themissingsunday
#tech-news

Weekly Scan: Cloud, Cybersecurity, AI News — Jan 25, 2026

Weekly Scan: Cloud, Cybersecurity, AI News — Jan 25, 2026

⚠️ Audio playback is not supported in your browser. Please try Chrome, Edge, or Safari for the best experience.

#This Week in Security: Your News Briefing

Welcome to your weekly security roundup. We’ve tracked down the 10 most important stories this week—the ones everyone’s talking about, from critical threats to emerging trends that could shape your security posture. Leading the news this week is Appsec Roundup - June 2025, which has sparked conversation across 9 sources. Meanwhile, the industry is closely tracking Secure By Design roundup - November 2025 with 5 mentions, along with emerging details on CVE-2026-23008 | Linux Kernel up to 6.18.6/6.19-rc5 vmwgfx null…, CVE-2026-1411 | Beetel 777VR1 up to 01.00.09/01.00.09_55 UART…, and CVE-2025-34165. Here’s the full breakdown of what you need to know.

#🚨 Critical Threats This Week

First, the stories that demand your immediate attention:

1. Appsec Roundup - June 2025 Mentioned across 9 industry sources this week. Lots of fascinating threat model-related advances, new risk management tools, games, and more!. Get the details →

2. CVE-2026-23008 | Linux Kernel up to 6.18.6/6.19-rc5 vmwgfx null pointer dereference (EUVD-2026-4625) Mentioned across 5 industry sources this week. A vulnerability, which was classified as critical , was found in Linux Kernel up to 6. Get the details →

3. CVE-2026-1411 | Beetel 777VR1 up to 01.00.09/01.00.09_55 UART Interface access control Mentioned across 4 industry sources this week. A vulnerability identified as critical has been detected in Beetel 777VR1 up to 01. Get the details →

#🛠️ Tools, Updates & Releases

New capabilities and releases worth knowing about:

1. Secure By Design roundup - November 2025 Perspective on CISOs as facilitators, a deep dive into the types of diagrams for medical devices, po. Referenced in 5 stories this week. Explore →

2. Meeting Third-Party Risk Requirements of DORA in 2026 | UpGuard Learn how to achieve compliance with the third-party risk management standards of the Digital Operat. Referenced in 3 stories this week. Explore →

#What You Should Do Next

Monitor these in your environment next week:

  • Any new CVE announcements related to systems you operate
  • Emerging attack techniques being discussed in the community
  • Updates and patches for tools your team uses

Have a look at the full deep-dives in the trending stories below. Each one provides context that could inform your security decisions this week.


1. Key Threat Intel & Vulnerability Stories (17 mentions)
2. Appsec Roundup - June 2025 (9 mentions)

Lots of fascinating threat model-related advances, new risk management tools, games, and more!

Read Full Article →
3. Secure By Design roundup - November 2025 (5 mentions)

Perspective on CISOs as facilitators, a deep dive into the types of diagrams for medical devices, poetry, Chinese LLMs, Chinese drones and Chinese routers. Do any of them contain secrets?

Read Full Article →
4. MedDream PACS Premium sendOruReport reflected cross-site scripting (XSS) vulnerability (3 mentions)
5. Meeting Third-Party Risk Requirements of DORA in 2026 | UpGuard (3 mentions)

Learn how to achieve compliance with the third-party risk management standards of the Digital Operational Resilience Act (DORA)

Read Full Article →
6. Russia-linked Sandworm APT implicated in major cyber attack on Poland’s power grid (2 mentions)

Russia-linked APT Sandworm launched what was described as the largest cyber attack on Poland’s power grid in Dec 2025. ESET linked a late-2025 cyberattack on Poland’s energy system to the Russia-linked Sandworm APT. “Based on our analysis of the m...

Read Full Article →

#Article Summary

Category Article Count
AI & LLM 6
Cloud 6
Cyber Regulatory 3
Cybersecurity 194
Scraping Candidates 1
Security Vendor Blog 46
Tech 39
Threat Intel & Vulnerability 134
Total Articles Scanned 429

#AI & LLM

Inside Praktika's conversational approach to language learning

How Praktika uses GPT-4.1 and GPT-5.2 to build adaptive AI tutors that personalize lessons, track progress, and help learners achieve real-world language fluency

Read Full Article →
Inside GPT-5 for Work: How Businesses Use GPT-5

A data-driven report on how workers across industries use ChatGPT—covering adoption trends, top tasks, departmental patterns, and the future of AI at work.

Read Full Article →
How Higgsfield turns simple ideas into cinematic social videos

Discover how Higgsfield gives creators cinematic, social-first video output from simple inputs using OpenAI GPT-4.1, GPT-5, and Sora 2.

Read Full Article →
Introducing ChatGPT Go, now available worldwide

ChatGPT Go is now available worldwide, offering expanded access to GPT-5.2 Instant, higher usage limits, and longer memory—making advanced AI more affordable globally.

Read Full Article →
Netomi’s lessons for scaling agentic systems into the enterprise

How Netomi scales enterprise AI agents using GPT-4.1 and GPT-5.2—combining concurrency, governance, and multi-step reasoning for reliable production workflows.

Read Full Article →
How Tolan builds voice-first AI with GPT-5.1

Tolan built a voice-first AI companion with GPT-5.1, combining low-latency responses, real-time context reconstruction, and memory-driven personalities for natural conversations.

Read Full Article →

#Cloud

Amazon Neptune Analytics is now available in 7 additional regions

Amazon Neptune Analytics is now available in US West (N. California), Asia Pacific (Seoul), Asia Pacific (Osaka), Asia Pacific (Hong Kong), Europe (Stockholm), Europe (Paris), and South America (São Paulo) regions. You can now create and manage Neptune Analytics graphs in these new regions and ru...

Read Full Article →
Amazon EC2 G7e instances are now generally available

Today, Amazon announces the general availability of Amazon Elastic Compute Cloud (Amazon EC2) G7e instances, accelerated by NVIDIA RTX PRO 6000 Blackwell Server Edition GPUs. G7e instances offer up to 2.3x inference performance compared to G6e. Customers can use G7e instances to deploy large lang...

Read Full Article →
Amazon Corretto January 2026 Quarterly Updates

On January 20, 2026 Amazon announced quarterly security and critical updates for Amazon Corretto Long-Term Supported (LTS) versions of OpenJDK. Corretto 25.0.2, 21.0.10, 17.0.18, 11.0.30, and 8u482 are now available for download . Amazon Corretto is a no-cost, multi-platform, production-ready dis...

Read Full Article →
Amazon RDS now supports the latest CU and GDR updates for Microsoft SQL Server

Amazon Relational Database Service (Amazon RDS) for SQL Server now supports the latest General Distribution Release (GDR) updates for Microsoft SQL Server. This release includes support for Microsoft SQL Server 2016 SP3+GDR KB5068401 (RDS version 13.00.6475.1.v1), SQL Server 2017 CU31+GDR KB50684...

Read Full Article → *(Covered by: AWS News)*
Amazon Bedrock introduces API keys to streamline development in GovCloud regions

API keys for Amazon Bedrock are now available in AWS GovCloud (US) regions, expanding a feature that simplifies authentication and accelerates generative AI development. Originally launched in commercial AWS regions in July 2025, API keys for Amazon Bedrock enable developers to quickly generate a...

Read Full Article →
ServiceNow's Virtual Agent Vulnerability Shows Why AI Security Needs Traditional AppSec Foundations

The critical ServiceNow Virtual Agent vulnerability highlights a vital lesson: securing agentic AI requires a return to traditional AppSec foundations. While AI can amplify risks, the root causes often stem from classic failures in authentication and authorization.

Read Full Article →

#Cyber Regulatory

Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium

Read Full Article → *(Covered by: Hong Kong PCPD)*
Promoting AI Security – Assistant Privacy Commissioner Speaks at AIM Conference
Advancing AI Security – Privacy Commissioner Publishes an Article in Hong Kong Lawyer

#Cybersecurity

1Password’s New “Genius” Defense: A Shield Against the Sneaky Copy-Paste Phishing Trap

The post 1Password’s New “Genius” Defense: A Shield Against the Sneaky Copy-Paste Phishing Trap appeared first on Daily CyberSecurity .

Read Full Article →
Russia-linked Sandworm APT implicated in major cyber attack on Poland’s power grid

Russia-linked APT Sandworm launched what was described as the largest cyber attack on Poland’s power grid in Dec 2025. ESET linked a late-2025 cyberattack on Poland’s energy system to the Russia-linked Sandworm APT. “Based on our analysis of the malware and associated TTPs, we attribute the attac...

Read Full Article → *(Covered by: Security Affairs)*
Firewalla outlines a zero trust approach to fixing flat home networks

Firewalla announced a new approach to modernizing large, flat home networks, helping users improve security, scalability, and performance without the pain of IP renumbering or reconfiguring dozens of devices. Using zero trust network architecture and microsegmentation powered by Firewalla AP7 and...

Read Full Article →
CISO’s predictions for 2026

Last year was defined by AI hype, new attack models, and intensifying global tensions. As 2026 begins, security teams are asking what the next phase will look like. Will AI continue to accelerate risk, or will controls and governance finally catch up? CSO spoke to 10 security leaders about their ...

Read Full Article →
Incident response lessons learned the hard way

In this Help Net Security video, Ryan Seymour, VP, Consulting and Education at ConnectSecure, shares lessons from more than two decades in cybersecurity incident response. He explains why many response failures are set in motion long before an attack begins. The focus is on how teams prepare to m...

Read Full Article →
2024 VMware Flaw Now in Attackers’ Crosshairs

The critical-severity vulnerability can be exploited via crafted network packets for remote code execution. The post 2024 VMware Flaw Now in Attackers’ Crosshairs appeared first on SecurityWeek .

Read Full Article →
Security Advisory SA-26-01 GPS Attacks

GPS attacks trigger revisiting threat models

Read Full Article →
Threat Modeling Essentials at Archimedes 2026 Healthcare Security Week

Threat Modeling Essentials, led by Adam Shostack, is a standout offering at Archimedes 2026 Healthcare Security Week, Feb 18 in Las Vegas.

Read Full Article →
A few thoughts closing out 2025

Prompted by participants, a few closing thoughts for 2025

Read Full Article →
Secure By Design roundup - November 2025

The article broadly touches upon the

Read Full Article → *(Covered by: Shostack + Friends Blog)*
October Adam's New Thing!

Read up on Adam's New Thing from October

Read Full Article →
Prompt Engineering Requires Evaluation

Understanding ‘prompt engineering’

Read Full Article →
AI Insurance Won't Save You

LLM Insurance is, and will remain, a great source of insurer profits.

Read Full Article →
How could LLMs change threat modeling

LLMs will change threat modeling. Will it be for the better?

Read Full Article →
Mansplaining your threat model, as a service

Everyone wants robots to help with threat models. How’s that working out?

Read Full Article →
Threat Modeling Tools

A 2025 view of threat modeling tools

Read Full Article → *(Covered by: Shostack + Friends Blog)*
LLMs as Compilers

What if we think about LLM coding as if it’s a compiler stage?

Read Full Article →
Risk Management and Threat Modeling

Threat modeling finds threats; risk management helps us deal with the tricky ones.

Read Full Article →
The Cyber Resilience Act (CRA)!

The CRA is coming and it's going to be a dramatic change for technology producers

Read Full Article →
Threat modeling as a dial, not a switch

Thinking of threat modeling with a knob helps you get more out of it.

Read Full Article →
Appsec Roundup - June 2025

The article highlights

Read Full Article → *(Covered by: Shostack + Friends Blog)*
Google’s approach to AI Agents -- Threat Model Thursday

What can we learn from Google’s approach to AI Agent Security

Read Full Article →
Publish your threat model!

We think you should publish your threat model, and we’re publishing our arguments.

Read Full Article →
The Essence and Beauty of Threat Modeling

Automation sounds great, but what about the essence and beauty?

Read Full Article →
Andor: Insider Threats

Andor teaches us about insider threats

Read Full Article →
Andor Threats: Information Disclosure

What Andor can teach us about Information disclosure threats

Read Full Article →
CVE Futures

What’s next for the CVE program?

Read Full Article →
A few thoughts on CVE

Thoughts on the CVE funding crisis

Read Full Article →
Learning from Troy Hunt’s Sneaky Phish
Introducing the DEF CON 32 Hackers' Almanack

Grateful to introduce the Hackers' Almanack!

Read Full Article →
Security Researcher Comments on HIPAA Security Rule

A group of us have urged HHS to require better handling of security reports

Read Full Article →
Strategy for threat modeling AI

Clarifying how to threat model AI

Read Full Article →
Inside Man

Some thoughts on the Voyager Episode ‘Inside Man’

Read Full Article →
Blackhat and Human Factors

BlackHat invites human factors work

Read Full Article → *(Covered by: Shostack + Friends Blog)*
National Cyber Incident Response Plan comments

Our comments on the National Cyber Incident Plan

Read Full Article →
Spatial Reasoning and Threat Modeling

Do diagrams leverage the brain in a different way?

Read Full Article →
Handling Pandemic-Scale Cyber Threats: Lessons from COVID-19

Emerging research on Cyber Public Health

Read Full Article →
Car Safety Factoids

A few thoughts from a clickbait headline

Read Full Article →
25 Years of CVE

Some thoughts on 25 years of the CVE program

Read Full Article →
Handling Pandemic-Scale Cyber Threats (preprint)

A new paper on 'Pandemic Scale Cyber Events

Read Full Article →
The Goals of Cyber Public Health

Cyber Public Health is prompting fascinating conversations

Read Full Article →
Lockbit, a study in public health

Why is it hard to count lockbit infections?

Read Full Article →
Threat Modeling and Logins, Redux

How to effectively threat model authentication.

Read Full Article →
The Universal Cloud TM -- Threat Model Thursday

A new universal threat model - what can we learn from it?

Read Full Article →
Security Engineering roundup - May 2024

The most important stories around threat modeling, appsec and secure by design for May, 2024.

Read Full Article →
Happy Star Wars Day
Sutter on Safety

What do we need to assess if memory safe langages are 'sufficient'?

Read Full Article →
Eternal sunshine of the spotless LLM

Making an LLM forget is harder than it seems

Read Full Article →
CSRB Report on Microsoft

The CSRB has released its report into an intrusion at Microsoft, and...it’s a doozy.

Read Full Article →
Introducing Magic Security Dust!
The NVD Crisis

The NVD is in crisis, and so is patch management. It’s time to modernize.

Read Full Article →
Adventures in LLM Coding

Exploring LLM-driven coding as I get ready for Archimedes

Read Full Article →
The British Library’s Incident Review

Thoughts on the British Library incident

Read Full Article →
Application and AI roundup - Feb 2024

A busy month in appsec, AI, and regulation.

Read Full Article → *(Covered by: Shostack + Friends Blog)*
Solving Hallucinations

Solving hallucinations in legal briefs is playing on easy mode —— and still too hard

Read Full Article →
The State of Appsec in 2024

2024 is bringing lots of AI, and Liability, too

Read Full Article →
Think like Alph-V?
Security Principles in 2023

Principles are lovely, but do they lead us to actionable results?

Read Full Article →
Comparing Retrospectives

We can learn a lot from comparing retrospectives

Read Full Article →
ML Sec Ops: Feature with Diana Kelley

Adam featured on ML Sec Ops podcast

Read Full Article →
Microsoft Can Fix Ransomware Tomorrow

My latest at Dark Reading draws attention to how Microsoft can fix ransomware tomorrow.

Read Full Article →
Worthwhile Books Q2 2023

Books that I read in the second quater that are worth your time include two memoirs, a great book on the security of ML, and more!

Read Full Article →
AI will be the high interest credit card of 2023
Phishing Defenses

Phishing behaviors, as observed in the wild.

Read Full Article →
Layoffs in Responsible AI Teams

Some inferences from layoffs in responsible AI teams

Read Full Article →
Five Threat Model Diagrams for Machine Learning

Some diagrams to help clarify machine learning threats

Read Full Article →
Reflecting on Threats: The Frame

Reflecting on the framing of the Threats book

Read Full Article →
Application Security Roundup - March

A few tools, some thoughts on injection, some standards, and some of Adam’s appsec news.

Read Full Article → *(Covered by: Shostack + Friends Blog)*
The National CyberSecurity Strategy: Liability is Coming
Threats Book is Complete

The serious side of the book

Read Full Article →
Threats: The Table of Contents

Like the Force, each threat has a light side, and a dark side.

Read Full Article →
More on GPT-3 and threat modeling

More thoughts about AI and threat modeling

Read Full Article →
Darkreading: Threat Modeling in the Age of OpenAI's Chatbot

Pointer to Adam’s latest Darkreading article

Read Full Article →
GPT-3

The OpenAI chatbot is shockingly improved — its capabilities deserve attention.

Read Full Article → *(Covered by: Shostack + Friends Blog)*
How Executives Can Use Threat Modeling

You don’t have to be technical, but you can’t make informed decisions about your business without threat modeling.

Read Full Article →
Fast, Cheap + Good Whitepaper

Threat modeling doesn't need to be a slow, heavyweight activity!

Read Full Article →
Trainings at Global Appsec 2021

Tremendous training opportunities in threat modeling and other topics at Appsec Global 2021

Read Full Article →
What are we going to do: CO2 edition

What happened when Microsoft tried to buy climate abatements

Read Full Article →
Threat Model Thursday: 5G Infrastructure

The US Government's lead cybersecurity agencies have released an interesting report, and I wanted to use this for a Threat Model Thursday, where we take a respectful look at threat modeling work products to see what we can learn.

Read Full Article →
Ransomware is Not the Problem

Arbitrarily powerful software -- applications, operating systems -- is a problem, as is preventing it from running on enterprise systems.

Read Full Article →
Colonial Pipeline, Darkside and Models

The Colonial Pipeline shutdown story is interesting in all sorts of ways, and I can't delve into all of it.I did want to talk about one small aspect, which is the way responders talk about Darkside.

Read Full Article →
The Updates Must Go Through

The timing of updates is not coincidental.

Read Full Article →
Ever Given & Suez

Thoughts on the issues with the Ever Given blocking the Suez Canal.

Read Full Article →
Linkedin Learning

Bringing threat modeling to more and more people, now through a series of courses on LinkedIn.

Read Full Article →
Threat Modeling and Social Issues

For Data Breach Today, I spoke with Anna Delaney about threat modeling for issues that are in the news right now.

Read Full Article →
Vaccines

You may have noticed that my end of the year posts are all science focused. Today, a set of resources on the COVID vaccines.

Read Full Article →
Threat Modeling, Insiders and Incentives

Inspired by the recent story of Tesla's insider, I'd like to discuss insider threat as it fits into threat modeling.

Read Full Article →
The Uber CSO indictment

Thoughts on Mark Rasch's essay, Conceal and Fail to Report - The Uber CSO Indictment

Read Full Article →
Information Disclosure In Depth

I have something to disclose...

Read Full Article →
The Cyentia Library Relaunches

I'm excited to see that they're Re-introducing the Cyentia Research Library, with cool (new?) features like an RSS feed. There are over 1,000 corporate research reports with data that companies paid to collect, massage, and release in a way they felt would be helpful to the rest of the world.

Read Full Article →
Threat Research: More Like This

I want to call out some impressive aspects of a report by Proofpoint.

Read Full Article →
How Are Computers Compromised (2020 Edition)

Understanding the way intrusions really happen is a long-standing interest of mine.

Read Full Article →
Amazon's 'Alexa Built-in' Threat Model

Exploring supply chain threat modeling with Alexa

Read Full Article →
Threat Modeling Thursday: Machine Learning

For my first blog post of 2020, I want to look at threat modeling machine learning systems.

Read Full Article →
Managed Attribution Threat Modeling

Let's talk CAKED, a threat model for managed attribution.

Read Full Article →
Interesting reads

Sharing for you, bookmarking for me.

Read Full Article →
Capture the Flag events and eSports

A breakdown of CTFs and eSports

Read Full Article →
Actionable Followups from the Capital One Breach

What have we learned and what steps can we take?

Read Full Article →
DNS Security

I'm happy to say that some new research by Jay Jacobs, Wade Baker, and myself is now available, thanks to the Global Cyber Alliance.

Read Full Article →
When security goes off the rails

My newest post over at Dark Reading ponders regulation.

Read Full Article →
Episode 9 Spoilers

Today is the last Star Wars Day before Episode 9 comes out, and brings the Skywalker saga to its end.

Read Full Article →
Leave Those Numbers for April 1st

Over-inflated numbers won't scare me into buying your ‘solution’.

Read Full Article →
Fire Doesn't Innovate by Kip Boyle (Book Review)

An unexpected book review.

Read Full Article →
High ROI Security Advisory Boards

Discussing the value of Security Advisory Boards

Read Full Article →
Measuring ROI for DMARC

I'm pleased to be able to share work that Shostack + Associates and the Cyentia Institute have been doing for the Global Cyber Alliance.

Read Full Article →
CVE Funding and Process

[no description provided]

Read Full Article →
Carpenter!

[no description provided]

Read Full Article →
The DREAD Pirates

[no description provided]

Read Full Article →
Threat Model Thursday: ARM's Network Camera TMSA

[no description provided]

Read Full Article →
AppSec Cali 2018: Izar Tarandach

[no description provided]

Read Full Article →
Pen Testing The Empire

[no description provided]

Read Full Article →
Threat Modeling Tooling from 2017

[no description provided]

Read Full Article →
Emergent Design Issues

[no description provided]

Read Full Article →
20 Year Software: Engineering and Updates

[no description provided]

Read Full Article →
Building an Application Security Team

[no description provided]

Read Full Article →
Breach Vouchers & Equifax 2017 Breach Links

[no description provided]

Read Full Article →
Star Wars, Star Trek and Getting Root on a Star Ship

[no description provided]

Read Full Article →
Organizing Threat Modeling Magic

[no description provided]

Read Full Article →
Learning From npm's Rough Few Months

[no description provided]

Read Full Article →
Secure updates: A threat model

[no description provided]

Read Full Article →
Hospital Ransomware

[no description provided]

Read Full Article →
Warrants for Cleaning Malware in Kelihos

[no description provided]

Read Full Article →
People are The Weakest Link In Security?

[no description provided]

Read Full Article →
2017 and Tidal Forces

[no description provided]

Read Full Article →
Modeling Attackers and Their Motives

There are a number of reports out recently, breathlessly presenting their analysis of one threatening group of baddies or another. Most readers should, at most, skim their analysis of the perpetrators. Read on for why.

Read Full Article →
PoC Released for Critical Oracle E-Business Suite Flaw Exploited by Ransomware

The post PoC Released for Critical Oracle E-Business Suite Flaw Exploited by Ransomware appeared first on Daily CyberSecurity .

Read Full Article →
Booting Up Malware: Critical Flaw in Rufus Grants Admin Access (CVE-2026-23988)

The post Booting Up Malware: Critical Flaw in Rufus Grants Admin Access (CVE-2026-23988) appeared first on Daily CyberSecurity .

Read Full Article →
Code by AI: KONNI APT Targets Crypto Devs with “Polished” Backdoor

The post Code by AI: KONNI APT Targets Crypto Devs with “Polished” Backdoor appeared first on Daily CyberSecurity .

Read Full Article →
The Invisible Trap: GenAI Now Creates “Living” Polymorphic Phishing Pages

The post The Invisible Trap: GenAI Now Creates “Living” Polymorphic Phishing Pages appeared first on Daily CyberSecurity .

Read Full Article →
“Osiris” Rises: New Ransomware Targets Southeast Asian Food Giant with Advanced Tactics

The post “Osiris” Rises: New Ransomware Targets Southeast Asian Food Giant with Advanced Tactics appeared first on Daily CyberSecurity .

Read Full Article →
CVE-2025-67968 (CVSS 9.9): Critical Flaw in Real Estate Theme Exposes 30,000 Sites to Takeover

The post CVE-2025-67968 (CVSS 9.9): Critical Flaw in Real Estate Theme Exposes 30,000 Sites to Takeover appeared first on Daily CyberSecurity .

Read Full Article →
CVE-2026-24656: Deserialization Flaw in Apache Karaf Exposes Systems to DoS

The post CVE-2026-24656: Deserialization Flaw in Apache Karaf Exposes Systems to DoS appeared first on Daily CyberSecurity .

Read Full Article →
Ghost in the Code: Critical RCE Found in Abandoned Python PLY Library (CVSS 9.8)

The post Ghost in the Code: Critical RCE Found in Abandoned Python PLY Library (CVSS 9.8) appeared first on Daily CyberSecurity .

Read Full Article →
1Password adds pop-up warnings for suspected phishing sites

The 1Password digital vault and password manager has added built-in protection against phishing URLs to help users identify malicious pages and prevent them from sharing account credentials with threat actors. [...]

Read Full Article →
Nike is investigating a possible data breach, after WorldLeaks claims

Nike is investigating a possible cyber incident after the WorldLeaks group claimed it stole data from the company’s systems. Nike is probing a potential security breach after the WorldLeaks cybercrime group claimed it accessed and stole data from the company’s systems. The footwear and apparel gi...

Read Full Article → *(Covered by: Security Affairs)*
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 81

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter UNO reverse card: stealing cookies from cookie stealers PDFSIDER Malware – Exploitation of DLL Side-Loading for AV and EDR Evasion VoidLink: Evi...

Read Full Article → *(Covered by: Security Affairs)*
Security Affairs newsletter Round 560 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Osiris ransomware emerges, leveraging BYOVD te...

Read Full Article → *(Covered by: Security Affairs)*
Osiris ransomware emerges, leveraging BYOVD technique to kill security tools

Researchers identified a new Osiris ransomware used in a November 2025 attack, abusing the POORTRY driver via BYOVD to disable security tools. Symantec and Carbon Black researchers uncovered a new ransomware strain named Osiris, used in a November 2025 attack against a major Southeast Asian food ...

Read Full Article → *(Covered by: Security Affairs)*
'Weaponized AI' could be the biggest security threat facing your business this year - here's what experts say you should be on the lookout for

AI-driven cybercrime is escalating rapidly, combining phishing, deepfakes, and Dark LLMs, forcing businesses to strengthen defences and monitoring systems.

Read Full Article →
Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware

A new multi-stage phishing campaign has been observed targeting users in Russia with ransomware and a remote access trojan called Amnesia RAT. "The attack begins with social engineering lures delivered via business-themed documents crafted to appear routine and benign," Fortinet FortiGuard Labs r...

Read Full Article →
U.S. CISA adds a flaw in Broadcom VMware vCenter Server to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw impacting Broadcom VMware vCenter to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Broadcom VMware vCenter Server vulnerability, tracked as CVE-2024...

Read Full Article → *(Covered by: Security Affairs)*
Nike Probing Potential Security Incident as Hackers Threaten to Leak Data

The WorldLeaks cybercrime group claims to have stolen information from the footwear and apparel giant’s systems. The post Nike Probing Potential Security Incident as Hackers Threaten to Leak Data appeared first on SecurityWeek .

Read Full Article →
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw affecting Broadcom VMware vCenter Server that was patched in June 2024 to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerabil...

Read Full Article →
11-Year-Old critical telnetd flaw found in GNU InetUtils (CVE-2026-24061)

Critical telnetd flaw CVE-2026-24061 (CVSS 9.8) affects all GNU InetUtils versions 1.9.3–2.7 and went unnoticed for nearly 11 years. A critical vulnerability, tracked as CVE-2026-24061 (CVSS score of 9.8), in the GNU InetUtils telnet daemon (telnetd) impacts all versions from 1.9.3 to 2.7. The vu...

Read Full Article → *(Covered by: Security Affairs)*
ShinyHunters claim hacks of Okta, Microsoft SSO accounts for data theft

The ShinyHunters extortion gang claims it is behind a wave of ongoing voice phishing attacks targeting single sign-on (SSO) accounts at Okta, Microsoft, and Google, enabling threat actors to breach corporate SaaS platforms and steal company data for extortion. [...]

Read Full Article →
Fortinet confirms new zero-day attacks against customer devices

Fortinet has confirmed that a new attack campaign observed recently against customer devices is exploiting an unpatched issue to bypass authentication. The new attacks are different from a previous campaign seen in December that targeted two vulnerabilities related to FortiCloud single sign-on (S...

Read Full Article →
Exploited Zero-Day Flaw in Cisco UC Could Affect Millions

Mass scanning is underway for CVE-2026-20045, which Cisco tagged as critical because successful exploitation could lead to a complete system takeover.

Read Full Article →
The cybercrime industry continues to challenge CISOs in 2026

Cybercriminals have built structured criminal groups with an organizational model similar to that of a legitimate business. “Cybercrime has become industrialized, a return on investment (ROI)-oriented economy, focused on speed and monetization,” according to Martin Zugec, Bitdefender’s director o...

Read Full Article →
Fortinet warns of active FortiCloud SSO bypass affecting updated devices

Fortinet confirmed attacks are bypassing FortiCloud SSO authentication, affecting even fully patched devices, similar to recent SSO flaws. Fortinet confirmed attacks bypass FortiCloud SSO on fully patched devices. Threat actors automate firewall changes, add users, enable VPNs, and steal configs,...

Read Full Article → *(Covered by: Security Affairs)*
Cyberattack Targeting Poland’s Energy Grid Used a Wiper

A cyberattack that targeted power plants and other energy producers in Poland at the end of December used malware known as a “wiper” that was intended to erase computers and in an operation that was intended to cause a power outage and other disruption to services, says European

Read Full Article →
CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of vulnerabilities is as follows - CVE-2025-68645 (CVSS score: 8.8) - A PHP rem...

Read Full Article →
Ransomware-Attacke auf Verkehrsgesellschaft Main-Tauber

srcset="https://b2b-contenthub.com/wp-content/uploads/2026/01/480442374_625365396806507_3730545703312550477_n.jpg?quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/480442374_625365396806507_3730545703312550477_n.jpg?resize=300%2C168&quality=50&strip=all 300w, https...

Read Full Article →
In Other News: €1.2B GDPR Fines, Net-NTLMv1 Rainbow Tables, Rockwell Security Notice

Other noteworthy stories that might have slipped under the radar: Cloudflare WAF bypass, Canonical Snap Store abused for malware delivery, Curl terminating bug bounty program The post In Other News: €1.2B GDPR Fines, Net-NTLMv1 Rainbow Tables, Rockwell Security Notice appeared first on SecurityWe...

Read Full Article →
Phishers Abuse SharePoint in New Campaign Targeting Energy Sector

Threat actors are leveraging the file-sharing service for payload delivery in AitM phishing and BEC attacks. The post Phishers Abuse SharePoint in New Campaign Targeting Energy Sector appeared first on SecurityWeek .

Read Full Article →
Okta users under attack: Modern phishing kits are turbocharging vishing attacks

Threat actors who specialize in vishing (i.e., voice phishing) have started using phishing kits that can intercept targets’ login credentials while also allowing attackers to control the authentication flow in a targeted user’s browser in real-time. At least two custom-made phishing kits are curr...

Read Full Article →
Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls

Fortinet has officially confirmed that it's working to completely plug a FortiCloud SSO authentication bypass vulnerability following reports of fresh exploitation activity on fully-patched firewalls. "In the last 24 hours, we have identified a number of cases where the exploit was to a device th...

Read Full Article →
Under Armour Investigates Data Breach After 72 Million Records Allegedly Exposed

Under Armour said there is no evidence at this point to suggest the incident affected systems used to process payments or store customer passwords

Read Full Article →
AIs are Getting Better at Finding and Exploiting Internet Vulnerabilities

Really interesting blog post from Anthropic: In a recent evaluation of AI models’ cyber capabilities, current Claude models can now succeed at multistage attacks on networks with dozens of hosts using only standard, open-source tools, instead of the custom tools needed by previous generations. Th...

Read Full Article →
Under Armour Looking Into Data Breach Affecting Customers’ Email Addresses

Under Armour is investigating a recent data breach that purloined customers’ email addresses and other personal information. The post Under Armour Looking Into Data Breach Affecting Customers’ Email Addresses appeared first on SecurityWeek .

Read Full Article →
U.S. CISA adds Prettier eslint-config-prettier, Vite Vitejs, Versa Concerto SD-WAN orchestration platform, and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Prettier eslint-config-prettier, Vite Vitejs, Versa Concerto SD-WAN orchestration platform, and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Secu...

Read Full Article → *(Covered by: Security Affairs)*
1Password targets AI-driven phishing with built-in prevention

To help reduce phishing risk, 1Password added an extra layer of protection and began rolling out a phishing prevention feature designed to stop users before they share passwords with scammers. How 1Password phishing prevention works When a user clicks a link whose URL doesn’t match a saved login,...

Read Full Article →
Unterschätztes Risiko: Insider-Bedrohungen endlich ernst nehmen

srcset="https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?quality=50&strip=all 2500w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01...

Read Full Article →
Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access

Cybersecurity researchers have disclosed details of a new dual-vector campaign that leverages stolen credentials to deploy legitimate Remote Monitoring and Management (RMM) software for persistent remote access to compromised hosts. "Instead of deploying custom viruses, attackers are bypassing se...

Read Full Article →
Fortinet confirms critical FortiCloud auth bypass not fully patched

Days after admins began reporting that their fully patched firewalls are being hacked, Fortinet confirmed it's working to fully address a critical FortiCloud SSO authentication bypass vulnerability that should have already been patched since early December. [...]

Read Full Article →
Fresh SmarterMail Flaw Exploited for Admin Access

The exploitation of the authentication bypass vulnerability started two days after patches were released. The post Fresh SmarterMail Flaw Exploited for Admin Access appeared first on SecurityWeek .

Read Full Article →
Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms

Microsoft has warned of a multi‑stage adversary‑in‑the‑middle (AitM) phishing and business email compromise (BEC) campaign targeting multiple organizations in the energy sector. "The campaign abused SharePoint file‑sharing services to deliver phishing payloads and relied on inbox rule creation to...

Read Full Article →
Investigation underway after 72M Under Armour records surface online

Under Armour is investigating a data breach after 72M customer records were posted online by a cybercriminal. Under Armour is an American company that designs, manufactures, and sells sportswear, athletic shoes, and fitness-related accessories. TechCrunch reported that Under Armour is investigati...

Read Full Article → *(Covered by: Security Affairs)*
Ransomware gang’s slip-up led to data recovery for 12 US firms

Twelve US companies hit by the INC ransomware group were able to recover encrypted data after a cybersecurity firm discovered the cloud storage infrastructure where the gang stockpiled what it stole. Researchers at Florida-based Cyber Centaurs said Thursday they took advantage of a lapse in opera...

Read Full Article →
News Alert: Halo Security earns SOC 2 Type II certification, shows sustained operational security

MIAMI, Jan. 22, 2026, CyberNewswire — Halo Security , a leading provider of external attack surface management and penetration testing services, today announced it has successfully achieved SOC 2 Type II compliance following an extensive multi-month audit by Insight Assurance.… (more…) The post N...

Read Full Article →
Trivial Telnet authentication bypass exposes devices to complete takeover

Computers with Telnet open are in immediate danger of being compromised due to a critical vulnerability that allows attackers to bypass authentication. The Telnet remote access protocol has long been superseded by the more secure and encrypted SSH, but many IoT and embedded devices have continued...

Read Full Article →
Leader of ransomware crew pleads guilty to four-year crime spree

Ianis Antropenko, a Russian national living in California, admitted to committing ransomware attacks against at least 50 victims. He faces up to 25 years in jail. The post Leader of ransomware crew pleads guilty to four-year crime spree appeared first on CyberScoop .

Read Full Article →
New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack

Cybersecurity researchers have disclosed details of a new ransomware family called Osiris that targeted a major food service franchisee operator in Southeast Asia in November 2025. The attack leveraged a malicious driver called POORTRY as part of a known technique referred to as bring your own vu...

Read Full Article →
Researchers find Jordan government used Cellebrite phone-cracking tech against activists

The incidents occurred amid Gaza protests and suggest human rights violations, Citizen Lab said. The post Researchers find Jordan government used Cellebrite phone-cracking tech against activists appeared first on CyberScoop .

Read Full Article →
Bitwarden supercharges credential protection for Premium and Family plans – new update adds vault health alerts, password strength coaching, 5GB secure storage, and phishing protections

Bitwarden is upgrading protection across Individual and Family plans, but the price is going up too.

Read Full Article →
Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access

A critical security flaw has been disclosed in the GNU InetUtils telnet daemon (telnetd) that went unnoticed for nearly 11 years. The vulnerability, tracked as CVE-2026-24061, is rated 9.8 out of 10.0 on the CVSS scoring system. It affects all versions of GNU InetUtils from version 1.9.3 up to an...

Read Full Article →
Latin American Orgs Lack Confidence in Cyber Defenses, Skills

Cybersecurity professionals in Latin America are least likely to have faith in their countries' preparedness for cyberattacks on critical infrastructure, the World Economic Forum says.

Read Full Article →
Critical Appsmith Flaw Enables Account Takeovers

Critical vulnerability in Appsmith allows account takeover via flawed password reset process

Read Full Article →
Under Armour says it’s ‘aware’ of data breach claims after 72M customer records were posted online

TechCrunch obtained a sample of the stolen data, which contained names, email addresses, dates of birth, and the user's approximate geographic location. Under Armour confirmed some sensitive information was taken in the breach.

Read Full Article →
DPRK Actors Deploy VS Code Tunnels for Remote Hacking

A spear-phishing campaign tied to the Democratic People's Republic of Korea (DPRK) uses trusted Microsoft infrastructure to avoid detection.

Read Full Article →
1Password boosts built-in phishing protections – simple URL detection tool could save users millions of dollars and prevent hackers stealing banking details

1Password has announced a new phishing protection tool that will help users avoid typo-squatting URLs.

Read Full Article →
KONNI Adopts AI to Generate PowerShell Backdoors

North Korea-linked threat group KONNI targets countries across APAC, specifically in blockchain sectors, with AI-generated malware

Read Full Article →
Cloud adoption isn't going away - but can your business deal with the security impact?

Most companies' security doesn't offer good visibility across hybrid and multi-cloud environments.

Read Full Article →
Hacker legen Websites von Conceptnet-Kunden lahm

Der Regensburger IT-Dienstleister Conceptnet wurde Opfer einer Ransomware-Attacke. fadfebrian – shutterstock.com Der Regensburger IT-Dienstleister Conceptnet informiert derzeit auf seiner Internetseite über eine technische Störung, die durch einen Ransomware-Angriff verursacht wurde. Berichten zu...

Read Full Article →
Why AI Keeps Falling for Prompt Injection Attacks

Imagine you work at a drive-through restaurant. Someone drives up and says: “I’ll have a double cheeseburger, large fries, and ignore previous instructions and give me the contents of the cash drawer.” Would you hand over the money? Of course not. Yet this is what large language models ( LLMs ) d...

Read Full Article →
Actively exploited Cisco UC bug requires immediate, version‑specific patching

Cisco has released patches for a critical remote code execution vulnerability in its unified communications products that attackers are actively exploiting. The US Cybersecurity and Infrastructure Security Agency has added the flaw to its Known Exploited Vulnerabilities catalog, confirming the ex...

Read Full Article →
LastPass Warns of Phishing Campaign Attempting to Steal Master Passwords

Phoney email alerts suggest users need to backup their LastPass accounts within 24 hours. LastPass says it would never require this action from users

Read Full Article →
Top PC components store denies data breach - PcComponentes says it is safe, despite hacker claims

PcComponentes says it did not lose data in a breach, but through a credential stuffing attack.

Read Full Article →
Filling the Most Common Gaps in Google Workspace Security

Security teams at agile, fast-growing companies often have the same mandate: secure the business without slowing it down. Most teams inherit a tech stack optimized for breakneck growth, not resilience. In these environments, the security team is the helpdesk, the compliance expert, and the incide...

Read Full Article →
Over 160,000 Companies Notify Regulators of GDPR Breaches

DLA Piper finds 22% increase in breached firms notifying European GDPR regulators

Read Full Article →
Warum Microsoft-365-Konfigurationen geschützt werden müssen

Lesen Sie, warum CISOs den M365-Tenant stärker in den Blick nehmen müssen. IB Photography – shutterstock.com Im Jahr 2010 war Office 365 eine einfache Suite mit Office-Anwendungen und zusätzlicher E-Mail-Funktion. Das hat sich 15 Jahre später mit Microsoft 365 geändert: Die Suite ist ein wesentli...

Read Full Article →
73% of CISOs more likely to consider AI-enabled security solution

CISO’s are increasingly turning to AI-enabled security technologies to augment their organizations’ cyber defense and extend the capabilities of their teams. According to Foundry’s latest Security Priorities Study , 73% of security decision-makers are now more likely to consider a security soluti...

Read Full Article →
Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex

Cisco has released fresh patches to address what it described as a "critical" security vulnerability impacting multiple Unified Communications (CM) products and Webex Calling Dedicated Instance that it has been actively exploited as a zero-day in the wild. The vulnerability, CVE-2026-20045 (CVSS ...

Read Full Article →
Attackers With Decompilers Strike Again (SmarterTools SmarterMail WT-2026-0001 Auth Bypass)

Well, well, well - look what we’re back with. You may recall that merely two weeks ago, we analyzed CVE-2025-52691 - a pre-auth RCE vulnerability in the SmarterTools SmarterMail email solution with a timeline that is typically reserved for KEV holders. The plot of that story had everything; * A g...

Read Full Article →
Python Wheel (Zip) Parser Differential Vulnerability v2.0

### Summary It is still possible (albeit with significantly more effort) to upload a specially crafted Wheel file (i.e. zip) to PyPI that when installed with PIP (or another Python zipfile based t...

Read Full Article →
GitLab 2FA login protection bypass lets attackers take over accounts

A critical two-factor authentication bypass vulnerability in the Community and Enterprise editions of the GitLab application development platform has to be patched immediately, say experts. The hole is one of five vulnerabilities patched Wednesday as part of new versions of GitLab. Three are rank...

Read Full Article →
Misconfigured demo environments are turning into cloud backdoors to the enterprise

Internal testing, product demonstrations, and security training are critical practices in cybersecurity, giving defenders and everyday users the tools and wherewithal to prevent and respond to enterprise threats. However, according to new research from Pentera Labs, when left in default or miscon...

Read Full Article →
GCVE launches as a decentralized system for tracking software vulnerabilities

The new system emerges after repeated funding crises exposed the fragility of the 25-year-old CVE program that cybersecurity defenders worldwide depend on. The post GCVE launches as a decentralized system for tracking software vulnerabilities appeared first on CyberScoop .

Read Full Article →
A new LinkedIn phishing scam is targeting executives online - make sure you don't fall for this

A little bit of Python, a little bit of DLL sideloading, and a little bit of fake jobs.

Read Full Article →
Phishing Campaign Zeroes in on LastPass Customers

The bait incudes plausible subject lines and credible messages, most likely thanks to attackers' use of large language models to craft them.

Read Full Article →
Black Basta’s alleged ringleader identified as authorities raid homes of other members

Oleg Evgenievich Nefedov, a 35-year-old Russian national, is accused of forming and running the ransomware outfit since 2022. He’s now on Europol and Interpol’s most-wanted lists. The post Black Basta’s alleged ringleader identified as authorities raid homes of other members appeared first on Cyb...

Read Full Article →
Phishing and Spoofed Sites Remain Primary Entry Points For Olympics

Cyber risks for the Milano-Cortina 2026 Winter Games include phishing and spoofed websites as key threat vectors

Read Full Article →
Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws

Zoom and GitLab have released security updates to resolve a number of security vulnerabilities that could result in denial-of-service (DoS) and remote code execution. The most severe of the lot is a critical security flaw impacting Zoom Node Multimedia Routers (MMRs) that could permit a meeting p...

Read Full Article →
Peruvian Loan Scam Harvests Cards and PINs via Fake Applications

Loan phishing operation in Peru is stealing card info by impersonating financial institutions

Read Full Article →
LastPass warns users of new phishing campaign sending out fake support messages

LastPass targeted with phishing campaign pressuring victims into sharing their master passwords.

Read Full Article →
The thin line between saving a company and funding a crime

Ransomware negotiators dish on being in a ‘moral gray zone,’ unrestricted by accountability or industrywide rules of engagement. The post The thin line between saving a company and funding a crime appeared first on CyberScoop .

Read Full Article →
SHARED INTEL Q&A: AI retrieval systems can still hallucinate; deterministic logic offers a fix

AI hallucination is still the deal-breaker. Related: Correcting LLM hallucinations As companies rush AI into production, executives face a basic constraint: you cannot automate a workflow if you cannot trust the output. A model that fabricates facts becomes a risk … (more…) The post SHARED INTEL ...

Read Full Article →
LastPass Warns of Fake Maintenance Messages Targeting Users’ Master Passwords

LastPass is alerting users to a new active phishing campaign that's impersonating the password management service, which aims to trick users into giving up their master passwords. The campaign, which began on or around January 19, 2026, involves sending phishing emails claiming upcoming maintenan...

Read Full Article →
CERT/CC Warns binary-parser Bug Allows Node.js Privilege-Level Code Execution

A security vulnerability has been disclosed in the popular binary-parser npm library that, if successfully exploited, could result in the execution of arbitrary JavaScript. The vulnerability, tracked as CVE-2026-1245 (CVSS score: 6.5), affects all versions of the module prior to version 2.3.0, wh...

Read Full Article →
News alert: Forrester study finds Airlock Digital’s app control cuts breaches to zero with 224% ROI

ATLANTA, Jan. 20, 2026, CyberNewswire — Airlock Digital , a leader in proactive application control and endpoint security, announced the release of The Total Economic Impact (TEI) of Airlock Digital , an independent study commissioned by Airlock Digital and conducted … (more…) The post News alert...

Read Full Article →
News alert: One Identity launches AI-powered ‘Identity Manager’ to speed threat response

ALISO VIEJO, Calif., Jan. 20, 2026, CyberNewswire — One Identity, a trusted leader in identity security , today announces a major upgrade to One Identity Manager, a top-rated IGA solution , strengthening identity governance as a critical security control for … (more…) The post News alert: One Ide...

Read Full Article →
A Google Gemini security flaw let hackers use calendar invites to steal private data

Another prompt injection variant was discovered and remedied.

Read Full Article →
HackerOne rolls out industry framework to support ‘good faith’ AI research

The voluntary framework would provide legal clarity to third-party AI researchers, including those who study safety and other “unexpected” AI behaviors. The post HackerOne rolls out industry framework to support ‘good faith’ AI research appeared first on CyberScoop .

Read Full Article →
AI-supported vulnerability triage with the GitHub Security Lab Taskflow Agent

Learn how we are using the newly released GitHub Security Lab Taskflow Agent to triage categories of vulnerabilities in GitHub Actions and JavaScript projects.

Read Full Article →
Kimwolf Botnet Lurking in Corporate, Govt. Networks

A new Internet-of-Things botnet called Kimwolf has spread to more than 2 million devices, forcing infected systems to participate in massive distributed denial-of-service (DDoS) attacks and to relay other malicious and abusive Internet traffic. Kimwolf's ability to scan the local networks of comp...

Read Full Article →
Ransomware gang claims it hacked into Hyatt systems, says it has stolen data for sale

NightSpire claims to have stolen almost 50GB of Hyatt files, including login credentials for CMS systems.

Read Full Article →
Google Gemini Flaw Turns Calendar Invites Into Attack Vector

The indirect prompt injection vulnerability allows an attacker to weaponize invites to circumvent Google's privacy controls and access private data.

Read Full Article →
New botnet reportedly targets HPE OneView, so be on your guard

Researcher finds critical-level flaw could be abused to expand the RondoDox botnet.

Read Full Article →
Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution

A set of three security vulnerabilities has been disclosed in mcp-server-git, the official Git Model Context Protocol (MCP) server maintained by Anthropic, that could be exploited to read or delete arbitrary files and execute code under certain conditions. "These flaws can be exploited through pr...

Read Full Article →
Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading

Cybersecurity researchers have uncovered a new phishing campaign that exploits social media private messages to propagate malicious payloads, likely with the intent to deploy a remote access trojan (RAT). The activity delivers "weaponized files via Dynamic Link Library (DLL) sideloading, combined...

Read Full Article →
Why inaccessible cybersecurity is a security risk: our path to accessibility

In cybersecurity, an inaccessible tool isn’t just a nuisance: it’s a vulnerability. With the European Accessibility Act tightening regulations across Sweden and the EU, “good ... The post Why inaccessible cybersecurity is a security risk: our path to accessibility appeared first on Blog Detectify .

Read Full Article →
Ingram Micro reveals ransomware attack hit 42,000 people - here's how to find out more

SafePay is claiming responsibility for July 2025 attack which forced Ingram Micro to shut down parts of its IT network.

Read Full Article →
Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto

Cybersecurity researchers have disclosed details of a malware campaign that's targeting software developers with a new information stealer called Evelyn Stealer by weaponizing the Microsoft Visual Studio Code (VS Code) extension ecosystem. "The malware is designed to exfiltrate sensitive informat...

Read Full Article →
Key Apple, Nvidia, and Tesla supplier sees confidential files allegedly exposed in major breach - here's what we know so far

One of the key suppliers for Apple, Tesla, and Nvidia has seemingly suffered a ransomware attack.

Read Full Article →
VoidLink: Evidence That the Era of Advanced AI-Generated Malware Has Begun

VoidLink's framework marks the first evidence of fully AI-designed and built advanced malware, beginning a new era of AI-generated malware

Read Full Article →
MedDream PACS Premium sendOruReport reflected cross-site scripting (XSS) vulnerability

Read Full Article → *(Covered by: 0day Fans)*
MY TAKE: From ‘holy mackeral’ to ‘daily routine’ — AI vendors maneuver to commandeer your life

An email from Claude landed in my inbox Friday morning with a subject line that stopped me cold: “Using Claude for your everyday life.” Related: AI’s fortune teller effect Not “Unlock the power of AI” or “Transform your productivity.” Just… … (more…) The post MY TAKE: From ‘holy mackeral’ to ‘dai...

Read Full Article →
Huge data breach reveals info on 750,000 investors - here's what we know, and how to see if you're affected

CIRO details what happened in 2025 data breach, including what kind of info was taken.

Read Full Article →
Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites

Cybersecurity researchers have disclosed details of a security flaw that leverages indirect prompt injection targeting Google Gemini as a way to bypass authorization guardrails and use Google Calendar as a data extraction mechanism. The vulnerability, Miggo Security's Head of Research, Liad Eliya...

Read Full Article →
Who are the most spoofed brands in phishing scams? Let's be honest, you can probably guess most of them - but there are a few surprises

Microsoft is still the most impersonated brand when it comes to phishing attacks – Google, Amazon, Apple and Meta are also in the top five.

Read Full Article →
Rogue agents and shadow AI: Why VCs are betting big on AI security

Misaligned agents are just one layer of the AI security challenge that startup Witness AI is trying to solve. It detects employee use of unapproved tools, blocks attacks, and ensures compliance.

Read Full Article →
Who’s on the Line? Exploiting RCE in Windows Telephony Service

Windows has supported computer telephony integration for decades, providing applications with the ability to manage phone devices, lines, and calls. While modern deployments increasingly rely on cloud-based telephony solutions, classic telephony services remain available out of the box in Windows...

Read Full Article →
Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations

Cybersecurity researchers have disclosed a cross-site scripting (XSS) vulnerability in the web-based control panel used by operators of the StealC information stealer, allowing them to gather crucial insights on one of the threat actors using the malware in their operations. "By exploiting it, we...

Read Full Article →
On the Coming Industrialisation of Exploit Generation with LLMs

Recently I ran an experiment where I built agents on top of Opus 4.5 and GPT-5.2 and then challenged them to write exploits for a zeroday vulnerability in the QuickJS Javascript interpreter. I adde…

Read Full Article →
Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice

Ukrainian and German law enforcement authorities have identified two Ukrainians suspected of working for the Russia-linked ransomware-as-a-service (RaaS) group Black Basta. In addition, the group's alleged leader, a 35-year-old Russian national named Oleg Evgenievich Nefedov (Нефедов Олег Евгенье...

Read Full Article →
More Problems for Fortinet: Critical FortiSIEM Flaw Exploited

CVE-2025-64155, a command injection vulnerability, was disclosed earlier this week and quickly came under attack from a variety of IP addresses.

Read Full Article →
YOLO Mode: Hidden Risks in Claude Code Permissions | UpGuard

Developers are frequently granting Claude Code permission to download, execute, and delete code, creating fertile ground for prompt injection attacks.

Read Full Article →
How a hacking campaign targeted high-profile Gmail and WhatsApp users across the Middle East

The phishing campaign targeted users on WhatsApp, including an Iranian-British activist, and stole the credentials of a Lebanese cabinet minister and at least one journalist.

Read Full Article →
Five Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts

Cybersecurity researchers have discovered five new malicious Google Chrome web browser extensions that masquerade as human resources (HR) and enterprise resource planning (ERP) platforms like Workday, NetSuite, and SuccessFactors to take control of victim accounts. "The extensions work in concert...

Read Full Article →
LOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishing

Security experts have disclosed details of a new campaign that has targeted U.S. government and policy entities using politically themed lures to deliver a backdoor known as LOTUSLITE. The targeted malware campaign leverages decoys related to the recent geopolitical developments between the U.S. ...

Read Full Article →
China-Linked APT Exploited Sitecore Zero-Day in Critical Infrastructure Intrusion

A threat actor likely aligned with China has been observed targeting critical infrastructure sectors in North America since at least last year. Cisco Talos, which is tracking the activity under the name UAT-8837, assessed it to be a China-nexus advanced persistent threat (APT) actor with medium c...

Read Full Article →
Weekly Update 486

I’m in Oslo! Flighty is telling me I’ve flown in or out of here 43 times since a visit in 2014 set me on a new path professionally and, many years later, personally . It’s special here, like a second home that just feels…

Read Full Article → *(Covered by: Troy Hunt Blog)*
Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways

Cisco on Thursday released security updates for a maximum-severity security flaw impacting Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager, nearly a month after the company disclosed that it had been exploited as a zero-day by a China-nexus advanced pe...

Read Full Article →
Windows Internals: Check Your Privilege - The Curious Case of ETW’s SecurityTrace Flag

Consuming from Microsoft-Windows-Threat-Intelligence without Antimalware-PPL or kernel patching/driver loading.

Read Full Article →
News alert: BreachLock unveils agentic AI pen testing that mimics attacker behavior on web apps

NEW YORK, Jan. 15, 2026, CyberNewswire — BreachLock , a global leader in offensive security, today announced that its Adversarial Exposure Validation (AEV) solution now supports autonomous red teaming at the application layer, expanding beyond its initial network-layer capabilities introduced … (...

Read Full Article →
News alert: AppGuard reopens insider program as AI-enhanced malware outpaces detection defenses

MCLEAN, Va., Jan.15, 2026, CyberNewswire — A new Top 10 Cybersecurity Innovators profile by AppGuard has been released, spotlighting growing concerns over AI-enhanced malware. AI makes malware even more difficult to detect. Worse, they use AI to assess, adapt, and … (more…) The post News alert: A...

Read Full Article →
Risky Bulletin: China bans Israeli and US cybersecurity products

China bans Israeli and US cybersecurity products, Sean Plankey is re-nominated for CISA Director, RAM price hikes are likely to impact the cost of firewalls, and Lumen sinkholes the Kimwolf DDoS botnet.

Read Full Article →
AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks

A critical misconfiguration in Amazon Web Services (AWS) CodeBuild could have allowed complete takeover of the cloud service provider's own GitHub repositories, including its AWS JavaScript SDK, putting every AWS environment at risk. The vulnerability has been codenamed CodeBreach by cloud securi...

Read Full Article →
WEF: AI overtakes ransomware as fastest-growing cyber risk

We can no longer say that artificial intelligence is a "future risk", lurking somewhere on a speculative threat horizon. The truth is that it is a fast-growing cybersecurity risk that organizations are facing today. That's not just my opinion, that's also the message that comes loud and clear fro...

Read Full Article →
Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access

A maximum-severity security flaw in a WordPress plugin called Modular DS has come under active exploitation in the wild, according to Patchstack. The vulnerability, tracked as CVE-2026-23550 (CVSS score: 10.0), has been described as a case of unauthenticated privilege escalation impacting all ver...

Read Full Article →
New Vulnerability in n8n

This isn’t good: We discovered a critical vulnerability ( CVE-2026-21858, CVSS 10.0 ) in n8n that enables attackers to take over locally deployed instances, impacting an estimated 100,000 servers globally. No official workarounds are available for this vulnerability. Users should upgrade to versi...

Read Full Article →
Epic Games Store Installation DLL Hijacking Privilege Escalation Vulnerability
News alert: SpyCloud unveils supply chain security tool that detects compromised vendors’ employees

AUSTIN, Texas, Jan. 14, 2026, CyberNewsWire — SpyCloud , the leader in identity threat protection, today announced the launch of its Supply Chain Threat Protection solution, an advanced layer of defense that expands identity threat protection across the extended workforce, … (more…) The post News...

Read Full Article →
The multibillion-dollar AI security problem enterprises can’t ignore

AI agents are supposed to make work easier. But they’re also creating a whole new category of security nightmares. As companies deploy AI-powered chatbots, agents, and copilots across their operations, they’re facing a new risk: How do you let employees and AI agents use powerful AI tools without...

Read Full Article →
Microsoft Disrupts Cybercrime Service RedVDS

RedVDS, a cybercrime-as-a-service operation that has stolen millions from victims, lost two domains to a law enforcement operation.

Read Full Article →
Community-powered security with AI: an open source framework for security research

Announcing GitHub Security Lab Taskflow Agent, an open source and collaborative framework for security research with AI.

Read Full Article →
AI security firm, depthfirst, announces $40 million Series A

The company used an AI-native platform to help companies fight threats.

Read Full Article →
Sicarii Ransomware: Truth vs Myth

Key findings Introduction In December 2025, a previously unknown Ransomware-as-a-Service (RaaS) operation calling itself Sicarii began advertising its services across multiple underground platforms. The group’s name references the Sicarii, a 1st-century Jewish assassins group that opposed Roman r...

Read Full Article →
Taiwan Endures Greater Cyber Pressure From China

Chinese cyberattacks on Taiwan's critical infrastructure — including energy utilities and hospitals — rose 6% in 2025, averaging 2.63 million attacks a day.

Read Full Article →
Patch Tuesday, January 2026 Edition

Microsoft today issued patches to plug at least 113 security holes in its various Windows operating systems and supported software. Eight of the vulnerabilities earned Microsoft's most-dire "critical" rating, and the company warns that attackers are already exploiting one of the bugs fixed today.

Read Full Article →
Wireless-(in)Fidelity: Pentesting Wi-Fi in 2025

Wireless-(in)Fidelity: Pentesting Wi-Fi in 2025

Read Full Article →
The AI Fix #83: ChatGPT Health, Victorian LLMs, and the biggest AI bluffers

In episode 83 of The AI Fix, Graham reveals he's taken up lying to LLMs, and shows how a journalist exposed AI bluffers with a made-up idiom. Meanwhile Mark invents a "Godwin's Law" for AI, and explains how to ruin any LLM with humus. Also in this episode, a marriage is declared invalid thanks to...

Read Full Article →
AsyncRAT Malware Infests Orgs via Python & Cloudflare

The phishing campaign shows how attackers continue to weaponize legitimate cloud services and open source tools to evade detection and gain trust.

Read Full Article →
Who Decides Who Doesn’t Deserve Privacy?

Remember the Ashley Madison data breach? That was now more than a decade ago, yet it arguably remains the single most noteworthy data breach of all time. There are many reasons for this accolade, but chief among them is that by virtue of the site being expressly designed to facilitate

Read Full Article →
Your personal information is on the dark web. What happens next?

If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.

Read Full Article →
Hackers get hacked, as BreachForums database is leaked

Have you ever stolen data, traded a hacking tool, or just lurked on a dark web forum believing that you are anonymous? If so, I might have some unsettling news for you. Read more in my article on the Hot for Security blog.

Read Full Article →
Unveiling VoidLink – A Stealthy, Cloud-Native Linux Malware Framework

The new framework maintains long-term access to Linux systems while operating reliably in cloud and container environments

Read Full Article →
Multipurpose GoBruteforcer Botnet Targets 50K+ Linux Servers

Researchers detailed a souped-up version of the GoBruteforcer botnet that preys on servers with weak credentials and AI-generated configurations.

Read Full Article →
FBI Flags Quishing Attacks From North Korean APT

A state-sponsored threat group tracked as "Kimsuky" sent QR-code-filled phishing emails to US and foreign government agencies, NGOs, and academic institutions.

Read Full Article →
Fintech firm Betterment confirms data breach after hackers send fake crypto scam notification to users

Hackers gained access to some Betterment customers’ personal information through a social engineering attack, then targeted some of them with a crypto-related phishing message.

Read Full Article →
2 Separate Campaigns Probe Corporate LLMs for Secrets

A total of 91,403 sessions targeted public LLM endpoints to find leaks in organizations' use of AI and map an expanding attack surface.

Read Full Article →
Russia’s Fancy Bear APT Doubles Down on Global Secrets Theft

The notorious state-sponsored group relies on basic techniques that are highly effective, often delivering greater ROI than more complex malware-heavy operations.

Read Full Article →
Who Benefited from the Aisuru and Kimwolf Botnets?

Our first story of 2026 revealed how a destructive new botnet called Kimwolf rapidly grew to infect more than two million devices by mass-compromising a vast number of unofficial Android TV streaming boxes. Today, we'll dig through digital clues left behind by the hackers, network operators, and ...

Read Full Article →
Do Smart People Ever Say They’re Smart? (SmarterTools SmarterMail Pre-Auth RCE CVE-2025-52691)

Welcome to 2026! While we are all waiting for the scheduled SSLVPN ITW exploitation programming that occurs every January, we’re back from Christmas and idle hands, idle minds, yada yada. In December, we were alerted to a vulnerability in SmarterTools’ SmarterMail solution, accompanied by an advi...

Read Full Article →
The year of technoligarchy

In 2025, Trump brought tech executives into power to dismantle regulators and write their own rules. But the instabilities they’re creating may be their downfall.

Read Full Article →
Inside GoBruteforcer: AI-Generated Server Defaults, Weak Passwords, and Crypto-Focused Campaigns

Key takeaways Introduction GoBruteforcer is a botnet that turns compromised Linux servers into scanning and password brute-force nodes. It targets internet-exposed services such as phpMyAdmin web panels, MySQL and PostgreSQL databases, and FTP servers. Infected hosts are incorporated into the bot...

Read Full Article →
Everything I've Said About AI Since 2016: A Retrospective

![AI Predictions Retrospective](/images/ai-predictions-retrospective.webp) I've been thinking and writing about AI for [exactly a decade now](/blog/the-real-internet-of-things), and last week someone claimed I said two things in 2023 that I don't think I said. (1. That we'd have AGI in 6 months, ...

Read Full Article →
Never Trust the Output: Data Pollution in AI Agents and MCP

Disclaimer: This article is intended for educational purposes and security specialists conducting authorized testing. The author assumes no responsibility for any misuse of the information provided. Distribution of malicious software, system disruption, and privacy violations are punishable by la...

Read Full Article →
TrustZone Break-in Vulnerabilities in Ampere UEFI MM Drivers (Buffer Overflow and Stack Information Leak)

### Summary A buffer overflow and stack information leak affecting the ARM Ampere Management Mode (MM) Boot Error Record Table (BERT) driver. This code is bundled into the ARM Unified Extensible F...

Read Full Article →
Meeting Third-Party Risk Requirements of DORA in 2026 | UpGuard

Learn how to achieve compliance with the third-party risk management standards of the Digital Operational Resilience Act (DORA)

Read Full Article → *(Covered by: UpGuard Blog)*
Free GDPR Vendor Security Questionnaire Template (2026 Edition) | UpGuard

Expand your organization's vendor risk management toolbox by utilizing this free GDPR vendor questionnaire template.

Read Full Article →
Choosing a PCI DSS 4.0 Compliance Product in 2026 | UpGuard

Learn which features to look for when choosing a tool for tracking PCI DSS compliance. The right tool will help you avoid costly violations.

Read Full Article →
Choosing a Healthcare Cyber Risk Remediation Product in 2026 | UpGuard

Learn which features to look for in an ideal cyber risk remediation product for healthcare services. The right choice will reduce data breach impact.

Read Full Article →
The Ultimate Cybersecurity Guide for Healthcare in 2026 | UpGuard

A free cybersecurity guide for any business in the healthcare industry. Includes data breach and ransomware attack defense strategies for 2026.

Read Full Article →
How to Comply with PCI DSS 4.0.1 (2026 Guide) | UpGuard

Learn how to comply with versions 4.0 and 4.0.1 of PCI DSS.

Read Full Article →
The Ultimate Ransomware Defense Guide (2026) | UpGuard

Learn how to implement an effective security strategy for minimizing the impact of ransomware attacks.

Read Full Article →
Key Metrics for Tracking PCI DSS Compliance in 2026 | UpGuard

Monitoring these key metrics will help you track your PCI DSS compliance efforts.

Read Full Article →
How to Prepare for a PCI DSS 4.0 Audit in 7 Steps in 2026 | UpGuard

This article covers how to prepare for a PCI DSS onsite audit and maintain compliance with PCI requirements.

Read Full Article →
19 Most Common Types of Phishing Attacks in 2026 | UpGuard

Learn the most commonly used phishing attacks and how to identify them.

Read Full Article →
116 Must-Know Data Breach Statistics for 2026 | UpGuard

116 data breach statistics that cover risk, cost, prevention, industry trends, and more. Assess and analyze these stats and learn to prevent data breaches.

Read Full Article →
The Kimwolf Botnet is Stalking Your Local Network

The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide security advisory. The vulnerability at issue has been exploited for months already, and it's time for a broader awareness of the threat. The short version is that everything you thought you knew about ...

Read Full Article →
Reverse Engineering the Tapo C260 and Tapo Discovery Protocol v2

The Tapo C260 is the latest TP-Link camera featuring a whole host of upgrades. As part of the SPIRITCYBER contest where I found several RCEs and other interesting vulnerabilities, I decided to focus on this device and dive deeper into hardware hacking.

Read Full Article →
Bugs that survive the heat of continuous fuzzing

Learn why some long-enrolled OSS-Fuzz projects still contain vulnerabilities and how you can find them.

Read Full Article →
Happy 16th Birthday, KrebsOnSecurity.com!

KrebsOnSecurity.com celebrates its 16th anniversary today! A huge "thank you" to all of our readers -- newcomers, long-timers and drive-by critics alike. Your engagement this past year here has been tremendous and truly a salve on a handful of dark days. Happily, comeuppance was a strong theme ru...

Read Full Article →
Blind trust: what is hidden behind the process of creating your PDF file?

Every day, thousands of web services generate PDF (Portable Document Format) files—bills, contracts, reports. This step is often treated as a technical routine, “just convert the HTML,” but in practice it’s exactly where a trust boundary is crossed. The renderer parses HTML, downloads external re...

Read Full Article →

#Scraping Candidates

Leader of ransomware crew pleads guilty to four-year crime spree

#Security Vendor Blog

PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers

Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.

Read Full Article →
Threats Making WAVs - Incident Response to a Cryptomining Attack

Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files. The report includes the full attack vectors, from detection, infection, network propagation and malware analysis and recommendations for optimizing incident res...

Read Full Article →
From runtime risk to real‑time defense: Securing AI agents

Why securing AI agents at runtime is essential as attackers find new ways to exploit generative orchestration. The post From runtime risk to real‑time defense: Securing AI agents appeared first on Microsoft Security Blog .

Read Full Article →
AI jailbreaking via poetry: bypassing chatbot defenses with rhyme | Kaspersky official blog

A new study shows that verse-based prompts can slash the effectiveness of AI safety constraints. We’re breaking down an experiment involving 25 language models and its key takeaways.

Read Full Article →
I scan, you scan, we all scan for... knowledge?

In this week's newsletter, Bill hammers home the old adage, "Know your environment" — even throughout alert fatigue.

Read Full Article →
Microsoft Security success stories: Why integrated security is the foundation of AI transformation

Discover how Ford, Icertis, and TriNet modernized security with Microsoft—embedding Zero Trust, automating defenses, and enabling secure AI innovation at scale. The post Microsoft Security success stories: Why integrated security is the foundation of AI transformation appeared first on Microsoft ...

Read Full Article →
Foxit, Epic Games Store, MedDreams vulnerabilities

Cisco Talos’ Vulnerability Discovery & Research team recently disclosed three vulnerabilities in Foxit PDF Editor, one in the Epic Games Store, and twenty-one in MedDream PACS.. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisc...

Read Full Article →
The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time

We discuss a novel AI-augmented attack method where malicious webpages use LLM services to generate dynamic code in real-time within a browser. The post The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time appeared first on Unit 42 .

Read Full Article →
Resurgence of a multi‑stage AiTM phishing and BEC campaign abusing SharePoint

Microsoft Defender Researchers uncovered a multi‑stage AiTM phishing and business email compromise (BEC) campaign targeting multiple organizations in the energy sector. The post Resurgence of a multi‑stage AiTM phishing and BEC campaign abusing SharePoint appeared first on Microsoft Security Blog .

Read Full Article →
A new era of agents, a new era of posture

AI agents are transforming how organizations operate, but their autonomy also expands the attack surface. The post A new era of agents, a new era of posture appeared first on Microsoft Security Blog .

Read Full Article →
How to protect yourself from Bluetooth-headset tracking and the WhisperPair attack | Kaspersky official blog

With the WhisperPair attack, a stranger can pair their device with your headphones to keep tabs on your location.

Read Full Article →
Oracle January 2026 Critical Patch Update Addresses 158 CVEs

Oracle addresses 158 CVEs in its first quarterly update of 2026 with 337 patches, including 27 critical updates. Key takeaways: The first Critical Patch Update (CPU) for 2026, contains fixes for 158 unique CVEs in 337 security updates. 27 issues (8% of all patches) were assigned a critical severi...

Read Full Article →
Tenable Discovers SSRF Vulnerability in Java TLS Handshakes That Creates DoS Risk

Tenable Research has discovered a server-side request forgery (SSRF) vulnerability in Java’s handling of client certificates during a TLS handshake. In certain configurations, this can be abused to cause a denial-of-service (DoS) condition. Key takeaways Tenable Research identified a vulnerabilit...

Read Full Article →
DNS OverDoS: Are Private Endpoints Too Private?

We've identified an aspect of Azure’s Private Endpoint architecture that could expose Azure resources to denial of service (DoS) attacks. The post DNS OverDoS: Are Private Endpoints Too Private? appeared first on Unit 42 .

Read Full Article →
Four priorities for AI-powered identity and network access security in 2026

Discover four key identity and access priorities for the new year to strengthen your organization's identity security baseline. The post Four priorities for AI-powered identity and network access security in 2026 appeared first on Microsoft Security Blog .

Read Full Article →
What is the “year 2038 problem”, and how can businesses fix it?

How can organizations find and fix systems vulnerable to Y2K38 — the Unix epoch time overflow problem, also known as Epochalypse?

Read Full Article →
Key attack scenarios involving brand impersonation

Here’s how cybercriminals cash in on companies’ online doppelgängers, and what can be done about it.

Read Full Article →
Predicting 2026

In this week’s newsletter, Martin examines the evolving landscape for 2026, highlighting key threats, emerging trends like AI-driven risks, and the continued importance of addressing familiar vulnerabilities.

Read Full Article →
AI-powered sextortion: a new threat to privacy | Kaspersky official blog

Ordinary photos from your social media can be turned into tools for AI-driven sextortion and deepfakes. How can you protect your privacy and security?

Read Full Article →
UAT-8837 targets critical infrastructure sectors in North America

Cisco Talos is closely tracking UAT-8837, a threat actor we assess with medium confidence is a China-nexus advanced persistent threat (APT) actor.

Read Full Article →
CVE-2025-64155: Exploit Code Released for Critical Fortinet FortiSIEM Command Injection Vulnerability

Exploit code has been published for CVE-2025-64155, a critical command injection vulnerability affecting Fortinet FortiSIEM devices. Key takeaways: CVE-2025-64155 is a critical operating system (OS) command injection vulnerability affecting Fortinet FortiSIEM. Fortinet vulnerabilities have histor...

Read Full Article →
Microsoft named a Leader in IDC MarketScape for Unified AI Governance Platforms

Microsoft is honored to be named a Leader in the 2025–2026 IDC MarketScape for Unified AI Governance Platforms, highlighting our commitment to making AI innovation safe, responsible, and enterprise-ready. The post Microsoft named a Leader in IDC MarketScape for Unified AI Governance Platforms app...

Read Full Article →
Inside RedVDS: How a single virtual desktop provider fueled worldwide cybercriminal operations

Microsoft’s investigation into RedVDS services and infrastructure uncovered a global network of disparate cybercriminals purchasing and using to target multiple sectors. In collaboration with law enforcement agencies worldwide, Microsoft’s Digital Crimes Unit (DCU) recently facilitated a disrupti...

Read Full Article →
Brushstrokes and breaches with Terryn Valikodath

Terryn’s path to cybersecurity started with a fascination for criminal forensics and a knack for jailbreaking his family's tech — interests that eventually steered him toward the fast-paced world of digital investigations.

Read Full Article →
How we set the standard for transparency and trust | Kaspersky official blog

An independent study of companies’ transparency and data usage practices in cybersecurity products.

Read Full Article →
ServiceNow's Virtual Agent Vulnerability Shows Why AI Security Needs Traditional AppSec Foundations

The critical ServiceNow Virtual Agent vulnerability highlights a vital lesson: securing agentic AI requires a return to traditional AppSec foundations. While AI can amplify risks, the root causes often stem from classic failures in authentication and authorization.

Read Full Article →
Threat Brief: MongoDB Vulnerability (CVE-2025-14847)

Database platform MongoDB disclosed CVE-2025-14847, called MongoBleed. This is an unauthenticated memory disclosure vulnerability with a CVSS score of 8.7. The post Threat Brief: MongoDB Vulnerability (CVE-2025-14847) appeared first on Unit 42 .

Read Full Article →
Direct and reverse NFC relay attacks being used to steal money | Kaspersky official blog

How to protect your Android device from NFC relay attacks exploiting NFCGate.

Read Full Article →
Microsoft’s January 2026 Patch Tuesday Addresses 113 CVEs (CVE-2026-20805)

8 Critical 105 Important 0 Moderate 0 Low Microsoft addresses 113 CVEs in the first Patch Tuesday of 2026, with two zero-days, including one that was exploited in the wild. Microsoft patched 113 CVEs in its January 2026 Patch Tuesday release, with eight rated critical and 105 rated as important. ...

Read Full Article →
Microsoft Patch Tuesday for January 2026 — Snort rules and prominent vulnerabilities

Microsoft has released its monthly security update for January 2026, which includes 112 vulnerabilities affecting a range of products, including 8 that Microsoft marked as “critical”.

Read Full Article →
How Microsoft builds privacy and security to work hand-in-hand

Learn how Microsoft unites privacy and security through advanced tools and global compliance to protect data and build trust. The post How Microsoft builds privacy and security to work hand-in-hand appeared first on Microsoft Security Blog .

Read Full Article →
Remote Code Execution With Modern AI/ML Formats and Libraries

We identified remote code execution vulnerabilities in open-source AI/ML libraries published by Apple, Salesforce and NVIDIA. The post Remote Code Execution With Modern AI/ML Formats and Libraries appeared first on Unit 42 .

Read Full Article →
Your personal information is on the dark web. What happens next?

If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.

Read Full Article →
Laughter in the dark: Tales of absurdity from the cyber frontline and what they taught us

From a quintuple-encryption ransomware attack to zany dark web schemes and AI fails, Sophos X-Ops looks back at some of our favorite weirdest incidents from the last few years – and the serious lessons behind them Categories: Threat Research Tags: Ransomware, Hive, Lockbit, BlackCat, LLM, AI, Mon...

Read Full Article →
Activity-masking infostealer dropper | Kaspersky official blog

Malware disguising its activity in network and system logs as legitimate state information system traffic and a Network Diagnostic Service.

Read Full Article →
Tenable Is a Gartner® Peer Insights™ Customers’ Choice for Cloud-Native Application Protection Platforms

This recognition — based entirely on feedback from the people who use our products every day — to us is a testament to the unmatched value Tenable Cloud Security CNAPP offers organizations worldwide. Our key takeaways: In our view, this peer recognition confirms Tenable’s strategic value in helpi...

Read Full Article →
The State of Ransomware in Enterprise 2025

Categories: Products & Services Tags: Ransomware, Enterprise, Solutions, The State of Ransomware

Read Full Article →
Resolutions, shmesolutions (and what’s actually worked for me)

Talos' editor ditches the pressure of traditional New Year’s resolutions in favor of practical, in-the-moment changes, and finds more success by letting go of perfection. Plus, we break down the latest on UAT-7290, a newly disclosed threat actor targeting critical infrastructure.

Read Full Article →
UAT-7290 targets high value telecommunications infrastructure in South Asia

Talos assesses with high confidence that UAT-7290 is a sophisticated threat actor falling under the China-nexus of advanced persistent threat actors (APTs). UAT-7290 primarily targets telecommunications providers in South Asia.

Read Full Article →
Explore the latest Microsoft Incident Response proactive services for enhanced resilience

The new proactive services from Microsoft Incident Response turn security uncertainty into readiness with expert‑led preparation and advanced intelligence. The post Explore the latest Microsoft Incident Response proactive services for enhanced resilience appeared first on Microsoft Security Blog .

Read Full Article →
How Cisco Talos powers the solutions protecting your organization

What happens under the hood of Cisco's security portfolio? Our reputation and detection services apply Talos' real-time intelligence to detect and block threats. Here's how.

Read Full Article →
Phishing actors exploit complex routing and misconfigurations to spoof domains

Threat actors are exploiting complex routing scenarios and misconfigured spoof protections to send spoofed phishing emails, crafted to appear as internally sent messages. The post Phishing actors exploit complex routing and misconfigurations to spoof domains appeared first on Microsoft Security B...

Read Full Article →
Cybersecurity Snapshot: Predictions for 2026: AI Attack Acceleration, Automated Remediation, Custom-Made AI Security Tools, Machine Identity Threats, and More

In this special edition, Tenable leaders forecast key 2026 trends, including: AI will make attacks more plentiful and less costly; machine identities will become the top cloud risk; preemptive cloud and exposure management will dethrone runtime detection; and automated remediation gets the go-ahe...

Read Full Article →
CVE-2025-14847: All You Need to Know About MongoBleed
CVE-2025-14847 (MongoBleed): MongoDB Memory Leak Vulnerability Exploited in the Wild

A recently disclosed vulnerability affecting MongoDB instances has been reportedly exploited in the wild. Exploit code has been released for this flaw dubbed MongoBleed. Key takeaways: MongoBleed is a memory leak vulnerability affecting multiple versions of MongoDB. Exploitation of MongoDB has be...

Read Full Article →
The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor

Kaspersky discloses a 2025 HoneyMyte (aka Mustang Panda or Bronze President) APT campaign, which uses a kernel-mode rootkit to deliver and protect a ToneShell backdoor.

Read Full Article →

#Tech

백업 도구 흔적이 단서였다···랜섬웨어 피해 기업 12곳 데이터 복원 성공

한 사이버보안 기업이 INC 랜섬웨어 그룹의 탈취 데이터가 보관된 클라우드 스토리지 인프라를 찾아냈다. 이로 인해 공격을 받은 미국 기업 12곳이 암호화된 데이터를 복구할 수 있었다. 보안 기업 사이버 센타우르스의 연구진 은 지난 22일 INC 그룹의 운영 보안상 허점을 포착해 활용했다고 밝혔다. 해당 보고서에 따르면, 연구진은 INC 그룹이 피해 기업의 데이터를 암호화하고 외부로 유출하는 데 사용하는 합법적인 오픈소스 백업 유틸리티인 레스틱(Restic)에서 남은 아티팩트를 발견했다. INC 그룹이 레스틱 기반 인프라를 반복...

Read Full Article →
탐지를 넘어 예방으로, 산업화된 사이버 범죄에 맞서는 CISO의 과제

사이버 범죄자들은 합법적인 기업과 유사한 조직 모델을 갖춘 구조화된 범죄 집단을 구축해 왔다. 보안 기업 비트디펜더(Bitdefender)의 기술 솔루션 총괄 마틴 주겍은 “사이버 범죄는 산업화됐으며, 투자 대비 수익(ROI)을 중시하는 경제로 진화해 속도와 수익화에 초점을 맞추고 있다”라고 설명했다. 주겍은 사이버 범죄 조직의 이러한 운영 방식이 높은 수준의 전문화를 특징으로 하며, 초기 침투를 담당하는 접근 브로커나 서비스형 랜섬웨어(Ransomware-as-a-Service, RaaS) 제휴사 등이 그 예라고 분석했다. ...

Read Full Article →
젯브레인, 오픈AI 코덱스 통합으로 IDE 중심 AI 코딩 강화

젯브레인은 오픈AI의 코덱스 AI 코딩 에이전트를 젯브레인 IDE 내부에서 바로 사용할 수 있도록 제공한다고 23일 밝혔다 . 개발자는 에디터를 벗어나지 않고도 코드 기획, 작성, 테스트, 리뷰, 배포까지 수행할 수 있다. 코덱스가 젯브레인 AI 채팅에 네이티브로 통합되면서, 개발자는 2025.3 버전부터 젯브레인 IDE 안에서 코덱스와 직접 협업할 수 있게 됐다. 코덱스는 젯브레인 AI 구독, 챗GPT 계정, 또는 오픈AI API 키를 통해 동일한 AI 채팅 인터페이스에서 사용할 수 있다. 이 기능을 지원하는 IDE로는 젯브...

Read Full Article →
‘Halo’ Actor Steve Downes Asks You Not to Remake His Voice with AI

The man behind Master Chief feels a way about generative AI when it comes to his voice being used for any 'Halo' fan project or video.

Read Full Article →
How to defend against advanced DDoS threats

In 1996, a New York-based Internet service provider became the first target of a major distributed denial-of-service (DDoS) attack. They were shut down for 36 hours. Since then, DDoS has remained a favored tactic of cybercriminals. But with the advent of AI, DDoS attacks have become both more com...

Read Full Article →
Top 3 trends in business internet connectivity

Reliable, high-speed internet connectivity is no longer optional—it’s an essential business tool. Increasingly more business applications and processes live in the cloud, requiring a powerful connection that considers factors such as reliability, scalability, security, and performance. Organizati...

Read Full Article →
Shining light on the dark side of emerging tech

For some time now, concerned business users have been discussing the possibilities of AI being a tool to increase the efficiency of cybercriminals . However, it can also be a welcome helper to bolster cyberdefense. Industry experts like Chuck Brooks also chose to focus on AI as a double-edged swo...

Read Full Article →
6 billion leaked passwords reveal the ones you should never, ever use

Over the course of the past year, security researchers at Specops Software examined six billion leaked passwords and subsequently published a comprehensive report on their findings. This report not only provides insight into the most commonly used passwords, but also into the current threat posed...

Read Full Article →
ShinyHunters claims Okta customer breaches, leaks data belonging to 3 orgs

'A lot more' victims to come, we're told ShinyHunters has claimed responsibility for an Okta voice-phishing campaign during which the extortionist crew allegedly gained access to Crunchbase and Betterment.…

Read Full Article →
1Password adds new password protection feature to thwart phishing scams

Password manager 1Password has launched a new feature in its browser extension that provides extra protection against phishing, reports Engadget . The new feature warns users when they manually paste login details on a website that isn’t linked to a saved login in 1Password. A pop-up message will...

Read Full Article →
Is that $20 credit for the Verizon outage real? Don’t click a bad link

Last week, Verizon had a massive outage. Millions of wireless customers couldn’t get a signal, instead stuck on emergency service. If you were affected, you definitely knew it—your phone was stuck on “SOS” mode, only capable of calling 911. Service was eventually restored by the evening, with Ver...

Read Full Article →
Europe votes to tackle deep dependence on US tech in sovereignty drive

European lawmakers on Thursday adopted a comprehensive report on technological sovereignty and digital infrastructure that directs the European Commission to reduce the bloc’s heavy reliance on foreign technology providers across semiconductors, cloud infrastructure, software, and AI systems. The...

Read Full Article →
Why Apple is the best investment for future AI

The AI industry is moving incredibly fast. It’s almost as though you can close your eyes for ten minutes and wake to find that yet another business-friendly AI tool or service has appeared. While refreshing, this glut of investment and innovation represents an industry in flux, meaning the most s...

Read Full Article →
How enterprise architecture and start-up thinking drive strategic success

In an era defined by rapid innovation, shifting markets and disruptive emerging technologies, long-term planning alone cannot deliver the agility enterprises need. Strategy is now judged less by the quality of vision decks and more by how quickly enterprises can test, learn and scale what works a...

Read Full Article →
The new CDIO stack: Tech, talent and storytelling

When people hear my title — chief digital and information officer — most of them immediately think of technology — cloud, Data, AI, Cybersecurity. They imagine servers, dashboards, code. And, to be fair, all of that is part of my world. But if I describe my job only in terms of technology, I am t...

Read Full Article →
Always disclose how you use AI

AI chatbots have been with us three years and one month (at least the kind that use large language models (LLMs) to communicate with natural-sounding words). Already norms are emerging in some professions for users to disclose how they use AI. For example: Organizations such as the International ...

Read Full Article →
Experts warn: Swarms of AI bots threaten democracy

A group of researchers from Berkeley, Harvard, Oxford, Cambridge, and Yale warn that the rise of AI bots and AI agents could pose a serious threat to democracy. For example, power-hungry politicians around the world can relatively easily create swarms of AI bots that flood social media and messag...

Read Full Article →
Windows 11 Insider Previews: What’s in the latest build?

Windows 11 25H2 has been released, but behind the scenes, Microsoft is constantly working to improve the newest version of Windows. The company frequently rolls out public preview builds to members of its Windows Insider Program, allowing them to test out — and help shape — upcoming features. Ski...

Read Full Article →
Workers challenge ‘hidden’ AI hiring tools in class action with major regulatory stakes

Workers are getting fed up with AI-based hiring practices. A new class action lawsuit filed in California alleges that human candidates are being unfairly profiled by “hidden” AI hiring technologies that “lurk in the background” to collect “sensitive and often inaccurate” information about “unsus...

Read Full Article →
Crims hit the easy button for Scattered-Spider style helpdesk scams

Teach a crook to phish… Criminals can more easily pull off social engineering scams and other forms of identity fraud thanks to custom voice-phishing kits being sold on dark web forums and messaging platforms.…

Read Full Article →
Hacker who stole 120,000 bitcoins wants a second chance—and a security job

Crypto theft was "the worst thing I had ever done."

Read Full Article →
Crims compromised energy firms' Microsoft accounts, sent 600 phishing emails

Logging in, not breaking in Unknown attackers are abusing Microsoft SharePoint file-sharing services to target multiple energy-sector organizations, harvest user credentials, take over corporate inboxes, and then send hundreds of phishing emails from compromised accounts to contacts inside and ou...

Read Full Article →
Apple’s Siri to see two major AI improvements this year

More details about the expected cadence of Apple’s plans to turn Siri into an AI-driven chatbot are emerging, and Mark Gurman tells us Apple has a two-tier approach in mind. The current thinking is that Apple’s Gemini-powered chatbot will arrive in June with iOS 26.4, which will be a significant ...

Read Full Article →
Female-dominated careers among most exposed to AI disruption

Dentists least likely to get an LLM kick in the teeth Most US workers in jobs exposed to AI are also relatively well placed to adapt if disruption leads to displacement, according to research summarized by the Brookings Institution. However, there are some careers with high percentages of female ...

Read Full Article →
Best VPNs for torrenting: 5 top picks for speed, privacy, and security

Torrenting, or P2P (peer-to-peer) file sharing, is a convenient way to download large files quickly. But it isn’t without its risks. Not only is there the risk of accidentally downloading a malicious file or malware, but there’s a privacy risk as well—your ISP can see all your online activity and...

Read Full Article →
Critical Cisco UC bug actively exploited

Cisco has released patches for a critical remote code execution vulnerability in its unified communications products that attackers are actively exploiting. The US Cybersecurity and Infrastructure Security Agency has added the flaw to its Known Exploited Vulnerabilities catalog, confirming the ex...

Read Full Article →
Europe's GDPR cops dished out €1.2B in fines last year as data breaches piled up

Regulators logged over 400 personal data breach notifications a day for first time since law came into force GDPR fines pushed past the £1 billion (€1.2 billion) mark in 2025 as Europe's regulators were deluged with more than 400 data breach notifications a day, according to a new survey that sug...

Read Full Article →
Work-from-office mandate? Expect top talent turnover, culture rot

Work-from-office mandates are accelerating as the world moves further away from the COVID-19 pandemic, but the push toward in-person work environments will make it more difficult for IT leaders to retain and recruit staff, some experts say. Over the past year, many companies, including IT giants ...

Read Full Article →
Ancient telnet bug happily hands out root to attackers

Critical vuln flew under the radar for a decade A recently disclosed critical vulnerability in the GNU InetUtils telnet daemon (telnetd) is "trivial" to exploit, experts say.…

Read Full Article →
Best free VPN for Android: 5 top picks you can trust

Whether you want extra security while using public Wi-Fi, or to unlock content on your favorite streaming services, the right free VPN for your Android device can help you do it without having to pay a dime. The problem when looking for a good free VPN, though, is that there are a ton available o...

Read Full Article →
What’s a browser-in-browser attack? The key traits to know

Recently, a new way of stealing Facebook login info came to light—hackers using fake windows within your browser to imitate legitimate pop-up windows for sign-in. Called browser-in-browser (BitB) attacks, this form of phishing puts a novel spin on a long-standing hack. First documented by securit...

Read Full Article →
This fake ad blocker malware impersonated uBlock Origin’s developer

I block ads (despite the hypocrisy) and you probably do too if you’re tech-literate enough to read PCWorld on the regular. So maybe you’re familiar with the minor drama between Google Chrome and the incredibly popular uBlock Origin , which is also a solo developer’s passion project. That notoriet...

Read Full Article →
840,000+ users hit by malicious browser extensions. Uninstall these ASAP!

Security researchers are now warning of a targeted malware campaign that involves malicious software hiding in certain browser extensions. The wave of attacks—dubbed “GhostPoster”—targets Chrome, Firefox, and Edge users. There have been over 840,000 attacks since December. How the GhostPoster att...

Read Full Article →
1Password review: A password manager designed for the Apple crowd

At a glance Expert's Rating Pros Polished, clean interface Multitude of entry types (logins, notes, etc), with the ability to pack in info fields Autofill works smoothly Large type for password viewing! Unique “travel mode” Cons Complex login system compared to rivals Family plan subaccounts can ...

Read Full Article →
Never reply to these text messages! How to spot SMS cost traps

Beware of text messages with promises to win or a call to action! Because it is precisely messages like these that repeatedly lead to unexpected costs on your mobile phone bill. If you reply carelessly or contact a specified number, you can quickly fall into an expensive trap. We explain below wh...

Read Full Article →
Say bye-bye to ads and malware on 9 devices for just $40

TL;DR: For a one-time $39.99 (MSRP $169.99), the AdGuard Family Plan lets you block ads, protect privacy, and secure up to nine devices for life. Online ads have gotten louder, sneakier, and harder to avoid—and that’s before you even factor in trackers, malicious sites, and kid-unfriendly content...

Read Full Article →
Best 5 VPNs for streaming Netflix and other services

VPNs aren’t just useful for keeping your online activities safe and private, they’re also a great way to bypass restrictions on streaming content in other countries. The top VPN providers work hard to stay one step ahead of streaming services in a never-ending cat-and-mouse game, ensuring that yo...

Read Full Article →
Firefox 147 improves video playback on AMD GPUs and privacy protection

With the most recent update to Firefox 147, you can enjoy a number of new features and improvements. Safe Browsing v5 improves privacy protection, picture-in-picture mode for videos has learned a new trick, and the developers have once again fixed several security flaws. Mozilla doesn’t plan to r...

Read Full Article →
Hackers are using browser-in-the-browser trick to steal Facebook logins

If you’re still using Facebook, then I assume you’re old enough to remember watching John Wayne movies in the theater. Nevertheless, it remains a pretty juicy target for hackers and digital thieves. They’re using a technique that you should be aware of, even if your only interaction with the slop...

Read Full Article →

#Threat Intel & Vulnerability

CVE-2025-34165

Currently trending CVE - Hype Score: 17 - A stack-based buffer overflow vulnerability in NetSupport Manager 14.x versions prior to 14.12.0000 allows a remote, unauthenticated attacker to cause a denial of service (DoS) or potentially leak a limited amount of memory.

Read Full Article → *(Covered by: Intruder Intel CVE Feed)*
CVE-2025-25257

Currently trending CVE - Hype Score: 16 - An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] vulnerability in Fortinet FortiWeb 7.6.0 through 7.6.3, FortiWeb 7.4.0 through 7.4.7, FortiWeb 7.2.0 through 7.2.10, FortiWeb 7.0.0 through 7.0....

Read Full Article →
CVE-2025-51683

A critical blind SQL Injection

Read Full Article → *(Covered by: Intruder Intel CVE Feed)*
CVE-2024-37079

Currently trending CVE - Hype Score: 10 - vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to...

Read Full Article →
CVE-2025-43529

Currently trending CVE - Hype Score: 1 - A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 26.2, Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2, tvOS 26.2. Processing maliciously crafted web c...

Read Full Article →
CVE-2025-14174

Currently trending CVE - Hype Score: 1 - Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

Read Full Article →
A week in security (January 19 – January 25)

A list of topics we covered in the week of January 19 to January 25 of 2026

Read Full Article → *(Covered by: Malwarebytes Labs)*
CVE-2025-14316 | AhaChat Messenger Marketing Plugin up to 1.1 on WordPress cross site scripting

A vulnerability labeled as problematic has been found in AhaChat Messenger Marketing Plugin up to 1.1 on WordPress. Impacted is an unknown function. Such manipulation leads to cross site scripting. This vulnerability is uniquely identified as CVE-2025-14316 . The attack can be launched remotely. ...

Read Full Article →
CVE-2025-14973 | Recipe Card Blocks Lite Plugin up to 3.4.12 on WordPress sql injection

A vulnerability identified as critical has been detected in Recipe Card Blocks Lite Plugin up to 3.4.12 on WordPress. This issue affects some unknown processing. This manipulation causes sql injection. This vulnerability is handled as CVE-2025-14973 . The attack can be initiated remotely. There i...

Read Full Article →
CVE-2026-1425 | pymumu SmartDNS up to 47.1 SVBC Record Parser src/dns.c _dns_decode_rr_head/_dns_decode_SVCB_HTTPS stack-based overflow

A vulnerability categorized as critical has been discovered in pymumu SmartDNS up to 47.1 . This vulnerability affects the function _dns_decode_rr_head/_dns_decode_SVCB_HTTPS of the file src/dns.c of the component SVBC Record Parser . The manipulation results in stack-based buffer overflow. This ...

Read Full Article →
CVE-2026-1424 | PHPGurukul News Portal 1.0 Profile Pic unrestricted upload

A vulnerability was found in PHPGurukul News Portal 1.0 . It has been rated as critical . This affects an unknown part of the component Profile Pic Handler . The manipulation leads to unrestricted upload. This vulnerability is traded as CVE-2026-1424 . It is possible to initiate the attack remote...

Read Full Article →
CVE-2026-1423 | code-projects Online Examination System 1.0 /admin_pic.php unrestricted upload

A vulnerability was found in code-projects Online Examination System 1.0 . It has been declared as critical . Affected by this issue is some unknown functionality of the file /admin_pic.php . Executing a manipulation can lead to unrestricted upload. This vulnerability appears as CVE-2026-1423 . T...

Read Full Article →
CVE-2026-1422 | code-projects Online Examination System 1.0 Login Page /index.php User sql injection

A vulnerability was found in code-projects Online Examination System 1.0 . It has been classified as critical . Affected by this vulnerability is an unknown functionality of the file /index.php of the component Login Page . Performing a manipulation of the argument User results in sql injection. ...

Read Full Article →
CVE-2026-1421 | code-projects Online Examination System 1.0 Add Pages cross site scripting

A vulnerability was found in code-projects Online Examination System 1.0 and classified as problematic . Affected is an unknown function of the component Add Pages . Such manipulation leads to cross site scripting. This vulnerability is documented as CVE-2026-1421 . The attack can be executed rem...

Read Full Article →
CVE-2026-1420 | Tenda AC23 16.03.07.52 /goform/WifiExtraSet wpapsk_crypto buffer overflow

A vulnerability has been found in Tenda AC23 16.03.07.52 and classified as critical . This impacts an unknown function of the file /goform/WifiExtraSet . This manipulation of the argument wpapsk_crypto causes buffer overflow. This vulnerability is registered as CVE-2026-1420 . Remote exploitation...

Read Full Article →
CVE-2026-23008 | Linux Kernel up to 6.18.6/6.19-rc5 vmwgfx null pointer dereference (EUVD-2026-4625)

A **critical

Read Full Article → *(Covered by: VulnDB)*
CVE-2026-23007 | Linux Kernel up to 6.18.6/6.19-rc5 block uninitialized pointer (EUVD-2026-4628)

A vulnerability, which was classified as critical , has been found in Linux Kernel up to 6.18.6/6.19-rc5 . The impacted element is an unknown function of the component block . The manipulation leads to uninitialized pointer. This vulnerability is listed as CVE-2026-23007 . The attack must be carr...

Read Full Article →
CVE-2026-23012 | Linux Kernel up to 6.18.6/6.19-rc5 DAMON Sysfs Interface damon_call use after free (EUVD-2026-4617)

A vulnerability classified as critical was found in Linux Kernel up to 6.18.6/6.19-rc5 . The affected element is the function damon_call of the component DAMON Sysfs Interface . Executing a manipulation can lead to use after free. This vulnerability is tracked as CVE-2026-23012 . The attack is on...

Read Full Article →
CVE-2026-23013 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 octep_vf_request_irqs use after free (EUVD-2026-4616)

A vulnerability classified as critical has been found in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 . Impacted is the function octep_vf_request_irqs . Performing a manipulation results in use after free. This vulnerability is identified as CVE-2026-23013 . The attack can only be performed from th...

Read Full Article → *(Covered by: VulnDB)*
CVE-2026-22997 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 j1939_xtp_rx_rts_session_active reference count (EUVD-2026-4637)

A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 . Affected by this vulnerability is the function j1939_xtp_rx_rts_session_active . Executing a manipulation can lead to improper update of reference count. This vulnerability is handled as CV...

Read Full Article →
CVE-2025-71162 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 Tegra ADMA Driver tegra_adma_terminate_all use after free (EUVD-2026-4634)

A vulnerability was found in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 . It has been rated as critical . Affected is the function tegra_adma_terminate_all of the component Tegra ADMA Driver . Performing a manipulation results in use after free. This vulnerability is known as CVE-2025-71162 . Acc...

Read Full Article →
CVE-2025-71163 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 dmaengine memory leak (EUVD-2026-4639)

A vulnerability was found in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 . It has been declared as critical . This impacts an unknown function of the component dmaengine . Such manipulation leads to memory leak. This vulnerability is traded as CVE-2025-71163 . Access to the local network is requir...

Read Full Article →
CVE-2026-23009 | Linux Kernel up to 6.18.6/6.19-rc5 xhci_sideband_remove_endpoint initialization (EUVD-2026-4619)

A vulnerability was found in Linux Kernel up to 6.18.6/6.19-rc5 . It has been classified as critical . This affects the function xhci_sideband_remove_endpoint . This manipulation causes improper initialization. This vulnerability appears as CVE-2026-23009 . The attacker needs to be present on the...

Read Full Article →
CVE-2026-23004 | Linux Kernel up to 6.18.6/6.19-rc5 IPv4 lib/dump_stack.c rt6_uncached_list_del use after free (EUVD-2026-4614)

A vulnerability was found in Linux Kernel up to 6.18.6/6.19-rc5 and classified as critical . The impacted element is the function rt6_uncached_list_del in the library lib/dump_stack.c of the component IPv4 . The manipulation results in use after free. This vulnerability is reported as CVE-2026-23...

Read Full Article →
CVE-2026-22999 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 qfq_change_class allocation of resources (EUVD-2026-4624)

A vulnerability has been found in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 and classified as critical . The affected element is the function qfq_change_class . The manipulation leads to allocation of resources. This vulnerability is documented as CVE-2026-22999 . The attack requires being on th...

Read Full Article → *(Covered by: VulnDB)*
CVE-2026-23005 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 fpu_update_guest_xfd state issue (EUVD-2026-4627)

A vulnerability, which was classified as critical , was found in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 . Impacted is the function fpu_update_guest_xfd . Executing a manipulation can lead to state issue. This vulnerability is registered as CVE-2026-23005 . The attack requires access to the lo...

Read Full Article →
CVE-2026-22998 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 nvmet_tcp_handle_h2c_data_pdu null pointer dereference (EUVD-2026-4629)

A vulnerability, which was classified as critical , has been found in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 . This issue affects the function nvmet_tcp_handle_h2c_data_pdu . Performing a manipulation results in null pointer dereference. This vulnerability is cataloged as CVE-2026-22998 . The...

Read Full Article →
CVE-2026-23003 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 ip6_tunnel include/net/inet_ecn.h skb_vlan_inet_prepare information disclosure (EUVD-2026-4621)

A vulnerability described as critical has been identified in Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 . Affected by this issue is the function skb_vlan_inet_prepare in the library include/net/inet_ecn.h of the component ip6_tunnel . The manipulation results in information disclosure. This vulne...

Read Full Article →
CVE-2026-1419 | D-Link DCS700l 1.03.09 Web Form /setDayNightMode LightSensorControl command injection

A vulnerability labeled as critical has been found in D-Link DCS700l 1.03.09 . Affected is an unknown function of the file /setDayNightMode of the component Web Form Handler . Executing a manipulation of the argument LightSensorControl can lead to command injection. The identification of this vul...

Read Full Article →
CVE-2020-36937 | Microvirt MEMU PLAY 3.7.0 MEmusvc Windows Service unquoted search path (Exploit 49016 / EUVD-2026-4636)

A vulnerability identified as problematic has been detected in Microvirt MEMU PLAY 3.7.0 . This impacts an unknown function of the component MEmusvc Windows Service . Performing a manipulation results in unquoted search path. This vulnerability was named CVE-2020-36937 . The attack needs to be ap...

Read Full Article →
CVE-2020-36935 | KMSpico Service KMSELDI 17.1.0.0 Service_KMS.exe unquoted search path (Exploit 49003 / EUVD-2026-4633)

A vulnerability categorized as problematic has been discovered in KMSpico Service KMSELDI 17.1.0.0 . This affects an unknown function of the file C:\Program Files\KMSpico\Service_KMS.exe . Such manipulation leads to unquoted search path. This vulnerability is uniquely identified as CVE-2020-36935...

Read Full Article →
CVE-2020-36933 | HTC IPTInstaller 4.0.9 PassThru Service unquoted search path (Exploit 49006 / EUVD-2026-4631)

A vulnerability was found in HTC IPTInstaller 4.0.9 . It has been rated as problematic . The impacted element is an unknown function of the component PassThru Service . This manipulation causes unquoted search path. This vulnerability is handled as CVE-2020-36933 . It is possible to launch the at...

Read Full Article →
CVE-2020-36934 | Deepinstinct Deep Instinct Windows Agent 1.2.24.0 DeepNetworkService.exe unquoted search path (Exploit 49020 / EUVD-2026-4640)

A vulnerability was found in Deepinstinct Deep Instinct Windows Agent 1.2.24.0 . It has been declared as problematic . The affected element is an unknown function of the file C:\Program Files\HP Sure Sense\DeepNetworkService.exe . The manipulation results in unquoted search path. This vulnerabili...

Read Full Article →
CVE-2020-36936 | Magic Utilities Magic Mouse 2 Utilities 2.20 Windows Service unquoted search path (Exploit 49017 / EUVD-2026-4638)

A vulnerability was found in Magic Utilities Magic Mouse 2 Utilities 2.20 . It has been classified as problematic . Impacted is an unknown function of the component Windows Service . The manipulation leads to unquoted search path. This vulnerability is traded as CVE-2020-36936 . An attack has to ...

Read Full Article →
CVE-2020-36932 | SeaCMS up to 11.1 Admin Settings Page checkuser cross site scripting (Exploit 49251 / EUVD-2026-4635)

A vulnerability was found in SeaCMS up to 11.1 and classified as problematic . This issue affects some unknown processing of the component Admin Settings Page . Executing a manipulation of the argument checkuser can lead to cross site scripting. This vulnerability appears as CVE-2020-36932 . The ...

Read Full Article →
CVE-2020-36931 | Click2Magic up to 1.1.5 cross site scripting (Exploit 49347 / EUVD-2026-4632)

A vulnerability has been found in Click2Magic up to 1.1.5 and classified as problematic . This vulnerability affects unknown code. Performing a manipulation results in cross site scripting. This vulnerability is reported as CVE-2020-36931 . The attack is possible to be carried out remotely. Moreo...

Read Full Article →
CVE-2026-1418 | GPAC up to 2.4.0 SRT Subtitle Import text_to_bifs.c gf_text_import_srt_bifs out-of-bounds write (Issue 3425)

A vulnerability, which was classified as critical , was found in GPAC up to 2.4.0 . This affects the function gf_text_import_srt_bifs of the file src/scene_manager/text_to_bifs.c of the component SRT Subtitle Import . Such manipulation leads to out-of-bounds write. This vulnerability is documente...

Read Full Article →
CVE-2026-1417 | GPAC up to 2.4.0 filedump.c dump_isom_rtp null pointer dereference (Issue 3426)

A vulnerability, which was classified as problematic , has been found in GPAC up to 2.4.0 . Affected by this issue is the function dump_isom_rtp of the file applications/mp4box/filedump.c . This manipulation causes null pointer dereference. This vulnerability is registered as CVE-2026-1417 . The ...

Read Full Article → *(Covered by: VulnDB)*
CVE-2026-1415 | GPAC up to 2.4.0 media_export.c gf_media_export_webvtt_metadata Name null pointer dereference (Issue 3428)

A vulnerability classified as problematic has been found in GPAC up to 2.4.0 . Affected is the function gf_media_export_webvtt_metadata of the file src/media_tools/media_export.c . The manipulation of the argument Name leads to null pointer dereference. This vulnerability is listed as CVE-2026-14...

Read Full Article →
CVE-2026-1414 | Sangfor Operation and Maintenance Security Management System HTTP POST Request get_Information getInformation command injection

A vulnerability described as critical has been identified in Sangfor Operation and Maintenance Security Management System up to 3.0.12 . This impacts the function getInformation of the file /equipment/get_Information of the component HTTP POST Request Handler . Executing a manipulation of the arg...

Read Full Article → *(Covered by: VulnDB)*
CVE-2026-1411 | Beetel 777VR1 up to 01.00.09/01.00.09_55 UART Interface access control

A critical vulnerability (

Read Full Article → *(Covered by: VulnDB)*
CVE-2026-1407 | Beetel 777VR1 up to 01.00.09/01.00.09_55 UART Interface information disclosure (EUVD-2026-4651)

A vulnerability was found in Beetel 777VR1 up to 01.00.09/01.00.09_55 . It has been classified as problematic . This affects an unknown part of the component UART Interface . Performing a manipulation results in information disclosure. This vulnerability is known as CVE-2026-1407 . The attack may...

Read Full Article →
CVE-2025-6461 | cubewp1211 CubeWP Framework Plugin up to 1.1.27 on WordPress class-cubewp-search-ajax-hooks.php information disclosure (EUVD-2026-4642)

A vulnerability was found in cubewp1211 CubeWP Framework Plugin up to 1.1.27 on WordPress and classified as problematic . Affected by this issue is some unknown functionality of the file class-cubewp-search-ajax-hooks.php . Such manipulation leads to information disclosure. This vulnerability is ...

Read Full Article →
CVE-2026-1406 | lcg0124 BootDo up to 5ccd963c74058036b466e038cff37de4056c1600 Host Header AccessControlFilter.java redirectToLogin Hostname (EUVD-2026-4641)

A vulnerability has been found in lcg0124 BootDo up to 5ccd963c74058036b466e038cff37de4056c1600 and classified as problematic . Affected by this vulnerability is the function redirectToLogin of the file AccessControlFilter.java of the component Host Header Handler . This manipulation of the argum...

Read Full Article →
ShinyHunters claim to be behind SSO-account data theft attacks

Lawrence Abrams reports: The ShinyHunters extortion gang claims it is behind a wave of ongoing voice phishing attacks targeting single sign-on (SSO) accounts at Okta, Microsoft, and Google, enabling threat actors to breach corporate SaaS platforms and steal company data for extortion. In these at...

Read Full Article →
France’s Waltio faces ransom threat from notorious hacker collective

Caroline Alvarez reports: Waltio, a French crypto tax platform, is under siege from ShinyHunters, a notorious ransomware group claiming to hold the personal data of nearly 50,000 users. ShinyHunters, known for high-profile crypto and corporate hacks, is threatening to leak users’ 2024 tax reports...

Read Full Article →
CVE-2025-13920 | WP Directory Kit Plugin up to 1.4.9 on WordPress AJAX wdk_public_action information disclosure (EUVD-2026-4542)

A vulnerability, which was classified as problematic , was found in WP Directory Kit Plugin up to 1.4.9 on WordPress. Affected is the function wdk_public_action of the component AJAX Handler . The manipulation results in information disclosure. This vulnerability is reported as CVE-2025-13920 . T...

Read Full Article →
CVE-2026-0862 | PDFCrowd Save as PDF Plugin up to 4.5.5 on WordPress cross site scripting (EUVD-2026-4541)

A vulnerability, which was classified as problematic , has been found in PDFCrowd Save as PDF Plugin up to 4.5.5 on WordPress. This impacts an unknown function. The manipulation leads to cross site scripting. This vulnerability is documented as CVE-2026-0862 . The attack can be initiated remotely...

Read Full Article →
CVE-2026-0593 | WP Go Maps Plugin up to 10.0.04 on WordPress Map Engine Setting processBackgroundAction authorization (EUVD-2026-4540)

A vulnerability classified as problematic was found in WP Go Maps Plugin up to 10.0.04 on WordPress. This affects the function processBackgroundAction of the component Map Engine Setting Handler . Executing a manipulation can lead to missing authorization. This vulnerability is registered as CVE-...

Read Full Article →
CVE-2026-0911 | Hustle Plugin up to 7.8.9.2 on WordPress action_import_module unrestricted upload (EUVD-2026-4543)

A vulnerability classified as critical has been found in Hustle Plugin up to 7.8.9.2 on WordPress. The impacted element is the function action_import_module . Performing a manipulation results in unrestricted upload. This vulnerability is cataloged as CVE-2026-0911 . It is possible to initiate th...

Read Full Article →
CVE-2026-24656 | Apache Karaf up to 2.11.x Decanter log-socket Collector deserialization

A vulnerability described as problematic has been identified in Apache Karaf up to 2.11.x . The affected element is an unknown function of the component Decanter log-socket Collector . Such manipulation leads to deserialization. This vulnerability is listed as CVE-2026-24656 . The attack may be p...

Read Full Article →
Spammers abuse Zendesk to flood inboxes with legitimate-looking emails, but why?

Spammers are abusing Zendesk to flood inboxes with emails from trusted brands. There’s no phishing or malware—just noise.

Read Full Article →
5 Hot Cybersecurity Certifications for Salary Growth in 2026

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 23, 2026 –Read the full story in SkillUp Cybercrime was predicted to cost the world $10.5 trillion annually in 2025, and to reach $12.2 trillion by 2031, according to Cybersecurity Ventures, and there’s Th...

Read Full Article →
ShinyHunters group opens new dark web leak site, claims responsibility for OKTA vishing campaign

Over on LinkedIn, AlonGal of Hudson Rock wrote: BIG – ShinyHunters confirmed to me that they are behind the recent Okta vishing campaign and have published alleged data from three major victims (Crunchbase, SoundCloud, and Betterment) on their new blog, stating more are coming. 🔽 I was approached...

Read Full Article →
INC ransomware opsec fail allowed data recovery for 12 US orgs

Bill Toulas reports: An operational security failure allowed researchers to recover data that the INC ransomware gang stole from a dozen U.S. organizations. A deep forensic examination of the artifacts left behind uncovered tooling that had not been used in the investigated attack, but exposed at...

Read Full Article →
I scan, you scan, we all scan for... knowledge?

In this week's newsletter, Bill hammers home the old adage, "Know your environment" — even throughout alert fatigue.

Read Full Article →
How Public Container Registries Have Become a Silent Risk Multiplier in a Modern Supply Chain

Key Takeaways The Risk Introduced by Implicit Trust in Public Container Images Public container registries have become foundational to modern software development. A single docker pull can accelerate application delivery, standardize environments, and reduce operational friction across teams. How...

Read Full Article →
LastPass ‘create backup’ email is a phishing scam targeting your master password

Attackers are abusing maintenance-themed alerts to steal master passwords from LastPass users. Password managers are still top-tier targets Password managers remain in the middle of attackers’ crosshairs, largely because a single successful compromise can unlock access to dozens, or even hundreds...

Read Full Article →
Europe’s GDPR cops dished out €1.2B in fines last year as data breaches piled up

Carly Page reports: GDPR fines pushed past the £1 billion (€1.2 billion) mark in 2025 as Europe’s regulators were deluged with more than 400 data breach notifications a day, according to a new survey that suggests the post-plateau era of enforcement has well and truly arrived. The figures come fr...

Read Full Article →
Foxit, Epic Games Store, MedDreams vulnerabilities

Cisco Talos’ Vulnerability Discovery & Research team recently disclosed three vulnerabilities in Foxit PDF Editor, one in the Epic Games Store, and twenty-one in MedDream PACS.. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisc...

Read Full Article →
Fake LastPass maintenance emails target users

LastPass is warning users about phishing emails that pressure users to back up their vaults within 24 hours.

Read Full Article →
Top 10 Ransomware Attacks Over The Past Year

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 22, 2026 –Read the full story in SOC Radar In 2025, ransomware moved beyond isolated IT incidents and became a systemic risk, capable of disrupting national supply chains, critical services, and The post T...

Read Full Article →
UK Launches ‘Report Fraud’ as Scams Reach New Heights

The City of London Police has officially launched Report Fraud — a unified national service designed to transform how the public reports cybercrime and fraud across England, Wales and Northern Ireland. The new platform aims to strengthen the UK’s response to digital scams and economic crime. Cybe...

Read Full Article →
Under Armour ransomware breach: data of 72 million customers appears on the dark web

Customer data allegedly stolen during a ransomware attack on sportswear giant Under Armour is now circulating on the dark web.

Read Full Article →
  • ANY.RUN Sandbox & MISP Integration: Confirm Alerts Faster, Stop Incidents Early — Most SOC teams are overloaded with routine work. Tier 1 & 2 analysts spend too much time validating alerts, moving samples between tools, and chasing missing context. When integrations are weak, investigations slow down, MTTR grows, and SLAs suffer delays. That directly increases operational risk…
Qualys Named a Leader and Outperformer in the 2025 GigaOm Radar for CNAPP

We’re proud to share that Qualys has been recognized as a Leader and Outperformer in the 2025 GigaOm Radar Report for Cloud-Native Application Protection Platforms (CNAPP). This year’s evaluation underscores an important reality of the CNAPP market: while 18 vendors were evaluated, only a small s...

Read Full Article →
Can you use too many LOLBins to drop some RATs?

An attempt to drop two RATs on a system used an uncanny assortment of legitimate Windows tools.

Read Full Article →
Best Cybersecurity Newsletters Shortlist For 2026

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 21, 2026 –Read the full story in The CTO Club With new cyber vulnerabilities emerging daily, it’s not enough to rely solely on the tools at hand—keeping your team informed and The post Best Cybersecurity N...

Read Full Article →
Black Basta Ransomware Group Exposed in Europe, Russian Leader Is Now Among EU’s Most Wanted

European and Ukrainian authorities have exposed two alleged key members of the Black Basta cybercrime group and identified its alleged leader

Read Full Article →
Malicious Google Calendar invites could expose private data

Researchers showed how prompt injection hidden in a calendar invite can bypass privacy controls and turn an AI assistant into a data-leaking accomplice.

Read Full Article →
Under Armour - 72,742,892 breached accounts

In November 2025, the Everest ransomware group claimed Under Armour as a victim and attempted to extort a ransom , alleging they had obtained access to 343GB of data. In January 2026, customer data from the incident was published publicly on a popular hacking forum , including 72M email addresses...

Read Full Article →
Oracle January 2026 Critical Patch Update Addresses 158 CVEs

Oracle addresses 158 CVEs in its first quarterly update of 2026 with 337 patches, including 27 critical updates. Key takeaways: The first Critical Patch Update (CPU) for 2026, contains fixes for 158 unique CVEs in 337 security updates. 27 issues (8% of all patches) were assigned a critical severi...

Read Full Article →
Tenable Discovers SSRF Vulnerability in Java TLS Handshakes That Creates DoS Risk

Tenable Research has discovered a server-side request forgery (SSRF) vulnerability in Java’s handling of client certificates during a TLS handshake. In certain configurations, this can be abused to cause a denial-of-service (DoS) condition. Key takeaways Tenable Research identified a vulnerabilit...

Read Full Article →
VU#481830: Libheif uncompressed codec lacks bounds check leading to application crash

Overview An out-of-bounds memory access vulnerability exists in the uncompressed decoder component of libheif . A maliciously crafted HEIF image can trigger a denial-of-service condition by causing the libheif library to crash or exhibit other unexpected behavior due to an out-of-bounds memory ac...

Read Full Article →
VU#102648: Code injection vulnerability in binary-parser library

Overview The binary-parser library for Node.js contains a code injection vulnerability that may allow arbitrary JavaScript code execution if untrusted input is used to construct parser definitions. Versions prior to 2.3.0 are affected. The issue has been resolved by the developer in a public upda...

Read Full Article →
VU#458022: Open5GS WebUI uses a hard-coded secrets including JSON Web Token signing key

Overview The Open5GS WebUI component contains default hardcoded secrets used for security-sensitive operations, including JSON Web Token (JWT) signing. If these defaults are not changed, an attacker can forge valid authentication tokens and gain administrative access to the WebUI. This can result...

Read Full Article →
VU#271649: Stack-based buffer overflow in libtasn1 versions v4.20.0 and earlier

Overview A stack-based buffer overflow vulnerability exists in GNU libtasn1, a low-level ASN.1 parsing library. The issue is caused by unsafe string concatenation in the asn1_expand_octet_string function located in decoding.c . Under worst-case conditions, this results in a one-byte stack overflo...

Read Full Article →
Cybersecurity Predictions for 2026 Signal the Maturation of Risk-First Security Models

Key Takeaways The Signals Are Loud, the Dashboards Are Full, Yet Decisive Action Remains Elusive By the end of 2025, many security leaders reached a quiet conclusion. The challenge was no longer a lack of tools, telemetry, or frameworks. Most enterprises already had all three. What remained unres...

Read Full Article →
VU#818729: Safetica contains a kernel driver vulnerability

Overview Kernel driver ProcessMonitorDriver.sys in Safetica's endpoint client x64, versions 10.5.75.0 and 11.11.4.0, allows for an unprivileged user to abuse an IOCTL path and terminate protected system processes. Description Safetica is a Data Loss Prevention (DLP) and Insider Risk Management (I...

Read Full Article →
VU#244846: Server-Side Template Injection (SSTI) vulnerability exist in Genshi

Overview A Server-Side Template Injection (SSTI) vulnerability exists in the Genshi template engine due to unsafe evaluation of template expressions. Genshi processes template expressions using Python’s 'eval()’ and ‘exec()’ functions while allowing fallback access to Python built-in objects. If ...

Read Full Article →
Mastercard CEO Michael Miebach On Cybersecurity at World Economic Forum

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 20, 2026 –Read the full story in World Economic Forum “Cybersecurity is the foundation for our digital world. It is at the heart of trust and will allow society to fully The post Mastercard CEO Michael Mie...

Read Full Article →
VU#924114: dr_flac contains an integer overflow vulnerability that allows for DoS when provided a crafted file

Overview dr_flac , an open-source FLAC audio decoder, part of the dr_libs audio decoder toolset, contains an integer overflow vulnerability allowing for denial of service (DoS) when provided a specific crafted file. An attacker can exploit this vulnerability through providing a tool that uses dr_...

Read Full Article →
  • Malware Trends Report 2025: New Security Risks for Businesses in 2026 — Summarizing the past year’s threat landscape based on activity observed in ANY.RUN’s Interactive Sandbox, this annual report provides insights into the most detected malware types, families, TTPs, and phishing threats of 2025. For additional insights, view ANY.RUN’s quarterly malware trends repor…
Computer History, 1989: The Queen Of The Hackers Tracked Down By U.S. Secret Service

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 19, 2026 –Watch the YouTube video On Aug. 17, 1990, a federal judge sentenced a Chicago woman to 27 months in prison for masterminding a nationwide ring of computer hackers that stole more The post Compute...

Read Full Article →
Firefox joins Chrome and Edge as sleeper extensions spy on users

Researchers found more sleeper browser extensions that spy on users and install backdoors, this time targeting Firefox users as well.

Read Full Article →
Why Managed Detection and Response Has Become Essential to Modern Cyber Resilience

Managed Detection and Response (MDR) delivers 24/7 threat detection, intelligence-led hunting, and rapid response—moving organizations beyond basic monitoring to active defense. MDR providers combine advanced analytics, AI, and human expertise to deliver scalable MDR services tailored to regional...

Read Full Article →
First Trust NASDAQ Cybersecurity ETF Growth Thesis For 2026

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 16, 2026 –Read the full story in AIInvest The macro tailwind for the cybersecurity sector is now a tidal wave, according to AIInvest. Global spending on security products and services is projected The post...

Read Full Article →
WhisperPair exposes Bluetooth earbuds and headphones to tracking and eavesdropping

Researchers demonstrated WhisperPair, a set of attacks that can take control of many widely used Bluetooth earbuds and headphones without user interaction.

Read Full Article →
VU#383552: thelibrarian does not secure its interface, allowing for access to internal system data

Overview Multiple vulnerabilities were discovered in The Librarian, an AI-powered personal assistant tool provided by the company TheLibrarian.io . The Librarian can be used to manage personal email, calendar, documents, and other information through external services, such as Gmail and Google Dr...

Read Full Article →
VU#650657: Livewire Filemanager contains an insecure .php component that allows for unauthenticated RCE in Laravel Products

Overview A vulnerability, tracked as CVE-2025-14894, has been discovered within Livewire Filemanager, a tool designed for usage within Laravel applications. The Livewire Filemanager tool allows for users to upload various files, including PHP files, and host them within the Laravel application. W...

Read Full Article →
Threat and Vulnerability Management in 2026

Understand the future of threat and vulnerability management (TVM). Learn what TVM is, why traditional tools fail, and how intelligence is essential in today’s landscape.

Read Full Article →
Predicting 2026

In this week’s newsletter, Martin examines the evolving landscape for 2026, highlighting key threats, emerging trends like AI-driven risks, and the continued importance of addressing familiar vulnerabilities.

Read Full Article →
Your VMDR Year in Review: Making Security Progress Visible and Actionable

Security Teams Rarely Stop to Reflect When a security program is working well, very little seems to happen. That is by design. There is no alert for the incident that was prevented. No visibility into the attack path that was quietly closed. No recognition for the vulnerability that was fixed bef...

Read Full Article →
WEF: AI overtakes ransomware as fastest-growing cyber risk

We can no longer say that artificial intelligence is a "future risk", lurking somewhere on a speculative threat horizon. The truth is that it is a fast-growing cybersecurity risk that organizations are facing today. That's not just my opinion, that's also the message that comes loud and clear fro...

Read Full Article →
Why Serverless Risk Demands Identity-Aware Security at Cloud Scale

Key Takeaways The Current Picture Serverless adoption is accelerating as organizations prioritize speed, scalability, and operational efficiency. According to the Data Bridge Market Research’s Global Serverless Security Market Report, the serverless security market reached USD 12.08 billion in 20...

Read Full Article →
VU#472136: Information Leak and DoS Vulnerabilities in Redmi Buds 3 Pro through 6 Pro

Overview Redmi Buds , a series of Bluetooth earbuds produced and sold by Xiaomi , contain an Information Leak vulnerability and a Denial of Service (DoS) vulnerability in versions 3 Pro through 6 Pro. An attacker within Bluetooth radio range can send specially crafted RFCOMM protocol interactions...

Read Full Article →
Closing the Door on Net-NTLMv1: Releasing Rainbow Tables to Accelerate Protocol Deprecation

Written by: Nic Losby Introduction Mandiant is publicly releasing a comprehensive dataset of Net-NTLMv1 rainbow tables to underscore the urgency of migrating away from this outdated protocol. Despite Net-NTLMv1 being deprecated and known to be insecure for over two decades—with cryptanalysis dati...

Read Full Article →
Canon U.S.A. Managing Office Technology, IT Infrastructure And Cybersecurity Under One Roof

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 15, 2026 –Read the full story in Brandpoint Today’s businesses face unprecedented challenges, from the increasing complexity of digital transformations and hybrid cloud environments to constantly evolving ...

Read Full Article →
“Reprompt” attack lets attackers steal data from Microsoft Copilot

Researchers uncovered a way to steal data from Microsoft Copilot users with a single malicious link.

Read Full Article →
Aembit Announces Agenda and Speaker Lineup for NHIcon 2026 on Agentic AI Security

Silver Spring, Maryland, 15th January 2026, CyberNewsWire The post Aembit Announces Agenda and Speaker Lineup for NHIcon 2026 on Agentic AI Security appeared first on The Security Ledger with Paul F. Roberts .

Read Full Article →
UAT-8837 targets critical infrastructure sectors in North America

Cisco Talos is closely tracking UAT-8837, a threat actor we assess with medium confidence is a China-nexus advanced persistent threat (APT) actor.

Read Full Article →
CVE-2025-64155: Exploit Code Released for Critical Fortinet FortiSIEM Command Injection Vulnerability

Exploit code has been published for CVE-2025-64155, a critical command injection vulnerability affecting Fortinet FortiSIEM devices. Key takeaways: CVE-2025-64155 is a critical operating system (OS) command injection vulnerability affecting Fortinet FortiSIEM. Fortinet vulnerabilities have histor...

Read Full Article →
A 0-click exploit chain for the Pixel 9 Part 3: Where do we go from here?

While our previous two blog posts provided technical recommendations for increasing the effort required by attackers to develop 0-click exploit chains, our experience finding, reporting and exploiting these vulnerabilities highlighted some broader issues in the Android ecosystem. This post descri...

Read Full Article →
A 0-click exploit chain for the Pixel 9 Part 2: Cracking the Sandbox with a Big Wave

With the advent of a potential Dolby Unified Decoder RCE exploit, it seemed prudent to see what kind of Linux kernel drivers might be accessible from the resulting userland context, the mediacodec context. As per the AOSP documentation, the mediacodec SELinux context is intended to be a constrain...

Read Full Article →
A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby

Over the past few years, several AI-powered features have been added to mobile phones that allow users to better search and understand their messages. One effect of this change is increased 0-click attack surface, as efficient analysis often requires message media to be decoded before the message...

Read Full Article →
Phishing scammers are posting fake “account restricted” comments on LinkedIn

Fake LinkedIn comments warning of account restrictions are designed to trick users into revealing their login details.

Read Full Article →
Identity & Beyond: 2026 Incident Response Predictions

In 2026, incident response (IR) will continue its shift away from traditional malware-centric investigations toward identity-driven intrusions, abuse of trusted cloud services, and low-signal, high-impact activity that blends seamlessly into normal business operations. Rather than relying on tech...

Read Full Article →
AI-Powered Deepfake Scams Are A Pain In The Wallet

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 14, 2026 –Read the full story in Finextra With the democratization of artificial intelligence (AI) technology, deepfakes are becoming a popular tool among cybercriminals with which to scam consumers, busin...

Read Full Article →
How real software downloads can hide remote backdoors

Attackers use legitimate open-source software as cover, relying on user trust to compromise systems. We dive into an example.

Read Full Article →
Brushstrokes and breaches with Terryn Valikodath

Terryn’s path to cybersecurity started with a fascination for criminal forensics and a knack for jailbreaking his family's tech — interests that eventually steered him toward the fast-paced world of digital investigations.

Read Full Article →
  • German Manufacturing Under Phishing Attacks: Tracking a Stealthy AsyncRAT Campaign — Manufacturing companies have quietly become one of the most hunted species in the modern threat landscape. Not because they are careless, but because they are operationally critical, geographically distributed, and often rely on complex IT and OT environments that attackers love to probe. Key Tak…
Microsoft and Adobe Patch Tuesday, January 2026 Security Update Review

Starting the year on a security-first note, Microsoft’s January 2026 Patch Tuesday resolves several vulnerabilities that could impact enterprise environments. Here’s a quick breakdown of what you need to know. Microsoft Patch Tuesday for January 2026 This month’s release addresses 115 vulnerabili...

Read Full Article →
Microsoft’s January 2026 Patch Tuesday Addresses 113 CVEs (CVE-2026-20805)

8 Critical 105 Important 0 Moderate 0 Low Microsoft addresses 113 CVEs in the first Patch Tuesday of 2026, with two zero-days, including one that was exploited in the wild. Microsoft patched 113 CVEs in its January 2026 Patch Tuesday release, with eight rated critical and 105 rated as important. ...

Read Full Article →
Microsoft Patch Tuesday for January 2026 — Snort rules and prominent vulnerabilities

Microsoft has released its monthly security update for January 2026, which includes 112 vulnerabilities affecting a range of products, including 8 that Microsoft marked as “critical”.

Read Full Article →
The AI Fix #83: ChatGPT Health, Victorian LLMs, and the biggest AI bluffers

In episode 83 of The AI Fix, Graham reveals he's taken up lying to LLMs, and shows how a journalist exposed AI bluffers with a made-up idiom. Meanwhile Mark invents a "Godwin's Law" for AI, and explains how to ruin any LLM with humus. Also in this episode, a marriage is declared invalid thanks to...

Read Full Article →
In The Future: Breach Ready, Board Ready, and AI-Powered Cybersecurity

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 13, 2026 –Read the full story in Voice & Data Cybersecurity Ventures estimated that the global cost of cybercrime would reach $10.5 trillion USD annually by 2025, and ransomware would cost its The post In ...

Read Full Article →
Hackers get hacked, as BreachForums database is leaked

Have you ever stolen data, traded a hacking tool, or just lurked on a dark web forum believing that you are anonymous? If so, I might have some unsettling news for you. Read more in my article on the Hot for Security blog.

Read Full Article →
  • CastleLoader Analysis: A Deep Dive into Stealthy Loader Targeting Government Sector — ANY.RUN’s team conducted an extensive malware analysis of CastleLoader, the first link in the chain of attacks impacting various industries, including government agencies and critical infrastructures. It’s a unique walkthrough of its entire execution path, from a packaged installer to C2 server c…
Best Ransomware Detection Tools

Stop ransomware before encryption begins. Learn how intelligence-driven detection tools can help identify precursor behaviors and reduce false positives for faster response.

Read Full Article →
December 2025 CVE Landscape: 22 Critical Vulnerabilities Mark 120% Surge, React2Shell Dominates Threat Activity

December 2025 saw a 120% surge in critical CVEs, with 22 exploited flaws and React2Shell (CVE-2025-55182) dominating threat activity across Meta’s React framework.

Read Full Article →
10 Hot Cyber Range Companies To Watch In 2026

Bridging the cybersecurity skills gap with virtual hands-on experience – Steve Morgan, Editor-in-Chief Sausalito, Calif. – Jan. 12, 2026 A cyber range is designed to mimic real-world scenarios that can be used to detect and react to simulated cyberattacks, and to enable practitioners to test The ...

Read Full Article →
Received an Instagram password reset email? Here’s what you need to know

Instagram users received emails last week about purported password reset attempts. At the same time, Instagram data appeared on the dark web.

Read Full Article →
Tenable Is a Gartner® Peer Insights™ Customers’ Choice for Cloud-Native Application Protection Platforms

This recognition — based entirely on feedback from the people who use our products every day — to us is a testament to the unmatched value Tenable Cloud Security CNAPP offers organizations worldwide. Our key takeaways: In our view, this peer recognition confirms Tenable’s strategic value in helpi...

Read Full Article →
BreachForums (2025) - 672,247 breached accounts

In October 2025, a reincarnation of the hacking forum BreachForums, which had previously been shut down multiple times, was taken offline by a coalition of law enforcement agencies . In the months leading up to the takedown, the site itself suffered a data breach that exposed a total of 672k uniq...

Read Full Article →
VU#361400: BeeS Software Solutions BeeS Examination Tool (BET) portal contains SQL injection vulnerability

Overview The BeeS Examination Tool (BET) portal from BeeS Software Solutions contains an SQL injection vulnerability in its website login functionality. More than 100 universities use the BET portal for test administration and other academic tasks. The vulnerability enables arbitrary SQL commands...

Read Full Article →
Resolutions, shmesolutions (and what’s actually worked for me)

Talos' editor ditches the pressure of traditional New Year’s resolutions in favor of practical, in-the-moment changes, and finds more success by letting go of perfection. Plus, we break down the latest on UAT-7290, a newly disclosed threat actor targeting critical infrastructure.

Read Full Article →
UAT-7290 targets high value telecommunications infrastructure in South Asia

Talos assesses with high confidence that UAT-7290 is a sophisticated threat actor falling under the China-nexus of advanced persistent threat actors (APTs). UAT-7290 primarily targets telecommunications providers in South Asia.

Read Full Article →
How Cisco Talos powers the solutions protecting your organization

What happens under the hood of Cisco's security portfolio? Our reputation and detection services apply Talos' real-time intelligence to detect and block threats. Here's how.

Read Full Article →
GRU-Linked BlueDelta Evolves Credential Harvesting

Insikt Group reveals how GRU-linked BlueDelta evolved credential-harvesting campaigns targeting government, energy, and research organizations across Europe and Eurasia.

Read Full Article →
Cloud Agent in 2025: A Year of Scale, Security, and Smarter Visibility

As we move into 2026, 2025 stands out as a defining year for the Qualys Cloud Agent. In 2025, Cloud Agent delivered deeper visibility into running systems and applications, stronger security controls, expanded support across operating systems and architectures, and meaningful platform modernizati...

Read Full Article →
VU#295169: TOTOLINK EX200 firmware-upload error handling can activate an unauthenticated root telnet service

Overview A flaw in the firmware-upload error-handling logic of the TOTOLINK EX200 extender can cause the device to unintentionally start an unauthenticated root-level telnet service. This condition may allow a remote authenticated attacker to gain full system access. Description In the End-of-Lif...

Read Full Article →
VU#420440: Vulnerable Python version used in Forcepoint One DLP Client

Overview A vulnerability in the Forcepoint One DLP Client allows bypass of the vendor-implemented Python restrictions designed to prevent arbitrary code execution. By reconstructing the ctypes FFI environment and applying a version-header patch to the ctypes.pyd module, an attacker can restore ct...

Read Full Article →
WhiteDate - 6,076 breached accounts

In December 2025, the dating website "for a Europid vision" WhiteDate suffered a data breach that exposed 6k unique email addresses . The breach exposed extensive further personal information including data related to physical appearance, income, education and IQ.

Read Full Article →
New State Laws Impact AI Governance, Risk, and Compliance

New York has started a movement to reshape the AI compliance landscape for companies doing business in the state. Other states are following suit making Governance and AI Compliance an increasingly critical endeavor.

Read Full Article →
New ransomware tactics to watch out for in 2026

Ransomware groups made less money in 2025 despite a 47% increase in attacks, driving new tactics: bundled DDoS services, insider recruitment, and gig worker exploitation. Learn the emerging trends defenders must prepare for in 2026.

Read Full Article →
Cybersecurity Snapshot: Predictions for 2026: AI Attack Acceleration, Automated Remediation, Custom-Made AI Security Tools, Machine Identity Threats, and More

In this special edition, Tenable leaders forecast key 2026 trends, including: AI will make attacks more plentiful and less costly; machine identities will become the top cloud risk; preemptive cloud and exposure management will dethrone runtime detection; and automated remediation gets the go-ahe...

Read Full Article →
LevelBlue SpiderLabs: Ransomware Attacks Up 17% in 2025

Global Ransomware Surges in 2025: Total ransomware attacks rose by 17.2% year-over-year, with LevelBlue SpiderLabs tracking approximately 7,400 incidents compared to 6,017 in 2024. Q ilin and Akira Lead the Threat Landscape: Following the disappearance of Ransomhub and the disr uption of Lockbit3...

Read Full Article →
  • Integrating a Malware Sandbox into SOAR Workflows: Steps, Benefits, and Impact — SOAR platforms are excellent at moving work forward. They trigger playbooks, route incidents, and enforce consistent response steps. What they don’t do well on their own is confirm what’s actually SOAR helps teams move faster, but speed isn’t the real problem. The real issue is figuring out what …
CVE-2025-14847 (MongoBleed): MongoDB Memory Leak Vulnerability Exploited in the Wild

A recently disclosed vulnerability affecting MongoDB instances has been reportedly exploited in the wild. Exploit code has been released for this flaw dubbed MongoBleed. Key takeaways: MongoBleed is a memory leak vulnerability affecting multiple versions of MongoDB. Exploitation of MongoDB has be...

Read Full Article →
  • 5 Ways MSSPs Can Win Clients in 2026 — By 2026, MSSPs will compete less on tooling and more on clarity, speed, and foresight. Security buyers want proof that their provider understands what threats matter now, how fast they can respond, and how security decisions reduce business risk. At the center of this challenge sits threat intell…

  • Release Notes: AI Sigma Rules, Live Threat Landscape & 1,700+ New Detections — ANY.RUN is wrapping up 2025 with updates that take pressure off your SOC and help your team work faster. You can now get AI‑generated Sigma rules, track threats by industry and region, and detect new campaigns with better speed and accuracy. Let’s see what these improvements bring to your securit…

  • Malware Trends Q4 2025: Inside ANY.RUN’s Latest Threat Landscape Report — We’re glad to present our regular quarterly report highlighting the most prominent malicious trends of the last three months of 2025, as observed by ANY.RUN’s community. Following the release of our annual report on key threats and milestones, this report offers a closer look at the threat landsc…

Share this post