read Full Article →
AI Insurance Won't Save You
▼
LLM Insurance is, and will remain, a great source of insurer profits.
Read Full Article →
How could LLMs change threat modeling
▼
LLMs will change threat modeling. Will it be for the better?
Read Full Article →
Mansplaining your threat model, as a service
▼
Everyone wants robots to help with threat models. How’s that working out?
Read Full Article →
Threat Modeling Tools
▼
LLMs as Compilers
▼
What if we think about LLM coding as if it’s a compiler stage?
Read Full Article →
Risk Management and Threat Modeling
▼
Threat modeling finds threats; risk management helps us deal with the tricky ones.
Read Full Article →
The Cyber Resilience Act (CRA)!
▼
The CRA is coming and it's going to be a dramatic change for technology producers
Read Full Article →
Threat modeling as a dial, not a switch
▼
Thinking of threat modeling with a knob helps you get more out of it.
Read Full Article →
Appsec Roundup - June 2025
▼
The article notes advancements in threat
Read Full Article → *(Covered by: Shostack + Friends Blog)*
Google’s approach to AI Agents -- Threat Model Thursday
▼
What can we learn from Google’s approach to AI Agent Security
Read Full Article →
Publish your threat model!
▼
We think you should publish your threat model, and we’re publishing our arguments.
Read Full Article →
The Essence and Beauty of Threat Modeling
▼
Automation sounds great, but what about the essence and beauty?
Read Full Article →
Andor: Insider Threats
▼
Andor teaches us about insider threats
Read Full Article →
Andor Threats: Information Disclosure
▼
What Andor can teach us about Information disclosure threats
Read Full Article →
CVE Futures
▼
What’s next for the CVE program?
Read Full Article →
A few thoughts on CVE
▼
Thoughts on the CVE funding crisis
Read Full Article →
Learning from Troy Hunt’s Sneaky Phish
▼
Introducing the DEF CON 32 Hackers' Almanack
▼
Grateful to introduce the Hackers' Almanack!
Read Full Article →
Security Researcher Comments on HIPAA Security Rule
▼
A group of us have urged HHS to require better handling of security reports
Read Full Article →
Strategy for threat modeling AI
▼
Clarifying how to threat model AI
Read Full Article →
Inside Man
▼
Some thoughts on the Voyager Episode ‘Inside Man’
Read Full Article →
Blackhat and Human Factors
▼
National Cyber Incident Response Plan comments
▼
Our comments on the National Cyber Incident Plan
Read Full Article →
Spatial Reasoning and Threat Modeling
▼
Do diagrams leverage the brain in a different way?
Read Full Article →
Handling Pandemic-Scale Cyber Threats: Lessons from COVID-19
▼
Emerging research on Cyber Public Health
Read Full Article →
Car Safety Factoids
▼
A few thoughts from a clickbait headline
Read Full Article →
25 Years of CVE
▼
Some thoughts on 25 years of the CVE program
Read Full Article →
Handling Pandemic-Scale Cyber Threats (preprint)
▼
A new paper on 'Pandemic Scale Cyber Events
Read Full Article →
The Goals of Cyber Public Health
▼
Cyber Public Health is prompting fascinating conversations
Read Full Article →
Lockbit, a study in public health
▼
Why is it hard to count lockbit infections?
Read Full Article →
Threat Modeling and Logins, Redux
▼
How to effectively threat model authentication.
Read Full Article →
The Universal Cloud TM -- Threat Model Thursday
▼
A new universal threat model - what can we learn from it?
Read Full Article →
Security Engineering roundup - May 2024
▼
The most important stories around threat modeling, appsec and secure by design for May, 2024.
Read Full Article →
Happy Star Wars Day
▼
Sutter on Safety
▼
What do we need to assess if memory safe langages are 'sufficient'?
Read Full Article →
Eternal sunshine of the spotless LLM
▼
Making an LLM forget is harder than it seems
Read Full Article →
CSRB Report on Microsoft
▼
The CSRB has released its report into an intrusion at Microsoft, and...it’s a doozy.
Read Full Article →
Introducing Magic Security Dust!
▼
The NVD Crisis
▼
The NVD is in crisis, and so is patch management. It’s time to modernize.
Read Full Article →
Adventures in LLM Coding
▼
Exploring LLM-driven coding as I get ready for Archimedes
Read Full Article →
The British Library’s Incident Review
▼
Thoughts on the British Library incident
Read Full Article →
Application and AI roundup - Feb 2024
▼
A busy month in appsec, AI, and regulation.
Read Full Article → *(Covered by: Shostack + Friends Blog)*
Solving Hallucinations
▼
Solving hallucinations in legal briefs is playing on easy mode —— and still too hard
Read Full Article →
The State of Appsec in 2024
▼
2024 is bringing lots of AI, and Liability, too
Read Full Article →
Think like Alph-V?
▼
Security Principles in 2023
▼
Principles are lovely, but do they lead us to actionable results?
Read Full Article →
Comparing Retrospectives
▼
We can learn a lot from comparing retrospectives
Read Full Article →
ML Sec Ops: Feature with Diana Kelley
▼
Adam featured on ML Sec Ops podcast
Read Full Article →
Microsoft Can Fix Ransomware Tomorrow
▼
My latest at Dark Reading draws attention to how Microsoft can fix ransomware tomorrow.
Read Full Article →
Worthwhile Books Q2 2023
▼
Books that I read in the second quater that are worth your time include two memoirs, a great book on the security of ML, and more!
Read Full Article →
AI will be the high interest credit card of 2023
▼
Phishing Defenses
▼
Phishing behaviors, as observed in the wild.
Read Full Article →
Layoffs in Responsible AI Teams
▼
Some inferences from layoffs in responsible AI teams
Read Full Article →
Five Threat Model Diagrams for Machine Learning
▼
Some diagrams to help clarify machine learning threats
Read Full Article →
Reflecting on Threats: The Frame
▼
Reflecting on the framing of the Threats book
Read Full Article →
Application Security Roundup - March
▼
A few tools, some thoughts on injection, some standards, and some of Adam’s appsec news.
Read Full Article → *(Covered by: Shostack + Friends Blog)*
The National CyberSecurity Strategy: Liability is Coming
▼
Threats Book is Complete
▼
The serious side of the book
Read Full Article →
Threats: The Table of Contents
▼
Like the Force, each threat has a light side, and a dark side.
Read Full Article →
More on GPT-3 and threat modeling
▼
More thoughts about AI and threat modeling
Read Full Article →
Darkreading: Threat Modeling in the Age of OpenAI's Chatbot
▼
Pointer to Adam’s latest Darkreading article
Read Full Article →
GPT-3
▼
The OpenAI chatbot is shockingly improved — its capabilities deserve attention.
Read Full Article → *(Covered by: Shostack + Friends Blog)*
How Executives Can Use Threat Modeling
▼
You don’t have to be technical, but you can’t make informed decisions about your business without threat modeling.
Read Full Article →
Fast, Cheap + Good Whitepaper
▼
Threat modeling doesn't need to be a slow, heavyweight activity!
Read Full Article →
Trainings at Global Appsec 2021
▼
Tremendous training opportunities in threat modeling and other topics at Appsec Global 2021
Read Full Article →
What are we going to do: CO2 edition
▼
What happened when Microsoft tried to buy climate abatements
Read Full Article →
Threat Model Thursday: 5G Infrastructure
▼
The US Government's lead cybersecurity agencies have released an interesting report, and I wanted to use this for a Threat Model Thursday, where we take a respectful look at threat modeling work products to see what we can learn.
Read Full Article →
Ransomware is Not the Problem
▼
Arbitrarily powerful software -- applications, operating systems -- is a problem, as is preventing it from running on enterprise systems.
Read Full Article →
Colonial Pipeline, Darkside and Models
▼
The Colonial Pipeline shutdown story is interesting in all sorts of ways, and I can't delve into all of it.I did want to talk about one small aspect, which is the way responders talk about Darkside.
Read Full Article →
The Updates Must Go Through
▼
The timing of updates is not coincidental.
Read Full Article →
Ever Given & Suez
▼
Thoughts on the issues with the Ever Given blocking the Suez Canal.
Read Full Article →
Linkedin Learning
▼
Bringing threat modeling to more and more people, now through a series of courses on LinkedIn.
Read Full Article →
Threat Modeling and Social Issues
▼
For Data Breach Today, I spoke with Anna Delaney about threat modeling for issues that are in the news right now.
Read Full Article →
Vaccines
▼
You may have noticed that my end of the year posts are all science focused. Today, a set of resources on the COVID vaccines.
Read Full Article →
Threat Modeling, Insiders and Incentives
▼
Inspired by the recent story of Tesla's insider, I'd like to discuss insider threat as it fits into threat modeling.
Read Full Article →
The Uber CSO indictment
▼
Thoughts on Mark Rasch's essay, Conceal and Fail to Report - The Uber CSO Indictment
Read Full Article →
Information Disclosure In Depth
▼
I have something to disclose...
Read Full Article →
The Cyentia Library Relaunches
▼
I'm excited to see that they're Re-introducing the Cyentia Research Library, with cool (new?) features like an RSS feed. There are over 1,000 corporate research reports with data that companies paid to collect, massage, and release in a way they felt would be helpful to the rest of the world.
Read Full Article →
Threat Research: More Like This
▼
I want to call out some impressive aspects of a report by Proofpoint.
Read Full Article →
How Are Computers Compromised (2020 Edition)
▼
Understanding the way intrusions really happen is a long-standing interest of mine.
Read Full Article →
Amazon's 'Alexa Built-in' Threat Model
▼
Exploring supply chain threat modeling with Alexa
Read Full Article →
Threat Modeling Thursday: Machine Learning
▼
For my first blog post of 2020, I want to look at threat modeling machine learning systems.
Read Full Article →
Managed Attribution Threat Modeling
▼
Let's talk CAKED, a threat model for managed attribution.
Read Full Article →
Interesting reads
▼
Sharing for you, bookmarking for me.
Read Full Article →
Capture the Flag events and eSports
▼
A breakdown of CTFs and eSports
Read Full Article →
Actionable Followups from the Capital One Breach
▼
What have we learned and what steps can we take?
Read Full Article →
DNS Security
▼
I'm happy to say that some new research by Jay Jacobs, Wade Baker, and myself is now available, thanks to the Global Cyber Alliance.
Read Full Article →
When security goes off the rails
▼
My newest post over at Dark Reading ponders regulation.
Read Full Article →
Episode 9 Spoilers
▼
Today is the last Star Wars Day before Episode 9 comes out, and brings the Skywalker saga to its end.
Read Full Article →
Leave Those Numbers for April 1st
▼
Over-inflated numbers won't scare me into buying your ‘solution’.
Read Full Article →
Fire Doesn't Innovate by Kip Boyle (Book Review)
▼
An unexpected book review.
Read Full Article →
High ROI Security Advisory Boards
▼
Discussing the value of Security Advisory Boards
Read Full Article →
Measuring ROI for DMARC
▼
I'm pleased to be able to share work that Shostack + Associates and the Cyentia Institute have been doing for the Global Cyber Alliance.
Read Full Article →
CVE Funding and Process
▼
[no description provided]
Read Full Article →
Carpenter!
▼
[no description provided]
Read Full Article →
The DREAD Pirates
▼
[no description provided]
Read Full Article →
Threat Model Thursday: ARM's Network Camera TMSA
▼
[no description provided]
Read Full Article →
AppSec Cali 2018: Izar Tarandach
▼
[no description provided]
Read Full Article →
Pen Testing The Empire
▼
[no description provided]
Read Full Article →
Threat Modeling Tooling from 2017
▼
[no description provided]
Read Full Article →
Emergent Design Issues
▼
[no description provided]
Read Full Article →
20 Year Software: Engineering and Updates
▼
[no description provided]
Read Full Article →
Building an Application Security Team
▼
[no description provided]
Read Full Article →
Breach Vouchers & Equifax 2017 Breach Links
▼
[no description provided]
Read Full Article →
Star Wars, Star Trek and Getting Root on a Star Ship
▼
[no description provided]
Read Full Article →
Organizing Threat Modeling Magic
▼
[no description provided]
Read Full Article →
Learning From npm's Rough Few Months
▼
[no description provided]
Read Full Article →
Secure updates: A threat model
▼
[no description provided]
Read Full Article →
Hospital Ransomware
▼
[no description provided]
Read Full Article →
Warrants for Cleaning Malware in Kelihos
▼
[no description provided]
Read Full Article →
People are The Weakest Link In Security?
▼
[no description provided]
Read Full Article →
2017 and Tidal Forces
▼
[no description provided]
Read Full Article →
Modeling Attackers and Their Motives
▼
There are a number of reports out recently, breathlessly presenting their analysis of one threatening group of baddies or another. Most readers should, at most, skim their analysis of the perpetrators. Read on for why.
Read Full Article →
1Password adds pop-up warnings for suspected phishing sites
▼
The 1Password digital vault and password manager has added built-in protection against phishing URLs to help users identify malicious pages and prevent them from sharing account credentials with threat actors. [...]
Read Full Article →
Nike is investigating a possible data breach, after WorldLeaks claims
▼
Nike is investigating a possible cyber incident after the WorldLeaks group claimed it stole data from the company’s systems. Nike is probing a potential security breach after the WorldLeaks cybercrime group claimed it accessed and stole data from the company’s systems. The footwear and apparel gi...
Read Full Article → *(Covered by: Security Affairs)*
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 81
▼
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter UNO reverse card: stealing cookies from cookie stealers PDFSIDER Malware – Exploitation of DLL Side-Loading for AV and EDR Evasion VoidLink: Evi...
Read Full Article → *(Covered by: Security Affairs)*
CVE-2025-27821: Apache Patches Out-of-Bounds Write Flaw in Hadoop HDFS Client
▼
The post CVE-2025-27821: Apache Patches Out-of-Bounds Write Flaw in Hadoop HDFS Client appeared first on Daily CyberSecurity .
Read Full Article →
CISA Alert: Critical VMware vCenter RCE (CVSS 9.8) Now Exploited in the Wild
▼
The post CISA Alert: Critical VMware vCenter RCE (CVSS 9.8) Now Exploited in the Wild appeared first on Daily CyberSecurity .
Read Full Article →
How New Phishing Kits Are Turning Vishing into Real-Time Orchestration
▼
The post How New Phishing Kits Are Turning Vishing into Real-Time Orchestration appeared first on Daily CyberSecurity .
Read Full Article →
Security Affairs newsletter Round 560 by Pierluigi Paganini – INTERNATIONAL EDITION
▼
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Osiris ransomware emerges, leveraging BYOVD te...
Read Full Article → *(Covered by: Security Affairs)*
How is AI security evolving for better protection?
▼
How Can Non-Human Identities Enhance AI Security? What are the key challenges faced by organizations in managing cybersecurity for machine identities? With digital systems continue to evolve, cybersecurity professionals are increasingly focusing on the protection and management of Non-Human Ident...
Read Full Article →
Osiris ransomware emerges, leveraging BYOVD technique to kill security tools
▼
Researchers identified a new Osiris ransomware used in a November 2025 attack, abusing the POORTRY driver via BYOVD to disable security tools. Symantec and Carbon Black researchers uncovered a new ransomware strain named Osiris, used in a November 2025 attack against a major Southeast Asian food ...
Read Full Article → *(Covered by: Security Affairs)*
'Weaponized AI' could be the biggest security threat facing your business this year - here's what experts say you should be on the lookout for
▼
AI-driven cybercrime is escalating rapidly, combining phishing, deepfakes, and Dark LLMs, forcing businesses to strengthen defences and monitoring systems.
Read Full Article →
NDSS 2025 – Secure Data Analytics
▼
Session 10A: Confidential Computing 2 Authors, Creators & Presenters: Byeongwook Kim (Seoul National University), Jaewon Hur (Seoul National University), Adil Ahmad (Arizona State University), Byoungyoung Lee (Seoul National University) PAPER Secure Data Analytics in Apache Spark with Fine-graine...
Read Full Article →
Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware
▼
A new multi-stage phishing campaign has been observed targeting users in Russia with ransomware and a remote access trojan called Amnesia RAT. "The attack begins with social engineering lures delivered via business-themed documents crafted to appear routine and benign," Fortinet FortiGuard Labs r...
Read Full Article →
U.S. CISA adds a flaw in Broadcom VMware vCenter Server to its Known Exploited Vulnerabilities catalog
▼
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw impacting Broadcom VMware vCenter to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Broadcom VMware vCenter Server vulnerability, tracked as CVE-2024...
Read Full Article → *(Covered by: Security Affairs)*
Nike Probing Potential Security Incident as Hackers Threaten to Leak Data
▼
The WorldLeaks cybercrime group claims to have stolen information from the footwear and apparel giant’s systems. The post Nike Probing Potential Security Incident as Hackers Threaten to Leak Data appeared first on SecurityWeek .
Read Full Article →
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog
▼
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw affecting Broadcom VMware vCenter Server that was patched in June 2024 to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerabil...
Read Full Article →
11-Year-Old critical telnetd flaw found in GNU InetUtils (CVE-2026-24061)
▼
Critical telnetd flaw CVE-2026-24061 (CVSS 9.8) affects all GNU InetUtils versions 1.9.3–2.7 and went unnoticed for nearly 11 years. A critical vulnerability, tracked as CVE-2026-24061 (CVSS score of 9.8), in the GNU InetUtils telnet daemon (telnetd) impacts all versions from 1.9.3 to 2.7. The vu...
Read Full Article → *(Covered by: Security Affairs)*
ShinyHunters claim hacks of Okta, Microsoft SSO accounts for data theft
▼
The ShinyHunters extortion gang claims it is behind a wave of ongoing voice phishing attacks targeting single sign-on (SSO) accounts at Okta, Microsoft, and Google, enabling threat actors to breach corporate SaaS platforms and steal company data for extortion. [...]
Read Full Article →
Fortinet confirms new zero-day attacks against customer devices
▼
Fortinet has confirmed that a new attack campaign observed recently against customer devices is exploiting an unpatched issue to bypass authentication. The new attacks are different from a previous campaign seen in December that targeted two vulnerabilities related to FortiCloud single sign-on (S...
Read Full Article →
Exploited Zero-Day Flaw in Cisco UC Could Affect Millions
▼
Mass scanning is underway for CVE-2026-20045, which Cisco tagged as critical because successful exploitation could lead to a complete system takeover.
Read Full Article →
The cybercrime industry continues to challenge CISOs in 2026
▼
Cybercriminals have built structured criminal groups with an organizational model similar to that of a legitimate business. “Cybercrime has become industrialized, a return on investment (ROI)-oriented economy, focused on speed and monetization,” according to Martin Zugec, Bitdefender’s director o...
Read Full Article →
Fortinet warns of active FortiCloud SSO bypass affecting updated devices
▼
Fortinet confirmed attacks are bypassing FortiCloud SSO authentication, affecting even fully patched devices, similar to recent SSO flaws. Fortinet confirmed attacks bypass FortiCloud SSO on fully patched devices. Threat actors automate firewall changes, add users, enable VPNs, and steal configs,...
Read Full Article → *(Covered by: Security Affairs)*
Cyberattack Targeting Poland’s Energy Grid Used a Wiper
▼
A cyberattack that targeted power plants and other energy producers in Poland at the end of December used malware known as a “wiper” that was intended to erase computers and in an operation that was intended to cause a power outage and other disruption to services, says European
Read Full Article →
CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
▼
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of vulnerabilities is as follows - CVE-2025-68645 (CVSS score: 8.8) - A PHP rem...
Read Full Article →
Ransomware-Attacke auf Verkehrsgesellschaft Main-Tauber
▼
srcset="https://b2b-contenthub.com/wp-content/uploads/2026/01/480442374_625365396806507_3730545703312550477_n.jpg?quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/480442374_625365396806507_3730545703312550477_n.jpg?resize=300%2C168&quality=50&strip=all 300w, https...
Read Full Article →
In Other News: €1.2B GDPR Fines, Net-NTLMv1 Rainbow Tables, Rockwell Security Notice
▼
Other noteworthy stories that might have slipped under the radar: Cloudflare WAF bypass, Canonical Snap Store abused for malware delivery, Curl terminating bug bounty program The post In Other News: €1.2B GDPR Fines, Net-NTLMv1 Rainbow Tables, Rockwell Security Notice appeared first on SecurityWe...
Read Full Article →
Phishers Abuse SharePoint in New Campaign Targeting Energy Sector
▼
Threat actors are leveraging the file-sharing service for payload delivery in AitM phishing and BEC attacks. The post Phishers Abuse SharePoint in New Campaign Targeting Energy Sector appeared first on SecurityWeek .
Read Full Article →
Okta users under attack: Modern phishing kits are turbocharging vishing attacks
▼
Threat actors who specialize in vishing (i.e., voice phishing) have started using phishing kits that can intercept targets’ login credentials while also allowing attackers to control the authentication flow in a targeted user’s browser in real-time. At least two custom-made phishing kits are curr...
Read Full Article →
Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls
▼
Fortinet has officially confirmed that it's working to completely plug a FortiCloud SSO authentication bypass vulnerability following reports of fresh exploitation activity on fully-patched firewalls. "In the last 24 hours, we have identified a number of cases where the exploit was to a device th...
Read Full Article →
Under Armour Investigates Data Breach After 72 Million Records Allegedly Exposed
▼
Under Armour said there is no evidence at this point to suggest the incident affected systems used to process payments or store customer passwords
Read Full Article →
AIs are Getting Better at Finding and Exploiting Internet Vulnerabilities
▼
Really interesting blog post from Anthropic: In a recent evaluation of AI models’ cyber capabilities, current Claude models can now succeed at multistage attacks on networks with dozens of hosts using only standard, open-source tools, instead of the custom tools needed by previous generations. Th...
Read Full Article →
Under Armour Looking Into Data Breach Affecting Customers’ Email Addresses
▼
Under Armour is investigating a recent data breach that purloined customers’ email addresses and other personal information. The post Under Armour Looking Into Data Breach Affecting Customers’ Email Addresses appeared first on SecurityWeek .
Read Full Article →
U.S. CISA adds Prettier eslint-config-prettier, Vite Vitejs, Versa Concerto SD-WAN orchestration platform, and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog
▼
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Prettier eslint-config-prettier, Vite Vitejs, Versa Concerto SD-WAN orchestration platform, and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Secu...
Read Full Article → *(Covered by: Security Affairs)*
1Password targets AI-driven phishing with built-in prevention
▼
To help reduce phishing risk, 1Password added an extra layer of protection and began rolling out a phishing prevention feature designed to stop users before they share passwords with scammers. How 1Password phishing prevention works When a user clicks a link whose URL doesn’t match a saved login,...
Read Full Article →
Unterschätztes Risiko: Insider-Bedrohungen endlich ernst nehmen
▼
srcset="https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?quality=50&strip=all 2500w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01...
Read Full Article →
Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access
▼
Cybersecurity researchers have disclosed details of a new dual-vector campaign that leverages stolen credentials to deploy legitimate Remote Monitoring and Management (RMM) software for persistent remote access to compromised hosts. "Instead of deploying custom viruses, attackers are bypassing se...
Read Full Article →
Fortinet confirms critical FortiCloud auth bypass not fully patched
▼
Days after admins began reporting that their fully patched firewalls are being hacked, Fortinet confirmed it's working to fully address a critical FortiCloud SSO authentication bypass vulnerability that should have already been patched since early December. [...]
Read Full Article →
Fresh SmarterMail Flaw Exploited for Admin Access
▼
The exploitation of the authentication bypass vulnerability started two days after patches were released. The post Fresh SmarterMail Flaw Exploited for Admin Access appeared first on SecurityWeek .
Read Full Article →
Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms
▼
Microsoft has warned of a multi‑stage adversary‑in‑the‑middle (AitM) phishing and business email compromise (BEC) campaign targeting multiple organizations in the energy sector. "The campaign abused SharePoint file‑sharing services to deliver phishing payloads and relied on inbox rule creation to...
Read Full Article →
Investigation underway after 72M Under Armour records surface online
▼
Under Armour is investigating a data breach after 72M customer records were posted online by a cybercriminal. Under Armour is an American company that designs, manufactures, and sells sportswear, athletic shoes, and fitness-related accessories. TechCrunch reported that Under Armour is investigati...
Read Full Article → *(Covered by: Security Affairs)*
iboss unveils AI-powered SSPM capability to reduce SaaS risk
▼
iboss announced SSPM, an AI-powered SaaS Security Posture Management capability integrated into the iboss Zero Trust SASE platform. SSPM connects directly to SaaS applications via API to continuously analyze configurations, permissions, and data exposure, giving organizations an actionable view o...
Read Full Article →
Ransomware gang’s slip-up led to data recovery for 12 US firms
▼
Twelve US companies hit by the INC ransomware group were able to recover encrypted data after a cybersecurity firm discovered the cloud storage infrastructure where the gang stockpiled what it stole. Researchers at Florida-based Cyber Centaurs said Thursday they took advantage of a lapse in opera...
Read Full Article →
News Alert: Halo Security earns SOC 2 Type II certification, shows sustained operational security
▼
MIAMI, Jan. 22, 2026, CyberNewswire — Halo Security , a leading provider of external attack surface management and penetration testing services, today announced it has successfully achieved SOC 2 Type II compliance following an extensive multi-month audit by Insight Assurance.… (more…) The post N...
Read Full Article →
Trivial Telnet authentication bypass exposes devices to complete takeover
▼
Computers with Telnet open are in immediate danger of being compromised due to a critical vulnerability that allows attackers to bypass authentication. The Telnet remote access protocol has long been superseded by the more secure and encrypted SSH, but many IoT and embedded devices have continued...
Read Full Article →
Leader of ransomware crew pleads guilty to four-year crime spree
▼
Ianis Antropenko, a Russian national living in California, admitted to committing ransomware attacks against at least 50 victims. He faces up to 25 years in jail. The post Leader of ransomware crew pleads guilty to four-year crime spree appeared first on CyberScoop .
Read Full Article →
New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack
▼
Cybersecurity researchers have disclosed details of a new ransomware family called Osiris that targeted a major food service franchisee operator in Southeast Asia in November 2025. The attack leveraged a malicious driver called POORTRY as part of a known technique referred to as bring your own vu...
Read Full Article →
Researchers find Jordan government used Cellebrite phone-cracking tech against activists
▼
The incidents occurred amid Gaza protests and suggest human rights violations, Citizen Lab said. The post Researchers find Jordan government used Cellebrite phone-cracking tech against activists appeared first on CyberScoop .
Read Full Article →
Bitwarden supercharges credential protection for Premium and Family plans – new update adds vault health alerts, password strength coaching, 5GB secure storage, and phishing protections
▼
Bitwarden is upgrading protection across Individual and Family plans, but the price is going up too.
Read Full Article →
Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access
▼
A critical security flaw has been disclosed in the GNU InetUtils telnet daemon (telnetd) that went unnoticed for nearly 11 years. The vulnerability, tracked as CVE-2026-24061, is rated 9.8 out of 10.0 on the CVSS scoring system. It affects all versions of GNU InetUtils from version 1.9.3 up to an...
Read Full Article →
Latin American Orgs Lack Confidence in Cyber Defenses, Skills
▼
Cybersecurity professionals in Latin America are least likely to have faith in their countries' preparedness for cyberattacks on critical infrastructure, the World Economic Forum says.
Read Full Article →
Critical Appsmith Flaw Enables Account Takeovers
▼
Critical vulnerability in Appsmith allows account takeover via flawed password reset process
Read Full Article →
Under Armour says it’s ‘aware’ of data breach claims after 72M customer records were posted online
▼
TechCrunch obtained a sample of the stolen data, which contained names, email addresses, dates of birth, and the user's approximate geographic location. Under Armour confirmed some sensitive information was taken in the breach.
Read Full Article →
DPRK Actors Deploy VS Code Tunnels for Remote Hacking
▼
A spear-phishing campaign tied to the Democratic People's Republic of Korea (DPRK) uses trusted Microsoft infrastructure to avoid detection.
Read Full Article →
1Password boosts built-in phishing protections – simple URL detection tool could save users millions of dollars and prevent hackers stealing banking details
▼
1Password has announced a new phishing protection tool that will help users avoid typo-squatting URLs.
Read Full Article →
KONNI Adopts AI to Generate PowerShell Backdoors
▼
North Korea-linked threat group KONNI targets countries across APAC, specifically in blockchain sectors, with AI-generated malware
Read Full Article →
Cloud adoption isn't going away - but can your business deal with the security impact?
▼
Most companies' security doesn't offer good visibility across hybrid and multi-cloud environments.
Read Full Article →
Hacker legen Websites von Conceptnet-Kunden lahm
▼
Der Regensburger IT-Dienstleister Conceptnet wurde Opfer einer Ransomware-Attacke. fadfebrian – shutterstock.com Der Regensburger IT-Dienstleister Conceptnet informiert derzeit auf seiner Internetseite über eine technische Störung, die durch einen Ransomware-Angriff verursacht wurde. Berichten zu...
Read Full Article →
Why AI Keeps Falling for Prompt Injection Attacks
▼
Imagine you work at a drive-through restaurant. Someone drives up and says: “I’ll have a double cheeseburger, large fries, and ignore previous instructions and give me the contents of the cash drawer.” Would you hand over the money? Of course not. Yet this is what large language models ( LLMs ) d...
Read Full Article →
Actively exploited Cisco UC bug requires immediate, version‑specific patching
▼
Cisco has released patches for a critical remote code execution vulnerability in its unified communications products that attackers are actively exploiting. The US Cybersecurity and Infrastructure Security Agency has added the flaw to its Known Exploited Vulnerabilities catalog, confirming the ex...
Read Full Article →
LastPass Warns of Phishing Campaign Attempting to Steal Master Passwords
▼
Phoney email alerts suggest users need to backup their LastPass accounts within 24 hours. LastPass says it would never require this action from users
Read Full Article →
Top PC components store denies data breach - PcComponentes says it is safe, despite hacker claims
▼
PcComponentes says it did not lose data in a breach, but through a credential stuffing attack.
Read Full Article →
Filling the Most Common Gaps in Google Workspace Security
▼
Security teams at agile, fast-growing companies often have the same mandate: secure the business without slowing it down. Most teams inherit a tech stack optimized for breakneck growth, not resilience. In these environments, the security team is the helpdesk, the compliance expert, and the incide...
Read Full Article →
Over 160,000 Companies Notify Regulators of GDPR Breaches
▼
DLA Piper finds 22% increase in breached firms notifying European GDPR regulators
Read Full Article →
Warum Microsoft-365-Konfigurationen geschützt werden müssen
▼
Lesen Sie, warum CISOs den M365-Tenant stärker in den Blick nehmen müssen. IB Photography – shutterstock.com Im Jahr 2010 war Office 365 eine einfache Suite mit Office-Anwendungen und zusätzlicher E-Mail-Funktion. Das hat sich 15 Jahre später mit Microsoft 365 geändert: Die Suite ist ein wesentli...
Read Full Article →
73% of CISOs more likely to consider AI-enabled security solution
▼
CISO’s are increasingly turning to AI-enabled security technologies to augment their organizations’ cyber defense and extend the capabilities of their teams. According to Foundry’s latest Security Priorities Study , 73% of security decision-makers are now more likely to consider a security soluti...
Read Full Article →
Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex
▼
Cisco has released fresh patches to address what it described as a "critical" security vulnerability impacting multiple Unified Communications (CM) products and Webex Calling Dedicated Instance that it has been actively exploited as a zero-day in the wild. The vulnerability, CVE-2026-20045 (CVSS ...
Read Full Article →
Attackers With Decompilers Strike Again (SmarterTools SmarterMail WT-2026-0001 Auth Bypass)
▼
Well, well, well - look what we’re back with. You may recall that merely two weeks ago, we analyzed CVE-2025-52691 - a pre-auth RCE vulnerability in the SmarterTools SmarterMail email solution with a timeline that is typically reserved for KEV holders. The plot of that story had everything; * A g...
Read Full Article →
Python Wheel (Zip) Parser Differential Vulnerability v2.0
▼
### Summary It is still possible (albeit with significantly more effort) to upload a specially crafted Wheel file (i.e. zip) to PyPI that when installed with PIP (or another Python zipfile based t...
Read Full Article →
GitLab 2FA login protection bypass lets attackers take over accounts
▼
A critical two-factor authentication bypass vulnerability in the Community and Enterprise editions of the GitLab application development platform has to be patched immediately, say experts. The hole is one of five vulnerabilities patched Wednesday as part of new versions of GitLab. Three are rank...
Read Full Article →
Misconfigured demo environments are turning into cloud backdoors to the enterprise
▼
Internal testing, product demonstrations, and security training are critical practices in cybersecurity, giving defenders and everyday users the tools and wherewithal to prevent and respond to enterprise threats. However, according to new research from Pentera Labs, when left in default or miscon...
Read Full Article →
GCVE launches as a decentralized system for tracking software vulnerabilities
▼
The new system emerges after repeated funding crises exposed the fragility of the 25-year-old CVE program that cybersecurity defenders worldwide depend on. The post GCVE launches as a decentralized system for tracking software vulnerabilities appeared first on CyberScoop .
Read Full Article →
A new LinkedIn phishing scam is targeting executives online - make sure you don't fall for this
▼
A little bit of Python, a little bit of DLL sideloading, and a little bit of fake jobs.
Read Full Article →
Phishing Campaign Zeroes in on LastPass Customers
▼
The bait incudes plausible subject lines and credible messages, most likely thanks to attackers' use of large language models to craft them.
Read Full Article →
Ingram Micro admits 42,000 people impacted by ransomware attack
▼
In July 2025, Ingram Micros suffered devastating consequences from a ransomware in which the IT distributor’s logistics were paralyzed for a week. It has now emerged that sensitive data was also leaked. As Ingram Micro confirmed in a mandatory filing with US authorities , more than 42,000 people ...
Read Full Article →
Oracle releases 337 security patches, including fix for critical Apache Tika flaw
▼
Oracle has handed security teams their first big patching workload of the year, with its latest quarterly update containing a hefty 337 security fixes across its product range, including 27 rated critical. This imposing number of patches won’t surprise anyone whose job it is to look after Oracle ...
Read Full Article →
Black Basta’s alleged ringleader identified as authorities raid homes of other members
▼
Oleg Evgenievich Nefedov, a 35-year-old Russian national, is accused of forming and running the ransomware outfit since 2022. He’s now on Europol and Interpol’s most-wanted lists. The post Black Basta’s alleged ringleader identified as authorities raid homes of other members appeared first on Cyb...
Read Full Article →
Phishing and Spoofed Sites Remain Primary Entry Points For Olympics
▼
Cyber risks for the Milano-Cortina 2026 Winter Games include phishing and spoofed websites as key threat vectors
Read Full Article →
Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws
▼
Zoom and GitLab have released security updates to resolve a number of security vulnerabilities that could result in denial-of-service (DoS) and remote code execution. The most severe of the lot is a critical security flaw impacting Zoom Node Multimedia Routers (MMRs) that could permit a meeting p...
Read Full Article →
Peruvian Loan Scam Harvests Cards and PINs via Fake Applications
▼
Loan phishing operation in Peru is stealing card info by impersonating financial institutions
Read Full Article →
LastPass warns users of new phishing campaign sending out fake support messages
▼
LastPass targeted with phishing campaign pressuring victims into sharing their master passwords.
Read Full Article →
The thin line between saving a company and funding a crime
▼
Ransomware negotiators dish on being in a ‘moral gray zone,’ unrestricted by accountability or industrywide rules of engagement. The post The thin line between saving a company and funding a crime appeared first on CyberScoop .
Read Full Article →
SHARED INTEL Q&A: AI retrieval systems can still hallucinate; deterministic logic offers a fix
▼
AI hallucination is still the deal-breaker. Related: Correcting LLM hallucinations As companies rush AI into production, executives face a basic constraint: you cannot automate a workflow if you cannot trust the output. A model that fabricates facts becomes a risk … (more…) The post SHARED INTEL ...
Read Full Article →
LastPass Warns of Fake Maintenance Messages Targeting Users’ Master Passwords
▼
LastPass is alerting users to a new active phishing campaign that's impersonating the password management service, which aims to trick users into giving up their master passwords. The campaign, which began on or around January 19, 2026, involves sending phishing emails claiming upcoming maintenan...
Read Full Article →
CERT/CC Warns binary-parser Bug Allows Node.js Privilege-Level Code Execution
▼
A security vulnerability has been disclosed in the popular binary-parser npm library that, if successfully exploited, could result in the execution of arbitrary JavaScript. The vulnerability, tracked as CVE-2026-1245 (CVSS score: 6.5), affects all versions of the module prior to version 2.3.0, wh...
Read Full Article →
News alert: Forrester study finds Airlock Digital’s app control cuts breaches to zero with 224% ROI
▼
ATLANTA, Jan. 20, 2026, CyberNewswire — Airlock Digital , a leader in proactive application control and endpoint security, announced the release of The Total Economic Impact (TEI) of Airlock Digital , an independent study commissioned by Airlock Digital and conducted … (more…) The post News alert...
Read Full Article →
News alert: One Identity launches AI-powered ‘Identity Manager’ to speed threat response
▼
ALISO VIEJO, Calif., Jan. 20, 2026, CyberNewswire — One Identity, a trusted leader in identity security , today announces a major upgrade to One Identity Manager, a top-rated IGA solution , strengthening identity governance as a critical security control for … (more…) The post News alert: One Ide...
Read Full Article →
A Google Gemini security flaw let hackers use calendar invites to steal private data
▼
Another prompt injection variant was discovered and remedied.
Read Full Article →
HackerOne rolls out industry framework to support ‘good faith’ AI research
▼
The voluntary framework would provide legal clarity to third-party AI researchers, including those who study safety and other “unexpected” AI behaviors. The post HackerOne rolls out industry framework to support ‘good faith’ AI research appeared first on CyberScoop .
Read Full Article →
AI-supported vulnerability triage with the GitHub Security Lab Taskflow Agent
▼
Learn how we are using the newly released GitHub Security Lab Taskflow Agent to triage categories of vulnerabilities in GitHub Actions and JavaScript projects.
Read Full Article →
Kimwolf Botnet Lurking in Corporate, Govt. Networks
▼
A new Internet-of-Things botnet called Kimwolf has spread to more than 2 million devices, forcing infected systems to participate in massive distributed denial-of-service (DDoS) attacks and to relay other malicious and abusive Internet traffic. Kimwolf's ability to scan the local networks of comp...
Read Full Article →
Ransomware gang claims it hacked into Hyatt systems, says it has stolen data for sale
▼
NightSpire claims to have stolen almost 50GB of Hyatt files, including login credentials for CMS systems.
Read Full Article →
Google Gemini Flaw Turns Calendar Invites Into Attack Vector
▼
The indirect prompt injection vulnerability allows an attacker to weaponize invites to circumvent Google's privacy controls and access private data.
Read Full Article →
New botnet reportedly targets HPE OneView, so be on your guard
▼
Researcher finds critical-level flaw could be abused to expand the RondoDox botnet.
Read Full Article →
Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution
▼
A set of three security vulnerabilities has been disclosed in mcp-server-git, the official Git Model Context Protocol (MCP) server maintained by Anthropic, that could be exploited to read or delete arbitrary files and execute code under certain conditions. "These flaws can be exploited through pr...
Read Full Article →
Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading
▼
Cybersecurity researchers have uncovered a new phishing campaign that exploits social media private messages to propagate malicious payloads, likely with the intent to deploy a remote access trojan (RAT). The activity delivers "weaponized files via Dynamic Link Library (DLL) sideloading, combined...
Read Full Article →
Why inaccessible cybersecurity is a security risk: our path to accessibility
▼
In cybersecurity, an inaccessible tool isn’t just a nuisance: it’s a vulnerability. With the European Accessibility Act tightening regulations across Sweden and the EU, “good ... The post Why inaccessible cybersecurity is a security risk: our path to accessibility appeared first on Blog Detectify .
Read Full Article →
Ingram Micro reveals ransomware attack hit 42,000 people - here's how to find out more
▼
SafePay is claiming responsibility for July 2025 attack which forced Ingram Micro to shut down parts of its IT network.
Read Full Article →
Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto
▼
Cybersecurity researchers have disclosed details of a malware campaign that's targeting software developers with a new information stealer called Evelyn Stealer by weaponizing the Microsoft Visual Studio Code (VS Code) extension ecosystem. "The malware is designed to exfiltrate sensitive informat...
Read Full Article →
Key Apple, Nvidia, and Tesla supplier sees confidential files allegedly exposed in major breach - here's what we know so far
▼
One of the key suppliers for Apple, Tesla, and Nvidia has seemingly suffered a ransomware attack.
Read Full Article →
VoidLink: Evidence That the Era of Advanced AI-Generated Malware Has Begun
▼
VoidLink's framework marks the first evidence of fully AI-designed and built advanced malware, beginning a new era of AI-generated malware
Read Full Article →
MedDream PACS Premium sendOruReport reflected cross-site scripting (XSS) vulnerability
▼
MY TAKE: From ‘holy mackeral’ to ‘daily routine’ — AI vendors maneuver to commandeer your life
▼
An email from Claude landed in my inbox Friday morning with a subject line that stopped me cold: “Using Claude for your everyday life.” Related: AI’s fortune teller effect Not “Unlock the power of AI” or “Transform your productivity.” Just… … (more…) The post MY TAKE: From ‘holy mackeral’ to ‘dai...
Read Full Article →
Huge data breach reveals info on 750,000 investors - here's what we know, and how to see if you're affected
▼
CIRO details what happened in 2025 data breach, including what kind of info was taken.
Read Full Article →
Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites
▼
Cybersecurity researchers have disclosed details of a security flaw that leverages indirect prompt injection targeting Google Gemini as a way to bypass authorization guardrails and use Google Calendar as a data extraction mechanism. The vulnerability, Miggo Security's Head of Research, Liad Eliya...
Read Full Article →
Who are the most spoofed brands in phishing scams? Let's be honest, you can probably guess most of them - but there are a few surprises
▼
Microsoft is still the most impersonated brand when it comes to phishing attacks – Google, Amazon, Apple and Meta are also in the top five.
Read Full Article →
Rogue agents and shadow AI: Why VCs are betting big on AI security
▼
Misaligned agents are just one layer of the AI security challenge that startup Witness AI is trying to solve. It detects employee use of unapproved tools, blocks attacks, and ensures compliance.
Read Full Article →
Who’s on the Line? Exploiting RCE in Windows Telephony Service
▼
Windows has supported computer telephony integration for decades, providing applications with the ability to manage phone devices, lines, and calls. While modern deployments increasingly rely on cloud-based telephony solutions, classic telephony services remain available out of the box in Windows...
Read Full Article →
Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations
▼
Cybersecurity researchers have disclosed a cross-site scripting (XSS) vulnerability in the web-based control panel used by operators of the StealC information stealer, allowing them to gather crucial insights on one of the threat actors using the malware in their operations. "By exploiting it, we...
Read Full Article →
On the Coming Industrialisation of Exploit Generation with LLMs
▼
Recently I ran an experiment where I built agents on top of Opus 4.5 and GPT-5.2 and then challenged them to write exploits for a zeroday vulnerability in the QuickJS Javascript interpreter. I adde…
Read Full Article →
Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
▼
Ukrainian and German law enforcement authorities have identified two Ukrainians suspected of working for the Russia-linked ransomware-as-a-service (RaaS) group Black Basta. In addition, the group's alleged leader, a 35-year-old Russian national named Oleg Evgenievich Nefedov (Нефедов Олег Евгенье...
Read Full Article →
More Problems for Fortinet: Critical FortiSIEM Flaw Exploited
▼
CVE-2025-64155, a command injection vulnerability, was disclosed earlier this week and quickly came under attack from a variety of IP addresses.
Read Full Article →
YOLO Mode: Hidden Risks in Claude Code Permissions | UpGuard
▼
Developers are frequently granting Claude Code permission to download, execute, and delete code, creating fertile ground for prompt injection attacks.
Read Full Article →
How a hacking campaign targeted high-profile Gmail and WhatsApp users across the Middle East
▼
The phishing campaign targeted users on WhatsApp, including an Iranian-British activist, and stole the credentials of a Lebanese cabinet minister and at least one journalist.
Read Full Article →
Five Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts
▼
Cybersecurity researchers have discovered five new malicious Google Chrome web browser extensions that masquerade as human resources (HR) and enterprise resource planning (ERP) platforms like Workday, NetSuite, and SuccessFactors to take control of victim accounts. "The extensions work in concert...
Read Full Article →
LOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishing
▼
Security experts have disclosed details of a new campaign that has targeted U.S. government and policy entities using politically themed lures to deliver a backdoor known as LOTUSLITE. The targeted malware campaign leverages decoys related to the recent geopolitical developments between the U.S. ...
Read Full Article →
China-Linked APT Exploited Sitecore Zero-Day in Critical Infrastructure Intrusion
▼
A threat actor likely aligned with China has been observed targeting critical infrastructure sectors in North America since at least last year. Cisco Talos, which is tracking the activity under the name UAT-8837, assessed it to be a China-nexus advanced persistent threat (APT) actor with medium c...
Read Full Article →
Weekly Update 486
▼
I’m in Oslo! Flighty is telling me I’ve flown in or out of here 43 times since a visit in 2014 set me on a new path professionally and, many years later, personally . It’s special here, like a second home that just feels…
Read Full Article → *(Covered by: Troy Hunt Blog)*
Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways
▼
Cisco on Thursday released security updates for a maximum-severity security flaw impacting Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager, nearly a month after the company disclosed that it had been exploited as a zero-day by a China-nexus advanced pe...
Read Full Article →
Windows Internals: Check Your Privilege - The Curious Case of ETW’s SecurityTrace Flag
▼
Consuming from Microsoft-Windows-Threat-Intelligence without Antimalware-PPL or kernel patching/driver loading.
Read Full Article →
News alert: BreachLock unveils agentic AI pen testing that mimics attacker behavior on web apps
▼
NEW YORK, Jan. 15, 2026, CyberNewswire — BreachLock , a global leader in offensive security, today announced that its Adversarial Exposure Validation (AEV) solution now supports autonomous red teaming at the application layer, expanding beyond its initial network-layer capabilities introduced … (...
Read Full Article →
News alert: AppGuard reopens insider program as AI-enhanced malware outpaces detection defenses
▼
MCLEAN, Va., Jan.15, 2026, CyberNewswire — A new Top 10 Cybersecurity Innovators profile by AppGuard has been released, spotlighting growing concerns over AI-enhanced malware. AI makes malware even more difficult to detect. Worse, they use AI to assess, adapt, and … (more…) The post News alert: A...
Read Full Article →
Risky Bulletin: China bans Israeli and US cybersecurity products
▼
China bans Israeli and US cybersecurity products, Sean Plankey is re-nominated for CISA Director, RAM price hikes are likely to impact the cost of firewalls, and Lumen sinkholes the Kimwolf DDoS botnet.
Read Full Article →
AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks
▼
A critical misconfiguration in Amazon Web Services (AWS) CodeBuild could have allowed complete takeover of the cloud service provider's own GitHub repositories, including its AWS JavaScript SDK, putting every AWS environment at risk. The vulnerability has been codenamed CodeBreach by cloud securi...
Read Full Article →
WEF: AI overtakes ransomware as fastest-growing cyber risk
▼
We can no longer say that artificial intelligence is a "future risk", lurking somewhere on a speculative threat horizon. The truth is that it is a fast-growing cybersecurity risk that organizations are facing today. That's not just my opinion, that's also the message that comes loud and clear fro...
Read Full Article →
Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access
▼
A maximum-severity security flaw in a WordPress plugin called Modular DS has come under active exploitation in the wild, according to Patchstack. The vulnerability, tracked as CVE-2026-23550 (CVSS score: 10.0), has been described as a case of unauthenticated privilege escalation impacting all ver...
Read Full Article →
New Vulnerability in n8n
▼
This isn’t good: We discovered a critical vulnerability ( CVE-2026-21858, CVSS 10.0 ) in n8n that enables attackers to take over locally deployed instances, impacting an estimated 100,000 servers globally. No official workarounds are available for this vulnerability. Users should upgrade to versi...
Read Full Article →
Epic Games Store Installation DLL Hijacking Privilege Escalation Vulnerability
▼
News alert: SpyCloud unveils supply chain security tool that detects compromised vendors’ employees
▼
AUSTIN, Texas, Jan. 14, 2026, CyberNewsWire — SpyCloud , the leader in identity threat protection, today announced the launch of its Supply Chain Threat Protection solution, an advanced layer of defense that expands identity threat protection across the extended workforce, … (more…) The post News...
Read Full Article →
The multibillion-dollar AI security problem enterprises can’t ignore
▼
AI agents are supposed to make work easier. But they’re also creating a whole new category of security nightmares. As companies deploy AI-powered chatbots, agents, and copilots across their operations, they’re facing a new risk: How do you let employees and AI agents use powerful AI tools without...
Read Full Article →
Microsoft Disrupts Cybercrime Service RedVDS
▼
RedVDS, a cybercrime-as-a-service operation that has stolen millions from victims, lost two domains to a law enforcement operation.
Read Full Article →
Community-powered security with AI: an open source framework for security research
▼
Announcing GitHub Security Lab Taskflow Agent, an open source and collaborative framework for security research with AI.
Read Full Article →
AI security firm, depthfirst, announces $40 million Series A
▼
The company used an AI-native platform to help companies fight threats.
Read Full Article →
Sicarii Ransomware: Truth vs Myth
▼
Key findings Introduction In December 2025, a previously unknown Ransomware-as-a-Service (RaaS) operation calling itself Sicarii began advertising its services across multiple underground platforms. The group’s name references the Sicarii, a 1st-century Jewish assassins group that opposed Roman r...
Read Full Article →
Taiwan Endures Greater Cyber Pressure From China
▼
Chinese cyberattacks on Taiwan's critical infrastructure — including energy utilities and hospitals — rose 6% in 2025, averaging 2.63 million attacks a day.
Read Full Article →
Patch Tuesday, January 2026 Edition
▼
Microsoft today issued patches to plug at least 113 security holes in its various Windows operating systems and supported software. Eight of the vulnerabilities earned Microsoft's most-dire "critical" rating, and the company warns that attackers are already exploiting one of the bugs fixed today.
Read Full Article →
Wireless-(in)Fidelity: Pentesting Wi-Fi in 2025
▼
Wireless-(in)Fidelity: Pentesting Wi-Fi in 2025
Read Full Article →
The AI Fix #83: ChatGPT Health, Victorian LLMs, and the biggest AI bluffers
▼
In episode 83 of The AI Fix, Graham reveals he's taken up lying to LLMs, and shows how a journalist exposed AI bluffers with a made-up idiom. Meanwhile Mark invents a "Godwin's Law" for AI, and explains how to ruin any LLM with humus. Also in this episode, a marriage is declared invalid thanks to...
Read Full Article →
AsyncRAT Malware Infests Orgs via Python & Cloudflare
▼
The phishing campaign shows how attackers continue to weaponize legitimate cloud services and open source tools to evade detection and gain trust.
Read Full Article →
Who Decides Who Doesn’t Deserve Privacy?
▼
Remember the Ashley Madison data breach? That was now more than a decade ago, yet it arguably remains the single most noteworthy data breach of all time. There are many reasons for this accolade, but chief among them is that by virtue of the site being expressly designed to facilitate
Read Full Article →
Your personal information is on the dark web. What happens next?
▼
If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.
Read Full Article →
Hackers get hacked, as BreachForums database is leaked
▼
Have you ever stolen data, traded a hacking tool, or just lurked on a dark web forum believing that you are anonymous? If so, I might have some unsettling news for you. Read more in my article on the Hot for Security blog.
Read Full Article →
Unveiling VoidLink – A Stealthy, Cloud-Native Linux Malware Framework
▼
The new framework maintains long-term access to Linux systems while operating reliably in cloud and container environments
Read Full Article →
Multipurpose GoBruteforcer Botnet Targets 50K+ Linux Servers
▼
Researchers detailed a souped-up version of the GoBruteforcer botnet that preys on servers with weak credentials and AI-generated configurations.
Read Full Article →
FBI Flags Quishing Attacks From North Korean APT
▼
A state-sponsored threat group tracked as "Kimsuky" sent QR-code-filled phishing emails to US and foreign government agencies, NGOs, and academic institutions.
Read Full Article →
Fintech firm Betterment confirms data breach after hackers send fake crypto scam notification to users
▼
Hackers gained access to some Betterment customers’ personal information through a social engineering attack, then targeted some of them with a crypto-related phishing message.
Read Full Article →
2 Separate Campaigns Probe Corporate LLMs for Secrets
▼
A total of 91,403 sessions targeted public LLM endpoints to find leaks in organizations' use of AI and map an expanding attack surface.
Read Full Article →
Russia’s Fancy Bear APT Doubles Down on Global Secrets Theft
▼
The notorious state-sponsored group relies on basic techniques that are highly effective, often delivering greater ROI than more complex malware-heavy operations.
Read Full Article →
Who Benefited from the Aisuru and Kimwolf Botnets?
▼
Our first story of 2026 revealed how a destructive new botnet called Kimwolf rapidly grew to infect more than two million devices by mass-compromising a vast number of unofficial Android TV streaming boxes. Today, we'll dig through digital clues left behind by the hackers, network operators, and ...
Read Full Article →
Do Smart People Ever Say They’re Smart? (SmarterTools SmarterMail Pre-Auth RCE CVE-2025-52691)
▼
Welcome to 2026! While we are all waiting for the scheduled SSLVPN ITW exploitation programming that occurs every January, we’re back from Christmas and idle hands, idle minds, yada yada. In December, we were alerted to a vulnerability in SmarterTools’ SmarterMail solution, accompanied by an advi...
Read Full Article →
The year of technoligarchy
▼
In 2025, Trump brought tech executives into power to dismantle regulators and write their own rules. But the instabilities they’re creating may be their downfall.
Read Full Article →
Inside GoBruteforcer: AI-Generated Server Defaults, Weak Passwords, and Crypto-Focused Campaigns
▼
Key takeaways Introduction GoBruteforcer is a botnet that turns compromised Linux servers into scanning and password brute-force nodes. It targets internet-exposed services such as phpMyAdmin web panels, MySQL and PostgreSQL databases, and FTP servers. Infected hosts are incorporated into the bot...
Read Full Article →
Everything I've Said About AI Since 2016: A Retrospective
▼
 I've been thinking and writing about AI for [exactly a decade now](/blog/the-real-internet-of-things), and last week someone claimed I said two things in 2023 that I don't think I said. (1. That we'd have AGI in 6 months, ...
Read Full Article →
Never Trust the Output: Data Pollution in AI Agents and MCP
▼
Disclaimer: This article is intended for educational purposes and security specialists conducting authorized testing. The author assumes no responsibility for any misuse of the information provided. Distribution of malicious software, system disruption, and privacy violations are punishable by la...
Read Full Article →
TrustZone Break-in Vulnerabilities in Ampere UEFI MM Drivers (Buffer Overflow and Stack Information Leak)
▼
### Summary A buffer overflow and stack information leak affecting the ARM Ampere Management Mode (MM) Boot Error Record Table (BERT) driver. This code is bundled into the ARM Unified Extensible F...
Read Full Article →
Meeting Third-Party Risk Requirements of DORA in 2026 | UpGuard
▼
Learn how to achieve compliance with the third-party risk management standards of the Digital Operational Resilience Act (DORA)
Read Full Article → *(Covered by: UpGuard Blog)*
Free GDPR Vendor Security Questionnaire Template (2026 Edition) | UpGuard
▼
Expand your organization's vendor risk management toolbox by utilizing this free GDPR vendor questionnaire template.
Read Full Article →
Choosing a PCI DSS 4.0 Compliance Product in 2026 | UpGuard
▼
Learn which features to look for when choosing a tool for tracking PCI DSS compliance. The right tool will help you avoid costly violations.
Read Full Article →
Choosing a Healthcare Cyber Risk Remediation Product in 2026 | UpGuard
▼
Learn which features to look for in an ideal cyber risk remediation product for healthcare services. The right choice will reduce data breach impact.
Read Full Article →
The Ultimate Cybersecurity Guide for Healthcare in 2026 | UpGuard
▼
A free cybersecurity guide for any business in the healthcare industry. Includes data breach and ransomware attack defense strategies for 2026.
Read Full Article →
How to Comply with PCI DSS 4.0.1 (2026 Guide) | UpGuard
▼
Learn how to comply with versions 4.0 and 4.0.1 of PCI DSS.
Read Full Article →
The Ultimate Ransomware Defense Guide (2026) | UpGuard
▼
Learn how to implement an effective security strategy for minimizing the impact of ransomware attacks.
Read Full Article →
Key Metrics for Tracking PCI DSS Compliance in 2026 | UpGuard
▼
Monitoring these key metrics will help you track your PCI DSS compliance efforts.
Read Full Article →
How to Prepare for a PCI DSS 4.0 Audit in 7 Steps in 2026 | UpGuard
▼
This article covers how to prepare for a PCI DSS onsite audit and maintain compliance with PCI requirements.
Read Full Article →
19 Most Common Types of Phishing Attacks in 2026 | UpGuard
▼
Learn the most commonly used phishing attacks and how to identify them.
Read Full Article →
116 Must-Know Data Breach Statistics for 2026 | UpGuard
▼
116 data breach statistics that cover risk, cost, prevention, industry trends, and more. Assess and analyze these stats and learn to prevent data breaches.
Read Full Article →
The Kimwolf Botnet is Stalking Your Local Network
▼
The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide security advisory. The vulnerability at issue has been exploited for months already, and it's time for a broader awareness of the threat. The short version is that everything you thought you knew about ...
Read Full Article →
Reverse Engineering the Tapo C260 and Tapo Discovery Protocol v2
▼
The Tapo C260 is the latest TP-Link camera featuring a whole host of upgrades. As part of the SPIRITCYBER contest where I found several RCEs and other interesting vulnerabilities, I decided to focus on this device and dive deeper into hardware hacking.
Read Full Article →
Bugs that survive the heat of continuous fuzzing
▼
Learn why some long-enrolled OSS-Fuzz projects still contain vulnerabilities and how you can find them.
Read Full Article →
Happy 16th Birthday, KrebsOnSecurity.com!
▼
KrebsOnSecurity.com celebrates its 16th anniversary today! A huge "thank you" to all of our readers -- newcomers, long-timers and drive-by critics alike. Your engagement this past year here has been tremendous and truly a salve on a handful of dark days. Happily, comeuppance was a strong theme ru...
Read Full Article →
Blind trust: what is hidden behind the process of creating your PDF file?
▼
Every day, thousands of web services generate PDF (Portable Document Format) files—bills, contracts, reports. This step is often treated as a technical routine, “just convert the HTML,” but in practice it’s exactly where a trust boundary is crossed. The renderer parses HTML, downloads external re...
Read Full Article →#Scraping Candidates
Leader of ransomware crew pleads guilty to four-year crime spree
▼
#Security Vendor Blog
PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers
▼
Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.
Read Full Article →
Threats Making WAVs - Incident Response to a Cryptomining Attack
▼
Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files. The report includes the full attack vectors, from detection, infection, network propagation and malware analysis and recommendations for optimizing incident res...
Read Full Article →
From runtime risk to real‑time defense: Securing AI agents
▼
Why securing AI agents at runtime is essential as attackers find new ways to exploit generative orchestration. The post From runtime risk to real‑time defense: Securing AI agents appeared first on Microsoft Security Blog .
Read Full Article →
AI jailbreaking via poetry: bypassing chatbot defenses with rhyme | Kaspersky official blog
▼
A new study shows that verse-based prompts can slash the effectiveness of AI safety constraints. We’re breaking down an experiment involving 25 language models and its key takeaways.
Read Full Article →
I scan, you scan, we all scan for... knowledge?
▼
In this week's newsletter, Bill hammers home the old adage, "Know your environment" — even throughout alert fatigue.
Read Full Article →
Microsoft Security success stories: Why integrated security is the foundation of AI transformation
▼
Discover how Ford, Icertis, and TriNet modernized security with Microsoft—embedding Zero Trust, automating defenses, and enabling secure AI innovation at scale. The post Microsoft Security success stories: Why integrated security is the foundation of AI transformation appeared first on Microsoft ...
Read Full Article →
Foxit, Epic Games Store, MedDreams vulnerabilities
▼
Cisco Talos’ Vulnerability Discovery & Research team recently disclosed three vulnerabilities in Foxit PDF Editor, one in the Epic Games Store, and twenty-one in MedDream PACS.. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisc...
Read Full Article →
The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time
▼
We discuss a novel AI-augmented attack method where malicious webpages use LLM services to generate dynamic code in real-time within a browser. The post The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time appeared first on Unit 42 .
Read Full Article →
Resurgence of a multi‑stage AiTM phishing and BEC campaign abusing SharePoint
▼
Microsoft Defender Researchers uncovered a multi‑stage AiTM phishing and business email compromise (BEC) campaign targeting multiple organizations in the energy sector. The post Resurgence of a multi‑stage AiTM phishing and BEC campaign abusing SharePoint appeared first on Microsoft Security Blog .
Read Full Article →
A new era of agents, a new era of posture
▼
AI agents are transforming how organizations operate, but their autonomy also expands the attack surface. The post A new era of agents, a new era of posture appeared first on Microsoft Security Blog .
Read Full Article →
How to protect yourself from Bluetooth-headset tracking and the WhisperPair attack | Kaspersky official blog
▼
With the WhisperPair attack, a stranger can pair their device with your headphones to keep tabs on your location.
Read Full Article →
Oracle January 2026 Critical Patch Update Addresses 158 CVEs
▼
Oracle addresses 158 CVEs in its first quarterly update of 2026 with 337 patches, including 27 critical updates. Key takeaways: The first Critical Patch Update (CPU) for 2026, contains fixes for 158 unique CVEs in 337 security updates. 27 issues (8% of all patches) were assigned a critical severi...
Read Full Article →
Tenable Discovers SSRF Vulnerability in Java TLS Handshakes That Creates DoS Risk
▼
Tenable Research has discovered a server-side request forgery (SSRF) vulnerability in Java’s handling of client certificates during a TLS handshake. In certain configurations, this can be abused to cause a denial-of-service (DoS) condition. Key takeaways Tenable Research identified a vulnerabilit...
Read Full Article →
DNS OverDoS: Are Private Endpoints Too Private?
▼
We've identified an aspect of Azure’s Private Endpoint architecture that could expose Azure resources to denial of service (DoS) attacks. The post DNS OverDoS: Are Private Endpoints Too Private? appeared first on Unit 42 .
Read Full Article →
Four priorities for AI-powered identity and network access security in 2026
▼
Discover four key identity and access priorities for the new year to strengthen your organization's identity security baseline. The post Four priorities for AI-powered identity and network access security in 2026 appeared first on Microsoft Security Blog .
Read Full Article →
What is the “year 2038 problem”, and how can businesses fix it?
▼
How can organizations find and fix systems vulnerable to Y2K38 — the Unix epoch time overflow problem, also known as Epochalypse?
Read Full Article →
Key attack scenarios involving brand impersonation
▼
Here’s how cybercriminals cash in on companies’ online doppelgängers, and what can be done about it.
Read Full Article →
Predicting 2026
▼
In this week’s newsletter, Martin examines the evolving landscape for 2026, highlighting key threats, emerging trends like AI-driven risks, and the continued importance of addressing familiar vulnerabilities.
Read Full Article →
AI-powered sextortion: a new threat to privacy | Kaspersky official blog
▼
Ordinary photos from your social media can be turned into tools for AI-driven sextortion and deepfakes. How can you protect your privacy and security?
Read Full Article →
UAT-8837 targets critical infrastructure sectors in North America
▼
Cisco Talos is closely tracking UAT-8837, a threat actor we assess with medium confidence is a China-nexus advanced persistent threat (APT) actor.
Read Full Article →
CVE-2025-64155: Exploit Code Released for Critical Fortinet FortiSIEM Command Injection Vulnerability
▼
Exploit code has been published for CVE-2025-64155, a critical command injection vulnerability affecting Fortinet FortiSIEM devices. Key takeaways: CVE-2025-64155 is a critical operating system (OS) command injection vulnerability affecting Fortinet FortiSIEM. Fortinet vulnerabilities have histor...
Read Full Article →
Microsoft named a Leader in IDC MarketScape for Unified AI Governance Platforms
▼
Microsoft is honored to be named a Leader in the 2025–2026 IDC MarketScape for Unified AI Governance Platforms, highlighting our commitment to making AI innovation safe, responsible, and enterprise-ready. The post Microsoft named a Leader in IDC MarketScape for Unified AI Governance Platforms app...
Read Full Article →
Inside RedVDS: How a single virtual desktop provider fueled worldwide cybercriminal operations
▼
Microsoft’s investigation into RedVDS services and infrastructure uncovered a global network of disparate cybercriminals purchasing and using to target multiple sectors. In collaboration with law enforcement agencies worldwide, Microsoft’s Digital Crimes Unit (DCU) recently facilitated a disrupti...
Read Full Article →
Brushstrokes and breaches with Terryn Valikodath
▼
Terryn’s path to cybersecurity started with a fascination for criminal forensics and a knack for jailbreaking his family's tech — interests that eventually steered him toward the fast-paced world of digital investigations.
Read Full Article →
How we set the standard for transparency and trust | Kaspersky official blog
▼
An independent study of companies’ transparency and data usage practices in cybersecurity products.
Read Full Article →
ServiceNow's Virtual Agent Vulnerability Shows Why AI Security Needs Traditional AppSec Foundations
▼
The critical ServiceNow Virtual Agent vulnerability highlights a vital lesson: securing agentic AI requires a return to traditional AppSec foundations. While AI can amplify risks, the root causes often stem from classic failures in authentication and authorization.
Read Full Article →
Threat Brief: MongoDB Vulnerability (CVE-2025-14847)
▼
Database platform MongoDB disclosed CVE-2025-14847, called MongoBleed. This is an unauthenticated memory disclosure vulnerability with a CVSS score of 8.7. The post Threat Brief: MongoDB Vulnerability (CVE-2025-14847) appeared first on Unit 42 .
Read Full Article →
Direct and reverse NFC relay attacks being used to steal money | Kaspersky official blog
▼
How to protect your Android device from NFC relay attacks exploiting NFCGate.
Read Full Article →
Microsoft’s January 2026 Patch Tuesday Addresses 113 CVEs (CVE-2026-20805)
▼
8 Critical 105 Important 0 Moderate 0 Low Microsoft addresses 113 CVEs in the first Patch Tuesday of 2026, with two zero-days, including one that was exploited in the wild. Microsoft patched 113 CVEs in its January 2026 Patch Tuesday release, with eight rated critical and 105 rated as important. ...
Read Full Article →
Microsoft Patch Tuesday for January 2026 — Snort rules and prominent vulnerabilities
▼
Microsoft has released its monthly security update for January 2026, which includes 112 vulnerabilities affecting a range of products, including 8 that Microsoft marked as “critical”.
Read Full Article →
How Microsoft builds privacy and security to work hand-in-hand
▼
Learn how Microsoft unites privacy and security through advanced tools and global compliance to protect data and build trust. The post How Microsoft builds privacy and security to work hand-in-hand appeared first on Microsoft Security Blog .
Read Full Article →
Remote Code Execution With Modern AI/ML Formats and Libraries
▼
We identified remote code execution vulnerabilities in open-source AI/ML libraries published by Apple, Salesforce and NVIDIA. The post Remote Code Execution With Modern AI/ML Formats and Libraries appeared first on Unit 42 .
Read Full Article →
Your personal information is on the dark web. What happens next?
▼
If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.
Read Full Article →
Laughter in the dark: Tales of absurdity from the cyber frontline and what they taught us
▼
From a quintuple-encryption ransomware attack to zany dark web schemes and AI fails, Sophos X-Ops looks back at some of our favorite weirdest incidents from the last few years – and the serious lessons behind them Categories: Threat Research Tags: Ransomware, Hive, Lockbit, BlackCat, LLM, AI, Mon...
Read Full Article →
Activity-masking infostealer dropper | Kaspersky official blog
▼
Malware disguising its activity in network and system logs as legitimate state information system traffic and a Network Diagnostic Service.
Read Full Article →
Tenable Is a Gartner® Peer Insights™ Customers’ Choice for Cloud-Native Application Protection Platforms
▼
This recognition — based entirely on feedback from the people who use our products every day — to us is a testament to the unmatched value Tenable Cloud Security CNAPP offers organizations worldwide. Our key takeaways: In our view, this peer recognition confirms Tenable’s strategic value in helpi...
Read Full Article →
The State of Ransomware in Enterprise 2025
▼
Categories: Products & Services Tags: Ransomware, Enterprise, Solutions, The State of Ransomware
Read Full Article →
Resolutions, shmesolutions (and what’s actually worked for me)
▼
Talos' editor ditches the pressure of traditional New Year’s resolutions in favor of practical, in-the-moment changes, and finds more success by letting go of perfection. Plus, we break down the latest on UAT-7290, a newly disclosed threat actor targeting critical infrastructure.
Read Full Article →
UAT-7290 targets high value telecommunications infrastructure in South Asia
▼
Talos assesses with high confidence that UAT-7290 is a sophisticated threat actor falling under the China-nexus of advanced persistent threat actors (APTs). UAT-7290 primarily targets telecommunications providers in South Asia.
Read Full Article →
Explore the latest Microsoft Incident Response proactive services for enhanced resilience
▼
The new proactive services from Microsoft Incident Response turn security uncertainty into readiness with expert‑led preparation and advanced intelligence. The post Explore the latest Microsoft Incident Response proactive services for enhanced resilience appeared first on Microsoft Security Blog .
Read Full Article →
How Cisco Talos powers the solutions protecting your organization
▼
What happens under the hood of Cisco's security portfolio? Our reputation and detection services apply Talos' real-time intelligence to detect and block threats. Here's how.
Read Full Article →
Phishing actors exploit complex routing and misconfigurations to spoof domains
▼
Threat actors are exploiting complex routing scenarios and misconfigured spoof protections to send spoofed phishing emails, crafted to appear as internally sent messages. The post Phishing actors exploit complex routing and misconfigurations to spoof domains appeared first on Microsoft Security B...
Read Full Article →
Cybersecurity Snapshot: Predictions for 2026: AI Attack Acceleration, Automated Remediation, Custom-Made AI Security Tools, Machine Identity Threats, and More
▼
In this special edition, Tenable leaders forecast key 2026 trends, including: AI will make attacks more plentiful and less costly; machine identities will become the top cloud risk; preemptive cloud and exposure management will dethrone runtime detection; and automated remediation gets the go-ahe...
Read Full Article →
CVE-2025-14847: All You Need to Know About MongoBleed
▼
CVE-2025-14847 (MongoBleed): MongoDB Memory Leak Vulnerability Exploited in the Wild
▼
A recently disclosed vulnerability affecting MongoDB instances has been reportedly exploited in the wild. Exploit code has been released for this flaw dubbed MongoBleed. Key takeaways: MongoBleed is a memory leak vulnerability affecting multiple versions of MongoDB. Exploitation of MongoDB has be...
Read Full Article →
The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor
▼
Kaspersky discloses a 2025 HoneyMyte (aka Mustang Panda or Bronze President) APT campaign, which uses a kernel-mode rootkit to deliver and protect a ToneShell backdoor.
Read Full Article →#Tech
‘Halo’ Actor Steve Downes Asks You Not to Remake His Voice with AI
▼
The man behind Master Chief feels a way about generative AI when it comes to his voice being used for any 'Halo' fan project or video.
Read Full Article →
How to defend against advanced DDoS threats
▼
In 1996, a New York-based Internet service provider became the first target of a major distributed denial-of-service (DDoS) attack. They were shut down for 36 hours. Since then, DDoS has remained a favored tactic of cybercriminals. But with the advent of AI, DDoS attacks have become both more com...
Read Full Article →
Top 3 trends in business internet connectivity
▼
Reliable, high-speed internet connectivity is no longer optional—it’s an essential business tool. Increasingly more business applications and processes live in the cloud, requiring a powerful connection that considers factors such as reliability, scalability, security, and performance. Organizati...
Read Full Article →
Shining light on the dark side of emerging tech
▼
For some time now, concerned business users have been discussing the possibilities of AI being a tool to increase the efficiency of cybercriminals . However, it can also be a welcome helper to bolster cyberdefense. Industry experts like Chuck Brooks also chose to focus on AI as a double-edged swo...
Read Full Article →
6 billion leaked passwords reveal the ones you should never, ever use
▼
Over the course of the past year, security researchers at Specops Software examined six billion leaked passwords and subsequently published a comprehensive report on their findings. This report not only provides insight into the most commonly used passwords, but also into the current threat posed...
Read Full Article →
ShinyHunters claims Okta customer breaches, leaks data belonging to 3 orgs
▼
'A lot more' victims to come, we're told ShinyHunters has claimed responsibility for an Okta voice-phishing campaign during which the extortionist crew allegedly gained access to Crunchbase and Betterment.…
Read Full Article →
1Password adds new password protection feature to thwart phishing scams
▼
Password manager 1Password has launched a new feature in its browser extension that provides extra protection against phishing, reports Engadget . The new feature warns users when they manually paste login details on a website that isn’t linked to a saved login in 1Password. A pop-up message will...
Read Full Article →
Is that $20 credit for the Verizon outage real? Don’t click a bad link
▼
Last week, Verizon had a massive outage. Millions of wireless customers couldn’t get a signal, instead stuck on emergency service. If you were affected, you definitely knew it—your phone was stuck on “SOS” mode, only capable of calling 911. Service was eventually restored by the evening, with Ver...
Read Full Article →
Europe votes to tackle deep dependence on US tech in sovereignty drive
▼
European lawmakers on Thursday adopted a comprehensive report on technological sovereignty and digital infrastructure that directs the European Commission to reduce the bloc’s heavy reliance on foreign technology providers across semiconductors, cloud infrastructure, software, and AI systems. The...
Read Full Article →
Why Apple is the best investment for future AI
▼
The AI industry is moving incredibly fast. It’s almost as though you can close your eyes for ten minutes and wake to find that yet another business-friendly AI tool or service has appeared. While refreshing, this glut of investment and innovation represents an industry in flux, meaning the most s...
Read Full Article →
How enterprise architecture and start-up thinking drive strategic success
▼
In an era defined by rapid innovation, shifting markets and disruptive emerging technologies, long-term planning alone cannot deliver the agility enterprises need. Strategy is now judged less by the quality of vision decks and more by how quickly enterprises can test, learn and scale what works a...
Read Full Article →
The new CDIO stack: Tech, talent and storytelling
▼
When people hear my title — chief digital and information officer — most of them immediately think of technology — cloud, Data, AI, Cybersecurity. They imagine servers, dashboards, code. And, to be fair, all of that is part of my world. But if I describe my job only in terms of technology, I am t...
Read Full Article →
서비스나우의 선택, 단일 AI 전략을 넘어서다…오픈AI 협력의 배경은?
▼
서비스나우는 20일 오픈AI와 다년 계약을 체결했으며, 이번 계약이 “엔터프라이즈 AI 성과를 가속화하기 위한 것”이라고 밝혔다 . 서비스나우는 오픈AI 모델을 활용해 언어 장벽을 허물고 보다 자연스러운 상호작용을 제공하는 직접 음성-음성 기술을 구축할 계획이라고 설명했다. GPT-5.2를 포함한 최신 오픈AI 모델을 통해 전 세계 주요 기업을 위한 새로운 수준의 AI 기반 자동화를 구현할 수 있을 것이라고도 전했다. 이번 결정의 배경에 대해 서비스나우 제품 관리 담당 수석부사장인 존 아이시언 은 오픈AI와의 더 깊은 통합이 ...
Read Full Article →
Always disclose how you use AI
▼
AI chatbots have been with us three years and one month (at least the kind that use large language models (LLMs) to communicate with natural-sounding words). Already norms are emerging in some professions for users to disclose how they use AI. For example: Organizations such as the International ...
Read Full Article →
Experts warn: Swarms of AI bots threaten democracy
▼
A group of researchers from Berkeley, Harvard, Oxford, Cambridge, and Yale warn that the rise of AI bots and AI agents could pose a serious threat to democracy. For example, power-hungry politicians around the world can relatively easily create swarms of AI bots that flood social media and messag...
Read Full Article →
앤트로픽, 안전·윤리 강화한 새 ‘클로드 헌법’ 공개
▼
앤트로픽이 자사 AI 모델의 추론과 행동을 규율하는 윤리적 기준 문서인 ‘클로드 헌법(Claude constitution)’을 전면 개편했다. 세계경제포럼(WEF) 다보스 포럼에서 공개된 새 문서 는 클로드가 사람의 감독 권한을 침해하지 않는 ‘포괄적 안전성’, 부적절하거나 유해한 행동을 피하면서 정보를 왜곡하지 않는 ‘포괄적 윤리성’, 사용자에게 실질적인 이익을 제공하는 ‘유용성’, 그리고 ‘앤트로픽 가이드라인 준수’를 핵심 원칙으로 내세운다. 앤트로픽에 따르면 이는 이미 클로드 모델 학습 과정에 적용되고 있으며, 모델 추론...
Read Full Article →
Windows 11 Insider Previews: What’s in the latest build?
▼
Windows 11 25H2 has been released, but behind the scenes, Microsoft is constantly working to improve the newest version of Windows. The company frequently rolls out public preview builds to members of its Windows Insider Program, allowing them to test out — and help shape — upcoming features. Ski...
Read Full Article →
Workers challenge ‘hidden’ AI hiring tools in class action with major regulatory stakes
▼
Workers are getting fed up with AI-based hiring practices. A new class action lawsuit filed in California alleges that human candidates are being unfairly profiled by “hidden” AI hiring technologies that “lurk in the background” to collect “sensitive and often inaccurate” information about “unsus...
Read Full Article →
Crims hit the easy button for Scattered-Spider style helpdesk scams
▼
Teach a crook to phish… Criminals can more easily pull off social engineering scams and other forms of identity fraud thanks to custom voice-phishing kits being sold on dark web forums and messaging platforms.…
Read Full Article →
Hacker who stole 120,000 bitcoins wants a second chance—and a security job
▼
Crypto theft was "the worst thing I had ever done."
Read Full Article →
Crims compromised energy firms' Microsoft accounts, sent 600 phishing emails
▼
Logging in, not breaking in Unknown attackers are abusing Microsoft SharePoint file-sharing services to target multiple energy-sector organizations, harvest user credentials, take over corporate inboxes, and then send hundreds of phishing emails from compromised accounts to contacts inside and ou...
Read Full Article →
Apple’s Siri to see two major AI improvements this year
▼
More details about the expected cadence of Apple’s plans to turn Siri into an AI-driven chatbot are emerging, and Mark Gurman tells us Apple has a two-tier approach in mind. The current thinking is that Apple’s Gemini-powered chatbot will arrive in June with iOS 26.4, which will be a significant ...
Read Full Article →
Female-dominated careers among most exposed to AI disruption
▼
Dentists least likely to get an LLM kick in the teeth Most US workers in jobs exposed to AI are also relatively well placed to adapt if disruption leads to displacement, according to research summarized by the Brookings Institution. However, there are some careers with high percentages of female ...
Read Full Article →
Best VPNs for torrenting: 5 top picks for speed, privacy, and security
▼
Torrenting, or P2P (peer-to-peer) file sharing, is a convenient way to download large files quickly. But it isn’t without its risks. Not only is there the risk of accidentally downloading a malicious file or malware, but there’s a privacy risk as well—your ISP can see all your online activity and...
Read Full Article →
Critical Cisco UC bug actively exploited
▼
Cisco has released patches for a critical remote code execution vulnerability in its unified communications products that attackers are actively exploiting. The US Cybersecurity and Infrastructure Security Agency has added the flaw to its Known Exploited Vulnerabilities catalog, confirming the ex...
Read Full Article →
Europe's GDPR cops dished out €1.2B in fines last year as data breaches piled up
▼
Regulators logged over 400 personal data breach notifications a day for first time since law came into force GDPR fines pushed past the £1 billion (€1.2 billion) mark in 2025 as Europe's regulators were deluged with more than 400 data breach notifications a day, according to a new survey that sug...
Read Full Article →
Work-from-office mandate? Expect top talent turnover, culture rot
▼
Work-from-office mandates are accelerating as the world moves further away from the COVID-19 pandemic, but the push toward in-person work environments will make it more difficult for IT leaders to retain and recruit staff, some experts say. Over the past year, many companies, including IT giants ...
Read Full Article →
Ancient telnet bug happily hands out root to attackers
▼
Critical vuln flew under the radar for a decade A recently disclosed critical vulnerability in the GNU InetUtils telnet daemon (telnetd) is "trivial" to exploit, experts say.…
Read Full Article →
Best free VPN for Android: 5 top picks you can trust
▼
Whether you want extra security while using public Wi-Fi, or to unlock content on your favorite streaming services, the right free VPN for your Android device can help you do it without having to pay a dime. The problem when looking for a good free VPN, though, is that there are a ton available o...
Read Full Article →
What’s a browser-in-browser attack? The key traits to know
▼
Recently, a new way of stealing Facebook login info came to light—hackers using fake windows within your browser to imitate legitimate pop-up windows for sign-in. Called browser-in-browser (BitB) attacks, this form of phishing puts a novel spin on a long-standing hack. First documented by securit...
Read Full Article →
This fake ad blocker malware impersonated uBlock Origin’s developer
▼
I block ads (despite the hypocrisy) and you probably do too if you’re tech-literate enough to read PCWorld on the regular. So maybe you’re familiar with the minor drama between Google Chrome and the incredibly popular uBlock Origin , which is also a solo developer’s passion project. That notoriet...
Read Full Article →
840,000+ users hit by malicious browser extensions. Uninstall these ASAP!
▼
Security researchers are now warning of a targeted malware campaign that involves malicious software hiding in certain browser extensions. The wave of attacks—dubbed “GhostPoster”—targets Chrome, Firefox, and Edge users. There have been over 840,000 attacks since December. How the GhostPoster att...
Read Full Article →
1Password review: A password manager designed for the Apple crowd
▼
At a glance Expert's Rating Pros Polished, clean interface Multitude of entry types (logins, notes, etc), with the ability to pack in info fields Autofill works smoothly Large type for password viewing! Unique “travel mode” Cons Complex login system compared to rivals Family plan subaccounts can ...
Read Full Article →
Never reply to these text messages! How to spot SMS cost traps
▼
Beware of text messages with promises to win or a call to action! Because it is precisely messages like these that repeatedly lead to unexpected costs on your mobile phone bill. If you reply carelessly or contact a specified number, you can quickly fall into an expensive trap. We explain below wh...
Read Full Article →
Say bye-bye to ads and malware on 9 devices for just $40
▼
TL;DR: For a one-time $39.99 (MSRP $169.99), the AdGuard Family Plan lets you block ads, protect privacy, and secure up to nine devices for life. Online ads have gotten louder, sneakier, and harder to avoid—and that’s before you even factor in trackers, malicious sites, and kid-unfriendly content...
Read Full Article →
Best 5 VPNs for streaming Netflix and other services
▼
VPNs aren’t just useful for keeping your online activities safe and private, they’re also a great way to bypass restrictions on streaming content in other countries. The top VPN providers work hard to stay one step ahead of streaming services in a never-ending cat-and-mouse game, ensuring that yo...
Read Full Article →
Firefox 147 improves video playback on AMD GPUs and privacy protection
▼
With the most recent update to Firefox 147, you can enjoy a number of new features and improvements. Safe Browsing v5 improves privacy protection, picture-in-picture mode for videos has learned a new trick, and the developers have once again fixed several security flaws. Mozilla doesn’t plan to r...
Read Full Article →
Hackers are using browser-in-the-browser trick to steal Facebook logins
▼
If you’re still using Facebook, then I assume you’re old enough to remember watching John Wayne movies in the theater. Nevertheless, it remains a pretty juicy target for hackers and digital thieves. They’re using a technique that you should be aware of, even if your only interaction with the slop...
Read Full Article →#Threat Intel & Vulnerability
CVE-2024-37079
▼
Currently trending CVE - Hype Score: 26 - vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to...
Read Full Article →
CVE-2025-34164
▼
Currently trending CVE - Hype Score: 17 - A heap-based buffer overflow vulnerability in NetSupport Manager 14.x versions prior to 14.12.0000 allows a remote, unauthenticated attacker to cause a denial of service (DoS) or potentially result in arbitrary code execution.
Read Full Article → *(Covered by: Intruder Intel CVE Feed)*
CVE-2025-25257
▼
Currently trending CVE - Hype Score: 14 - An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] vulnerability in Fortinet FortiWeb 7.6.0 through 7.6.3, FortiWeb 7.4.0 through 7.4.7, FortiWeb 7.2.0 through 7.2.10, FortiWeb 7.0.0 through 7.0....
Read Full Article →
CVE-2025-51683
▼
Currently trending CVE - Hype Score: 12 - A blind SQL Injection (SQLi) vulnerability in mJobtime v15.7.2 allows unauthenticated attackers to execute arbitrary SQL statements via a crafted POST request to the /Default.aspx/update_profile_Server endpoint .
Read Full Article → *(Covered by: Intruder Intel CVE Feed)*
CVE-2025-43529
▼
Currently trending CVE - Hype Score: 10 - A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 26.2, Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2, tvOS 26.2. Processing maliciously crafted web ...
Read Full Article →
CVE-2025-13878
▼
Currently trending CVE - Hype Score: 1 - Malformed BRID/HHIT records can cause `named` to terminate unexpectedly. This issue affects BIND 9 versions 9.18.40 through 9.18.43, 9.20.13 through 9.20.17, 9.21.12 through 9.21.16, 9.18.40-S1 through 9.18.43-S1, and 9.20.13-S1 through 9.20.17-S1.
Read Full Article →
CVE-2026-1425 | pymumu SmartDNS up to 47.1 SVBC Record Parser src/dns.c _dns_decode_rr_head/_dns_decode_SVCB_HTTPS stack-based overflow
▼
A vulnerability categorized as critical has been discovered in pymumu SmartDNS up to 47.1 . This vulnerability affects the function _dns_decode_rr_head/_dns_decode_SVCB_HTTPS of the file src/dns.c of the component SVBC Record Parser . The manipulation results in stack-based buffer overflow. This ...
Read Full Article →
CVE-2026-1424 | PHPGurukul News Portal 1.0 Profile Pic unrestricted upload
▼
A vulnerability was found in PHPGurukul News Portal 1.0 . It has been rated as critical . This affects an unknown part of the component Profile Pic Handler . The manipulation leads to unrestricted upload. This vulnerability is traded as CVE-2026-1424 . It is possible to initiate the attack remote...
Read Full Article →
CVE-2026-1423 | code-projects Online Examination System 1.0 /admin_pic.php unrestricted upload
▼
A vulnerability was found in code-projects Online Examination System 1.0 . It has been declared as critical . Affected by this issue is some unknown functionality of the file /admin_pic.php . Executing a manipulation can lead to unrestricted upload. This vulnerability appears as CVE-2026-1423 . T...
Read Full Article →
CVE-2026-1422 | code-projects Online Examination System 1.0 Login Page /index.php User sql injection
▼
A vulnerability was found in code-projects Online Examination System 1.0 . It has been classified as critical . Affected by this vulnerability is an unknown functionality of the file /index.php of the component Login Page . Performing a manipulation of the argument User results in sql injection. ...
Read Full Article →
CVE-2026-1421 | code-projects Online Examination System 1.0 Add Pages cross site scripting
▼
A vulnerability was found in code-projects Online Examination System 1.0 and classified as problematic . Affected is an unknown function of the component Add Pages . Such manipulation leads to cross site scripting. This vulnerability is documented as CVE-2026-1421 . The attack can be executed rem...
Read Full Article →
CVE-2026-1420 | Tenda AC23 16.03.07.52 /goform/WifiExtraSet wpapsk_crypto buffer overflow
▼
A vulnerability has been found in Tenda AC23 16.03.07.52 and classified as critical . This impacts an unknown function of the file /goform/WifiExtraSet . This manipulation of the argument wpapsk_crypto causes buffer overflow. This vulnerability is registered as CVE-2026-1420 . Remote exploitation...
Read Full Article →
CVE-2026-23008 | Linux Kernel up to 6.18.6/6.19-rc5 vmwgfx null pointer dereference (EUVD-2026-4625)
▼
A vulnerability, which was classified as critical , was found in Linux Kernel up to 6.18.6/6.19-rc5 . This affects an unknown function of the component vmwgfx . The manipulation results in null pointer dereference. This vulnerability is cataloged as CVE-2026-23008 . The attack must originate from...
Read Full Article → *(Covered by: VulnDB)*
CVE-2026-23007 | Linux Kernel up to 6.18.6/6.19-rc5 block uninitialized pointer (EUVD-2026-4628)
▼
A vulnerability, which was classified as critical , has been found in Linux Kernel up to 6.18.6/6.19-rc5 . The impacted element is an unknown function of the component block . The manipulation leads to uninitialized pointer. This vulnerability is listed as CVE-2026-23007 . The attack must be carr...
Read Full Article →
CVE-2026-23012 | Linux Kernel up to 6.18.6/6.19-rc5 DAMON Sysfs Interface damon_call use after free (EUVD-2026-4617)
▼
A vulnerability classified as critical was found in Linux Kernel up to 6.18.6/6.19-rc5 . The affected element is the function damon_call of the component DAMON Sysfs Interface . Executing a manipulation can lead to use after free. This vulnerability is tracked as CVE-2026-23012 . The attack is on...
Read Full Article →
CVE-2026-23013 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 octep_vf_request_irqs use after free (EUVD-2026-4616)
▼
A vulnerability classified as critical has been found in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 . Impacted is the function octep_vf_request_irqs . Performing a manipulation results in use after free. This vulnerability is identified as CVE-2026-23013 . The attack can only be performed from th...
Read Full Article → *(Covered by: VulnDB)*
CVE-2026-22997 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 j1939_xtp_rx_rts_session_active reference count (EUVD-2026-4637)
▼
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 . Affected by this vulnerability is the function j1939_xtp_rx_rts_session_active . Executing a manipulation can lead to improper update of reference count. This vulnerability is handled as CV...
Read Full Article →
CVE-2025-71162 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 Tegra ADMA Driver tegra_adma_terminate_all use after free
▼
A vulnerability was found in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 . It has been rated as critical . Affected is the function tegra_adma_terminate_all of the component Tegra ADMA Driver . Performing a manipulation results in use after free. This vulnerability is known as CVE-2025-71162 . Acc...
Read Full Article →
CVE-2025-71163 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 dmaengine memory leak (EUVD-2026-4639)
▼
A vulnerability was found in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 . It has been declared as critical . This impacts an unknown function of the component dmaengine . Such manipulation leads to memory leak. This vulnerability is traded as CVE-2025-71163 . Access to the local network is requir...
Read Full Article →
CVE-2026-23009 | Linux Kernel up to 6.18.6/6.19-rc5 xhci_sideband_remove_endpoint initialization (EUVD-2026-4619)
▼
A vulnerability was found in Linux Kernel up to 6.18.6/6.19-rc5 . It has been classified as critical . This affects the function xhci_sideband_remove_endpoint . This manipulation causes improper initialization. This vulnerability appears as CVE-2026-23009 . The attacker needs to be present on the...
Read Full Article →
CVE-2026-23004 | Linux Kernel up to 6.18.6/6.19-rc5 IPv4 lib/dump_stack.c rt6_uncached_list_del use after free (EUVD-2026-4614)
▼
A vulnerability was found in Linux Kernel up to 6.18.6/6.19-rc5 and classified as critical . The impacted element is the function rt6_uncached_list_del in the library lib/dump_stack.c of the component IPv4 . The manipulation results in use after free. This vulnerability is reported as CVE-2026-23...
Read Full Article →
CVE-2026-22999 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 qfq_change_class allocation of resources (EUVD-2026-4624)
▼
A vulnerability has been found in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 and classified as critical . The affected element is the function qfq_change_class . The manipulation leads to allocation of resources. This vulnerability is documented as CVE-2026-22999 . The attack requires being on th...
Read Full Article → *(Covered by: VulnDB)*
CVE-2026-23005 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 fpu_update_guest_xfd state issue (EUVD-2026-4627)
▼
A vulnerability, which was classified as critical , was found in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 . Impacted is the function fpu_update_guest_xfd . Executing a manipulation can lead to state issue. This vulnerability is registered as CVE-2026-23005 . The attack requires access to the lo...
Read Full Article →
CVE-2026-22998 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 nvmet_tcp_handle_h2c_data_pdu null pointer dereference (EUVD-2026-4629)
▼
A vulnerability, which was classified as critical , has been found in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 . This issue affects the function nvmet_tcp_handle_h2c_data_pdu . Performing a manipulation results in null pointer dereference. This vulnerability is cataloged as CVE-2026-22998 . The...
Read Full Article →
CVE-2026-23003 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 ip6_tunnel include/net/inet_ecn.h skb_vlan_inet_prepare information disclosure (EUVD-2026-4621)
▼
A vulnerability described as critical has been identified in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 . Affected by this issue is the function skb_vlan_inet_prepare in the library include/net/inet_ecn.h of the component ip6_tunnel . The manipulation results in information disclosure. This vulne...
Read Full Article →
CVE-2026-1419 | D-Link DCS700l 1.03.09 Web Form /setDayNightMode LightSensorControl command injection
▼
A vulnerability labeled as critical has been found in D-Link DCS700l 1.03.09 . Affected is an unknown function of the file /setDayNightMode of the component Web Form Handler . Executing a manipulation of the argument LightSensorControl can lead to command injection. The identification of this vul...
Read Full Article →
CVE-2020-36937 | Microvirt MEMU PLAY 3.7.0 MEmusvc Windows Service unquoted search path (Exploit 49016)
▼
A vulnerability identified as problematic has been detected in Microvirt MEMU PLAY 3.7.0 . This impacts an unknown function of the component MEmusvc Windows Service . Performing a manipulation results in unquoted search path. This vulnerability was named CVE-2020-36937 . The attack needs to be ap...
Read Full Article →
CVE-2020-36935 | KMSpico Service KMSELDI 17.1.0.0 Service_KMS.exe unquoted search path (Exploit 49003)
▼
A vulnerability categorized as problematic has been discovered in KMSpico Service KMSELDI 17.1.0.0 . This affects an unknown function of the file C:\Program Files\KMSpico\Service_KMS.exe . Such manipulation leads to unquoted search path. This vulnerability is uniquely identified as CVE-2020-36935...
Read Full Article →
CVE-2020-36933 | HTC IPTInstaller 4.0.9 PassThru Service unquoted search path (Exploit 49006)
▼
A vulnerability was found in HTC IPTInstaller 4.0.9 . It has been rated as problematic . The impacted element is an unknown function of the component PassThru Service . This manipulation causes unquoted search path. This vulnerability is handled as CVE-2020-36933 . It is possible to launch the at...
Read Full Article →
CVE-2020-36934 | Deepinstinct Deep Instinct Windows Agent 1.2.24.0 DeepNetworkService.exe unquoted search path (Exploit 49020)
▼
A vulnerability was found in Deepinstinct Deep Instinct Windows Agent 1.2.24.0 . It has been declared as problematic . The affected element is an unknown function of the file C:\Program Files\HP Sure Sense\DeepNetworkService.exe . The manipulation results in unquoted search path. This vulnerabili...
Read Full Article →
CVE-2020-36936 | Magic Utilities Magic Mouse 2 Utilities 2.20 Windows Service unquoted search path (Exploit 49017)
▼
A vulnerability was found in Magic Utilities Magic Mouse 2 Utilities 2.20 . It has been classified as problematic . Impacted is an unknown function of the component Windows Service . The manipulation leads to unquoted search path. This vulnerability is traded as CVE-2020-36936 . An attack has to ...
Read Full Article →
CVE-2020-36932 | SeaCMS up to 11.1 Admin Settings Page checkuser cross site scripting (Exploit 49251 / EDB-49251)
▼
A vulnerability was found in SeaCMS up to 11.1 and classified as problematic . This issue affects some unknown processing of the component Admin Settings Page . Executing a manipulation of the argument checkuser can lead to cross site scripting. This vulnerability appears as CVE-2020-36932 . The ...
Read Full Article →
CVE-2020-36931 | Click2Magic up to 1.1.5 cross site scripting (Exploit 49347 / EDB-49347)
▼
A vulnerability has been found in Click2Magic up to 1.1.5 and classified as problematic . This vulnerability affects unknown code. Performing a manipulation results in cross site scripting. This vulnerability is reported as CVE-2020-36931 . The attack is possible to be carried out remotely. Moreo...
Read Full Article →
CVE-2026-1418 | GPAC up to 2.4.0 SRT Subtitle Import text_to_bifs.c gf_text_import_srt_bifs out-of-bounds write (Issue 3425)
▼
A vulnerability, which was classified as critical , was found in GPAC up to 2.4.0 . This affects the function gf_text_import_srt_bifs of the file src/scene_manager/text_to_bifs.c of the component SRT Subtitle Import . Such manipulation leads to out-of-bounds write. This vulnerability is documente...
Read Full Article →
CVE-2026-1417 | GPAC up to 2.4.0 filedump.c dump_isom_rtp null pointer dereference (Issue 3426)
▼
A vulnerability, which was classified as problematic , has been found in GPAC up to 2.4.0 . Affected by this issue is the function dump_isom_rtp of the file applications/mp4box/filedump.c . This manipulation causes null pointer dereference. This vulnerability is registered as CVE-2026-1417 . The ...
Read Full Article → *(Covered by: VulnDB)*
CVE-2026-1415 | GPAC up to 2.4.0 media_export.c gf_media_export_webvtt_metadata Name null pointer dereference (Issue 3428)
▼
A vulnerability classified as problematic has been found in GPAC up to 2.4.0 . Affected is the function gf_media_export_webvtt_metadata of the file src/media_tools/media_export.c . The manipulation of the argument Name leads to null pointer dereference. This vulnerability is listed as CVE-2026-14...
Read Full Article →
CVE-2026-1414 | Sangfor Operation and Maintenance Security Management System HTTP POST Request get_Information getInformation command injection
▼
A vulnerability described as critical has been identified in Sangfor Operation and Maintenance Security Management System up to 3.0.12 . This impacts the function getInformation of the file /equipment/get_Information of the component HTTP POST Request Handler . Executing a manipulation of the arg...
Read Full Article → *(Covered by: VulnDB)*
CVE-2026-1411 | Beetel 777VR1 up to 01.00.09/01.00.09_55 UART Interface access control
▼
A vulnerability identified as critical has been detected in Beetel 777VR1 up to 01.00.09/01.00.09_55 . The affected element is an unknown function of the component UART Interface . This manipulation causes improper access controls. The identification of this vulnerability is CVE-2026-1411 . It is...
Read Full Article → *(Covered by: VulnDB)*
CVE-2026-1407 | Beetel 777VR1 up to 01.00.09/01.00.09_55 UART Interface information disclosure (EUVD-2026-4651)
▼
A vulnerability was found in Beetel 777VR1 up to 01.00.09/01.00.09_55 . It has been classified as problematic . This affects an unknown part of the component UART Interface . Performing a manipulation results in information disclosure. This vulnerability is known as CVE-2026-1407 . The attack may...
Read Full Article →
CVE-2025-6461 | cubewp1211 CubeWP Framework Plugin up to 1.1.27 on WordPress class-cubewp-search-ajax-hooks.php information disclosure
▼
A vulnerability was found in cubewp1211 CubeWP Framework Plugin up to 1.1.27 on WordPress and classified as problematic . Affected by this issue is some unknown functionality of the file class-cubewp-search-ajax-hooks.php . Such manipulation leads to information disclosure. This vulnerability is ...
Read Full Article →
CVE-2026-1406 | lcg0124 BootDo up to 5ccd963c74058036b466e038cff37de4056c1600 Host Header AccessControlFilter.java redirectToLogin Hostname
▼
A vulnerability has been found in lcg0124 BootDo up to 5ccd963c74058036b466e038cff37de4056c1600 and classified as problematic . Affected by this vulnerability is the function redirectToLogin of the file AccessControlFilter.java of the component Host Header Handler . This manipulation of the argum...
Read Full Article →
ShinyHunters claim to be behind SSO-account data theft attacks
▼
Lawrence Abrams reports: The ShinyHunters extortion gang claims it is behind a wave of ongoing voice phishing attacks targeting single sign-on (SSO) accounts at Okta, Microsoft, and Google, enabling threat actors to breach corporate SaaS platforms and steal company data for extortion. In these at...
Read Full Article →
France’s Waltio faces ransom threat from notorious hacker collective
▼
Caroline Alvarez reports: Waltio, a French crypto tax platform, is under siege from ShinyHunters, a notorious ransomware group claiming to hold the personal data of nearly 50,000 users. ShinyHunters, known for high-profile crypto and corporate hacks, is threatening to leak users’ 2024 tax reports...
Read Full Article →
CVE-2025-13920 | WP Directory Kit Plugin up to 1.4.9 on WordPress AJAX wdk_public_action information disclosure (EUVD-2026-4542)
▼
A vulnerability, which was classified as problematic , was found in WP Directory Kit Plugin up to 1.4.9 on WordPress. Affected is the function wdk_public_action of the component AJAX Handler . The manipulation results in information disclosure. This vulnerability is reported as CVE-2025-13920 . T...
Read Full Article →
CVE-2026-0862 | PDFCrowd Save as PDF Plugin up to 4.5.5 on WordPress cross site scripting (EUVD-2026-4541)
▼
A vulnerability, which was classified as problematic , has been found in PDFCrowd Save as PDF Plugin up to 4.5.5 on WordPress. This impacts an unknown function. The manipulation leads to cross site scripting. This vulnerability is documented as CVE-2026-0862 . The attack can be initiated remotely...
Read Full Article →
CVE-2026-0593 | WP Go Maps Plugin up to 10.0.04 on WordPress Map Engine Setting processBackgroundAction authorization (EUVD-2026-4540)
▼
A vulnerability classified as problematic was found in WP Go Maps Plugin up to 10.0.04 on WordPress. This affects the function processBackgroundAction of the component Map Engine Setting Handler . Executing a manipulation can lead to missing authorization. This vulnerability is registered as CVE-...
Read Full Article →
CVE-2026-0911 | Hustle Plugin up to 7.8.9.2 on WordPress action_import_module unrestricted upload (EUVD-2026-4543)
▼
A vulnerability classified as critical has been found in Hustle Plugin up to 7.8.9.2 on WordPress. The impacted element is the function action_import_module . Performing a manipulation results in unrestricted upload. This vulnerability is cataloged as CVE-2026-0911 . It is possible to initiate th...
Read Full Article →
CVE-2026-24656 | Apache Karaf up to 2.11.x Decanter log-socket Collector deserialization
▼
A vulnerability described as problematic has been identified in Apache Karaf up to 2.11.x . The affected element is an unknown function of the component Decanter log-socket Collector . Such manipulation leads to deserialization. This vulnerability is listed as CVE-2026-24656 . The attack may be p...
Read Full Article →
CVE-2026-24401 | Avahi up to 0.9rc2 mDNS/DNS-SD lookup_handle_cname recursion (ID 501 / EUVD-2026-4603)
▼
A vulnerability marked as problematic has been reported in Avahi up to 0.9rc2 . Impacted is the function lookup_handle_cname of the component mDNS/DNS-SD . This manipulation causes uncontrolled recursion. This vulnerability is tracked as CVE-2026-24401 . The attack is possible to be carried out r...
Read Full Article →
CVE-2025-13952 | Imagination Graphics DDK up to 25.2 RTM use after free (EUVD-2026-4593)
▼
A vulnerability labeled as critical has been found in Imagination Graphics DDK up to 25.2 RTM . This issue affects some unknown processing. The manipulation results in use after free. This vulnerability is identified as CVE-2025-13952 . The attack can be executed remotely. There is not any exploi...
Read Full Article →
CVE-2026-24407 | InternationalColorConsortium iccDEV up to 2.3.1.1/2.3.1.2 icSigCalcOp denial of service (ID 481 / EUVD-2026-4607)
▼
A vulnerability identified as problematic has been detected in InternationalColorConsortium iccDEV up to 2.3.1.1/2.3.1.2 . This vulnerability affects the function icSigCalcOp . The manipulation leads to denial of service. This vulnerability is referenced as CVE-2026-24407 . Remote exploitation of...
Read Full Article → *(Covered by: VulnDB)*
CVE-2026-24403 | InternationalColorConsortium iccDEV up to 2.3.1.1/2.3.1.2 CIccProfile::CheckHeader tag tables/offsets/size integer overflow (ID 505 / EUVD-2026-4611)
▼
A vulnerability was found in InternationalColorConsortium iccDEV up to 2.3.1.1/2.3.1.2 . It has been classified as critical . Affected is the function CIccProfile::CheckHeader . This manipulation of the argument tag tables/offsets/size causes integer overflow. This vulnerability is handled as CVE...
Read Full Article →
CVE-2026-24469 | frustratedProton http-server up to 1.0 HTTP Request handleRequest filename path traversal (GHSA-qp54-6gfq-3gff / EUVD-2026-4601)
▼
A vulnerability classified as critical was found in frustratedProton http-server up to 1.0 . Impacted is the function RequestHandler::handleRequest of the component HTTP Request Handler . Such manipulation of the argument filename leads to path traversal. This vulnerability is documented as CVE-2...
Read Full Article →
CVE-2026-24421 | thorsten phpMyFAQ up to 4.0.16 Endpoint SetupController.php userIsAuthenticated authorization (GHSA-wm8h-26fv-mg7g / EUVD-2026-4258)
▼
A vulnerability classified as problematic has been found in thorsten phpMyFAQ up to 4.0.16 . This issue affects the function userIsAuthenticated of the file SetupController.php of the component Endpoint . This manipulation causes missing authorization. This vulnerability is registered as CVE-2026...
Read Full Article →
CVE-2026-24420 | thorsten phpMyFAQ up to 4.0.16 attachment.php access control (GHSA-7p9h-m7m8-vhhv / EUVD-2026-4259)
▼
A vulnerability described as critical has been identified in thorsten phpMyFAQ up to 4.0.16 . This vulnerability affects unknown code of the file attachment.php . The manipulation results in improper access controls. This vulnerability is cataloged as CVE-2026-24420 . The attack may be launched r...
Read Full Article →
CVE-2026-24422 | thorsten phpMyFAQ up to 4.0.16 API Endpoint list information disclosure (GHSA-j4rc-96xj-gvqc / EUVD-2026-4257)
▼
A vulnerability marked as problematic has been reported in thorsten phpMyFAQ up to 4.0.16 . This affects the function OpenQuestionController::list of the component API Endpoint . The manipulation leads to information disclosure. This vulnerability is listed as CVE-2026-24422 . The attack may be i...
Read Full Article →
Spammers abuse Zendesk to flood inboxes with legitimate-looking emails, but why?
▼
Spammers are abusing Zendesk to flood inboxes with emails from trusted brands. There’s no phishing or malware—just noise.
Read Full Article →
5 Hot Cybersecurity Certifications for Salary Growth in 2026
▼
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 23, 2026 –Read the full story in SkillUp Cybercrime was predicted to cost the world $10.5 trillion annually in 2025, and to reach $12.2 trillion by 2031, according to Cybersecurity Ventures, and there’s Th...
Read Full Article →
ShinyHunters group opens new dark web leak site, claims responsibility for OKTA vishing campaign
▼
Over on LinkedIn, AlonGal of Hudson Rock wrote: BIG – ShinyHunters confirmed to me that they are behind the recent Okta vishing campaign and have published alleged data from three major victims (Crunchbase, SoundCloud, and Betterment) on their new blog, stating more are coming. 🔽 I was approached...
Read Full Article →
INC ransomware opsec fail allowed data recovery for 12 US orgs
▼
Bill Toulas reports: An operational security failure allowed researchers to recover data that the INC ransomware gang stole from a dozen U.S. organizations. A deep forensic examination of the artifacts left behind uncovered tooling that had not been used in the investigated attack, but exposed at...
Read Full Article →
I scan, you scan, we all scan for... knowledge?
▼
In this week's newsletter, Bill hammers home the old adage, "Know your environment" — even throughout alert fatigue.
Read Full Article →
How Public Container Registries Have Become a Silent Risk Multiplier in a Modern Supply Chain
▼
Key Takeaways The Risk Introduced by Implicit Trust in Public Container Images Public container registries have become foundational to modern software development. A single docker pull can accelerate application delivery, standardize environments, and reduce operational friction across teams. How...
Read Full Article →
LastPass ‘create backup’ email is a phishing scam targeting your master password
▼
Attackers are abusing maintenance-themed alerts to steal master passwords from LastPass users. Password managers are still top-tier targets Password managers remain in the middle of attackers’ crosshairs, largely because a single successful compromise can unlock access to dozens, or even hundreds...
Read Full Article →
Europe’s GDPR cops dished out €1.2B in fines last year as data breaches piled up
▼
Carly Page reports: GDPR fines pushed past the £1 billion (€1.2 billion) mark in 2025 as Europe’s regulators were deluged with more than 400 data breach notifications a day, according to a new survey that suggests the post-plateau era of enforcement has well and truly arrived. The figures come fr...
Read Full Article →
Foxit, Epic Games Store, MedDreams vulnerabilities
▼
Cisco Talos’ Vulnerability Discovery & Research team recently disclosed three vulnerabilities in Foxit PDF Editor, one in the Epic Games Store, and twenty-one in MedDream PACS.. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisc...
Read Full Article →
Fake LastPass maintenance emails target users
▼
LastPass is warning users about phishing emails that pressure users to back up their vaults within 24 hours.
Read Full Article →
Top 10 Ransomware Attacks Over The Past Year
▼
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 22, 2026 –Read the full story in SOC Radar In 2025, ransomware moved beyond isolated IT incidents and became a systemic risk, capable of disrupting national supply chains, critical services, and The post T...
Read Full Article →
UK Launches ‘Report Fraud’ as Scams Reach New Heights
▼
The City of London Police has officially launched Report Fraud — a unified national service designed to transform how the public reports cybercrime and fraud across England, Wales and Northern Ireland. The new platform aims to strengthen the UK’s response to digital scams and economic crime. Cybe...
Read Full Article →
Under Armour ransomware breach: data of 72 million customers appears on the dark web
▼
Customer data allegedly stolen during a ransomware attack on sportswear giant Under Armour is now circulating on the dark web.
Read Full Article →- ANY.RUN Sandbox & MISP Integration: Confirm Alerts Faster, Stop Incidents Early — Most SOC teams are overloaded with routine work. Tier 1 & 2 analysts spend too much time validating alerts, moving samples between tools, and chasing missing context. When integrations are weak, investigations slow down, MTTR grows, and SLAs suffer delays. That directly increases operational risk…
Qualys Named a Leader and Outperformer in the 2025 GigaOm Radar for CNAPP
▼
We’re proud to share that Qualys has been recognized as a Leader and Outperformer in the 2025 GigaOm Radar Report for Cloud-Native Application Protection Platforms (CNAPP). This year’s evaluation underscores an important reality of the CNAPP market: while 18 vendors were evaluated, only a small s...
Read Full Article →
Can you use too many LOLBins to drop some RATs?
▼
An attempt to drop two RATs on a system used an uncanny assortment of legitimate Windows tools.
Read Full Article →
Best Cybersecurity Newsletters Shortlist For 2026
▼
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 21, 2026 –Read the full story in The CTO Club With new cyber vulnerabilities emerging daily, it’s not enough to rely solely on the tools at hand—keeping your team informed and The post Best Cybersecurity N...
Read Full Article →
Black Basta Ransomware Group Exposed in Europe, Russian Leader Is Now Among EU’s Most Wanted
▼
European and Ukrainian authorities have exposed two alleged key members of the Black Basta cybercrime group and identified its alleged leader
Read Full Article →
Malicious Google Calendar invites could expose private data
▼
Researchers showed how prompt injection hidden in a calendar invite can bypass privacy controls and turn an AI assistant into a data-leaking accomplice.
Read Full Article →
Under Armour - 72,742,892 breached accounts
▼
In November 2025, the Everest ransomware group claimed Under Armour as a victim and attempted to extort a ransom , alleging they had obtained access to 343GB of data. In January 2026, customer data from the incident was published publicly on a popular hacking forum , including 72M email addresses...
Read Full Article →
Oracle January 2026 Critical Patch Update Addresses 158 CVEs
▼
Oracle addresses 158 CVEs in its first quarterly update of 2026 with 337 patches, including 27 critical updates. Key takeaways: The first Critical Patch Update (CPU) for 2026, contains fixes for 158 unique CVEs in 337 security updates. 27 issues (8% of all patches) were assigned a critical severi...
Read Full Article →
Tenable Discovers SSRF Vulnerability in Java TLS Handshakes That Creates DoS Risk
▼
Tenable Research has discovered a server-side request forgery (SSRF) vulnerability in Java’s handling of client certificates during a TLS handshake. In certain configurations, this can be abused to cause a denial-of-service (DoS) condition. Key takeaways Tenable Research identified a vulnerabilit...
Read Full Article →
VU#481830: Libheif uncompressed codec lacks bounds check leading to application crash
▼
Overview An out-of-bounds memory access vulnerability exists in the uncompressed decoder component of libheif . A maliciously crafted HEIF image can trigger a denial-of-service condition by causing the libheif library to crash or exhibit other unexpected behavior due to an out-of-bounds memory ac...
Read Full Article →
VU#102648: Code injection vulnerability in binary-parser library
▼
Overview The binary-parser library for Node.js contains a code injection vulnerability that may allow arbitrary JavaScript code execution if untrusted input is used to construct parser definitions. Versions prior to 2.3.0 are affected. The issue has been resolved by the developer in a public upda...
Read Full Article →
VU#458022: Open5GS WebUI uses a hard-coded secrets including JSON Web Token signing key
▼
Overview The Open5GS WebUI component contains default hardcoded secrets used for security-sensitive operations, including JSON Web Token (JWT) signing. If these defaults are not changed, an attacker can forge valid authentication tokens and gain administrative access to the WebUI. This can result...
Read Full Article →
VU#271649: Stack-based buffer overflow in libtasn1 versions v4.20.0 and earlier
▼
Overview A stack-based buffer overflow vulnerability exists in GNU libtasn1, a low-level ASN.1 parsing library. The issue is caused by unsafe string concatenation in the asn1_expand_octet_string function located in decoding.c . Under worst-case conditions, this results in a one-byte stack overflo...
Read Full Article →
Cybersecurity Predictions for 2026 Signal the Maturation of Risk-First Security Models
▼
Key Takeaways The Signals Are Loud, the Dashboards Are Full, Yet Decisive Action Remains Elusive By the end of 2025, many security leaders reached a quiet conclusion. The challenge was no longer a lack of tools, telemetry, or frameworks. Most enterprises already had all three. What remained unres...
Read Full Article →
VU#818729: Safetica contains a kernel driver vulnerability
▼
Overview Kernel driver ProcessMonitorDriver.sys in Safetica's endpoint client x64, versions 10.5.75.0 and 11.11.4.0, allows for an unprivileged user to abuse an IOCTL path and terminate protected system processes. Description Safetica is a Data Loss Prevention (DLP) and Insider Risk Management (I...
Read Full Article →
VU#244846: Server-Side Template Injection (SSTI) vulnerability exist in Genshi
▼
Overview A Server-Side Template Injection (SSTI) vulnerability exists in the Genshi template engine due to unsafe evaluation of template expressions. Genshi processes template expressions using Python’s 'eval()’ and ‘exec()’ functions while allowing fallback access to Python built-in objects. If ...
Read Full Article →
Mastercard CEO Michael Miebach On Cybersecurity at World Economic Forum
▼
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 20, 2026 –Read the full story in World Economic Forum “Cybersecurity is the foundation for our digital world. It is at the heart of trust and will allow society to fully The post Mastercard CEO Michael Mie...
Read Full Article →
VU#924114: dr_flac contains an integer overflow vulnerability that allows for DoS when provided a crafted file
▼
Overview dr_flac , an open-source FLAC audio decoder, part of the dr_libs audio decoder toolset, contains an integer overflow vulnerability allowing for denial of service (DoS) when provided a specific crafted file. An attacker can exploit this vulnerability through providing a tool that uses dr_...
Read Full Article →- Malware Trends Report 2025: New Security Risks for Businesses in 2026 — Summarizing the past year’s threat landscape based on activity observed in ANY.RUN’s Interactive Sandbox, this annual report provides insights into the most detected malware types, families, TTPs, and phishing threats of 2025. For additional insights, view ANY.RUN’s quarterly malware trends repor…
Computer History, 1989: The Queen Of The Hackers Tracked Down By U.S. Secret Service
▼
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 19, 2026 –Watch the YouTube video On Aug. 17, 1990, a federal judge sentenced a Chicago woman to 27 months in prison for masterminding a nationwide ring of computer hackers that stole more The post Compute...
Read Full Article →
Firefox joins Chrome and Edge as sleeper extensions spy on users
▼
Researchers found more sleeper browser extensions that spy on users and install backdoors, this time targeting Firefox users as well.
Read Full Article →
A week in security (January 12 – January 18)
▼
Last week on Malwarebytes Labs: Stay safe!
Read Full Article →
Why Managed Detection and Response Has Become Essential to Modern Cyber Resilience
▼
Managed Detection and Response (MDR) delivers 24/7 threat detection, intelligence-led hunting, and rapid response—moving organizations beyond basic monitoring to active defense. MDR providers combine advanced analytics, AI, and human expertise to deliver scalable MDR services tailored to regional...
Read Full Article →
First Trust NASDAQ Cybersecurity ETF Growth Thesis For 2026
▼
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 16, 2026 –Read the full story in AIInvest The macro tailwind for the cybersecurity sector is now a tidal wave, according to AIInvest. Global spending on security products and services is projected The post...
Read Full Article →
WhisperPair exposes Bluetooth earbuds and headphones to tracking and eavesdropping
▼
Researchers demonstrated WhisperPair, a set of attacks that can take control of many widely used Bluetooth earbuds and headphones without user interaction.
Read Full Article →
VU#383552: thelibrarian does not secure its interface, allowing for access to internal system data
▼
Overview Multiple vulnerabilities were discovered in The Librarian, an AI-powered personal assistant tool provided by the company TheLibrarian.io . The Librarian can be used to manage personal email, calendar, documents, and other information through external services, such as Gmail and Google Dr...
Read Full Article →
VU#650657: Livewire Filemanager contains an insecure .php component that allows for unauthenticated RCE in Laravel Products
▼
Overview A vulnerability, tracked as CVE-2025-14894, has been discovered within Livewire Filemanager, a tool designed for usage within Laravel applications. The Livewire Filemanager tool allows for users to upload various files, including PHP files, and host them within the Laravel application. W...
Read Full Article →
Threat and Vulnerability Management in 2026
▼
Understand the future of threat and vulnerability management (TVM). Learn what TVM is, why traditional tools fail, and how intelligence is essential in today’s landscape.
Read Full Article →
Predicting 2026
▼
In this week’s newsletter, Martin examines the evolving landscape for 2026, highlighting key threats, emerging trends like AI-driven risks, and the continued importance of addressing familiar vulnerabilities.
Read Full Article →
Your VMDR Year in Review: Making Security Progress Visible and Actionable
▼
Security Teams Rarely Stop to Reflect When a security program is working well, very little seems to happen. That is by design. There is no alert for the incident that was prevented. No visibility into the attack path that was quietly closed. No recognition for the vulnerability that was fixed bef...
Read Full Article →
WEF: AI overtakes ransomware as fastest-growing cyber risk
▼
We can no longer say that artificial intelligence is a "future risk", lurking somewhere on a speculative threat horizon. The truth is that it is a fast-growing cybersecurity risk that organizations are facing today. That's not just my opinion, that's also the message that comes loud and clear fro...
Read Full Article →
Why Serverless Risk Demands Identity-Aware Security at Cloud Scale
▼
Key Takeaways The Current Picture Serverless adoption is accelerating as organizations prioritize speed, scalability, and operational efficiency. According to the Data Bridge Market Research’s Global Serverless Security Market Report, the serverless security market reached USD 12.08 billion in 20...
Read Full Article →
VU#472136: Information Leak and DoS Vulnerabilities in Redmi Buds 3 Pro through 6 Pro
▼
Overview Redmi Buds , a series of Bluetooth earbuds produced and sold by Xiaomi , contain an Information Leak vulnerability and a Denial of Service (DoS) vulnerability in versions 3 Pro through 6 Pro. An attacker within Bluetooth radio range can send specially crafted RFCOMM protocol interactions...
Read Full Article →
Closing the Door on Net-NTLMv1: Releasing Rainbow Tables to Accelerate Protocol Deprecation
▼
Written by: Nic Losby Introduction Mandiant is publicly releasing a comprehensive dataset of Net-NTLMv1 rainbow tables to underscore the urgency of migrating away from this outdated protocol. Despite Net-NTLMv1 being deprecated and known to be insecure for over two decades—with cryptanalysis dati...
Read Full Article →
Canon U.S.A. Managing Office Technology, IT Infrastructure And Cybersecurity Under One Roof
▼
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 15, 2026 –Read the full story in Brandpoint Today’s businesses face unprecedented challenges, from the increasing complexity of digital transformations and hybrid cloud environments to constantly evolving ...
Read Full Article →
“Reprompt” attack lets attackers steal data from Microsoft Copilot
▼
Researchers uncovered a way to steal data from Microsoft Copilot users with a single malicious link.
Read Full Article →
Aembit Announces Agenda and Speaker Lineup for NHIcon 2026 on Agentic AI Security
▼
Silver Spring, Maryland, 15th January 2026, CyberNewsWire The post Aembit Announces Agenda and Speaker Lineup for NHIcon 2026 on Agentic AI Security appeared first on The Security Ledger with Paul F. Roberts .
Read Full Article →
UAT-8837 targets critical infrastructure sectors in North America
▼
Cisco Talos is closely tracking UAT-8837, a threat actor we assess with medium confidence is a China-nexus advanced persistent threat (APT) actor.
Read Full Article →
CVE-2025-64155: Exploit Code Released for Critical Fortinet FortiSIEM Command Injection Vulnerability
▼
Exploit code has been published for CVE-2025-64155, a critical command injection vulnerability affecting Fortinet FortiSIEM devices. Key takeaways: CVE-2025-64155 is a critical operating system (OS) command injection vulnerability affecting Fortinet FortiSIEM. Fortinet vulnerabilities have histor...
Read Full Article →
A 0-click exploit chain for the Pixel 9 Part 3: Where do we go from here?
▼
While our previous two blog posts provided technical recommendations for increasing the effort required by attackers to develop 0-click exploit chains, our experience finding, reporting and exploiting these vulnerabilities highlighted some broader issues in the Android ecosystem. This post descri...
Read Full Article →
A 0-click exploit chain for the Pixel 9 Part 2: Cracking the Sandbox with a Big Wave
▼
With the advent of a potential Dolby Unified Decoder RCE exploit, it seemed prudent to see what kind of Linux kernel drivers might be accessible from the resulting userland context, the mediacodec context. As per the AOSP documentation, the mediacodec SELinux context is intended to be a constrain...
Read Full Article →
A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby
▼
Over the past few years, several AI-powered features have been added to mobile phones that allow users to better search and understand their messages. One effect of this change is increased 0-click attack surface, as efficient analysis often requires message media to be decoded before the message...
Read Full Article →
Phishing scammers are posting fake “account restricted” comments on LinkedIn
▼
Fake LinkedIn comments warning of account restrictions are designed to trick users into revealing their login details.
Read Full Article →
Identity & Beyond: 2026 Incident Response Predictions
▼
In 2026, incident response (IR) will continue its shift away from traditional malware-centric investigations toward identity-driven intrusions, abuse of trusted cloud services, and low-signal, high-impact activity that blends seamlessly into normal business operations. Rather than relying on tech...
Read Full Article →
AI-Powered Deepfake Scams Are A Pain In The Wallet
▼
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 14, 2026 –Read the full story in Finextra With the democratization of artificial intelligence (AI) technology, deepfakes are becoming a popular tool among cybercriminals with which to scam consumers, busin...
Read Full Article →
How real software downloads can hide remote backdoors
▼
Attackers use legitimate open-source software as cover, relying on user trust to compromise systems. We dive into an example.
Read Full Article →
Brushstrokes and breaches with Terryn Valikodath
▼
Terryn’s path to cybersecurity started with a fascination for criminal forensics and a knack for jailbreaking his family's tech — interests that eventually steered him toward the fast-paced world of digital investigations.
Read Full Article →- German Manufacturing Under Phishing Attacks: Tracking a Stealthy AsyncRAT Campaign — Manufacturing companies have quietly become one of the most hunted species in the modern threat landscape. Not because they are careless, but because they are operationally critical, geographically distributed, and often rely on complex IT and OT environments that attackers love to probe. Key Tak…
Microsoft and Adobe Patch Tuesday, January 2026 Security Update Review
▼
Starting the year on a security-first note, Microsoft’s January 2026 Patch Tuesday resolves several vulnerabilities that could impact enterprise environments. Here’s a quick breakdown of what you need to know. Microsoft Patch Tuesday for January 2026 This month’s release addresses 115 vulnerabili...
Read Full Article →
Microsoft’s January 2026 Patch Tuesday Addresses 113 CVEs (CVE-2026-20805)
▼
8 Critical 105 Important 0 Moderate 0 Low Microsoft addresses 113 CVEs in the first Patch Tuesday of 2026, with two zero-days, including one that was exploited in the wild. Microsoft patched 113 CVEs in its January 2026 Patch Tuesday release, with eight rated critical and 105 rated as important. ...
Read Full Article →
Microsoft Patch Tuesday for January 2026 — Snort rules and prominent vulnerabilities
▼
Microsoft has released its monthly security update for January 2026, which includes 112 vulnerabilities affecting a range of products, including 8 that Microsoft marked as “critical”.
Read Full Article →
The AI Fix #83: ChatGPT Health, Victorian LLMs, and the biggest AI bluffers
▼
In episode 83 of The AI Fix, Graham reveals he's taken up lying to LLMs, and shows how a journalist exposed AI bluffers with a made-up idiom. Meanwhile Mark invents a "Godwin's Law" for AI, and explains how to ruin any LLM with humus. Also in this episode, a marriage is declared invalid thanks to...
Read Full Article →
In The Future: Breach Ready, Board Ready, and AI-Powered Cybersecurity
▼
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 13, 2026 –Read the full story in Voice & Data Cybersecurity Ventures estimated that the global cost of cybercrime would reach $10.5 trillion USD annually by 2025, and ransomware would cost its The post In ...
Read Full Article →
Hackers get hacked, as BreachForums database is leaked
▼
Have you ever stolen data, traded a hacking tool, or just lurked on a dark web forum believing that you are anonymous? If so, I might have some unsettling news for you. Read more in my article on the Hot for Security blog.
Read Full Article →- CastleLoader Analysis: A Deep Dive into Stealthy Loader Targeting Government Sector — ANY.RUN’s team conducted an extensive malware analysis of CastleLoader, the first link in the chain of attacks impacting various industries, including government agencies and critical infrastructures. It’s a unique walkthrough of its entire execution path, from a packaged installer to C2 server c…
Best Ransomware Detection Tools
▼
Stop ransomware before encryption begins. Learn how intelligence-driven detection tools can help identify precursor behaviors and reduce false positives for faster response.
Read Full Article →
December 2025 CVE Landscape: 22 Critical Vulnerabilities Mark 120% Surge, React2Shell Dominates Threat Activity
▼
December 2025 saw a 120% surge in critical CVEs, with 22 exploited flaws and React2Shell (CVE-2025-55182) dominating threat activity across Meta’s React framework.
Read Full Article →
10 Hot Cyber Range Companies To Watch In 2026
▼
Bridging the cybersecurity skills gap with virtual hands-on experience – Steve Morgan, Editor-in-Chief Sausalito, Calif. – Jan. 12, 2026 A cyber range is designed to mimic real-world scenarios that can be used to detect and react to simulated cyberattacks, and to enable practitioners to test The ...
Read Full Article →
Received an Instagram password reset email? Here’s what you need to know
▼
Instagram users received emails last week about purported password reset attempts. At the same time, Instagram data appeared on the dark web.
Read Full Article →
Tenable Is a Gartner® Peer Insights™ Customers’ Choice for Cloud-Native Application Protection Platforms
▼
This recognition — based entirely on feedback from the people who use our products every day — to us is a testament to the unmatched value Tenable Cloud Security CNAPP offers organizations worldwide. Our key takeaways: In our view, this peer recognition confirms Tenable’s strategic value in helpi...
Read Full Article →
BreachForums (2025) - 672,247 breached accounts
▼
In October 2025, a reincarnation of the hacking forum BreachForums, which had previously been shut down multiple times, was taken offline by a coalition of law enforcement agencies . In the months leading up to the takedown, the site itself suffered a data breach that exposed a total of 672k uniq...
Read Full Article →
VU#361400: BeeS Software Solutions BeeS Examination Tool (BET) portal contains SQL injection vulnerability
▼
Overview The BeeS Examination Tool (BET) portal from BeeS Software Solutions contains an SQL injection vulnerability in its website login functionality. More than 100 universities use the BET portal for test administration and other academic tasks. The vulnerability enables arbitrary SQL commands...
Read Full Article →
Resolutions, shmesolutions (and what’s actually worked for me)
▼
Talos' editor ditches the pressure of traditional New Year’s resolutions in favor of practical, in-the-moment changes, and finds more success by letting go of perfection. Plus, we break down the latest on UAT-7290, a newly disclosed threat actor targeting critical infrastructure.
Read Full Article →
UAT-7290 targets high value telecommunications infrastructure in South Asia
▼
Talos assesses with high confidence that UAT-7290 is a sophisticated threat actor falling under the China-nexus of advanced persistent threat actors (APTs). UAT-7290 primarily targets telecommunications providers in South Asia.
Read Full Article →
How Cisco Talos powers the solutions protecting your organization
▼
What happens under the hood of Cisco's security portfolio? Our reputation and detection services apply Talos' real-time intelligence to detect and block threats. Here's how.
Read Full Article →
GRU-Linked BlueDelta Evolves Credential Harvesting
▼
Insikt Group reveals how GRU-linked BlueDelta evolved credential-harvesting campaigns targeting government, energy, and research organizations across Europe and Eurasia.
Read Full Article →
Cloud Agent in 2025: A Year of Scale, Security, and Smarter Visibility
▼
As we move into 2026, 2025 stands out as a defining year for the Qualys Cloud Agent. In 2025, Cloud Agent delivered deeper visibility into running systems and applications, stronger security controls, expanded support across operating systems and architectures, and meaningful platform modernizati...
Read Full Article →
VU#295169: TOTOLINK EX200 firmware-upload error handling can activate an unauthenticated root telnet service
▼
Overview A flaw in the firmware-upload error-handling logic of the TOTOLINK EX200 extender can cause the device to unintentionally start an unauthenticated root-level telnet service. This condition may allow a remote authenticated attacker to gain full system access. Description In the End-of-Lif...
Read Full Article →
VU#420440: Vulnerable Python version used in Forcepoint One DLP Client
▼
Overview A vulnerability in the Forcepoint One DLP Client allows bypass of the vendor-implemented Python restrictions designed to prevent arbitrary code execution. By reconstructing the ctypes FFI environment and applying a version-header patch to the ctypes.pyd module, an attacker can restore ct...
Read Full Article →
WhiteDate - 6,076 breached accounts
▼
In December 2025, the dating website "for a Europid vision" WhiteDate suffered a data breach that exposed 6k unique email addresses . The breach exposed extensive further personal information including data related to physical appearance, income, education and IQ.
Read Full Article →
New State Laws Impact AI Governance, Risk, and Compliance
▼
New York has started a movement to reshape the AI compliance landscape for companies doing business in the state. Other states are following suit making Governance and AI Compliance an increasingly critical endeavor.
Read Full Article →
New ransomware tactics to watch out for in 2026
▼
Ransomware groups made less money in 2025 despite a 47% increase in attacks, driving new tactics: bundled DDoS services, insider recruitment, and gig worker exploitation. Learn the emerging trends defenders must prepare for in 2026.
Read Full Article →
Cybersecurity Snapshot: Predictions for 2026: AI Attack Acceleration, Automated Remediation, Custom-Made AI Security Tools, Machine Identity Threats, and More
▼
In this special edition, Tenable leaders forecast key 2026 trends, including: AI will make attacks more plentiful and less costly; machine identities will become the top cloud risk; preemptive cloud and exposure management will dethrone runtime detection; and automated remediation gets the go-ahe...
Read Full Article →
LevelBlue SpiderLabs: Ransomware Attacks Up 17% in 2025
▼
Global Ransomware Surges in 2025: Total ransomware attacks rose by 17.2% year-over-year, with LevelBlue SpiderLabs tracking approximately 7,400 incidents compared to 6,017 in 2024. Q ilin and Akira Lead the Threat Landscape: Following the disappearance of Ransomhub and the disr uption of Lockbit3...
Read Full Article →- Integrating a Malware Sandbox into SOAR Workflows: Steps, Benefits, and Impact — SOAR platforms are excellent at moving work forward. They trigger playbooks, route incidents, and enforce consistent response steps. What they don’t do well on their own is confirm what’s actually SOAR helps teams move faster, but speed isn’t the real problem. The real issue is figuring out what …
CVE-2025-14847 (MongoBleed): MongoDB Memory Leak Vulnerability Exploited in the Wild
▼
A recently disclosed vulnerability affecting MongoDB instances has been reportedly exploited in the wild. Exploit code has been released for this flaw dubbed MongoBleed. Key takeaways: MongoBleed is a memory leak vulnerability affecting multiple versions of MongoDB. Exploitation of MongoDB has be...
Read Full Article →-
5 Ways MSSPs Can Win Clients in 2026 — By 2026, MSSPs will compete less on tooling and more on clarity, speed, and foresight. Security buyers want proof that their provider understands what threats matter now, how fast they can respond, and how security decisions reduce business risk. At the center of this challenge sits threat intell…
-
Release Notes: AI Sigma Rules, Live Threat Landscape & 1,700+ New Detections — ANY.RUN is wrapping up 2025 with updates that take pressure off your SOC and help your team work faster. You can now get AI‑generated Sigma rules, track threats by industry and region, and detect new campaigns with better speed and accuracy. Let’s see what these improvements bring to your securit…
-
Malware Trends Q4 2025: Inside ANY.RUN’s Latest Threat Landscape Report — We’re glad to present our regular quarterly report highlighting the most prominent malicious trends of the last three months of 2025, as observed by ANY.RUN’s community. Following the release of our annual report on key threats and milestones, this report offers a closer look at the threat landsc…