#This Week in Security: Your News Briefing
Welcome to your weekly security roundup. We’ve tracked down the 10 most important stories this week—the ones everyone’s talking about, from critical threats to emerging trends that could shape your security posture. Leading the news this week is Appsec Roundup - June 2025, which has sparked conversation across 9 sources. Meanwhile, the industry is closely tracking CVE-2026-2223 | code-projects Online Reviewer System 1.0 index.php… with 9 mentions, along with emerging details on CVE-2025-66595 | Yokogawa Electric FAST TOOLS up to R10.04…, Secure By Design roundup - Dec/Jan 2026, and CVE-2025-30208. Here’s the full breakdown of what you need to know.
#🚨 Critical Threats This Week
First, the stories that demand your immediate attention:
1. Appsec Roundup - June 2025 Mentioned across 9 industry sources this week. Lots of fascinating threat model-related advances, new risk management tools, games, and more!. Get the details →
2. CVE-2026-2223 | code-projects Online Reviewer System 1.0 index.php ID sql injection Mentioned across 9 industry sources this week. A vulnerability was found in code-projects Online Reviewer System 1. Get the details →
3. CVE-2025-66595 | Yokogawa Electric FAST TOOLS up to R10.04 cross-site request forgery Mentioned across 6 industry sources this week. A vulnerability described as problematic has been identified in Yokogawa Electric FAST TOOLS up to R10. Get the details →
#🛠️ Tools, Updates & Releases
New capabilities and releases worth knowing about:
1. Incognito Market admin sentenced to 30 years for running $105 million dark web drug empire He promised “the best security there is” to hundreds of thousands of drug buyers, while quietly maki. Referenced in 3 stories this week. Explore →
2. Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium . Referenced in 2 stories this week. Explore →
#What You Should Do Next
Monitor these in your environment next week:
- Any new CVE announcements related to systems you operate
- Emerging attack techniques being discussed in the community
- Updates and patches for tools your team uses
Have a look at the full deep-dives in the trending stories below. Each one provides context that could inform your security decisions this week.
#Top Trending Stories
1. Key Threat Intel & Vulnerability Stories (20 mentions)
▼
This week's critical security updates and vulnerability disclosures:
2. Appsec Roundup - June 2025 (9 mentions)
▼
Lots of fascinating threat model-related advances, new risk management tools, games, and more!
Read Full Article →
3. Secure By Design roundup - Dec/Jan 2026 (6 mentions)
▼
The normalization of deviance, exciting threat modeling news, and a question of do regulatory threats change ‘the threat model’ as much as GPS attacks? Not yet.
Read Full Article →
4. Incognito Market admin sentenced to 30 years for running $105 million dark web drug empire (3 mentions)
▼
He promised "the best security there is" to hundreds of thousands of drug buyers, while quietly making the kind of mistake that guaranteed a 30-year sentence. And maybe training police on cryptocurrency while running a running a vast Tor-hidden dr...
Read Full Article →
5. MedDream PACS Premium sendOruReport reflected cross-site scripting (XSS) vulnerability (3 mentions)
▼
6. What’s next for DHS’s forthcoming replacement critical infrastructure protection panel, AI information sharing (2 mentions)
▼
7. Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium (2 mentions)
▼
#Article Summary
| Category | Article Count |
|---|---|
| AI & LLM | 13 |
| Cloud | 9 |
| Cyber Regulatory | 2 |
| Cybersecurity | 303 |
| Scraping Candidates | 2 |
| Security Vendor Blog | 69 |
| Tech | 37 |
| Threat Intel & Vulnerability | 178 |
| Total Articles Scanned | 613 |
#AI & LLM
GPT-5 lowers the cost of cell-free protein synthesis
▼
An autonomous lab combining OpenAI’s GPT-5 with Ginkgo Bioworks’ cloud automation cut cell-free protein synthesis costs by 40% through closed-loop experimentation.
Read Full Article →
GPT-5.3-Codex System Card
▼
GPT‑5.3-Codex is the most capable agentic coding model to date, combining the frontier coding performance of GPT‑5.2-Codex with the reasoning and professional knowledge capabilities of GPT‑5.2.
Read Full Article →
Introducing GPT-5.3-Codex
▼
GPT-5.3-Codex is a Codex-native agent that pairs frontier coding performance with general reasoning to support long-horizon, real-world technical work.
Read Full Article →
Inside OpenAI’s in-house data agent
▼
How OpenAI built an in-house AI data agent that uses GPT-5, Codex, and memory to reason over massive datasets and deliver reliable insights in minutes.
Read Full Article →
Taisei Corporation shapes the next generation of talent with ChatGPT
▼
Taisei Corporation uses ChatGPT Enterprise to support HR-led talent development and scale generative AI across its global construction business.
Read Full Article →
Retiring GPT-4o, GPT-4.1, GPT-4.1 mini, and OpenAI o4-mini in ChatGPT
▼
On February 13, 2026, alongside the previously announced retirement of GPT‑5 (Instant, Thinking, and Pro), we will retire GPT‑4o, GPT‑4.1, GPT‑4.1 mini, and OpenAI o4-mini from ChatGPT. In the API, there are no changes at this time.
Read Full Article →
Keeping your data safe when an AI agent clicks a link
▼
Learn how OpenAI protects user data when AI agents open links, preventing URL-based data exfiltration and prompt injection with built-in safeguards.
Read Full Article →
Unlocking Agentic RL Training for GPT-OSS: A Practical Retrospective
▼
Introducing Prism
▼
Prism is a free LaTeX-native workspace with GPT-5.2 built in, helping researchers write, collaborate, and reason in one place.
Read Full Article →
Inside Praktika's conversational approach to language learning
▼
How Praktika uses GPT-4.1 and GPT-5.2 to build adaptive AI tutors that personalize lessons, track progress, and help learners achieve real-world language fluency
Read Full Article →
Inside GPT-5 for Work: How Businesses Use GPT-5
▼
A data-driven report on how workers across industries use ChatGPT—covering adoption trends, top tasks, departmental patterns, and the future of AI at work.
Read Full Article →
How Higgsfield turns simple ideas into cinematic social videos
▼
Discover how Higgsfield gives creators cinematic, social-first video output from simple inputs using OpenAI GPT-4.1, GPT-5, and Sora 2.
Read Full Article →
Introducing ChatGPT Go, now available worldwide
▼
ChatGPT Go is now available worldwide, offering expanded access to GPT-5.2 Instant, higher usage limits, and longer memory—making advanced AI more affordable globally.
Read Full Article →#Cloud
280+ Leaky Skills: How OpenClaw & ClawHub Are Exposing API Keys and PII
▼
Discover how 7.1% of AI agent skills are designed to leak secrets, PII, and API keys through LLM context. Learn to defend with Evo & mcp-scan.
Read Full Article →
Snyk Finds Prompt Injection in 36%, 1467 Malicious Payloads in a ToxicSkills Study of Agent Skills Supply Chain Compromise
▼
Snyk’s ToxicSkills research reveals 36% of AI agent skills contain security flaws, including 1,467 vulnerable skills and active malicious payloads targeting OpenClaw, Claude Code, and Cursor users.
Read Full Article →
Amazon EC2 G7e instances now available in US West (Oregon) region
▼
Starting today, Amazon EC2 G7e instances accelerated by NVIDIA RTX PRO 6000 Blackwell Server Edition GPUs are now available in US West (Oregon) region. G7e instances offer up to 2.3x inference performance compared to G6e. Customers can use G7e instances to deploy large language models (LLMs), age...
Read Full Article →
Introducing the AI Security Fabric: Empowering Software Builders in the Era of AI
▼
Snyk introduces the AI Security Fabric and a prescriptive path to help organizations secure software at the speed of AI. Discover how to operationalize AI security and scale innovation without compromising on safety.
Read Full Article →
The Prescriptive Path to Operationalizing AI Security
▼
Learn how to move from vision to practice with the Prescriptive Path, a framework for operationalizing AI security at scale. By replacing fragmented tools with a unified platform, you can build trust and secure AI-native applications at machine speed.
Read Full Article →
Amazon Bedrock now supports server-side custom tools using the Responses API
▼
Amazon Bedrock now supports server-side tools in the Responses API using OpenAI API-compatible service endpoints. Bedrock already supports client-side tool use with the Converse, Chat Completions, and Responses APIs. Now, with the launch of server-side tool use for Responses API, Amazon Bedrock c...
Read Full Article →
Change the server-side encryption type of Amazon S3 objects
▼
You can now change the server-side encryption type of encrypted objects in Amazon S3 without any data movement. You can use the UpdateObjectEncryption API to atomically change the encryption key of your objects regardless of the object size or storage class. With S3 Batch Operations, you can use ...
Read Full Article →
AWS Network Firewall now supports GenAI traffic visibility and enforcement with Web category-based filtering
▼
AWS Network Firewall now provides visibility into generative AI (GenAI) application traffic and supports traffic filtering based on web categories. This new capability simplifies governance by enabling you to identify and control access to GenAI services, social media platforms, streaming sites, ...
Read Full Article →
Amazon Neptune Analytics is now available in 7 additional regions
▼
Amazon Neptune Analytics is now available in US West (N. California), Asia Pacific (Seoul), Asia Pacific (Osaka), Asia Pacific (Hong Kong), Europe (Stockholm), Europe (Paris), and South America (São Paulo) regions. You can now create and manage Neptune Analytics graphs in these new regions and ru...
Read Full Article →#Cyber Regulatory
Promoting AI Security — Acting Assistant Privacy Commissioner Speaks at the GenA.I. Symposium
▼
Promoting AI Security – Assistant Privacy Commissioner Speaks at AIM Conference
▼
#Cybersecurity
NIS2: Supply chains as a risk factor
▼
Many companies today invest significant resources to secure their internal IT. Firewalls, monitoring, incident response plans , and awareness programs are well-established. At the same time, a dangerous illusion is growing: the assumption that risks can be controlled within the boundaries of one’...
Read Full Article →
BeyondTrust Fixes Critical Pre-Auth RCE Vulnerability in Remote Support and PRA
▼
BeyondTrust has released updates to address a critical security flaw impacting Remote Support (RS) and Privileged Remote Access (PRA) products that, if successfully exploited, could result in remote code execution. "BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote A...
Read Full Article →
Software developers: Prime cyber targets and a rising risk vector for CISOs
▼
Threats against corporate software developers are increasing and diversifying, challenging security leaders to develop more agile defenses against this growing attack vector. Attackers are increasingly targeting the tools, access, and trusted channels used by software developers rather than simpl...
Read Full Article →
Allama: Open-source AI security automation
▼
Allama is an open-source security automation platform that lets teams build visual workflows for threat detection and response. It includes integrations with 80+ types of tools and services typical in security operations, including SIEM systems, endpoint detection and response products, identity ...
Read Full Article →
AI agents behave like users, but don’t follow the same rules
▼
Security and governance approaches to autonomous AI agents rely on static credentials, inconsistent controls, and limited visibility. Securing these agents requires the same rigor and traceability applied to human users, according to Cloud Security Alliance’s Securing Autonomous AI Agents report....
Read Full Article →
Secure By Design roundup - Dec/Jan 2026
▼
Security Advisory SA-26-01 GPS Attacks
▼
GPS attacks trigger revisiting threat models
Read Full Article →
A few thoughts closing out 2025
▼
Prompted by participants, a few closing thoughts for 2025
Read Full Article →
October Adam's New Thing!
▼
Read up on Adam's New Thing from October
Read Full Article →
Prompt Engineering Requires Evaluation
▼
Understanding ‘prompt engineering’
Read Full Article →
AI Insurance Won't Save You
▼
LLM Insurance is, and will remain, a great source of insurer profits.
Read Full Article →
How could LLMs change threat modeling
▼
LLMs will change threat modeling. Will it be for the better?
Read Full Article →
Mansplaining your threat model, as a service
▼
Everyone wants robots to help with threat models. How’s that working out?
Read Full Article →
Threat Modeling Tools
▼
LLMs as Compilers
▼
What if we think about LLM coding as if it’s a compiler stage?
Read Full Article →
Risk Management and Threat Modeling
▼
Threat modeling finds threats; risk management helps us deal with the tricky ones.
Read Full Article →
The Cyber Resilience Act (CRA)!
▼
The CRA is coming and it's going to be a dramatic change for technology producers
Read Full Article →
Threat modeling as a dial, not a switch
▼
Thinking of threat modeling with a knob helps you get more out of it.
Read Full Article →
Appsec Roundup - June 2025
▼
Google’s approach to AI Agents -- Threat Model Thursday
▼
What can we learn from Google’s approach to AI Agent Security
Read Full Article →
Publish your threat model!
▼
We think you should publish your threat model, and we’re publishing our arguments.
Read Full Article →
The Essence and Beauty of Threat Modeling
▼
Automation sounds great, but what about the essence and beauty?
Read Full Article →
Andor: Insider Threats
▼
Andor teaches us about insider threats
Read Full Article →
Andor Threats: Information Disclosure
▼
What Andor can teach us about Information disclosure threats
Read Full Article →
CVE Futures
▼
What’s next for the CVE program?
Read Full Article →
A few thoughts on CVE
▼
Thoughts on the CVE funding crisis
Read Full Article →
Learning from Troy Hunt’s Sneaky Phish
▼
Introducing the DEF CON 32 Hackers' Almanack
▼
Grateful to introduce the Hackers' Almanack!
Read Full Article →
Security Researcher Comments on HIPAA Security Rule
▼
A group of us have urged HHS to require better handling of security reports
Read Full Article →
Strategy for threat modeling AI
▼
Clarifying how to threat model AI
Read Full Article →
Inside Man
▼
Some thoughts on the Voyager Episode ‘Inside Man’
Read Full Article →
Blackhat and Human Factors
▼
National Cyber Incident Response Plan comments
▼
Our comments on the National Cyber Incident Plan
Read Full Article →
Spatial Reasoning and Threat Modeling
▼
Do diagrams leverage the brain in a different way?
Read Full Article →
Handling Pandemic-Scale Cyber Threats: Lessons from COVID-19
▼
Emerging research on Cyber Public Health
Read Full Article →
Car Safety Factoids
▼
A few thoughts from a clickbait headline
Read Full Article →
25 Years of CVE
▼
Some thoughts on 25 years of the CVE program
Read Full Article →
Handling Pandemic-Scale Cyber Threats (preprint)
▼
A new paper on 'Pandemic Scale Cyber Events
Read Full Article →
The Goals of Cyber Public Health
▼
Cyber Public Health is prompting fascinating conversations
Read Full Article →
Lockbit, a study in public health
▼
Why is it hard to count lockbit infections?
Read Full Article →
Threat Modeling and Logins, Redux
▼
How to effectively threat model authentication.
Read Full Article →
The Universal Cloud TM -- Threat Model Thursday
▼
A new universal threat model - what can we learn from it?
Read Full Article →
Security Engineering roundup - May 2024
▼
The most important stories around threat modeling, appsec and secure by design for May, 2024.
Read Full Article →
Happy Star Wars Day
▼
Sutter on Safety
▼
What do we need to assess if memory safe langages are 'sufficient'?
Read Full Article →
Eternal sunshine of the spotless LLM
▼
Making an LLM forget is harder than it seems
Read Full Article →
CSRB Report on Microsoft
▼
The CSRB has released its report into an intrusion at Microsoft, and...it’s a doozy.
Read Full Article →
Introducing Magic Security Dust!
▼
The NVD Crisis
▼
The NVD is in crisis, and so is patch management. It’s time to modernize.
Read Full Article →
Adventures in LLM Coding
▼
Exploring LLM-driven coding as I get ready for Archimedes
Read Full Article →
The British Library’s Incident Review
▼
Thoughts on the British Library incident
Read Full Article →
Application and AI roundup - Feb 2024
▼
A busy month in appsec, AI, and regulation.
Read Full Article → *(Covered by: Shostack + Friends Blog)*
Solving Hallucinations
▼
Solving hallucinations in legal briefs is playing on easy mode —— and still too hard
Read Full Article →
The State of Appsec in 2024
▼
2024 is bringing lots of AI, and Liability, too
Read Full Article →
Think like Alph-V?
▼
Security Principles in 2023
▼
Principles are lovely, but do they lead us to actionable results?
Read Full Article →
Comparing Retrospectives
▼
We can learn a lot from comparing retrospectives
Read Full Article →
ML Sec Ops: Feature with Diana Kelley
▼
Adam featured on ML Sec Ops podcast
Read Full Article →
Microsoft Can Fix Ransomware Tomorrow
▼
My latest at Dark Reading draws attention to how Microsoft can fix ransomware tomorrow.
Read Full Article →
Worthwhile Books Q2 2023
▼
Books that I read in the second quater that are worth your time include two memoirs, a great book on the security of ML, and more!
Read Full Article →
AI will be the high interest credit card of 2023
▼
Phishing Defenses
▼
Phishing behaviors, as observed in the wild.
Read Full Article →
Layoffs in Responsible AI Teams
▼
Some inferences from layoffs in responsible AI teams
Read Full Article →
Five Threat Model Diagrams for Machine Learning
▼
Some diagrams to help clarify machine learning threats
Read Full Article →
Reflecting on Threats: The Frame
▼
Reflecting on the framing of the Threats book
Read Full Article →
Application Security Roundup - March
▼
A few tools, some thoughts on injection, some standards, and some of Adam’s appsec news.
Read Full Article → *(Covered by: Shostack + Friends Blog)*
The National CyberSecurity Strategy: Liability is Coming
▼
Threats Book is Complete
▼
The serious side of the book
Read Full Article →
Threats: The Table of Contents
▼
Like the Force, each threat has a light side, and a dark side.
Read Full Article →
More on GPT-3 and threat modeling
▼
More thoughts about AI and threat modeling
Read Full Article →
Darkreading: Threat Modeling in the Age of OpenAI's Chatbot
▼
Pointer to Adam’s latest Darkreading article
Read Full Article →
GPT-3
▼
The OpenAI chatbot is shockingly improved — its capabilities deserve attention.
Read Full Article → *(Covered by: Shostack + Friends Blog)*
How Executives Can Use Threat Modeling
▼
You don’t have to be technical, but you can’t make informed decisions about your business without threat modeling.
Read Full Article →
Fast, Cheap + Good Whitepaper
▼
Threat modeling doesn't need to be a slow, heavyweight activity!
Read Full Article →
Trainings at Global Appsec 2021
▼
Tremendous training opportunities in threat modeling and other topics at Appsec Global 2021
Read Full Article →
What are we going to do: CO2 edition
▼
What happened when Microsoft tried to buy climate abatements
Read Full Article →
Threat Model Thursday: 5G Infrastructure
▼
The US Government's lead cybersecurity agencies have released an interesting report, and I wanted to use this for a Threat Model Thursday, where we take a respectful look at threat modeling work products to see what we can learn.
Read Full Article →
Ransomware is Not the Problem
▼
Arbitrarily powerful software -- applications, operating systems -- is a problem, as is preventing it from running on enterprise systems.
Read Full Article →
Colonial Pipeline, Darkside and Models
▼
The Colonial Pipeline shutdown story is interesting in all sorts of ways, and I can't delve into all of it.I did want to talk about one small aspect, which is the way responders talk about Darkside.
Read Full Article →
The Updates Must Go Through
▼
The timing of updates is not coincidental.
Read Full Article →
Ever Given & Suez
▼
Thoughts on the issues with the Ever Given blocking the Suez Canal.
Read Full Article →
Linkedin Learning
▼
Bringing threat modeling to more and more people, now through a series of courses on LinkedIn.
Read Full Article →
Threat Modeling and Social Issues
▼
For Data Breach Today, I spoke with Anna Delaney about threat modeling for issues that are in the news right now.
Read Full Article →
Vaccines
▼
You may have noticed that my end of the year posts are all science focused. Today, a set of resources on the COVID vaccines.
Read Full Article →
Threat Modeling, Insiders and Incentives
▼
Inspired by the recent story of Tesla's insider, I'd like to discuss insider threat as it fits into threat modeling.
Read Full Article →
The Uber CSO indictment
▼
Thoughts on Mark Rasch's essay, Conceal and Fail to Report - The Uber CSO Indictment
Read Full Article →
Information Disclosure In Depth
▼
I have something to disclose...
Read Full Article →
The Cyentia Library Relaunches
▼
I'm excited to see that they're Re-introducing the Cyentia Research Library, with cool (new?) features like an RSS feed. There are over 1,000 corporate research reports with data that companies paid to collect, massage, and release in a way they felt would be helpful to the rest of the world.
Read Full Article →
Threat Research: More Like This
▼
I want to call out some impressive aspects of a report by Proofpoint.
Read Full Article →
How Are Computers Compromised (2020 Edition)
▼
Understanding the way intrusions really happen is a long-standing interest of mine.
Read Full Article →
Amazon's 'Alexa Built-in' Threat Model
▼
Exploring supply chain threat modeling with Alexa
Read Full Article →
Threat Modeling Thursday: Machine Learning
▼
For my first blog post of 2020, I want to look at threat modeling machine learning systems.
Read Full Article →
Managed Attribution Threat Modeling
▼
Let's talk CAKED, a threat model for managed attribution.
Read Full Article →
Interesting reads
▼
Sharing for you, bookmarking for me.
Read Full Article →
Capture the Flag events and eSports
▼
A breakdown of CTFs and eSports
Read Full Article →
Actionable Followups from the Capital One Breach
▼
What have we learned and what steps can we take?
Read Full Article →
DNS Security
▼
I'm happy to say that some new research by Jay Jacobs, Wade Baker, and myself is now available, thanks to the Global Cyber Alliance.
Read Full Article →
When security goes off the rails
▼
My newest post over at Dark Reading ponders regulation.
Read Full Article →
Episode 9 Spoilers
▼
Today is the last Star Wars Day before Episode 9 comes out, and brings the Skywalker saga to its end.
Read Full Article →
Leave Those Numbers for April 1st
▼
Over-inflated numbers won't scare me into buying your ‘solution’.
Read Full Article →
Fire Doesn't Innovate by Kip Boyle (Book Review)
▼
An unexpected book review.
Read Full Article →
High ROI Security Advisory Boards
▼
Discussing the value of Security Advisory Boards
Read Full Article →
Measuring ROI for DMARC
▼
I'm pleased to be able to share work that Shostack + Associates and the Cyentia Institute have been doing for the Global Cyber Alliance.
Read Full Article →
CVE Funding and Process
▼
[no description provided]
Read Full Article →
Carpenter!
▼
[no description provided]
Read Full Article →
The DREAD Pirates
▼
[no description provided]
Read Full Article →
Threat Model Thursday: ARM's Network Camera TMSA
▼
[no description provided]
Read Full Article →
AppSec Cali 2018: Izar Tarandach
▼
[no description provided]
Read Full Article →
Pen Testing The Empire
▼
[no description provided]
Read Full Article →
Threat Modeling Tooling from 2017
▼
[no description provided]
Read Full Article →
Emergent Design Issues
▼
[no description provided]
Read Full Article →
20 Year Software: Engineering and Updates
▼
[no description provided]
Read Full Article →
Building an Application Security Team
▼
[no description provided]
Read Full Article →
Breach Vouchers & Equifax 2017 Breach Links
▼
[no description provided]
Read Full Article →
Star Wars, Star Trek and Getting Root on a Star Ship
▼
[no description provided]
Read Full Article →
Organizing Threat Modeling Magic
▼
[no description provided]
Read Full Article →
Learning From npm's Rough Few Months
▼
[no description provided]
Read Full Article →
Secure updates: A threat model
▼
[no description provided]
Read Full Article →
Hospital Ransomware
▼
[no description provided]
Read Full Article →
Warrants for Cleaning Malware in Kelihos
▼
[no description provided]
Read Full Article →
People are The Weakest Link In Security?
▼
[no description provided]
Read Full Article →
2017 and Tidal Forces
▼
[no description provided]
Read Full Article →
Modeling Attackers and Their Motives
▼
There are a number of reports out recently, breathlessly presenting their analysis of one threatening group of baddies or another. Most readers should, at most, skim their analysis of the perpetrators. Read on for why.
Read Full Article →
Customer Identity & Access Management: Die besten CIAM-Tools
▼
Wir haben die besten Lösungen in Sachen Customer Identity & Access Management für Sie zusammengestellt. Jackie Niam | shutterstock.com Customer Identity & Access Management (CIAM) bildet eine Unterkategorie von Identity & Access Management ( IAM ). CIAM wird dazu eingesetzt, die Authentifizierung...
Read Full Article →
Risky Bulletin: SmarterTools hacked via its own product
▼
A software company gets hacked through vulnerabilities in its own product, European agencies are hacked via recent Ivanti zero-days, Senegal is being extorted by hackers, and a state actor is behind a Signal phishing campaign in Germany.
Read Full Article →
Endpoint Exposed: Critical FortiClient EMS Flaw (CVSS 9.1) Allows Unauthenticated RCE
▼
The post Endpoint Exposed: Critical FortiClient EMS Flaw (CVSS 9.1) Allows Unauthenticated RCE appeared first on Daily CyberSecurity .
Read Full Article →
Code Red: 4 Critical SandboxJS Flaws (CVSS 10.0) Allow Host Takeover
▼
The post Code Red: 4 Critical SandboxJS Flaws (CVSS 10.0) Allow Host Takeover appeared first on Daily CyberSecurity .
Read Full Article →
Flickr moves to contain data exposure, warns users of phishing
▼
Flickr says a flaw at a third-party email provider may have exposed users’ names, email addresses, IPs, and account activity. Flickr is a photo-sharing platform owned by SmugMug. It has over 100 million registered users and millions of active photographers. Flickr warned users about a possible da...
Read Full Article → *(Covered by: Security Affairs)*
CVE-2026-1731: Critical BeyondTrust Flaw (CVSS 9.9) Allows Pre-Auth RCE
▼
The post CVE-2026-1731: Critical BeyondTrust Flaw (CVSS 9.9) Allows Pre-Auth RCE appeared first on Daily CyberSecurity .
Read Full Article →
CVE-2026-25526: Critical Jinjava Flaw (CVSS 9.8) Permits Remote Code Execution
▼
The post CVE-2026-25526: Critical Jinjava Flaw (CVSS 9.8) Permits Remote Code Execution appeared first on Daily CyberSecurity .
Read Full Article →
Critical RCE Flaws (CVSS 9.3) Exposed in Lexmark Printers
▼
The post Critical RCE Flaws (CVSS 9.3) Exposed in Lexmark Printers appeared first on Daily CyberSecurity .
Read Full Article →
CVE-2025-62878: Critical 10.0 Vulnerability Found in Kubernetes Local Path Provisioner
▼
The post CVE-2025-62878: Critical 10.0 Vulnerability Found in Kubernetes Local Path Provisioner appeared first on Daily CyberSecurity .
Read Full Article →
UK Construction Firm Hit by Prometei Botnet Hiding in Windows Server
▼
Cybersecurity firm eSentire's TRU break down the Russian Prometei botnet attack on a UK firm, detailing its TOR usage, password theft and decoy tactics.
Read Full Article →
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 83
▼
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter ClawHavoc: 341 Malicious Clawed Skills Found by the Bot They Were Targeting ù APT28 Leverages CVE-2026-21509 in Operation Neusploit Amaranth-Dra...
Read Full Article → *(Covered by: Security Affairs)*
Security Affairs newsletter Round 562 by Pierluigi Paganini – INTERNATIONAL EDITION
▼
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Italian university La Sapienza still offline t...
Read Full Article → *(Covered by: Security Affairs)*
DKnife toolkit abuses routers to spy and deliver malware since 2019
▼
DKnife is a Linux toolkit used since 2019 to hijack router traffic and deliver malware in cyber-espionage attacks. Cisco Talos found DKnife, a powerful Linux toolkit that threat actors use to spy on and control network traffic through routers and edge devices. It inspects and alters data in trans...
Read Full Article → *(Covered by: Security Affairs)*
Week in review: Notepad++ supply chain attack details and targets, Patch Tuesday forecast
▼
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Global Threat Map: Open-source real-time situational awareness platform Global Threat Map is an open-source project offering security teams a live view of reported cyber activity across the globe, pu...
Read Full Article →
Italian university La Sapienza still offline to mitigate recent cyber attack
▼
Rome’s La Sapienza University was hit by a cyberattack that disrupted IT systems and caused widespread operational issues. Since February 2, Rome’s La Sapienza University, one of the most important Italian universities, has been offline due to a cyberattack. For days, students have been unable to...
Read Full Article → *(Covered by: Security Affairs)*
German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists
▼
Germany's Federal Office for the Protection of the Constitution (aka Bundesamt für Verfassungsschutz or BfV) and Federal Office for Information Security (BSI) have issued a joint advisory warning of a malicious cyber campaign undertaken by a likely state-sponsored threat actor that involves carry...
Read Full Article →
Payments platform BridgePay confirms ransomware attack behind outage
▼
A major U.S. payment gateway and solutions provider says a ransomware attack has knocked key systems offline, triggering a widespread outage affecting multiple services. The incident began on Friday and quickly escalated into a nationwide disruption across BridgePay's platform. [...]
Read Full Article →
Discovering Negative-Days with LLM Workflows
▼
It’s no longer just about reverse-engineering n-days. You can detect vulnerabilities in open-source repositories before a CVE is published - or even if they’re never published. Here’s how I built an LLM workflow to detect “negative-days” and “never-days”.
Read Full Article →
DHS privacy probe will focus on biometric tracking by ICE, OBIM
▼
Auditors told CyberScoop the probe could expand to other parts of DHS and will look at the agency’s increasing use of biometric markers in immigration enforcement. The post DHS privacy probe will focus on biometric tracking by ICE, OBIM appeared first on CyberScoop .
Read Full Article →
Six more vulnerabilities found in n8n automation platform
▼
Six more vulnerabilities have been discovered in the n8n workflow platform used for building LLM-powered agents to connect business processes. Four of the six are rated as critical, carrying CVSS severity scores of 9.4. “These vulnerabilities span multiple attack classes, from remote code executi...
Read Full Article →
Germany warns of Signal account hijacking targeting senior figures
▼
Germany's domestic intelligence agency is warning of suspected state-sponsored threat actors targeting high-ranking individuals in phishing attacks via messaging apps like Signal. [...]
Read Full Article →
CISA warns of SmarterMail RCE flaw used in ransomware attacks
▼
The Cybersecurity & Infrastructure Security Agency (CISA) in the U.S. has issued a warning about CVE-2026-24423, an unauthenticated remote code execution (RCE) flaw in SmarterMail that is used in ransomware attacks. [...]
Read Full Article →
Attackers Used AI to Breach an AWS Environment in 8 Minutes
▼
Threat actors using LLMs needed only eight minutes to move from initial access to full admin privileges in an attack on a company's AWS cloud environment in the latest example of cybercriminals expanding their use of AI in their operations, Sysdig researchers said. The post Attackers Used AI to B...
Read Full Article →
Conduent data breach might have been much worse than initially expected
▼
Tens of millions of people are most likely affected by the January 2025 Conduent breach.
Read Full Article →
Substack Confirms Data Breach, "Limited User Data" Compromised
▼
Substack did not specify the number of users affected by the data breach
Read Full Article →
Claude AI finds 500 high-severity software vulnerabilities
▼
Anthropic only released its latest large language model, Claude Opus 4.6, on Thursday, but it has already been using it behind the scenes to identify zero-day vulnerabilities in open-source software. In the trial, it put Claude inside a virtual machine with access to the latest versions of open s...
Read Full Article →
Top investment platform hit in data breach - over 1.4 million Betterment accounts exposed
▼
Betterment accounts were not compromised, but users might start getting phishing emails.
Read Full Article →
Pretend Disk Format: PDFs harbor new dangers
▼
A particularly insidious phishing campaign is disguising malware pretending to be ordinary PDF documents behind links to virtual hard disks. Because workers are used to receiving purchase orders or invoices in the PDF format, they are likely to open the malicious files unthinkingly, enabling the ...
Read Full Article →
Record-breaking 31.4 Tbps DDoS attack hits in November 2025, stopped by Cloudflare
▼
AISURU/Kimwolf botnet hit a record 31.4 Tbps DDoS attack lasting 35 seconds in Nov 2025, which Cloudflare automatically detected and blocked. The AISURU/Kimwolf botnet was linked to a record-breaking DDoS attack that peaked at 31.4 Tbps and lasted just 35 seconds. Cloudflare said the November 202...
Read Full Article → *(Covered by: Security Affairs)*
Flickr Notifies Users of Data Breach After External Partner Security Flaw
▼
Flickr says a third-party email vendor flaw may have exposed user names, emails, IP data, and activity logs,…
Read Full Article →
State-backed phishing attacks targeting military officials and journalists on Signal
▼
German security authorities are warning that a likely state-backed hacking group is engaged in attempts at phishing senior political figures, military officials, diplomats, and investigative journalists across Germany and Europe via Signal. The authorities also noted that while these attacks are ...
Read Full Article →
Poland’s energy control systems were breached through exposed VPN access
▼
On 29 December 2025, coordinated cyberattacks unfolded across Poland’s critical infrastructure, targeting energy and industrial organizations. The attackers struck numerous wind and solar farms, a private manufacturing company, and a heat and power (CHP) plant, but failed to negatively affect ene...
Read Full Article →
Substack data breach confirmed: user phone numbers email addresses all stolen in attack, here's what we know
▼
Popular creator platform Substack breached in October 2025, but hasn't noticed until months later.
Read Full Article →
17% of 3rd-Party Add-Ons for OpenClaw Used in Crypto Theft and macOS Malware
▼
Bitdefender Labs reveals that 17% of OpenClaw AI skills analyzed in February 2026 are malicious. With over 160,000…
Read Full Article →
Ten career-ending mistakes CISOs make and how to avoid them
▼
The Chief Information Security Officer role has become one of the most precarious positions in the C-suite. According to a Hitch Partners study, the average CISO tenure is 39 months — a timeframe that reflects the intense pressure and high stakes of the position. With 77% of CISOs fearing dismiss...
Read Full Article →
Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
▼
A previously undocumented cyber espionage group operating from Asia broke into the networks of at least 70 government and critical infrastructure organizations across 37 countries over the past year, according to new findings from Palo Alto Networks Unit 42. In addition, the hacking crew has been...
Read Full Article →
CISA gives federal agencies 18 months to purge unsupported edge devices
▼
The Cybersecurity and Infrastructure Security Agency has given federal agencies 18 months to remove all end-of-support edge devices from their networks, escalating its response to what security researchers describe as a fundamental shift in nation-state attack tactics, where attackers exploit net...
Read Full Article →
Zscaler extends zero-trust security to browsers with SquareX acquisition
▼
Cloud security company Zscaler has announced the acquisition of SquareX, a Singapore-based browser detection and response (BDR) technology startup. The deal will enable Zscaler to extend its Zero Trust Exchange capabilities directly into standard web browsers, across both managed and unmanaged de...
Read Full Article →
Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
▼
For the third time in two weeks, CISA added a vulnerability (CVE-2026-24423) affecting SmarterTools’ SmarterMail email and collaboration server to its Known Exploited Vulnerabilities catalog, and this one is being exploited in ransomware attacks. A glut of SmarterMail vulnerabilities On January 2...
Read Full Article →
Nearly 5 Million Web Servers Found Exposing Git Metadata – Study Reveals Widespread Risk of Code and Credential Leaks
▼
A study found nearly 5 million servers exposing Git metadata, with 250,000 leaking deployment credentials via .git/config files. A new 2026 study by the Mysterium VPN research team reveals that nearly 5 million public web servers are exposing Git repository metadata — with over 250,000 of them ex...
Read Full Article → *(Covered by: Security Affairs)*
Flickr discloses potential data breach exposing users' names, emails
▼
Photo-sharing platform Flickr is notifying users of a potential data breach after a vulnerability at a third-party email service provider exposed their real names, email addresses, IP addresses, and account activity. [...]
Read Full Article →
U.S. CISA adds SmarterTools SmarterMail and React Native Community CLI flaws to its Known Exploited Vulnerabilities catalog
▼
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SmarterTools SmarterMail and React Native Community CLI flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added SmarterTools SmarterMail and React Native Communit...
Read Full Article → *(Covered by: Security Affairs)*
‘DKnife’ Implant Used by Chinese Threat Actor for Adversary-in-the-Middle Attacks
▼
Used since at least 2019, DKnife has been targeting the desktop, mobile, and IoT devices of Chinese users. The post ‘DKnife’ Implant Used by Chinese Threat Actor for Adversary-in-the-Middle Attacks appeared first on SecurityWeek .
Read Full Article →
Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware
▼
Cybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index (PyPI) repository have been compromised to push malicious versions to facilitate wallet credential theft and remote code execution. The compromised versions of the ...
Read Full Article →
KI als AWS-Angriffsturbo
▼
Kriminelle Hacker haben ihre Angriffe auf AWS-Umgebungen mit KI beschleunigt. khunkornStudio – shutterstock.com Forscher des Sicherheitsanbieters Sysdig haben einen Angriff aufgedeckt, bei dem kriminelle Angreifer eine AWS-Umgebung in weniger als acht Minuten vollständig kompromittieren konnten. ...
Read Full Article →
Critical SmarterMail Vulnerability Exploited in Ransomware Attacks
▼
The security defect allows unauthenticated attackers to execute arbitrary code remotely via malicious HTTP requests. The post Critical SmarterMail Vulnerability Exploited in Ransomware Attacks appeared first on SecurityWeek .
Read Full Article →
The blind spot every CISO must see: Loyalty
▼
The longstanding assumption that tenure, performance metrics, or expressed commitment serve as reliable indicators of the trustworthiness of an employee persists across many sectors. Indeed, the great majority of personnel are loyal. But, while small, the percentage of those who aren’t is still w...
Read Full Article →
Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries
▼
Artificial intelligence (AI) company Anthropic revealed that its latest large language model (LLM), Claude Opus 4.6, has found more than 500 previously unknown high-severity security flaws in open-source libraries, including Ghostscript, OpenSC, and CGIF. Claude Opus 4.6, which was launched Thurs...
Read Full Article →
Concerns Raised Over CISA’s Silent Ransomware Updates in KEV Catalog
▼
CISA updated 59 KEV entries in 2025 to specify that the vulnerabilities have been exploited in ransomware attacks. The post Concerns Raised Over CISA’s Silent Ransomware Updates in KEV Catalog appeared first on SecurityWeek .
Read Full Article →
Cybersicherheitsvorschriften: So erfüllen Sie Ihre Compliance-Anforderungen
▼
Mit der Zunahme von Cyberbedrohungen steigt auch die Zahl der Compliance-Rahmenwerke. So können CISOs diese Herausforderung bewältigen. Foto: Dapitart – shutterstock.com Die Anforderungen von Cybersicherheitsvorschriften können je nach Unternehmensgröße, Region, Branche, Datensensibilität und Pro...
Read Full Article →
Four new vulnerabilities found in Ingress NGINX
▼
Four security vulnerabilities have been found in the open source Ingress NGINX traffic controller that is extensively used by organizations in Kubernetes deployments. They can only be fixed by upgrading to the latest version. Of the four holes, two are more serious, because they carry CVSS scores...
Read Full Article →
New APT group breached gov and critical infrastructure orgs in 37 countries
▼
A new cyberespionage group that operates out of Asia has compromised 70 government and critical infrastructure organizations across 37 countries over the past year using a sophisticated toolset that combines phishing, exploitation kits, custom malware, Linux rootkits, web shells, and a variety of...
Read Full Article →
Substack Breach: 662,752 User Records Leaked on Cybercrime Forum
▼
Substack confirms a breach after hacker accessed internal user records now circulating on crime forums, exposing emails, phone numbers, and account metadata.
Read Full Article →
Substack data breach leaks users’ email addresses and phone numbers
▼
Substack, a high-profile publishing platform widely used by academics, journalists, subject matter experts, and controversialists, has suffered a data breach affecting an unknown number of its creators and subscribers. According to emails sent out this week to some users, on February 3 the compan...
Read Full Article → *(Covered by: CSO Online, TechCrunch Security)*
Ransomware gang uses ISPsystem VMs for stealthy payload delivery
▼
Ransomware operators are hosting and delivering malicious payloads at scale by abusing virtual machines (VMs) provisioned by ISPsystem, a legitimate virtual infrastructure management provider. [...]
Read Full Article →
Hacker claims theft of data from 700,000 Substack users; Company confirms breach
▼
Substack confirmed a data breach after a hacker leaked data from nearly 700,000 users, including email addresses and phone numbers. Substack is an online platform for publishing email‑based newsletters and blogs, with built‑in paid subscriptions and basic analytics. It’s free to start; creators p...
Read Full Article → *(Covered by: Security Affairs)*
Incognito Market admin sentenced to 30 years for running $105 million dark web drug empire
▼
A dark web drug bazaar operator
Read Full Article →
One of Europe’s largest universities knocked offline for days after cyberattack
▼
An alleged ransomware attack has taken down the systems of the Sapienza University of Rome.
Read Full Article →
Bulletproof hosting providers renting cheap infrastructure to supply virtual machines to ransomware hackers
▼
Most high-profile ransomware groups were using the same Russian-based infrastructure for years
Read Full Article →
Threat Group Running Espionage Operations Against Dozens of Governments
▼
Unit 42 researchers say an Asian threat group behind what they call the Shadow Campaigns has targeted government agencies in 37 countries in a wide-ranging global cyberespionage campaign that has involved phishing attacks and the exploitation of a more than a dozen known vulnerabilities. The post...
Read Full Article →
AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
▼
The distributed denial-of-service (DDoS) botnet known as AISURU/Kimwolf has been attributed to a record-setting attack that peaked at 31.4 Terabits per second (Tbps) and lasted only 35 seconds. Cloudflare, which automatically detected and mitigated the activity, said it's part of a growing number...
Read Full Article →
CVE-2025-6978: Arbitrary Code Execution in the Arista NG Firewall
▼
In this excerpt of a TrendAI Research Services vulnerability report, Jonathan Lein and Simon Humbert of the TrendAI Research team detail a recently patched command injection vulnerability in the Arista NG Firewall. This bug was originally discovered by Gereon Huppertz and reported through the Tren
Read Full Article →
Alleged 764 member arrested, charged with CSAM possession in New York
▼
Authorities have arrested multiple members of 764 during the past year, reflecting heightened law enforcement activity targeting the violent extremist collective. The post Alleged 764 member arrested, charged with CSAM possession in New York appeared first on CyberScoop .
Read Full Article →
Startups, listen up: Proton says you're not "too small" to be hacked
▼
Proton's latest report shatters the myth that hackers only target big banks, urging European startups to "build in private" before it's too late.
Read Full Article →
Top 10 web hacking techniques of 2025
▼
Welcome to the Top 10 Web Hacking Techniques of 2025, the 19th edition of our annual community-powered effort to identify the most innovative must-read web security research published in the last year
Read Full Article →
Data breach at govtech giant Conduent balloons, affecting millions more Americans
▼
The ransomware attack at Conduent allowed hackers to steal a "significant number of individuals’ personal information" from the govtech giant's systems. Conduent handles personal and health data of more than 100 million people across America.
Read Full Article →
Personal data stolen during Harvard and UPenn data breaches leaked online - over a million details, including emails, home addresses and more, all published
▼
Negotiations were unsuccessful, so ShinyHunters decided to leak everything.
Read Full Article →
Attackers exploit decade‑old Windows driver flaw to shut down modern EDR defenses
▼
In a recent incident, attackers abused a legitimate but vulnerable Windows kernel driver to shut down endpoint security tools during an ongoing incident response. According to a Huntress report, the activity was observed during a customer investigation in early 2026 and involved the use of an old...
Read Full Article →
Backdoor in Notepad++
▼
Hackers associated with the Chinese government used a Trojaned version of Notepad++ to deliver malware to selected users. Notepad++ said that officials with the unnamed provider hosting the update infrastructure consulted with incident responders and found that it remained compromised until Septe...
Read Full Article →
Ransomware-Attacke auf Buhlmann Group
▼
Die Buhlmann Group wurde von einer Ransomware-Bande angegriffen. Der Hauptsitz in Deutschland ist jedoch verschont geblieben. Buhlmann Group Akira zählt zu den gefährlichsten Ransomware-Gruppen und ist bekannt für zahlreiche Angriffe auf deutsche Unternehmen . Nun hat es offenbar den Bremer Stahl...
Read Full Article →
Why boards should be obsessed with their most ‘boring’ systems
▼
Following a series of high-profile cyberattacks, boards of directors are now requiring their organizations to take greater responsibility for the risks posed by enterprise resource planning (ERP) systems pose after a series of high-profile cyberattacks. The Jaguar Land Rover (JLR), incident in Se...
Read Full Article →
The silent security gap in enterprise AI adoption
▼
Most security leaders believe they know where their sensitive data lives and how it is protected. That confidence is increasingly misplaced. As enterprises deploy AI across customer support, software development, legal analysis and internal operations, a new data exposure surface has quietly emer...
Read Full Article →
Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
▼
The elusive Iranian threat group known as Infy (aka Prince of Persia) has evolved its tactics as part of efforts to hide its tracks, even as it readied new command-and-control (C2) infrastructure coinciding with the end of the widespread internet blackout the regime imposed at the start of Januar...
Read Full Article →
Microsoft develops a new scanner to detect hidden backdoors in LLMs
▼
Microsoft has developed a scanner designed to detect backdoors in open-weight AI models, addressing a critical blind spot for enterprises increasingly dependent on third-party LLMs. In a blog post , the company said its research focused on identifying hidden triggers and malicious behaviors embed...
Read Full Article →
OpenAI Explains URL-Based Data Exfiltration Mitigations in New Paper
▼
"Last week I saw this paper from OpenAI called \u0026ldquo;Preventing URL-Based Data Exfiltration in Language-Model Agents\u0026rdquo;, which goes into detail on new …"
Read Full Article →
Protests Don't Impede Iranian Spying on Expats, Syrians, Israelis
▼
Iranian threat actors have been stealing credentials from people of interest across the Middle East, using spear-phishing and social engineering.
Read Full Article →
Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows
▼
A new, critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could result in the execution of arbitrary system commands. The flaw, tracked as CVE-2026-25049 (CVSS score: 9.4), is the result of inadequate sanitization that bypas...
Read Full Article →
Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign
▼
Cybersecurity researchers have disclosed details of an active web traffic hijacking campaign that has targeted NGINX installations and management panels like Baota (BT) in an attempt to route it through the attacker's infrastructure. Datadog Security Labs said it observed threat actors associated...
Read Full Article →
Srsly Risky Biz: Google's cyber disruption unit kicks its first goal
▼
Tom Uren and Amberleigh Jack talk about Google’s cyber disruption unit taking aim at the IPIDEA residential proxy network. The network was a cybercrime enabler that was used by hundreds of threat actors for crime and espionage. More of this kind of disruption please. They also discuss SpaceX’s ra...
Read Full Article →
Pickling the Mailbox: A Deep Dive into CVE-2025-20393
▼
TL;DR In December 2025, Cisco published https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4 addressing CVE-2025-20393, a critical vulnerability (CVSS 10.0) affecting Cisco Secure Email Gateway and Secure Email and Web Manager. The advisory was n...
Read Full Article →
Ransomware Gang Goes Full 'Godfather' With Cartel
▼
DragonForce is taking cues from organized crime, emphasizing cooperation and coordination among ransomware gangs.
Read Full Article →
CISA Makes Unpublicized Ransomware Updates to KEV Catalog
▼
A third of the "flipped" CVEs affected network edge devices, leading one researcher to conclude, "Ransomware operators are building playbooks around your perimeter."
Read Full Article →
News alert: MomentProof brings cryptographic proof to insurance claims as AI manipulation rises
▼
WASHINGTON, Feb. 4, 2026, CyberNewswire — MomentProofShow us, Inc., a provider of AI-resilient digital asset certification and verification technology, today announced the successful deployment of MomentProof Enterprise for AXA, enabling cryptographically authentic, tamper-proof digital assets fo...
Read Full Article →
Massive Chinese data breach allegedly spills 8.7 billion records - here's what we know
▼
Someone kept a gigantic database unlocked on the internet, allowing researchers (and likely, hackers, too) to find it.
Read Full Article →
More than 40,000 WordPress sites affected by new malware flaw - find out if you're affected
▼
A popular WordPress quiz plugin can be abused to mount SQL injection attacks, but a patch is available.
Read Full Article →
Hackers publish personal information stolen during Harvard, UPenn data breaches
▼
The prolific cybercrime group ShinyHunters took responsibility for hacking Harvard and the University of Pennsylvania, and published the stolen data on its extortion website.
Read Full Article →
Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models
▼
Microsoft on Wednesday said it built a lightweight scanner that it said can detect backdoors in open-weight large language models (LLMs) and improve the overall trust in artificial intelligence (AI) systems. The tech giant's AI Security team said the scanner leverages three observable signals tha...
Read Full Article →
DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files
▼
Threat hunters have disclosed details of a new, stealthy malware campaign dubbed DEAD#VAX that employs a mix of "disciplined tradecraft and clever abuse of legitimate system features" to bypass traditional detection mechanisms and deploy a remote access trojan (RAT) known as AsyncRAT. "The attack...
Read Full Article →
Global SystemBC Botnet Found Active Across 10,000 Infected Systems
▼
SystemBC malware linked to 10,000 infected IPs, posing risks to sensitive government infrastructure
Read Full Article →
New Technical Markers Reveal Expanding ShadowSyndicate Cybercriminal Infrastructure
▼
ShadowSyndicate cluster expands with new SSH fingerprints connecting servers to other ransomware ops
Read Full Article →
China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns
▼
Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies across Southeast Asia throughout 2025. Check Point Research is tracking the previously undocumented activity cluster under the moniker Amaranth-Dr...
Read Full Article →
AI Drives Doubling of Phishing Attacks in a Year
▼
Cofense claims AI is making phishing emails more personalized and sophisticated
Read Full Article →
Amaranth-Dragon: Weaponizing CVE-2025-8088 for Targeted Espionage in the Southeast Asia
▼
Key Points Introduction Check Point Research has identified several campaigns targeting multiple countries in the Southeast Asian region. These related activities have been collectively categorized under the codename “Amaranth-Dragon”. The campaigns demonstrate a clear focus on government entitie...
Read Full Article →
Big Breach or Smooth Sailing? Mexican Gov't Faces Leak Allegations
▼
A hacktivist group claims a 2.3-terabyte data breach exposes the information of 36 million Mexicans, but no sensitive accounts are at risk, says government.
Read Full Article →
The First 90 Seconds: How Early Decisions Shape Incident Response Investigations
▼
Many incident response failures do not come from a lack of tools, intelligence, or technical skills. They come from what happens immediately after detection, when pressure is high, and information is incomplete. I have seen IR teams recover from sophisticated intrusions with limited telemetry. I ...
Read Full Article →
CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog
▼
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) to its Known Exploited Vulnerabilities (KEV) catalog, flagging it as actively exploited in attacks. The vulnerability, tracked as CVE-2025-40551 (CVS...
Read Full Article →
Risky Business #823 -- Humans impersonate clawdbots impersonating humans
▼
Patrick Gray and Adam Boileau are joined by the newest guy on the Risky Business Media team, James WIlson. They discuss the week’s cybersecurity news, including: Notepad++ update supply chain attack has been attributed to China The AI agent future is even more stupid than expected; behold the Ope...
Read Full Article →
Weekly Update 489
▼
This week I'm in Hong Kong, and the day after recording, I gave the talk shown in the image above at INTERPOL's Cybercrime Expert Group. I posted a little about this on Facebook and LinkedIn, but thought I'd expand on what really stuck with
Read Full Article → *(Covered by: Troy Hunt Blog)*
Risky Bulletin: Plone CMS stops supply-chain attack
▼
The Plone CMS stops a supply-chain attack, French cops raid the X Paris office; the number of malicious OpenClaw skills grows, and a Chinese APT hacked Notepad++ servers.
Read Full Article →
Cantwell claims telecoms blocked release of Salt Typhoon report
▼
Senator Maria Cantwell, D-Wash., wants hearings to force AT&T and Verizon to disclose how they’ve responded to the hacks to protect telecom networks. The post Cantwell claims telecoms blocked release of Salt Typhoon report appeared first on CyberScoop .
Read Full Article →
What’s next for DHS’s forthcoming replacement critical infrastructure protection panel, AI information sharing
▼
Nick Andersen, a top CISA official, discussed plans for improving CIPAC and developing an AI-ISAC. The post What’s next for DHS’s forthcoming replacement critical infrastructure protection panel, AI information sharing appeared first on CyberScoop .
Read Full Article →
Ivanti’s EPMM is under active attack, thanks to two critical zero-days
▼
Limited attacks occurred prior to Ivanti’s disclosure, followed by mass exploitation by multiple threat groups. More than 1,400 potentially vulnerable instances remain exposed. The post Ivanti’s EPMM is under active attack, thanks to two critical zero-days appeared first on CyberScoop .
Read Full Article →
Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata
▼
Cybersecurity researchers have disclosed details of a now-patched security flaw impacting Ask Gordon, an artificial intelligence (AI) assistant built into Docker Desktop and the Docker Command-Line Interface (CLI), that could be exploited to execute code and exfiltrate sensitive data. The critica...
Read Full Article →
SQL Injection Flaw Affects 40,000 WordPress Sites
▼
40,000 WordPress sites are vulnerable to SQL injection in Quiz and Survey Master plugin
Read Full Article →
Panera Bread data breach much more serious than we thought - over 5 million customers were hit, new reports claim
▼
Panera Bread customer data leaked on the dark web, allowing researchers to determine how many people were hit.
Read Full Article →
Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package
▼
Threat actors have been observed exploiting a critical security flaw impacting the Metro Development Server in the popular "@react-native-community/cli" npm package. Cybersecurity company VulnCheck said it first observed exploitation of CVE-2025-11953 (aka Metro4Shell) on December 21, 2025. With ...
Read Full Article →
Researchers Warn of New “Vect” RaaS Variant
▼
A new ransomware-as-a-service operation dubbed “Vect” features custom malware
Read Full Article →
Cybercrime Unit of Paris Prosecutors Raid Elon Musk’s X Offices in France
▼
Elon Musk and X’s former CEO were summoned for voluntary interviews in Paris on April 20, 2026
Read Full Article →
Introducing Detectify Internal Scanning for internal scanning behind the firewall
▼
TL;DR We’re launching Internal Scanning, bringing our proprietary security engines, research-led crawling and fuzzing engine for internal vulnerability scanning behind your firewall. Built by Detectify’s ... The post Introducing Detectify Internal Scanning for internal scanning behind the firewal...
Read Full Article →
New Password-Stealing Phishing Campaign Targets Corporate Dropbox Credentials
▼
Multi-stage attack begins with fake message relating to business requests and evades detection with link hidden in a PDF
Read Full Article →
APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks
▼
The Russia-linked state-sponsored threat actor known as APT28 (aka UAC-0001) has been attributed to attacks exploiting a newly disclosed security flaw in Microsoft Office as part of a campaign codenamed Operation Neusploit. Zscaler ThreatLabz said it observed the hacking group weaponizing the sho...
Read Full Article →
How Mercari strengthened mobile security for millions of users with Oversecured
▼
Discover how Mercari, Japan's largest marketplace app, transformed their mobile security program with Oversecured, uncovering critical vulnerabilities missed by previous tools and achieving reliable automated scanning at scale.
Read Full Article →
Mozilla Adds One-Click Option to Disable Generative AI Features in Firefox
▼
Mozilla on Monday announced a new controls section in its Firefox desktop browser settings that allows users to completely turn off generative artificial intelligence (GenAI) features. "It provides a single place to block current and future generative AI features in Firefox," Ajit Varma, head of ...
Read Full Article →
Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group
▼
A China-linked threat actor known as Lotus Blossom has been attributed with medium confidence to the recently discovered compromise of the infrastructure hosting Notepad++. The attack enabled the state-sponsored hacking group to deliver a previously undocumented backdoor codenamed Chrysalis to us...
Read Full Article →
As feds pull back, states look inward for election security support
▼
Secretaries of State are scrambling to replace cybersecurity services once provided by CISA and other federal agencies. The post As feds pull back, states look inward for election security support appeared first on CyberScoop .
Read Full Article →
Auditing Outline. Firsthand lessons from comparing manual testing and AI security platforms
▼
Attackers Harvest Dropbox Logins Via Fake PDF Lures
▼
A malware-free phishing campaign targets corporate inboxes and asks employees to view "request orders," ultimately leading to Dropbox credential theft.
Read Full Article →
China-based espionage group compromised Notepad++ for six months
▼
The Chinese APT group Lotus Blossom intruded the tool’s internal systems to snoop on a limited set of users’ activities, according to researchers. The post China-based espionage group compromised Notepad++ for six months appeared first on CyberScoop .
Read Full Article →
'The breadth of targeted cloud platforms continues to expand': Google's security team takes a look at how ShinyHunters have rolled out so many SSO scams recently
▼
Mandiant analyzed ShinyHunters' MO, detailing how it steals login and MFA codes.
Read Full Article →
Canada Computers & Electronics reveals data breach - customer data exposed, here's what we know
▼
Some customers see credit card information also exposed, with police already notified.
Read Full Article →
Russian ransomware hackers allegedly hit Tulsa airport in cyberattack, dump private files online as proof
▼
The infamous Qilin group strikes again, this time targeting a major US airport.
Read Full Article →
OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
▼
A high-severity security flaw has been disclosed in OpenClaw (formerly referred to as Clawdbot and Moltbot) that could allow remote code execution (RCE) through a crafted malicious link. The issue, which is tracked as CVE-2026-25253 (CVSS score: 8.8), has been addressed in version 2026.1.29 relea...
Read Full Article →
Please Don’t Feed the Scattered Lapsus ShinyHunters
▼
A prolific data ransom gang that calls itself Scattered Lapsus ShinyHunters (SLSH) has a distinctive playbook when it seeks to extort payment from victim firms: Harassing, threatening and even swatting executives and their families, all while notifying journalists and regulators… Read More »
Read Full Article →
ShinyHunters Expands Scope of SaaS Extortion Attacks
▼
Following their attacks on Salesforce instances last year, members of the cybercrime group have broadened their targeting and gotten more aggressive with extortion tactics.
Read Full Article →
NSA Publishes New Zero Trust Implementation Guidelines
▼
NSA released new guidelines to help organizations achieve target-level Zero Trust maturity
Read Full Article →
MongoDB instances are being hit in data extortion attacks, so make sure you're protected
▼
Hackers are hunting for vulnerable MongoDB servers and there are reportedly many to choose from.
Read Full Article →
Notepad++ Update Hijacking Linked to Hosting Provider Compromise
▼
A supply chain attack on Notepad++ update process was linked to compromised hosting infrastructure
Read Full Article →
Major health provider data breach may have affected thousands more people - over 700k now thought to have been hit
▼
TriZetto Provider Solutions breach was spotted in October 2025 after hackers lurked for almost a year.
Read Full Article →
⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats
▼
Every week brings new discoveries, attacks, and defenses that shape the state of cybersecurity. Some threats are stopped quickly, while others go unseen until they cause real damage. Sometimes a single update, exploit, or mistake changes how we think about risk and protection. Every incident show...
Read Full Article →
Android RAT Uses Hugging Face to Host Malware
▼
Bitdefender has discovered a new Android malware campaign that uses Hugging Face
Read Full Article →
Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
▼
Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat actors compromised a legitimate developer's resources to push malicious updates to downstream users. "On January 30, 2026, four established Open VSX extensions pu...
Read Full Article →
Beyond ACLs: Mapping Windows Privilege Escalation Paths with BloodHound
▼
Beyond ACLs: Mapping Windows Privilege Escalation Paths with
Read Full Article →
Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
▼
A Farsi-speaking threat actor aligned with Iranian state interests is suspected to be behind a new campaign targeting non-governmental organizations and individuals involved in documenting recent human rights abuses. The activity, observed by HarfangLab in January 2026, has been codenamed RedKitt...
Read Full Article →
FBI takes notorious RAMP ransomware forum offline
▼
The FBI has seized control of RAMP, a notorious cybercrime online forum that bragged to be the only place that allowed ransomware, and boasted over 14,000 active users. Now some of those users' details are likely to be in the hands of the police... Read more in my article on the Bitdefender blog.
Read Full Article →
Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
▼
Google-owned Mandiant on Friday said it identified an "expansion in threat activity" that uses tradecraft consistent with extortion-themed attacks orchestrated by a financially motivated hacking group known as ShinyHunters. The attacks leverage advanced voice phishing (aka vishing) and bogus cred...
Read Full Article →
Tenable Tackles AI Governance, Shadow AI Risks, Data Exposure
▼
The Tenable One AI Exposure add-on discovers unsanctioned AI use in the organization and enforces policy compliance with approved tools.
Read Full Article →
This dangerous North Korean malware has now split into three entities for maximum impact
▼
Labyrinth Chollima is morphing into three separate entities, engaging in cyber-espionage, and crypto theft, against firms in the west.
Read Full Article →
Someone Knows Bash Far Too Well, And We Love It (Ivanti EPMM Pre-Auth RCEs CVE-2026-1281 & CVE-2026-1340)
▼
When Ivanti removed the embargoes from CVE-2026-1281 and CVE-2026-1340 - pre-auth Remote Command Execution vulnerabilities in Ivanti’s Endpoint Manager Mobile (EPMM) solution - we sighed with relief. Clearly, the universe had decided to continue mocking Secure-By-Design signers right on schedule ...
Read Full Article →
Labyrinth Chollima Evolves into Three North Korean Hacking Groups
▼
CrowdStrike assessed that two new threat actor groups have spun off from North Korean Labyrinth Chollima hackers
Read Full Article →
AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities
▼
From an Anthropic blog post : In a recent evaluation of AI models’ cyber capabilities, current Claude models can now succeed at multistage attacks on networks with dozens of hosts using only standard, open-source tools, instead of the custom tools needed by previous generations. This illustrates ...
Read Full Article →
Polish Grid Systems Targeted in Cyberattack Had Little Security, Per New Report
▼
The hackers behind a cyberattack that targeted Poland's grid infrastructure met little resistance when they hit systems at a heat-and-power plant and wind and solar farms last month. The intruders were able to easily access numerous systems at the affected facilities because the systems were conf...
Read Full Article →
China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware
▼
Cybersecurity researchers have discovered a new campaign attributed to a China-linked threat actor known as UAT-8099 that took place between late 2025 and early 2026. The activity, discovered by Cisco Talos, has targeted vulnerable Internet Information Services (IIS) servers located across Asia, ...
Read Full Article →
New AI-Developed Malware Campaign Targets Iranian Protests
▼
The RedKitten campaign distributes lures designed to target people seeking information about missing persons or political dissidents in Iran
Read Full Article →
Badges, Bytes and Blackmail
▼
Behind the scenes of law enforcement in cyber: what do we know about caught cybercriminals? What brought them in, where do they come from and what was their function in the crimescape? Introduction: One view on the scattered fight against cybercrime The growing sophistication and diversification ...
Read Full Article →
SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score
▼
SmarterTools has addressed two more security flaws in SmarterMail email software, including one critical security flaw that could result in arbitrary code execution. The vulnerability, tracked as CVE-2026-24423, carries a CVSS score of 9.3 out of 10.0. "SmarterTools SmarterMail versions prior to ...
Read Full Article →
Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
▼
Ivanti has rolled out security updates to address two security flaws impacting Ivanti Endpoint Manager Mobile (EPMM) that have been exploited in zero-day attacks, one of which has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities...
Read Full Article →
Chinese APTs Hacking Asian Orgs With High-End Malware
▼
Advanced persistent threat (APT) groups have deployed new cyber weapons against a variety of targets, highlighting the increasing threats to the region.
Read Full Article →
Risky Bulletin: eScan antivirus distributes backdoor in latest supply chain attack
▼
Hackers breach eScan antivirus and distribute a backdoor, Google takes down the IPIDEA proxy botnet, most GDPR fines remain uncollected, and the Poland wiper attack hit 30 locations.
Read Full Article →
MY TAKE: Transparent vs. opaque — edit Claude’s personalized memory, or trust ChatGPT’s blindly?
▼
After two years of daily ChatGPT use, I recently started experimenting with Claude, Anthropic’s competing AI assistant. Related: Microsofts see a ‘protopian’ AI future Claude is four to five times slower generating responses. But something emerged that matters more than … (more…) The post MY TAKE...
Read Full Article →
Fintech firm Marquis blames hack at firewall provider SonicWall for its data breach
▼
The fintech giant said it plans to "seek recoupment of any expenses" from its firewall provider SonicWall after a 2025 data breach exposed customer firewall configurations.
Read Full Article →
Google Disrupts Extensive Residential Proxy Networks
▼
Google has taken coordinated action against the massive IPIDEA residential proxy network, enhancing customer protections and disrupting cybercrime operations
Read Full Article →
France Fines National Employment Agency €5m Over 2024 Data Breach
▼
The French data protection regulator said that France Travail’s response to a 2024 data breach violated GDPR
Read Full Article →
FBI Takes Down RAMP Ransomware Forum
▼
The dark web forum administrator confirmed the takedown and said they had “no plans to rebuild”
Read Full Article →
Ransomware Victim Numbers Rise, Despite Drop in Active Extortion Groups
▼
Ransomware victims surged in Q4 2025 despite fewer active extortion groups, with data leaks rising 50%, ReliaQuest researchers report
Read Full Article →
Smashing Security podcast #452: The dark web’s worst assassins, and Pegasus in the dock
▼
In episode 452, a London-based YouTuber wins a landmark court case against Saudi Arabia after his phone was hacked with Pegasus spyware — exposing how a single, seemingly harmless text message can turn a smartphone into a round-the-clock surveillance device. Plus, we go looking for professional h...
Read Full Article →
How Can CISOs Respond to Ransomware Getting More Violent?
▼
Ransomware defense requires focusing on business resilience. This means patching issues promptly, improving user education, and deploying multifactor authentication.
Read Full Article →
AI security startup Outtake raises $40M from Iconiq, Satya Nadella, Bill Ackman, and other big names
▼
Outtake makes an agentic cybersecurity platform to help enterprises detect identity fraud. Its angel investors read like a who's who of tech industry names.
Read Full Article →
Cyber Security Report 2026
▼
Check Point's flagship report delivers industry leading intelligence shaping the decisions security leaders will make in 2026
Read Full Article →
Critical and High Severity n8n Sandbox Flaws Allow RCE
▼
Two critical security flaws in n8n have exposed sandboxing vulnerabilities, enabling remote code execution for attackers
Read Full Article →
Emojis in PureRAT’s Code Point to AI-Generated Malware Campaign
▼
Researchers discover that PureRAT’s code now contains emojis – indicating it has been written by AI based-on comments ripped from social media.
Read Full Article →
AI Security Threats Loom as Enterprise Usage Jumps 91%
▼
Zscaler analysts found critical vulnerabilities in 100% of enterprise AI systems, with 90% compromised in under 90 minutes
Read Full Article →
Vibe-Coded 'Sicarii' Ransomware Can't Be Decrypted
▼
A new ransomware strain that entered the scene last year has poorly designed code and uses Hebrew language that might be a false flag.
Read Full Article →
General Graboids: Worms and Remote Code Execution in Command & Conquer
▼
[this work was conducted collaboratively by Bryan Alexander and Jordan Whitehead] This post details several vulnerabilities discovered in the popular online game Command & Conquer: Generals. We recently presented some of this work at an information security conference and this post contain
Read Full Article →
'Stanley' Toolkit Turns Chrome Into Undetectable Phishing Vector
▼
The malware-as-a-service kit enables malicious extensions to overlay pages on real websites without changing the visible URL, signaling a fresh challenge for enterprise security.
Read Full Article →
Pyodide Sandbox Escape Enables Remote Code Execution in Grist-Core
▼
Critical sandbox escape vulnerability in Grist-Core enables remote code execution via a malicious formula
Read Full Article →
World Leaks Ransomware Group Claims 1.4TB Nike Data Breach
▼
Nike is investigating after the World Leaks ransomware group posted a 1.4TB data dump
Read Full Article →
Sandworm Blamed for Wiper Attack on Polish Power Grid
▼
Researchers attributed the failed attempt to the infamous Russian APT Sandworm, which is notorious for wiper attacks on critical infrastructure organizations.
Read Full Article →
Who Operates the Badbox 2.0 Botnet?
▼
The cybercriminals in control of Kimwolf -- a disruptive botnet that has infected more than 2 million devices -- recently shared a screenshot indicating they'd compromised the control panel for Badbox 2.0, a vast China-based botnet powered by malicious software that comes pre-installed on many An...
Read Full Article →
Law Firm Investigates Coupang Security Failures Ahead of Class Action Deadline
▼
The US law firm Hagens Berman will lead a class action lawsuit against Coupang over security failures that led to a June 2025 data breach
Read Full Article →
Okta Flags Customized, Reactive Vishing Attacks Which Bypass MFA
▼
Threat actors posing as IT support teams use phishing kits to generate fake login sites in real-time to trick victims into handing over credentials
Read Full Article →
Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm
▼
A destructive cyber attack targeting Poland’s energy sector has been linked to Russian APT group Sandworm
Read Full Article →
Cyberattack Targeting Poland’s Energy Grid Used a Wiper
▼
A cyberattack that targeted power plants and other energy producers in Poland at the end of December used malware known as a “wiper” that was intended to erase computers as part of an operation intended to cause a power outage and other disruption to services, says European security
Read Full Article →
Under Armour Investigates Data Breach After 72 Million Records Allegedly Exposed
▼
Under Armour said there is no evidence at this point to suggest the incident affected systems used to process payments or store customer passwords
Read Full Article →
News Alert: Halo Security earns SOC 2 Type II certification, shows sustained operational security
▼
MIAMI, Jan. 22, 2026, CyberNewswire — Halo Security , a leading provider of external attack surface management and penetration testing services, today announced it has successfully achieved SOC 2 Type II compliance following an extensive multi-month audit by Insight Assurance.… (more…) The post N...
Read Full Article →
Critical Appsmith Flaw Enables Account Takeovers
▼
Critical vulnerability in Appsmith allows account takeover via flawed password reset process
Read Full Article →
KONNI Adopts AI to Generate PowerShell Backdoors
▼
North Korea-linked threat group KONNI targets countries across APAC, specifically in blockchain sectors, with AI-generated malware
Read Full Article →
LastPass Warns of Phishing Campaign Attempting to Steal Master Passwords
▼
Phoney email alerts suggest users need to backup their LastPass accounts within 24 hours. LastPass says it would never require this action from users
Read Full Article →
Over 160,000 Companies Notify Regulators of GDPR Breaches
▼
DLA Piper finds 22% increase in breached firms notifying European GDPR regulators
Read Full Article →
Attackers With Decompilers Strike Again (SmarterTools SmarterMail WT-2026-0001 Auth Bypass)
▼
Well, well, well - look what we’re back with. You may recall that merely two weeks ago, we analyzed CVE-2025-52691 - a pre-auth RCE vulnerability in the SmarterTools SmarterMail email solution with a timeline that is typically reserved for KEV holders. The plot of that story had everything; * A g...
Read Full Article →
Python Wheel (Zip) Parser Differential Vulnerability v2.0
▼
### Summary It is still possible (albeit with significantly more effort) to upload a specially crafted Wheel file (i.e. zip) to PyPI that when installed with PIP (or another Python zipfile based t...
Read Full Article →
Phishing and Spoofed Sites Remain Primary Entry Points For Olympics
▼
Cyber risks for the Milano-Cortina 2026 Winter Games include phishing and spoofed websites as key threat vectors
Read Full Article →
Peruvian Loan Scam Harvests Cards and PINs via Fake Applications
▼
Loan phishing operation in Peru is stealing card info by impersonating financial institutions
Read Full Article →
SHARED INTEL Q&A: AI retrieval systems can still hallucinate; deterministic logic offers a fix
▼
AI hallucination is still the deal-breaker. Related: Correcting LLM hallucinations As companies rush AI into production, executives face a basic constraint: you cannot automate a workflow if you cannot trust the output. A model that fabricates facts becomes a risk … (more…) The post SHARED INTEL ...
Read Full Article →
Risk of AI Model Collapse to Drive Zero Trust Data Governance, Gartner Says
▼
Gartner predicts 50% of organizations will adopt zero trust data governance by 2028
Read Full Article →
News alert: Forrester study finds Airlock Digital’s app control cuts breaches to zero with 224% ROI
▼
ATLANTA, Jan. 20, 2026, CyberNewswire — Airlock Digital , a leader in proactive application control and endpoint security, announced the release of The Total Economic Impact (TEI) of Airlock Digital , an independent study commissioned by Airlock Digital and conducted … (more…) The post News alert...
Read Full Article →
News alert: One Identity launches AI-powered ‘Identity Manager’ to speed threat response
▼
ALISO VIEJO, Calif., Jan. 20, 2026, CyberNewswire — One Identity, a trusted leader in identity security , today announces a major upgrade to One Identity Manager, a top-rated IGA solution , strengthening identity governance as a critical security control for … (more…) The post News alert: One Ide...
Read Full Article →
AI-supported vulnerability triage with the GitHub Security Lab Taskflow Agent
▼
Learn how we are using the newly released GitHub Security Lab Taskflow Agent to triage categories of vulnerabilities in GitHub Actions and JavaScript projects.
Read Full Article →
Kimwolf Botnet Lurking in Corporate, Govt. Networks
▼
A new Internet-of-Things botnet called Kimwolf has spread to more than 2 million devices, forcing infected systems to participate in massive distributed denial-of-service (DDoS) attacks and to relay other malicious and abusive Internet traffic. Kimwolf's ability to scan the local networks of comp...
Read Full Article →
Prompt Injection Bugs Found in Official Anthropic Git MCP Server
▼
Three vulnerabilities in Anthropic's Git server for the MCP can be exploited via prompt injection
Read Full Article →
LinkedIn Phishing Campaign Exploits Open-Source Pen Testing Tool to Compromise Business Execs
▼
Cybersecurity Researchers at ReliaQuest warn of an ongoing campaign delivered to “high-value individuals” via LinkedIn messages
Read Full Article →
Why inaccessible cybersecurity is a security risk: our path to accessibility
▼
In cybersecurity, an inaccessible tool isn’t just a nuisance: it’s a vulnerability. With the European Accessibility Act tightening regulations across Sweden and the EU, “good ... The post Why inaccessible cybersecurity is a security risk: our path to accessibility appeared first on Blog Detectify .
Read Full Article →
AI Supercharges Attacks in Cybercrime's New 'Fifth Wave'
▼
Weaponized AI is fueling a new wave of cybercrime, said Group-IB in its latest report
Read Full Article →
VoidLink: Evidence That the Era of Advanced AI-Generated Malware Has Begun
▼
VoidLink's framework marks the first evidence of fully AI-designed and built advanced malware, beginning a new era of AI-generated malware
Read Full Article →
MedDream PACS Premium sendOruReport reflected cross-site scripting (XSS) vulnerability
▼
MY TAKE: From ‘holy mackeral’ to ‘daily routine’ — AI vendors maneuver to commandeer your life
▼
An email from Claude landed in my inbox Friday morning with a subject line that stopped me cold: “Using Claude for your everyday life.” Related: AI’s fortune teller effect Not “Unlock the power of AI” or “Transform your productivity.” Just… … (more…) The post MY TAKE: From ‘holy mackeral’ to ‘dai...
Read Full Article →
Russian Hacktivists Intensify Disruptive Cyber Pressure on UK Orgs
▼
UK NCSC warned of disruptive cyber attacks by Russian hacktivists targeting critical infrastructure
Read Full Article →
Who’s on the Line? Exploiting RCE in Windows Telephony Service
▼
Windows has supported computer telephony integration for decades, providing applications with the ability to manage phone devices, lines, and calls. While modern deployments increasingly rely on cloud-based telephony solutions, classic telephony services remain available out of the box in Windows...
Read Full Article →
Suspects Linked to Black Basta Ransomware Group Raided in Ukraine
▼
Oleg Evgenievich Nefedov, allegedly one of the founders of Black Basta, was also placed on Europol’s and Interpol’s Most Wanted lists
Read Full Article →
On the Coming Industrialisation of Exploit Generation with LLMs
▼
Recently I ran an experiment where I built agents on top of Opus 4.5 and GPT-5.2 and then challenged them to write exploits for a zeroday vulnerability in the QuickJS Javascript interpreter. I adde…
Read Full Article →
YOLO Mode: Hidden Risks in Claude Code Permissions | UpGuard
▼
Developers are frequently granting Claude Code permission to download, execute, and delete code, creating fertile ground for prompt injection attacks.
Read Full Article →
Account Compromise Surged 389% in 2025, Says eSentire
▼
An eSentire report showed credential theft accounted for 74% of all observed cyber threats in 2025
Read Full Article →
RondoDox Botnet Targets HPE OneView Vulnerability in Exploitation Wave
▼
Check Point Research has reported a surge in attacks on a vulnerability in HPE OneView, driven by the Linux-based RondoDox botnet
Read Full Article →
Windows Internals: Check Your Privilege - The Curious Case of ETW’s SecurityTrace Flag
▼
Consuming from Microsoft-Windows-Threat-Intelligence without Antimalware-PPL or kernel patching/driver loading.
Read Full Article →
WEF: AI overtakes ransomware as fastest-growing cyber risk
▼
We can no longer say that artificial intelligence is a "future risk", lurking somewhere on a speculative threat horizon. The truth is that it is a fast-growing cybersecurity risk that organizations are facing today. That's not just my opinion, that's also the message that comes loud and clear fro...
Read Full Article →
Hackers Increasingly Shun Encryption in Favour of Pure Data Theft and Extortion
▼
While ‘traditional’ ransomware attacks remain stable, some gangs are shifting towards exploiting zero-days and supply chains to go straight to stealing data
Read Full Article →
ICE Agent Doxxing Site DDoS-ed Via Russian Servers
▼
DDoS-ers are striking a website linked to a data breach at the Department of Homeland Security
Read Full Article →
Epic Games Store Installation DLL Hijacking Privilege Escalation Vulnerability
▼
Community-powered security with AI: an open source framework for security research
▼
Announcing GitHub Security Lab Taskflow Agent, an open source and collaborative framework for security research with AI.
Read Full Article →
Criminal Subscription Service Behind AI-Powered Cyber-Attacks Taken Out By Microsoft
▼
RedVDS cyber-crime-as-a-service platform powering phishing, BEC attacks and other fraud has cost victims millions
Read Full Article →
Hackers Use Fake PayPal Notices to Steal Credentials, Deploy RMMs
▼
Phishing attacks have been identified using fake PayPal alerts to exploit remote monitoring and management tools
Read Full Article →
Sicarii Ransomware: Truth vs Myth
▼
Key findings Introduction In December 2025, a previously unknown Ransomware-as-a-Service (RaaS) operation calling itself Sicarii began advertising its services across multiple underground platforms. The group’s name references the Sicarii, a 1st-century Jewish assassins group that opposed Roman r...
Read Full Article →
DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation
▼
A new DeadLock ransomware operation uses Polygon blockchain smart contracts to manage proxy server addresses
Read Full Article →
Patch Tuesday, January 2026 Edition
▼
Microsoft today issued patches to plug at least 113 security holes in its various Windows operating systems and supported software. Eight of the vulnerabilities earned Microsoft's most-dire "critical" rating, and the company warns that attackers are already exploiting one of the bugs fixed today.
Read Full Article →
Wireless-(in)Fidelity: Pentesting Wi-Fi in 2025
▼
Wireless-(in)Fidelity: Pentesting Wi-Fi in 2025
Read Full Article →
The AI Fix #83: ChatGPT Health, Victorian LLMs, and the biggest AI bluffers
▼
In episode 83 of The AI Fix, Graham reveals he's taken up lying to LLMs, and shows how a journalist exposed AI bluffers with a made-up idiom. Meanwhile Mark invents a "Godwin's Law" for AI, and explains how to ruin any LLM with humus. Also in this episode, a marriage is declared invalid thanks to...
Read Full Article →
CISA Flags Actively Exploited Gogs Vulnerability With No Patch
▼
A high-severity security flaw in the Gogs Git service is being actively exploited, leading to remote code execution
Read Full Article →
SHADOW#REACTOR Campaign Uses Text-Only Staging to Deploy Remcos RAT
▼
SHADOW#REACTOR is a multi-stage Windows malware campaign that stealthily deploys the Remcos RAT using complex infection techniques
Read Full Article →
Phishing Scams Exploit Browser-in-the-Browser Attacks to Steal Facebook Passwords
▼
Cybersecurity researchers issue warning over a surge in attacks designed to trick Facebook users into handing over login credentials
Read Full Article →
Who Decides Who Doesn’t Deserve Privacy?
▼
Remember the Ashley Madison data breach? That was now more than a decade ago, yet it arguably remains the single most noteworthy data breach of all time. There are many reasons for this accolade, but chief among them is that by virtue of the site being expressly designed to facilitate
Read Full Article →
Your personal information is on the dark web. What happens next?
▼
If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.
Read Full Article →
Hackers get hacked, as BreachForums database is leaked
▼
Have you ever stolen data, traded a hacking tool, or just lurked on a dark web forum believing that you are anonymous? If so, I might have some unsettling news for you. Read more in my article on the Hot for Security blog.
Read Full Article →
Unveiling VoidLink – A Stealthy, Cloud-Native Linux Malware Framework
▼
The new framework maintains long-term access to Linux systems while operating reliably in cloud and container environments
Read Full Article →
World Economic Forum: Cyber-fraud overtakes ransomware as business leaders' top cyber-security concern
▼
“Pervasive” threat of phishing, invoice scams and other cyber-enabled fraud is at “record highs”, warns WEF Cybersecurity Outlook 2026
Read Full Article →#Scraping Candidates
What’s next for DHS’s forthcoming replacement critical infrastructure protection panel, AI information sharing
▼
CISA Urges Critical Infrastructure Organizations to Take Action Against Insider Threats
▼
#Security Vendor Blog
PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers
▼
Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.
Read Full Article →
Threats Making WAVs - Incident Response to a Cryptomining Attack
▼
Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files. The report includes the full attack vectors, from detection, infection, network propagation and malware analysis and recommendations for optimizing incident res...
Read Full Article →
Analysis of active exploitation of SolarWinds Web Help Desk
▼
We are seeing exploitation of SolarWinds Web Help Desk via CVE‑2025‑40551 and CVE‑2025‑40536 that can lead to domain compromise; here is how to patch, hunt, and mitigate now. The post Analysis of active exploitation of SolarWinds Web Help Desk appeared first on Microsoft Security Blog .
Read Full Article →
Novel Technique to Detect Cloud Threat Actor Operations
▼
We introduce a novel method that maps cloud alert trends to MITRE ATT&CK techniques. The patterns created could identify threat actors by behavior. The post Novel Technique to Detect Cloud Threat Actor Operations appeared first on Unit 42 .
Read Full Article →
How to protect yourself from deepfake scammers and save your money | Kaspersky official blog
▼
Here’s how to spot deepfakes, protect yourself from identity theft, and avoid falling for neural network scams.
Read Full Article →
All gas, no brakes: Time to come to AI church
▼
This week, Joe cautions the rush to adopt AI tools rife with truly awful security vulnerabilities.
Read Full Article →
New Clickfix variant ‘CrashFix’ deploying Python Remote Access Trojan
▼
CrashFix crashes browsers to coerce users into executing commands that deploy a Python RAT, abusing finger.exe and portable Python to evade detection and persist on high‑value systems. The post New Clickfix variant ‘CrashFix’ deploying Python Remote Access Trojan appeared first on Microsoft Secur...
Read Full Article →
280+ Leaky Skills: How OpenClaw & ClawHub Are Exposing API Keys and PII
▼
Discover how 7.1% of AI agent skills are designed to leak secrets, PII, and API keys through LLM context. Learn to defend with Evo & mcp-scan.
Read Full Article →
The security implementation gap: Why Microsoft is supporting Operation Winter SHIELD
▼
Most security incidents happen in the gap between knowing what matters and actually implementing security controls consistently. Read how Microsoft is helping organizations close this implementation gap. The post The security implementation gap: Why Microsoft is supporting Operation Winter SHIELD...
Read Full Article →
SIEM Rules for detecting exploitation of vulnerabilities in FortiCloud SSO
▼
A set of SIEM rules for detecting attempts to bypass authentication in Fortinet products using the FortiCloud SSO mechanism has been added to the Kaspersky Unified Monitoring and Analysis Platform.
Read Full Article →
Chrysalis, Notepad++, and Supply Chain Risk: What it Means, and What to Do Next
▼
When Rapid7 published its analysis of the Chrysalis backdoor linked to a compromise of Notepad++ update infrastructure, it raised understandable questions from customers and security teams. The investigation showed that attackers did not exploit a flaw in the application itself. Instead, they com...
Read Full Article →
2025 SLG cyber trends: 5 lessons to build a 2026 cyber roadmap
▼
From school districts to state agencies, 2025 cyber incidents were a wake-up call about asset visibility. Discover five actionable lessons SLG leaders can use to close the cyber exposure gap and move from reactive threat detection and response to proactive exposure management. Key takeaways Effec...
Read Full Article →
Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework
▼
Cisco Talos uncovered “DKnife,” a fully featured gateway-monitoring and adversary-in-the-middle (AitM) framework comprising seven Linux-based implants.
Read Full Article →
The Shadow Campaigns: Uncovering Global Espionage
▼
In 2025 a threat group compromised government and critical infrastructure in 37 countries, with reconnaissance in 155. The post The Shadow Campaigns: Uncovering Global Espionage appeared first on Unit 42 .
Read Full Article →
Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT
▼
We analyze the recent Stan Ghouls campaign targeting organizations in Russia and Uzbekistan: Java-based loaders, the NetSupport RAT, and a potential interest in IoT.
Read Full Article →
Snyk Finds Prompt Injection in 36%, 1467 Malicious Payloads in a ToxicSkills Study of Agent Skills Supply Chain Compromise
▼
Snyk’s ToxicSkills research reveals 36% of AI agent skills contain security flaws, including 1,467 vulnerable skills and active malicious payloads targeting OpenClaw, Claude Code, and Cursor users.
Read Full Article →
Detecting backdoored language models at scale
▼
We're releasing new research on detecting backdoors in open-weight language models and highlighting a practical scanner designed to detect backdoored models at scale and improve overall trust in AI systems. The post Detecting backdoored language models at scale appeared first on Microsoft Securit...
Read Full Article →
LookOut: Discovering RCE and Internal Access on Looker (Google Cloud & On-Prem)
▼
Tenable Research discovered two novel vulnerabilities in Google Looker that could allow an attacker to completely compromise a Looker instance. Google moved swiftly to patch these issues. Organizations running Looker on-prem should verify they have upgraded to the patched versions. Key takeaways ...
Read Full Article →
Why Smart People Fall For Phishing Attacks
▼
Why do successful phishing attacks target our psychology rather than just our software? Discover Unit 42’s latest insights on defeating social engineering and securing your digital life. The post Why Smart People Fall For Phishing Attacks appeared first on Unit 42 .
Read Full Article →
Malicious use of virtual machine infrastructure
▼
Bulletproof hosting providers are abusing the legitimate ISPsystem infrastructure to supply virtual machines to cybercriminals Categories: Threat Research Tags: virtual machine, cybercrime, Ransomware, ISPs
Read Full Article →
From Clawdbot to Moltbot to OpenClaw: Security Experts Detail Critical Vulnerabilities and 6 Immediate Hardening Steps for the Viral AI Agent
▼
Moltbot, the viral AI agent, offers immense power but is riddled with critical vulnerabilities, including remote code execution (RCE), exposed control interfaces, and malicious extensions. Read on to understand the vulnerabilities associated with Moltbot and the immediate security practices users...
Read Full Article →
Microsoft SDL: Evolving security practices for an AI-powered world
▼
Discover Microsoft’s holistic SDL for AI combining policy, research, and enablement to help leaders secure AI systems against evolving cyberthreats. The post Microsoft SDL: Evolving security practices for an AI-powered world appeared first on Microsoft Security Blog .
Read Full Article →
Frequently Asked Questions About Notepad++ Supply Chain Compromise
▼
Threat actors compromised the update infrastructure for Notepad++, redirecting traffic to an attacker controlled site for targeted espionage purposes. Change log Update February 4: This FAQ blog has been updated to note that CVE-2025-15556 was assigned for this security incident. Click here to re...
Read Full Article →
The Notepad++ supply chain attack — unnoticed execution chains and new IoCs
▼
Kaspersky GReAT experts discovered previously undocumented infection chains used in the Notepad++ supply chain attacks. The article provides new IoCs related to those incidents which employ DLL sideloading and Cobalt Strike Beacon delivery.
Read Full Article →
Introducing the AI Security Fabric: Empowering Software Builders in the Era of AI
▼
Snyk introduces the AI Security Fabric and a prescriptive path to help organizations secure software at the speed of AI. Discover how to operationalize AI security and scale innovation without compromising on safety.
Read Full Article →
The Prescriptive Path to Operationalizing AI Security
▼
Learn how to move from vision to practice with the Prescriptive Path, a framework for operationalizing AI security at scale. By replacing fragmented tools with a unified platform, you can build trust and secure AI-native applications at machine speed.
Read Full Article →
Infostealers without borders: macOS, Python stealers, and platform abuse
▼
How modern infostealers target macOS systems, leverage Python‑based stealers, and abuse trusted platforms and utilities to distribute credential‑stealing payloads. The post Infostealers without borders: macOS, Python stealers, and platform abuse appeared first on Microsoft Security Blog .
Read Full Article →
How does cyberthreat attribution help in practice?
▼
Why it would be useful to identify the specific hacking group behind a malware file found in your infrastructure.
Read Full Article →
The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit
▼
Rapid7 Labs, together with the Rapid7 MDR team, has uncovered a sophisticated campaign attributed to the Chinese APT group Lotus Blossom. Active since 2009, the group is known for its targeted espionage campaigns primarily impacting organizations across Southeast Asia and more recently Central Am...
Read Full Article →
What’s New in Tenable Cloud Security: Multi-cloud Risk Analysis, Attack Surface Assessments, Improved IAM Security and More
▼
Tenable Cloud Security continues to expand the technical depth of our Tenable One exposure management platform. Our latest enhancements include unified multi-cloud exploration, high-fidelity network validation, and expanded entitlement visibility across infrastructure and identity providers. Key ...
Read Full Article →
Kaspersky SIEM 4.2 update — what’s new? | Kaspersky official blog
▼
Kaspersky Unified Monitoring and Analysis Platform, version 4.2: detecting compromised accounts using AI, updated correlator, and other innovations.
Read Full Article →
Privileged File System Vulnerability Present in a SCADA System
▼
We detail our discovery of CVE-2025-0921. This privileged file system flaw in SCADA system Iconics Suite could lead to a denial-of-service (DoS) attack. The post Privileged File System Vulnerability Present in a SCADA System appeared first on Unit 42 .
Read Full Article →
Case study: Securing AI application supply chains
▼
Securing AI-powered applications requires more than just safeguarding prompts. Organizations must adopt a holistic approach that includes monitoring the AI supply chain, assessing frameworks, SDKs, and orchestration layers for vulnerabilities, and enforcing strong runtime controls for agents and ...
Read Full Article →
CVE-2026-1281, CVE-2026-1340: Ivanti Endpoint Manager Mobile (EPMM) Zero-Day Vulnerabilities Exploited
▼
Two Critical vulnerabilities in Ivanti’s popular mobile device management solution have been exploited in the wild in limited attacks Key takeaways: Patch Ivanti EPMM immediately. Both CVE-2026-1281 and CVE-2026-1340 have been exploited in the wild, though impact has been limited so far. Apply th...
Read Full Article →
Turning threat reports into detection insights with AI
▼
Security teams often spend days manually turning long incident reports and threat writeups into actionable detections by extracting TTPs. This blog post shows an AI-assisted workflow that does the same job in minutes. It extracts the TTPs, maps them to existing detection coverage, and flags poten...
Read Full Article →
I'm locked in!
▼
Hazel reflects on how to find balance while staying informed, then delivers practical updates and insights on the latest cybersecurity threats.
Read Full Article →
New Microsoft Data Security Index report explores secure AI adoption to protect sensitive data
▼
The 2026 Microsoft Data Security Index explores one of the most pressing questions facing organizations today: How can we harness the power of generative while safeguarding sensitive data? The post New Microsoft Data Security Index report explores secure AI adoption to protect sensitive data appe...
Read Full Article →
Supply chain attack on eScan antivirus: detecting and remediating malicious updates
▼
On January 20, Kaspersky solutions detected malware used in eScan antivirus supply chain attack. In this article we provide available information on the threat: indicators of compromise, threat hunting and mitigating tips, etc.
Read Full Article →
What AI toys can actually discuss with your child | Kaspersky official blog
▼
AI toys have been found discussing knives, drugs, sex, and mature games with children. We dive into the latest research results and the risks to security and privacy.
Read Full Article →
Microsoft releases update to address zero-day vulnerability in Microsoft Office
▼
Microsoft has published three out-of-band (OOB) updates so far in January 2026. One of these updates was released to address a vulnerability, CVE-2026-21509, affecting Microsoft Office that has been reportedly exploited in the wild.
Read Full Article →
Dissecting UAT-8099: New persistence mechanisms and regional focus
▼
Cisco Talos has identified a new, regionally targeted campaign by UAT-8099 that leverages advanced persistence techniques and custom BadIIS malware variants to compromise IIS servers, particularly in Thailand and Vietnam.
Read Full Article →
IR Trends Q4 2025: Exploitation remains dominant, phishing campaign targets Native American tribal organizations
▼
A drop in exploitation and ransomware, but a spike in phishing and credential abuse, show why timely patching and robust MFA matter more than ever.
Read Full Article →
Eeny, meeny, miny, moe? How ransomware operators choose victims
▼
Most ransomware attacks are opportunistic, not targeted at a specific sector or region Categories: Threat Research Tags: Ransomware, cybercrime, state-sponsored ransomware, victimization
Read Full Article →
Microsoft announces the 2026 Security Excellence Awards winners
▼
Congratulations to the winners of the 2026 Microsoft Security Excellence Awards that recognize the innovative defenders who have gone above and beyond. The post Microsoft announces the 2026 Security Excellence Awards winners appeared first on Microsoft Security Blog .
Read Full Article →
Fake apps, NFC skimming attacks, and other Android issues in 2026 | Kaspersky official blog
▼
How to safely use Android devices in the face of 2026’s new security threats
Read Full Article →
Introducing Tenable One AI Exposure: A New Standard for Securing AI Usage at Scale
▼
Continuously discover and monitor all AI usage across your organization, including shadow AI, agents, browser plug-ins, and more, with Tenable One AI Exposure. Map complex AI workflows to reveal high-impact exposures and monitor compliance with security and AI acceptable use policies. Key takeawa...
Read Full Article →
HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns
▼
Kaspersky researchers analyze updated CoolClient backdoor and new tools and scripts used in HoneyMyte (aka Mustang Panda or Bronze President) APT campaigns, including three variants of a browser data stealer.
Read Full Article →
Microsoft Office vulnerability (CVE-2026-21509) in active exploitation
▼
Categories: Threat Research Tags: Microsoft Office, vulnerability, advisory
Read Full Article →
Аgentic AI security measures based on the OWASP ASI Top 10
▼
Key security controls to implement in your organization to protect against malicious AI agent behavior.
Read Full Article →
CVE-2026-23864: React and Next.js Denial of Service via Memory Exhaustion
▼
Generative AI and cybersecurity: What Sophos experts expect in 2026
▼
Categories: Sophos Insights Tags: Sophos AI, Gen AI, Year in Review
Read Full Article →
AI jailbreaking via poetry: bypassing chatbot defenses with rhyme | Kaspersky official blog
▼
A new study shows that verse-based prompts can slash the effectiveness of AI safety constraints. We’re breaking down an experiment involving 25 language models and its key takeaways.
Read Full Article →
I scan, you scan, we all scan for... knowledge?
▼
In this week's newsletter, Bill hammers home the old adage, "Know your environment" — even throughout alert fatigue.
Read Full Article →
Huntress Catches SmarterMail Account Takeover Leading to RCE
▼
SmarterMail versions prior to Build 9511 are vulnerable to privileged account takeover and remote code execution. Learn more about the latest Huntress DE&TH Team’s findings.
Read Full Article →
Foxit, Epic Games Store, MedDreams vulnerabilities
▼
Cisco Talos’ Vulnerability Discovery & Research team recently disclosed three vulnerabilities in Foxit PDF Editor, one in the Epic Games Store, and twenty-one in MedDream PACS.
Read Full Article →
The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time
▼
We discuss a novel AI-augmented attack method where malicious webpages use LLM services to generate dynamic code in real-time within a browser. The post The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time appeared first on Unit 42 .
Read Full Article →
How to protect yourself from Bluetooth-headset tracking and the WhisperPair attack | Kaspersky official blog
▼
With the WhisperPair attack, a stranger can pair their device with your headphones to keep tabs on your location.
Read Full Article →
Oracle January 2026 Critical Patch Update Addresses 158 CVEs
▼
Oracle addresses 158 CVEs in its first quarterly update of 2026 with 337 patches, including 27 critical updates. Key takeaways: The first Critical Patch Update (CPU) for 2026, contains fixes for 158 unique CVEs in 337 security updates. 27 issues (8% of all patches) were assigned a critical severi...
Read Full Article →
Tenable Discovers SSRF Vulnerability in Java TLS Handshakes That Creates DoS Risk
▼
Tenable Research has discovered a server-side request forgery (SSRF) vulnerability in Java’s handling of client certificates during a TLS handshake. In certain configurations, this can be abused to cause a denial-of-service (DoS) condition. Key takeaways Tenable Research identified a vulnerabilit...
Read Full Article →
DNS OverDoS: Are Private Endpoints Too Private?
▼
We've identified an aspect of Azure’s Private Endpoint architecture that could expose Azure resources to denial of service (DoS) attacks. The post DNS OverDoS: Are Private Endpoints Too Private? appeared first on Unit 42 .
Read Full Article →
What is the “year 2038 problem”, and how can businesses fix it?
▼
How can organizations find and fix systems vulnerable to Y2K38 — the Unix epoch time overflow problem, also known as Epochalypse?
Read Full Article →
Predicting 2026
▼
In this week’s newsletter, Martin examines the evolving landscape for 2026, highlighting key threats, emerging trends like AI-driven risks, and the continued importance of addressing familiar vulnerabilities.
Read Full Article →
UAT-8837 targets critical infrastructure sectors in North America
▼
Cisco Talos is closely tracking UAT-8837, a threat actor we assess with medium confidence is a China-nexus advanced persistent threat (APT) actor.
Read Full Article →
CVE-2025-64155: Exploit Code Released for Critical Fortinet FortiSIEM Command Injection Vulnerability
▼
Exploit code has been published for CVE-2025-64155, a critical command injection vulnerability affecting Fortinet FortiSIEM devices. Key takeaways: CVE-2025-64155 is a critical operating system (OS) command injection vulnerability affecting Fortinet FortiSIEM. Fortinet vulnerabilities have histor...
Read Full Article →
Brushstrokes and breaches with Terryn Valikodath
▼
Terryn’s path to cybersecurity started with a fascination for criminal forensics and a knack for jailbreaking his family's tech — interests that eventually steered him toward the fast-paced world of digital investigations.
Read Full Article →
Threat Brief: MongoDB Vulnerability (CVE-2025-14847)
▼
Database platform MongoDB disclosed CVE-2025-14847, called MongoBleed. This is an unauthenticated memory disclosure vulnerability with a CVSS score of 8.7. The post Threat Brief: MongoDB Vulnerability (CVE-2025-14847) appeared first on Unit 42 .
Read Full Article →
Microsoft Patch Tuesday for January 2026 — Snort rules and prominent vulnerabilities
▼
Microsoft has released its monthly security update for January 2026, which includes 112 vulnerabilities affecting a range of products, including 8 that Microsoft marked as “critical”.
Read Full Article →
Remote Code Execution With Modern AI/ML Formats and Libraries
▼
We identified remote code execution vulnerabilities in open-source AI/ML libraries published by Apple, Salesforce and NVIDIA. The post Remote Code Execution With Modern AI/ML Formats and Libraries appeared first on Unit 42 .
Read Full Article →
Your personal information is on the dark web. What happens next?
▼
If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.
Read Full Article →#Tech
‘Black Mirror’ Episode Comes to Life in Alleged $66 Million Crypto Theft Attempt
▼
Authorities believe the would-be alleged thieves were being extorted by mysterious figures named “Red” and “8” who communicated with them over signal.
Read Full Article →
Habit Detection For Home Assistant
▼
Computers are very good at doing exactly what they’re told. They’re still not very good at coming up with helpful suggestions of their own. They’re very much more about following …read more
Read Full Article →
Upgrading The E-mu Audity 20 Years After Factory Support Ended
▼
If you purchased an E-mu Audity 2000 ROMpler back in 1998, you almost certainly got a rig with the 1.00 firmware. It was fine, if a little limited, particularly where …read more
Read Full Article →
Whether they are building agents or folding proteins, LLMs need a friend
▼
AI pioneer Vishal Sikka warns to never trust an LLM that runs alone interview Don't trust; verify. According to AI researcher Vishal Sikka, LLMs alone are limited by computational boundaries and will start to hallucinate when they push those boundaries. One solution? Companion bots that check the...
Read Full Article →
The best free VPNs: 5 no-cost top picks
▼
VPNs, or virtual private networks, are one of the most effective ways to stay safe online. Not only do they allow you to stay anonymous, but they can help safeguard your data and keep intrusive trackers at bay. Plus, they allow you to get around region blocks on streaming services and avoid ISP t...
Read Full Article →
Moltbook’s rebellion of AI agents shows real risks
▼
Is an autonomous network of AI agents about to break free from humanity and take over the world? You might think so when you follow the uproar surrounding Moltbook , the latest big buzzword from the tech world. A quick background for those who haven’t been keeping up: The other week Clawbot — a p...
Read Full Article →
If you’re a Substack user, your data might’ve been leaked
▼
Substack has informed some of its users of a data breach in which email addresses and phone numbers were stolen. The attack occurred in October 2025, but the breach was first discovered on February 3rd, 2026, reports BleepingComputer . According to Substack CEO Chris Best, an unauthorized party g...
Read Full Article →
Flickr emails users about data breach, pins it on 3rd party
▼
Attackers may have snapped user locations and activity information, message warns Legacy image-sharing website Flickr suffered a data breach, according to customers emails seen by The Register .…
Read Full Article →
DDoS deluge: Brit biz battered as botnet blitzes break records
▼
UK leaps to sixth in global flood charts as mega-swarm unleashes 31.4 Tbps Yuletide pummeling Cloudflare says DDoS crews ended 2025 by pushing traffic floods to new extremes, while Britain made an unwelcome leap of 36 places to become the world's sixth-most targeted location.…
Read Full Article →
Pretend Disk Format: PDFs harbor new dangers
▼
A particularly insidious phishing campaign is disguising malware pretending to be ordinary PDF documents behind links to virtual hard disks. Because workers are used to receiving purchase orders or invoices in the PDF format, they are likely to open the malicious files unthinkingly, enabling the ...
Read Full Article →
Avoid Windows 11 if you care about your data, privacy experts warn
▼
Many Windows 10 users are still struggling to take that leap of faith and switch over to Windows 11. The move has long seemed to be one that’s inevitable even if postponed for as long as possible, but data protection experts are now advising that it’s the smart move: don’t switch to Windows 11 an...
Read Full Article →
The rise of GenAI in decision intelligence: Trends and tools for 2026 and beyond
▼
As someone who has spent 17+ years working hands-on with data analytics and decision intelligence initiatives across multiple industries, I have observed generative AI mature from an intriguing side experiment into a genuinely transformative capability. What began in late 2024 as cautious pilots ...
Read Full Article →
How to build AI employees that act more like employees and less like AI
▼
“I want you to build an AI project manager.” It seemed like a simple request at the time; a fun little side project for one of our engineers to knock out in a couple of days between their “real work.” That turned out to be partly right. It was a fun project, but it wasn’t quick. It forced us to r...
Read Full Article →
Hey, senior PMs: Shipping faster won’t get you promoted
▼
It was 2022 and I was sitting in a quarterly business review feeling invincible. I was the director of product for a SaaS platform scaling toward $25 million in annual recurring revenue (ARR). My team was a machine. Our Jira hygiene was impeccable. Our velocity was at an all-time high. We were sh...
Read Full Article →
From go-live to always-live: How agentic AI is rewriting the finance transformation playbook
▼
I still remember the feeling of day 1 on a massive post-merger integration project. The command center was packed, coffee cups were overflowing and the air was thick with the silent prayer of every CIO: Please let the data reconcile. We had spent months on the blueprint phase. We had retired 25 l...
Read Full Article →
The 10-man parity rule: When AI adoption accelerates faster than organizations can see
▼
Five years ago, digital transformation inside large enterprises followed a familiar pattern. Technology initiatives were introduced centrally, often by IT or digital teams, and pushed into operating environments measured on uptime, cost and output. Digital was viewed as organizational infrastruct...
Read Full Article →
OpenClaw: The AI agent that’s got humans taking orders from bots
▼
Well, that escalated quickly. I’m talking, of course, about OpenClaw (a.k.a. Moltbot a.k.a. Clawdbot), which not only represents a headlong rush into unchecked agentic AI, but also an emerging ecosystem that reads like every dystopian cautionary cyberpunk novel ever written. As my colleague and f...
Read Full Article →
Asia-based government spies quietly broke into critical networks across 37 countries
▼
And their toolkit includes a new, Linux kernel rootkit A state-aligned cyber group in Asia compromised government and critical infrastructure organizations across 37 countries in an ongoing espionage campaign, according to security researchers.…
Read Full Article →
Microsoft bakes one of its best security tools right into Windows 11
▼
Microsoft is apparently integrating System Monitor (Sysmon) directly into Windows 11. This pro-level tool allows you to detect suspicious processes caused by malware or hackers on a Windows PC. Part of the popular Sysinternals suite, it’s free to download directly from Microsoft . Developed by so...
Read Full Article →
Enterprise tech spending to cross $6 trillion in 2026, driven by AI infrastructure boom
▼
Global IT spending will grow 10.8% to reach $6.15 trillion in 2026, Gartner said in its latest forecast, with AI infrastructure accounting for the lion’s share of that growth. The forecast shows a spending spree that shows no signs of slowing down, despite growing chatter about an AI bubble. Ente...
Read Full Article →
Three clues that your LLM may be poisoned with a sleeper-agent back door
▼
It's a threat straight out of sci-fi, and fiendishly hard to detect Sleeper agent-style backdoors in AI large language models pose a straight-out-of-sci-fi security threat.…
Read Full Article →
Windows 11 Insider Previews: What’s in the latest build?
▼
Windows 11 25H2 has been released, but behind the scenes, Microsoft is constantly working to improve the newest version of Windows. The company frequently rolls out public preview builds to members of its Windows Insider Program, allowing them to test out — and help shape — upcoming features. Ski...
Read Full Article →
Fastest VPN 2026: Expert picks of the top 5 VPN speed demons
▼
When looking for a top-notch VPN, the two most important things to watch out for are privacy and speed. While privacy is crucial to a good VPN, speed shouldn’t be overlooked. Faster speeds mean quicker file downloads and website load times, higher-quality streaming, and just a better all-around e...
Read Full Article →
Model Context Protocol: Apple’s Xcode 26.3 opens for vibe coding
▼
Apple has embraced agentic AI for developers, introducing direct support in Xcode 26.3 for both Anthropic’s Claude Agent and OpenAI’s Codex and making vibe coding now a platform feature for iPhone, iPad, and Mac. It’s available to all Apple Developer Program members now and will be released “soon...
Read Full Article →
Testing can’t keep up with rapidly advancing AI systems: AI Safety Report
▼
AI systems continued to advance rapidly over the past year, but the methods used to test and manage their risks did not keep pace, according to the International AI Safety Report 2026. The report , produced with inputs from more than 100 experts across over 30 countries, said that pre-deployment ...
Read Full Article →
Uh oh! 1+ million Android apps exposed 700 TB of sensitive user data
▼
Towards the end of January, security researchers at Cybernews published a study on AI apps in the Google Play Store. The study revealed that numerous AI apps had inadequate security, leading them to inadvertently leak data from Google’s cloud servers. The result? A whopping total of 730 million T...
Read Full Article →
High-risk Office security flaw: Microsoft issues emergency updates
▼
Updated on February 3rd, 2026: New details have come to light regarding how attackers exploit this vulnerability. We’ve added a section explaining it down below. Microsoft recently published a security advisory warning of a newly discovered zero-day vulnerability in Office applications. The vulne...
Read Full Article →
Linux's Second-in-Command Greg Kroah-Hartman Bestowed With The European Open Source Award
▼
Linux kernel maintainer honored at Brussels ceremony for decades of critical infrastructure work.
Read Full Article →
Best VPNs for Android: 5 top picks for phones and tablets
▼
Many people’s daily browsing is now done on their mobile devices. So it’s more important than ever to have a great VPN that works well on your phone. While some services work best on Windows, others particularly shine when used on Android devices, and I’ve curated a list of my favorites to help y...
Read Full Article →
9 million Android devices were secretly hijacked by proxy network
▼
Google recently announced in a statement that it has disrupted the “world’s largest residential proxy network.” It was able to remain undetected for a long time, hijacking innocent users’ private devices (including smartphones, PCs, and smart home devices) and using them as gateways for distribut...
Read Full Article →
Best VPN services: 8 top picks for every VPN need
▼
A VPN, or virtual private network, is one of the best tools you can use to boost your online privacy and security. But in the vast ocean of available services, it can be exhausting trying to find the best VPN for your needs. Thankfully, we here at PCWorld are VPN experts and we’re sharing decades...
Read Full Article →
Update now! Bluetooth flaw lets attackers silently hijack accessories
▼
Security experts at the Computer Security and Industrial Cryptography research group (COSIC) are warning of a serious Bluetooth security vulnerability that could affect millions of headphones, speakers, and other wireless accessories worldwide. If you have any Bluetooth devices, you should check ...
Read Full Article →
Beware! That Microsoft email is genuine, but it’s also a scam
▼
Microsoft users are reporting a particularly difficult-to-detect scam: phishing emails sent from a genuine Microsoft email address that’s classified as “trustworthy” by the company itself. The emails appear to be official, but they’re demanding high-value payments and leading victims straight int...
Read Full Article →
Ditch your PC’s free trial—these 3 antivirus options are way better
▼
Using the antivirus trial that came with your PC? Or perhaps you’ve just been sitting it out with Windows Security? You may be able to do better. Why only may do better? It all depends on your needs—factors like your household, level of tech savvy, and willingness to directly manage your protecti...
Read Full Article →
WinRAR under attack by state-level hackers, according to Google
▼
WinRAR, a tool for unpacking compressed files , is one of those pillars of everyday PC use that’s kind of faded into the background. I used to install it on every computer setup, like VLC and Irfanview. But according to a report from security researchers at Google, a long-known vulnerability in W...
Read Full Article →
Google Meet is the new spam hotspot. This setting stops the random calls
▼
Spam and scams generally go hand-in-hand. Accordingly, we all get flooded daily from various angles across multiple email and messaging services, but they’re not the only ways of getting hit. As annoying as they are, scammers are a smart bunch. Which is why my guard is now up after being contacte...
Read Full Article →
Standardizing the BAS/CS of Critical Infrastructure Cybersecurity Alerts
▼
#Threat Intel & Vulnerability
CVE-2025-26399
▼
Currently trending CVE - Hype Score: 24 - SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass ...
Read Full Article → *(Covered by: Intruder Intel CVE Feed)*
CVE-2025-30208
▼
CVE-2025-54068
▼
Currently trending CVE - Hype Score: 13 - Livewire is a full-stack framework for Laravel. In Livewire v3 up to and including v3.6.3, a vulnerability allows unauthenticated attackers to achieve remote command execution in specific scenarios. The issue stems from how certain component property upda...
Read Full Article →
CVE-2025-34165
▼
Currently trending CVE - Hype Score: 9 - A stack-based buffer overflow vulnerability in NetSupport Manager 14.x versions prior to 14.12.0000 allows a remote, unauthenticated attacker to cause a denial of service (DoS) or potentially leak a limited amount of memory.
Read Full Article → *(Covered by: Intruder Intel CVE Feed)*
CVE-2025-59473
▼
Currently trending CVE - Hype Score: 7 - SQL Injection vulnerability in the Structure for Admin authenticated user
Read Full Article →
CVE-2025-15566
▼
Currently trending CVE - Hype Score: 1 - A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/auth-proxy-set-headers` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx...
Read Full Article →
CVE-2026-2236 | HGiga C&Cm@il package olln-base up to 7.0-977 sql injection
▼
A vulnerability categorized as critical has been discovered in HGiga C&Cm@il package olln-base up to 7.0-977 . This affects an unknown function. Executing a manipulation can lead to sql injection. This vulnerability appears as CVE-2026-2236 . The attack may be performed from remote. There is no a...
Read Full Article → *(Covered by: VulnDB)*
CVE-2026-24466 | Device Windows Service unquoted search path
▼
A vulnerability was found in Oki Electric Industry/Ricoh Company/Murata Machinery Device . It has been classified as problematic . Impacted is an unknown function of the component Windows Service . This manipulation causes unquoted search path. This vulnerability is registered as CVE-2026-24466 ....
Read Full Article →
CVE-2026-0870 | GIGABYTE MacroHub up to 2.3.1 unnecessary privileges
▼
A vulnerability was found in GIGABYTE MacroHub up to 2.3.1 and classified as critical . This issue affects some unknown processing. The manipulation results in execution with unnecessary privileges. This vulnerability is cataloged as CVE-2026-0870 . The attack must be initiated from a local posit...
Read Full Article →
CVE-2026-1868 | GitLab AI Gateway up to 18.6.1/18.7.0/18.8.0 Duo Workflow Service special elements used in a template engine
▼
A vulnerability has been found in GitLab AI Gateway up to 18.6.1/18.7.0/18.8.0 and classified as critical . This vulnerability affects unknown code of the component Duo Workflow Service . The manipulation leads to improper neutralization of special elements used in a template engine. This vulnera...
Read Full Article →
CVE-2026-23903 | Apache Shiro up to 2.0.6 authorization
▼
A vulnerability, which was classified as critical , was found in Apache Shiro up to 2.0.6 . This affects an unknown part. Executing a manipulation can lead to authorization bypass. This vulnerability is tracked as CVE-2026-23903 . The attack can be launched remotely. No exploit exists. You should...
Read Full Article →
CVE-2026-23901 | Apache Shiro up to 2.0.6 timing discrepancy
▼
A vulnerability, which was classified as problematic , has been found in Apache Shiro up to 2.0.6 . Affected by this issue is some unknown functionality. Performing a manipulation results in observable timing discrepancy. This vulnerability is identified as CVE-2026-23901 . The attack can be init...
Read Full Article →
CVE-2026-1615 | jsonpath code injection (SNYK-JS-JSONPATH-13645034)
▼
A vulnerability classified as critical was found in jsonpath . Affected by this vulnerability is an unknown functionality. Such manipulation leads to code injection. This vulnerability is referenced as CVE-2026-1615 . It is possible to launch the attack remotely. No exploit is available.
Read Full Article →
CVE-2026-22613 | Eaton Network M3 up to 2.3.2 Firmware Upgrade certificate validation
▼
A vulnerability classified as critical has been found in Eaton Network M3 up to 2.3.2 . Affected is an unknown function of the component Firmware Upgrade Handler . This manipulation causes improper certificate validation. The identification of this vulnerability is CVE-2026-22613 . It is possible...
Read Full Article →
CVE-2025-66595 | Yokogawa Electric FAST TOOLS up to R10.04 cross-site request forgery
▼
CVE-2025-66599 | Yokogawa Electric FAST TOOLS up to R10.04 exposure of sensitive system information to an unauthorized control sphere
▼
A vulnerability marked as problematic has been reported in Yokogawa Electric FAST TOOLS up to R10.04 . This affects an unknown function. The manipulation leads to exposure of sensitive system information to an unauthorized control sphere. This vulnerability is uniquely identified as CVE-2025-6659...
Read Full Article →
CVE-2025-66607 | Yokogawa Electric FAST TOOLS up to R10.04 security check
▼
A vulnerability categorized as problematic has been discovered in Yokogawa Electric FAST TOOLS up to R10.04 . Impacted is an unknown function. Such manipulation leads to security check for standard. This vulnerability is traded as CVE-2025-66607 . The attack may be launched remotely. There is no ...
Read Full Article → *(Covered by: VulnDB)*
CVE-2025-66605 | Yokogawa Electric FAST TOOLS up to R10.04 private personal information
▼
A vulnerability was found in Yokogawa Electric FAST TOOLS up to R10.04 and classified as problematic . Affected by this issue is some unknown functionality. Executing a manipulation can lead to exposure of private personal information to an unauthorized actor. This vulnerability is registered as ...
Read Full Article → *(Covered by: VulnDB)*
CrowdStrike Falcon Scores Perfect 100% in SE Labs’ Most Challenging Ransomware Test
▼
CVE-2026-2227 | D-Link DCS-931L up to 1.13.0 /setSystemAdmin doSystem AdminID command injection
▼
A vulnerability marked as critical has been reported in D-Link DCS-931L up to 1.13.0 . Impacted is the function doSystem of the file /setSystemAdmin . Performing a manipulation of the argument AdminID results in command injection. This vulnerability only affects products that are no longer suppor...
Read Full Article → *(Covered by: VulnDB)*
CVE-2026-2226 | DouPHP up to 1.9 ZIP File /admin/file.php sql_filename unrestricted upload
▼
A vulnerability labeled as critical has been found in DouPHP up to 1.9 . This issue affects some unknown processing of the file /admin/file.php of the component ZIP File Handler . Such manipulation of the argument sql_filename leads to unrestricted upload. This vulnerability is uniquely identifie...
Read Full Article →
CVE-2026-2225 | itsourcecode News Portal Project 1.0 Administrator Login /admin/index.php email sql injection
▼
A vulnerability identified as critical has been detected in itsourcecode News Portal Project 1.0 . This vulnerability affects unknown code of the file /admin/index.php of the component Administrator Login . This manipulation of the argument email causes sql injection. This vulnerability is handle...
Read Full Article →
CVE-2026-2224 | code-projects Online Reviewer System 1.0 btn_functions.php firstname cross site scripting
▼
A vulnerability categorized as problematic has been discovered in code-projects Online Reviewer System 1.0 . This affects an unknown part of the file /system/system/admins/manage/users/btn_functions.php . The manipulation of the argument firstname results in cross site scripting. This vulnerabili...
Read Full Article → *(Covered by: VulnDB)*
CVE-2026-2223 | code-projects Online Reviewer System 1.0 index.php ID sql injection
▼
FCC Cybersecurity Alert and Recommendations to Communications Providers
▼
On January 29, 2026, the FCC issued public notice DA 26-96: PUBLIC SAFETY AND HOMELAND SECURITY BUREAU HIGHLIGHTS BEST PRACTICES FOR DEFENDING AGAINST RANSOMWARE ATTACKS By this Public Notice, the Public Safety and Homeland Security Bureau (Bureau) of the Federal Communications Commission (Commis...
Read Full Article →
CVE-2026-2217 | itsourcecode Event Management System 1.0 /admin/manage_user.php ID sql injection
▼
A vulnerability, which was classified as critical , was found in itsourcecode Event Management System 1.0 . The impacted element is an unknown function of the file /admin/manage_user.php . The manipulation of the argument ID results in sql injection. This vulnerability is cataloged as CVE-2026-22...
Read Full Article → *(Covered by: VulnDB)*
Some good news: downstream victims of mass data theft campaigns are less likely to pay — incident responders
▼
Mathew J. Schwartz reports: The Clop digital extortion gang for years perfected a method for wringing tens of millions out of cybercrime. Find a zero-day flaw, often in file transfer software, swarm vulnerable networks and post online the sensitive data of any victim unwilling to pay for a promis...
Read Full Article →
CVE-2025-15572 | wasm3 up to 0.5.0 NewCodePage memory leak (Issue 550)
▼
A vulnerability, which was classified as problematic , has been found in wasm3 up to 0.5.0 . The affected element is the function NewCodePage . The manipulation leads to memory leak. This vulnerability is listed as CVE-2025-15572 . The attack must be carried out locally. In addition, an exploit i...
Read Full Article →
CVE-2026-2216 | rachelos WeRSS we-mp-rss up to 1.4.8 apis/tools.py download_export_file filename path traversal
▼
A vulnerability classified as critical was found in rachelos WeRSS we-mp-rss up to 1.4.8 . Impacted is the function download_export_file of the file apis/tools.py . Executing a manipulation of the argument filename can lead to path traversal. This vulnerability is tracked as CVE-2026-2216 . The a...
Read Full Article →
CVE-2026-2215 | rachelos WeRSS we-mp-rss up to 1.4.8 JWT core/auth.py SECRET_KEY default key
▼
A vulnerability classified as problematic has been found in rachelos WeRSS we-mp-rss up to 1.4.8 . This issue affects some unknown processing of the file core/auth.py of the component JWT Handler . Performing a manipulation of the argument SECRET_KEY results in use of default cryptographic key. T...
Read Full Article →
CVE-2025-15571 | ckolivas lrzip up to 0.651 stream.c ucompthread null pointer dereference (Issue 263)
▼
A vulnerability described as problematic has been identified in ckolivas lrzip up to 0.651 . This vulnerability affects the function ucompthread of the file stream.c . Such manipulation leads to null pointer dereference. This vulnerability is referenced as CVE-2025-15571 . The attack can only be ...
Read Full Article →
CVE-2026-2214 | code-projects for Plugin 1.0 AdminAddAlbum.php txtalbum cross site scripting
▼
A vulnerability marked as problematic has been reported in code-projects for Plugin 1.0 . This affects an unknown part of the file /Administrator/PHP/AdminAddAlbum.php . This manipulation of the argument txtalbum causes cross site scripting. The identification of this vulnerability is CVE-2026-22...
Read Full Article →
CVE-2026-2213 | code-projects Online Music Site 1.0 AdminAddAlbum.php txtimage unrestricted upload
▼
A vulnerability labeled as critical has been found in code-projects Online Music Site 1.0 . Affected by this issue is some unknown functionality of the file /Administrator/PHP/AdminAddAlbum.php . The manipulation of the argument txtimage results in unrestricted upload. This vulnerability was name...
Read Full Article →
CVE-2025-15570 | ckolivas lrzip up to 0.651 stream.c lzma_decompress_buf use after free
▼
A vulnerability was found in ckolivas lrzip up to 0.651 . It has been rated as critical . This impacts the function lzma_decompress_buf of the file stream.c . Performing a manipulation results in use after free. This vulnerability is known as CVE-2025-15570 . Attacking locally is a requirement. F...
Read Full Article →
CVE-2026-2210 | D-Link DIR-823X 250416 /goform/set_filtering sub_4211C8 os command injection
▼
A vulnerability was found in D-Link DIR-823X 250416 . It has been declared as critical . This affects the function sub_4211C8 of the file /goform/set_filtering . Such manipulation leads to os command injection. This vulnerability is traded as CVE-2026-2210 . The attack may be launched remotely. F...
Read Full Article →
CVE-2025-15569 | Artifex MuPDF up to 1.26.1 on Windows platform/x11/win_main.c get_system_dpi uncontrolled search path (ID 708617)
▼
A vulnerability was found in Artifex MuPDF up to 1.26.1 on Windows. It has been classified as problematic . The impacted element is the function get_system_dpi of the file platform/x11/win_main.c . This manipulation causes uncontrolled search path. This vulnerability appears as CVE-2025-15569 . T...
Read Full Article →
Several Dutch agencies suffer major data breach
▼
APA reports: Personal data of employees of the Dutch Data Protection Authority (Autoriteit Persoonsgegevens, AP) and the Council for Justice was accessed by unauthorized persons as a result of a leak caused by a vulnerability in software used by government agencies, APA reports citing ANP news ag...
Read Full Article →
CVE-2026-2209 | WeKan up to 8.18 Custom Translation translationBody.js setCreateTranslation improper authorization
▼
A vulnerability was found in WeKan up to 8.18 and classified as critical . The affected element is the function setCreateTranslation of the file client/components/settings/translationBody.js of the component Custom Translation Handler . The manipulation results in improper authorization. This vul...
Read Full Article →
CVE-2026-2208 | WeKan up to 8.20 Rules rules.js RulesBleed authorization
▼
A vulnerability has been found in WeKan up to 8.20 and classified as problematic . Impacted is an unknown function of the file server/publications/rules.js of the component Rules Handler . The manipulation leads to missing authorization. This vulnerability is documented as CVE-2026-2208 . The att...
Read Full Article →
CVE-2026-2207 | WeKan up to 8.20 Activity Publication activities.js LinkedBoardActivitiesBleed information disclosure
▼
A vulnerability, which was classified as problematic , was found in WeKan up to 8.20 . This issue affects some unknown processing of the file server/publications/activities.js of the component Activity Publication Handler . Executing a manipulation can lead to information disclosure. This vulnera...
Read Full Article →
CVE-2026-2206 | WeKan up to 8.20 Administrative Repair fixDuplicateLists.js FixDuplicateBleed access control
▼
A vulnerability, which was classified as critical , has been found in WeKan up to 8.20 . This vulnerability affects unknown code of the file server/methods/fixDuplicateLists.js of the component Administrative Repair Handler . Performing a manipulation results in improper access controls. This vul...
Read Full Article →
CVE-2026-2205 | WeKan up to 8.20 Meteor Publication cards.js CardPubSubBleed information disclosure
▼
A vulnerability classified as problematic was found in WeKan up to 8.20 . This affects an unknown part of the file server/publications/cards.js of the component Meteor Publication Handler . Such manipulation leads to information disclosure. This vulnerability is listed as CVE-2026-2205 . The atta...
Read Full Article →
CVE-2026-25562 | WeKan up to 8.18 Attachment Metadata attachments.js information exposure (EUVD-2026-5710)
▼
A vulnerability classified as problematic has been found in WeKan up to 8.18 . Affected by this issue is some unknown functionality of the file server/publications/attachments.js of the component Attachment Metadata Handler . This manipulation causes information exposure through discrepancy. This...
Read Full Article → *(Covered by: VulnDB)*
CVE-2026-25567 | WeKan up to 8.18 Card Comment Creation API models/cardComments.js authorization (EUVD-2026-5705)
▼
A vulnerability described as problematic has been identified in WeKan up to 8.18 . Affected by this vulnerability is an unknown functionality of the file models/cardComments.js of the component Card Comment Creation API . The manipulation results in authorization bypass. This vulnerability is ide...
Read Full Article → *(Covered by: VulnDB)*
CVE-2026-25565 | WeKan up to 8.18 Update API authorization (EUVD-2026-5707)
▼
A vulnerability labeled as critical has been found in WeKan up to 8.18 . This impacts an unknown function of the component Update API . Executing a manipulation can lead to incorrect authorization. The identification of this vulnerability is CVE-2026-25565 . The attack may be launched remotely. T...
Read Full Article → *(Covered by: VulnDB)*
CVE-2026-25564 | WeKan up to 8.18 Checklist models/checklists.js authorization (EUVD-2026-5708)
▼
A vulnerability identified as problematic has been detected in WeKan up to 8.18 . This affects an unknown function of the file models/checklists.js of the component Checklist Handler . Performing a manipulation results in authorization bypass. This vulnerability was named CVE-2026-25564 . The att...
Read Full Article →
CVE-2026-25560 | WeKan up to 8.18 ldap.js ldap injection (EUVD-2026-5712)
▼
A vulnerability was found in WeKan up to 8.18 . It has been declared as critical . Impacted is an unknown function of the file packages/wekan-ldap/server/ldap.js . The manipulation results in ldap injection. This vulnerability is known as CVE-2026-25560 . It is possible to launch the attack remot...
Read Full Article →
CVE-2026-25858 | macrozheng mall up to 1.0.3 password recovery (Issue 946 / EUVD-2026-5713)
▼
A vulnerability has been found in macrozheng mall up to 1.0.3 and classified as critical . This affects an unknown part. Performing a manipulation results in weak password recovery. This vulnerability is reported as CVE-2026-25858 . The attack is possible to be carried out remotely. No exploit ex...
Read Full Article →
CVE-2026-25857 | Tenda G300-F up to 16.01.14.2 Management Interface formSetWanDiag os command injection (EUVD-2026-5714)
▼
A vulnerability, which was classified as critical , was found in Tenda G300-F up to 16.01.14.2 . Affected by this issue is the function formSetWanDiag of the component Management Interface . Such manipulation leads to os command injection. This vulnerability is documented as CVE-2026-25857 . The ...
Read Full Article →
CVE-2026-2203 | Tenda AC8 16.03.33.05 Embedded Httpd Service fast_setting_wifi_set timeZone buffer overflow
▼
A vulnerability, which was classified as critical , has been found in Tenda AC8 16.03.33.05 . Affected by this vulnerability is an unknown functionality of the file /goform/fast_setting_wifi_set of the component Embedded Httpd Service . This manipulation of the argument timeZone causes buffer ove...
Read Full Article →
CVE-2026-2202 | Tenda AC8 16.03.33.05 httpd /goform/WifiGuestSet fromSetWifiGusetBasic shareSpeed buffer overflow
▼
A vulnerability classified as critical was found in Tenda AC8 16.03.33.05 . Affected is the function fromSetWifiGusetBasic of the file /goform/WifiGuestSet of the component httpd . The manipulation of the argument shareSpeed results in buffer overflow. This vulnerability is cataloged as CVE-2026-...
Read Full Article →
CVE-2026-2201 | ZeroWdd studentmanager up to 2151560fc0a50ec00426785ec1e01a3763b380d9 LeaveController.java addLeave Reason for Leave cross site scripting
▼
A vulnerability classified as problematic has been found in ZeroWdd studentmanager up to 2151560fc0a50ec00426785ec1e01a3763b380d9 . This impacts the function addLeave of the file src/main/java/com/wdd/studentmanager/controller/LeaveController.java . The manipulation of the argument Reason for Lea...
Read Full Article →
CVE-2026-2200 | heyewei JFinalCMS 5.0.0 API Endpoint /admin/admin/save cross site scripting
▼
A vulnerability described as problematic has been identified in heyewei JFinalCMS 5.0.0 . This affects an unknown function of the file /admin/admin/save of the component API Endpoint . Executing a manipulation can lead to cross site scripting. This vulnerability is tracked as CVE-2026-2200 . The ...
Read Full Article →
CVE-2026-2194 | D-Link DI-7100G C1 24.04.18D1 start_proxy_client_email command injection
▼
A vulnerability was found in D-Link DI-7100G C1 24.04.18D1 . It has been declared as critical . This affects the function start_proxy_client_email . Executing a manipulation can lead to command injection. This vulnerability is handled as CVE-2026-2194 . The attack can be executed remotely. Additi...
Read Full Article → *(Covered by: VulnDB)*
CVE-2026-2192 | Tenda AC9 15.03.06.42_multi formGetRebootTimer stack-based overflow
▼
A vulnerability was found in Tenda AC9 15.03.06.42_multi and classified as critical . Affected by this vulnerability is the function formGetRebootTimer . Such manipulation of the argument sys.schedulereboot.start_time/sys.schedulereboot.end_time leads to stack-based buffer overflow. This vulnerab...
Read Full Article →
CVE-2026-2191 | Tenda AC9 15.03.06.42_multi formGetDdosDefenceList security.ddos.map stack-based overflow
▼
A vulnerability has been found in Tenda AC9 15.03.06.42_multi and classified as critical . Affected is the function formGetDdosDefenceList . This manipulation of the argument security.ddos.map causes stack-based buffer overflow. This vulnerability appears as CVE-2026-2191 . The attack may be init...
Read Full Article →
CVE-2026-2189 | itsourcecode School Management System 1.0 index.php ay sql injection (EUVD-2026-5761)
▼
A vulnerability, which was classified as critical , has been found in itsourcecode School Management System 1.0 . This affects an unknown function of the file /ramonsys/report/index.php . The manipulation of the argument ay leads to sql injection. This vulnerability is documented as CVE-2026-2189...
Read Full Article →
CVE-2026-2188 | UTT 进取 521G 3.1.1-190816 /goform/formPdbUpConfig sub_446B18 policyNames os command injection (EUVD-2026-5762)
▼
A vulnerability classified as critical was found in UTT 进取 521G 3.1.1-190816 . The impacted element is the function sub_446B18 of the file /goform/formPdbUpConfig . Executing a manipulation of the argument policyNames can lead to os command injection. This vulnerability is registered as CVE-2026-...
Read Full Article →
CVE-2026-2187 | Tenda RX3 16.03.13.11 /goform/formSetQosBand set_qosMib_list stack-based overflow (EUVD-2026-5763)
▼
A vulnerability classified as critical has been found in Tenda RX3 16.03.13.11 . The affected element is the function set_qosMib_list of the file /goform/formSetQosBand . Performing a manipulation of the argument list results in stack-based buffer overflow. This vulnerability is cataloged as CVE-...
Read Full Article → *(Covered by: VulnDB)*
CVE-2026-2185 | Tenda RX3 16.03.13.11 MAC Filtering Configuration Endpoint /goform/setBlackRule set_device_name devName/mac stack-based overflow (EUVD-2026-5765)
▼
A vulnerability marked as critical has been reported in Tenda RX3 16.03.13.11 . This issue affects the function set_device_name of the file /goform/setBlackRule of the component MAC Filtering Configuration Endpoint . This manipulation of the argument devName/mac causes stack-based buffer overflow...
Read Full Article →
CVE-2026-2184 | Great Developers Certificate Generation System up to 97171bb0e5e22e52eacf4e4fa81773e5f3cffb73 /restructured/csv.php photo os command injection (EUVD-2026-5766)
▼
A vulnerability labeled as critical has been found in Great Developers Certificate Generation System up to 97171bb0e5e22e52eacf4e4fa81773e5f3cffb73 . This vulnerability affects unknown code of the file /restructured/csv.php . The manipulation of the argument photo results in os command injection....
Read Full Article → *(Covered by: VulnDB)*
CVE-2026-2182 | UTT 进取 521G 3.1.1-190816 /goform/setSysAdm doSystem passwd1 command injection (EUVD-2026-5768)
▼
A vulnerability categorized as critical has been discovered in UTT 进取 521G 3.1.1-190816 . Affected by this issue is the function doSystem of the file /goform/setSysAdm . Executing a manipulation of the argument passwd1 can lead to command injection. The identification of this vulnerability is CVE...
Read Full Article →
CVE-2026-2181 | Tenda RX3 16.03.13.11 /goform/openSchedWifi schedStartTime/schedEndTime stack-based overflow (EUVD-2026-5769)
▼
A vulnerability was found in Tenda RX3 16.03.13.11 . It has been rated as critical . Affected by this vulnerability is an unknown functionality of the file /goform/openSchedWifi . Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-based buffer overflow. This vu...
Read Full Article →
CVE-2026-2180 | Tenda RX3 16.03.13.11 fast_setting_wifi_set ssid_5g stack-based overflow (EUVD-2026-5770)
▼
A vulnerability was found in Tenda RX3 16.03.13.11 . It has been declared as critical . Affected is an unknown function of the file /goform/fast_setting_wifi_set . Such manipulation of the argument ssid_5g leads to stack-based buffer overflow. This vulnerability is uniquely identified as CVE-2026...
Read Full Article →
CVE-2026-2179 | PHPGurukul Hospital Management System 4.0 /admin/manage-users.php ID sql injection (EUVD-2026-5771)
▼
A vulnerability was found in PHPGurukul Hospital Management System 4.0 . It has been classified as critical . This impacts an unknown function of the file /admin/manage-users.php . This manipulation of the argument ID causes sql injection. This vulnerability is handled as CVE-2026-2179 . The atta...
Read Full Article →
CVE-2026-2178 | r-huijts xcode-mcp-server up to f3419f00117aa9949e326f78cc940166c88f18cb run_lldb src/tools/xcode/index.ts registerXcodeTools args command injection (Issue 13 / EUVD-2026-5772)
▼
A vulnerability was found in r-huijts xcode-mcp-server up to f3419f00117aa9949e326f78cc940166c88f18cb and classified as critical . This affects the function registerXcodeTools of the file src/tools/xcode/index.ts of the component run_lldb . The manipulation of the argument args results in command...
Read Full Article →
CVE-2026-2177 | SourceCodester Prison Management System 1.0 Login session fixiation (EUVD-2026-5773)
▼
A vulnerability has been found in SourceCodester Prison Management System 1.0 and classified as critical . The impacted element is an unknown function of the component Login . The manipulation leads to session fixiation. This vulnerability is traded as CVE-2026-2177 . It is possible to initiate t...
Read Full Article →
CVE-2025-15100 | JAY Login & Register Plugin up to 2.6.03 on WordPress jay_panel_ajax_update_profile privileges management
▼
A vulnerability, which was classified as critical , was found in JAY Login & Register Plugin up to 2.6.03 on WordPress. The affected element is the function jay_panel_ajax_update_profile . Executing a manipulation can lead to improper privilege management. This vulnerability appears as CVE-2025-1...
Read Full Article → *(Covered by: VulnDB)*
CVE-2026-2176 | code-projects Contact Management System 1.0 index.py selecteditem[0] sql injection (EUVD-2026-5774)
▼
A vulnerability classified as critical was found in code-projects Contact Management System 1.0 . This issue affects some unknown processing of the file index.py . Such manipulation of the argument selecteditem[0] leads to sql injection. This vulnerability is documented as CVE-2026-2176 . The att...
Read Full Article →
CVE-2026-2175 | D-Link DIR-823X 250416 /goform/set_upnp sub_420618 upnp_enable os command injection (EUVD-2026-5775)
▼
A vulnerability classified as critical has been found in D-Link DIR-823X 250416 . This vulnerability affects the function sub_420618 of the file /goform/set_upnp . This manipulation of the argument upnp_enable causes os command injection. This vulnerability is registered as CVE-2026-2175 . Remote...
Read Full Article →
CVE-2026-2174 | code-projects Contact Management System 1.0 CRUD Endpoint ID improper authentication (EUVD-2026-5776)
▼
A vulnerability described as critical has been identified in code-projects Contact Management System 1.0 . This affects an unknown part of the component CRUD Endpoint . The manipulation of the argument ID results in improper authentication. This vulnerability is cataloged as CVE-2026-2174 . The a...
Read Full Article →
CVE-2026-2173 | code-projects Online Examination System 1.0 login.php username/password sql injection (EUVD-2026-5777)
▼
A vulnerability marked as critical has been reported in code-projects Online Examination System 1.0 . Affected by this issue is some unknown functionality of the file login.php . The manipulation of the argument username/password leads to sql injection. This vulnerability is listed as CVE-2026-21...
Read Full Article → *(Covered by: VulnDB)*
CVE-2026-2172 | code-projects Online Application System for Admission 1.0 Login Endpoint enrollment/index.php sql injection (EUVD-2026-5778)
▼
A vulnerability labeled as critical has been found in code-projects Online Application System for Admission 1.0 . Affected by this vulnerability is an unknown functionality of the file enrollment/index.php of the component Login Endpoint . Executing a manipulation can lead to sql injection. This ...
Read Full Article →
Hong Kong plans to revive privacy law requiring firms to report data breaches
▼
Harvey Kong reports: Hong Kong’s privacy watchdog plans to consult lawmakers this year about introducing mandatory data breach reporting and related penalties, the body’s chief has said. Privacy Commissioner for Personal Data Ada Chung Lai-ling on Saturday revealed details about the proposed legi...
Read Full Article →
CVE-2026-2169 | D-Link DWR-M921 1.1.50 formLtefotaUpgradeFibocom fota_url command injection (EUVD-2026-5780)
▼
A vulnerability categorized as critical has been discovered in D-Link DWR-M921 1.1.50 . This impacts an unknown function of the file /boafrm/formLtefotaUpgradeFibocom . Such manipulation of the argument fota_url leads to command injection. This vulnerability is referenced as CVE-2026-2169 . It is...
Read Full Article → *(Covered by: VulnDB)*
Substack - 663,121 breached accounts
▼
In October 2025, the publishing platform Substack suffered a data breach that was subsequently circulated more widely in February 2026. The breach exposed 663k account holder records containing email addresses along with publicly visible profile information from Substack accounts, such as publica...
Read Full Article →
Nitrogen’s ransomware can’t be decrypted — even by Nitrogen
▼
Government advisories have informed entities and the public that paying ransomware gangs to get a decryptor key is no guarantee that you will get the decryptor key, or even if you get one, that none of the files will have been corrupted. Here’s a more striking reason not to consider paying for a ...
Read Full Article →
Apple Pay phish uses fake support calls to steal payment details
▼
This Apple Pay phishing campaign is designed to funnel victims into fake Apple Support calls, where scammers steal payment details.
Read Full Article →
Higinio Ochoa, Hacktivist Turned White Hat, On The Cybercrime Magazine Podcast
▼
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 6, 2026 –Listen to the podcast On Jun. 25, 2012, 31-year-old Higinio O. Ochoa, III of Dallas, Texas, the self-proclaimed associate of computer hacker groups known as “Anonymous” and “CabinCr3w” pleaded gui...
Read Full Article →
SASE vs SSE: Which Is Best Suited for Your Organization
▼
SASE vs. SSE explained: Understand the key differences between Secure Access Service Edge (SASE) and Security Service Edge (SSE) , including when each model makes the most sense for modern, cloud-first organizations. How SSE can be your path to SASE: Learn why many enterprises start with SSE as a...
Read Full Article →
Incognito Market admin sentenced to 30 years for running $105 million dark web drug empire
▼
He promised "the best security there is" to hundreds of thousands of drug buyers, while quietly making the kind of mistake that guaranteed a 30-year sentence. And maybe training police on cryptocurrency while running a running a vast Tor-hidden drug bazaar wasn't such a good idea. Read more in my...
Read Full Article → *(Covered by: Bitdefender Hot For Security, Graham Cluley)*
OIG audit of hospital’s cybersecurity finds vulnerabilities in common web applications
▼
Chad van Alstin reports: The U.S. Department of Health and Human Services Office of the Inspector General (OIG) released a report focused on a “large Southeastern hospital” that the agency said had security vulnerabilities that could be vectors for a cyberattack. The unnamed hospital, according t...
Read Full Article →
All gas, no brakes: Time to come to AI church
▼
This week, Joe cautions the rush to adopt AI tools rife with truly awful security vulnerabilities.
Read Full Article →
Nitrogen ransomware ESXi bug makes decryption impossible even after payment
▼
Nitrogen ransomware’s ESXi encryptor corrupts its own public key, making file recovery impossible even if victims pay.
Read Full Article →
Chrysalis, Notepad++, and Supply Chain Risk: What it Means, and What to Do Next
▼
When Rapid7 published its analysis of the Chrysalis backdoor linked to a compromise of Notepad++ update infrastructure, it raised understandable questions from customers and security teams. The investigation showed that attackers did not exploit a flaw in the application itself. Instead, they com...
Read Full Article →
2025 SLG cyber trends: 5 lessons to build a 2026 cyber roadmap
▼
From school districts to state agencies, 2025 cyber incidents were a wake-up call about asset visibility. Discover five actionable lessons SLG leaders can use to close the cyber exposure gap and move from reactive threat detection and response to proactive exposure management. Key takeaways Effec...
Read Full Article →
Open the wrong “PDF” and attackers gain remote access to your PC
▼
The DEAD#VAX campaign tricks users into installing AsyncRAT by disguising a virtual hard disk as a PDF attachment.
Read Full Article →
CISO FAQ: Should I Stay Or Should I Go?
▼
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 5, 2026 –Read the full story in CSO Lack of access to executives and the board is a red flag and a top reason why chief information security officers decide to leave The post CISO FAQ: Should I Stay Or Sho...
Read Full Article →- How Threat Intelligence Helps Protect Financial Organizations from Business Risk — The financial sector resembles a treasure vault under constant siege. Banks, insurers, and fintech firms are not just custodians of money. They are guardians of irreplaceable personal and corporate data, payment flows, transactional integrity, and trust itself. When cybercriminals strike, the rip…
Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework
▼
Cisco Talos uncovered “DKnife,” a fully featured gateway-monitoring and adversary-in-the-middle (AitM) framework comprising seven Linux-based implants.
Read Full Article →
Broken Phishing URLs, (Thu, Feb 5th)
▼
For a few days, many phishing emails that landed into my mailbox contain strange URLs. They are classic emails asking you to open a document, verify your pending emails, …
Read Full Article →
Betterment - 1,435,174 breached accounts
▼
In January 2026, the automated investment platform Betterment confirmed it had suffered a data breach attributed to a social engineering attack . As part of the incident, Betterment customers received fraudulent crypto-related messages promising high returns if funds were sent to an attacker-cont...
Read Full Article →
TruConfirm: Autonomous, Agent-Led, Safe Exploit Validation for Real-World Risk Reduction
▼
Key Takeaways The Question CISOs Cannot Answer Today The scan is done. Dashboards are full. Change windows are tight. And one critical question dominates every vulnerability review: “Is this exposure actually exploitable on our asset, in our production environment,with our controls, right now?” V...
Read Full Article →
Ransomware Damage To Cost The World $74B In 2026
▼
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 4, 2026 –Read the full story Cybersecurity Ventures publishes a chart at RansomwareCost.com containing our calculations of global ransomware damage cost predictions from 2015 to 2031. For this year, 2026, ...
Read Full Article →
Firefox is giving users the AI off switch
▼
Mozilla and other companies are starting to see why giving users a choice over AI features matters.
Read Full Article →
LookOut: Discovering RCE and Internal Access on Looker (Google Cloud & On-Prem)
▼
Tenable Research discovered two novel vulnerabilities in Google Looker that could allow an attacker to completely compromise a Looker instance. Google moved swiftly to patch these issues. Organizations running Looker on-prem should verify they have upgraded to the patched versions. Key takeaways ...
Read Full Article →- Release Notes: Workflow Improvements, MISP Integration & 2,000+ New Detections — First month of the year, and we’re starting it off with updates that support faster decisions and more predictable SOC operations. In January, we introduced a major workflow enhancement with the new ANY.RUN Sandbox integration with MISP, alongside expanded detection coverage across behavior signa…
[webapps] FortiWeb Fabric Connector 7.6.x - SQL Injection to Remote Code Execution
▼
FortiWeb Fabric Connector 7.6.x - SQL Injection to Remote Code Execution
Read Full Article → *(Covered by: CXSecurity Exploit Database, ExploitDB)*
Rublevka Team: Anatomy of a Russian Crypto Drainer Operation
▼
Rublevka Team exemplifies the industrialization of crypto scams. Learn how traffer teams and wallet drainers enable high-volume theft.
Read Full Article →
From Clawdbot to Moltbot to OpenClaw: Security Experts Detail Critical Vulnerabilities and 6 Immediate Hardening Steps for the Viral AI Agent
▼
Moltbot, the viral AI agent, offers immense power but is riddled with critical vulnerabilities, including remote code execution (RCE), exposed control interfaces, and malicious extensions. Read on to understand the vulnerabilities associated with Moltbot and the immediate security practices users...
Read Full Article →
SpiderLabs Ransomware Tracker Update January 2025: Qilin Continues as Dominant Threat Group
▼
The January 2026 edition of LevelBlue SpiderLabs ransomware tracker noted a sharp fall in the number of attacks launched compared to December 2025. Qilin remained the top attacker, but there was a reshuffling of the remaining top five attackers for the month.
Read Full Article →
Frequently Asked Questions About Notepad++ Supply Chain Compromise
▼
Threat actors compromised the update infrastructure for Notepad++, redirecting traffic to an attacker controlled site for targeted espionage purposes. Change log Update February 4: This FAQ blog has been updated to note that CVE-2025-15556 was assigned for this security incident. Click here to re...
Read Full Article →
What is Autonomous Penetration Testing and How Does it Work?
▼
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 3, 2026 –Read the full story from BreachLock Everything you always wanted to know about penetration testing but were afraid to ask can be found in a widely popular blog post from BreachLock, a The post Wha...
Read Full Article →
AT&T breach data resurfaces with new risks for customers
▼
As leaked datasets are merged and enriched, they become more useful to criminals. That makes recycled breach data a bigger risk for customers.
Read Full Article →
[updated] A fake cloud storage alert that ends at Freecash
▼
We followed a fake cloud storage payment alert through deceptive affiliate redirects, ending at a familiar destination: Freecash.
Read Full Article →- Enterprise Phishing: How Attackers Abuse Trusted Microsoft & Google Platforms — ANY.RUN observes a growing trend of phishing kit infrastructure being hosted on legitimate cloud and CDN platforms, rather than on newly registered domains. These campaigns often target enterprise users specifically, creating a global threat to businesses. The shift creates serious visibility cha…
Mutagen Astronomy: From Discovery to CISA Recognition—A Seven-Year Journey
▼
Introduction On January 26, 2026, the Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2018-14634 to its Known Exploited Vulnerabilities (KEV) catalog. The same vulnerability was discovered by the Qualys Threat Research Unit (TRU) in September 2018. We nicknamed it “Mutagen Astro...
Read Full Article →
How Manifest v3 forced us to rethink Browser Guard, and why that’s a good thing
▼
Browser Guard still blocks scams and phishing like it always has. But we had to rebuild the way it does that from the ground up.
Read Full Article →
LevelBlue Security Colony: A Practical Cybersecurity Resource Hub for CISOs
▼
Empower CISOs with actionable cybersecurity resources including maturity assessments, incident response playbooks, and vendor risk tools. Strengthen security programs using Security Colony , a self-service cybersecurity knowledge platform built by LevelBlue and SpiderLabs experts. Improve cyber r...
Read Full Article →
The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit
▼
Rapid7 Labs, together with the Rapid7 MDR team, has uncovered a sophisticated campaign attributed to the Chinese APT group Lotus Blossom. Active since 2009, the group is known for its targeted espionage campaigns primarily impacting organizations across Southeast Asia and more recently Central Am...
Read Full Article →
What’s New in Tenable Cloud Security: Multi-cloud Risk Analysis, Attack Surface Assessments, Improved IAM Security and More
▼
Tenable Cloud Security continues to expand the technical depth of our Tenable One exposure management platform. Our latest enhancements include unified multi-cloud exploration, high-fidelity network validation, and expanded entitlement visibility across infrastructure and identity providers. Key ...
Read Full Article →
U.S. Secret Service Agents Recovered Nearly $1M For A 71-Year-Old Retiree
▼
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. 2, 2026 –Read the full story in Moneywise Cybercrime will cost the world more than $12 trillion annually by 2031, according to Cybersecurity Ventures, and most of that money will never The post U.S. Secret...
Read Full Article →
Scam-checking just got easier: Malwarebytes is now in ChatGPT
▼
Malwarebytes' ChatGPT integration makes it the first cybersecurity provider that can deliver its expertise without ever leaving the chat
Read Full Article →
A week in security (January 26 – February 1)
▼
A list of topics we covered in the week of January 26 to February 1 of 2026
Read Full Article →
[webapps] RPi-Jukebox-RFID 2.8.0 - Stored Cross-Site Scripting (XSS)
▼
RPi-Jukebox-RFID 2.8.0 - Stored Cross-Site Scripting (XSS)
Read Full Article → *(Covered by: CXSecurity Exploit Database, ExploitDB)*
[hardware] D-Link DIR-825 Rev.B 2.10 - Stack Buffer Overflow (DoS)
▼
D-Link DIR-825 Rev.B 2.10 - Stack Buffer Overflow (DoS)
Read Full Article → *(Covered by: CXSecurity Exploit Database, ExploitDB)*
Autonomous Threat Operations in action: Real results from Recorded Future’s own SOC team | Recorded Future
▼
This article explores how Recorded Future served as Customer Zero for Autonomous Threat Operations, testing the new solution within our own SOC to validate its real-world impact before releasing it to the public. The article reveals how the technology transformed inconsistent, analyst-dependent t...
Read Full Article →
FBI takes notorious RAMP ransomware forum offline
▼
The FBI has seized control of RAMP, a notorious cybercrime online forum that bragged to be the only place that allowed ransomware, and boasted over 14,000 active users. Now some of those users' details are likely to be in the hands of the police... Read more in my article on the Bitdefender blog.
Read Full Article →
Panera Bread - 5,112,502 breached accounts
▼
In January 2026, Panera Bread suffered a data breach that exposed 14M records . After an attempted extortion failed, the attackers published the data publicly, which included 5.1M unique email addresses along with associated account information such as names, phone numbers and physical addresses....
Read Full Article →
CVE-2026-1281, CVE-2026-1340: Ivanti Endpoint Manager Mobile (EPMM) Zero-Day Vulnerabilities Exploited
▼
Two Critical vulnerabilities in Ivanti’s popular mobile device management solution have been exploited in the wild in limited attacks Key takeaways: Patch Ivanti EPMM immediately. Both CVE-2026-1281 and CVE-2026-1340 have been exploited in the wild, though impact has been limited so far. Apply th...
Read Full Article →
Google Presentations Abused for Phishing, (Fri, Jan 30th)
▼
Charlie, one of our readers, has forwarded an interesting phishing email. The email was sent to users of the Vivladi Webmail service. While not overly convincing, the email is likely sufficient to trick a non-empty group of users:
Read Full Article →
ROC vs. CTEM: How a Risk Operations Center Evolves Beyond Continuous Threat Exposure Management in 2026
▼
Key Takeaways: The Essentials of ROC vs. CTEM Modern enterprises face a constant flood of data from dozens of siloed security tools, creating a fragmented view of risk. Continuous threat exposure management (CTEM) offers a framework to bring exposures together from these tools, and a risk operati...
Read Full Article →
Cybersecurity Predictions for 2026
▼
Six Predictions for the AI-Driven SOC – Subo Guha, Senior Vice President, Product Management, Stellar Cyber San Jose, Calif. – Jan. 30, 2026 Agentic AI as applied to the cybersecurity market is expected to grow from $738.2 million in 2024 to an estimated $1.73 billion The post Cybersecurity Predi...
Read Full Article →
Match, Hinge, OkCupid, and Panera Bread breached by ransomware group
▼
ShinyHunters claims to have stolen millions of records from Match Group dating apps and Panera Bread, with very different consequences for users.
Read Full Article →
Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft
▼
Introduction Mandiant has identified an expansion in threat activity that uses tactics, techniques, and procedures (TTPs) consistent with prior ShinyHunters-branded extortion operations. These operations primarily leverage sophisticated voice phishing (vishing) and victim-branded credential harve...
Read Full Article →
Guidance from the Frontlines: Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS
▼
Introduction Mandiant is tracking a significant expansion and escalation in the operations of threat clusters associated with ShinyHunters-branded extortion. As detailed in our companion report, 'Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft' , these campaigns...
Read Full Article →
Orca Security Co-Founder & CEO Gil Geron: Cloud Security Pioneer
▼
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 30, 2026 –Watch the YouTube video 2026 is here, and the cloud security landscape is shifting rapidly. AI is reshaping how attackers operate, supply chains remain under siege, and the definition of The post...
Read Full Article →
Breaking the Sound Barrier, Part II: Exploiting CVE-2024-54529
▼
In the first part of this series, I detailed my journey into macOS security research, which led to the discovery of a type confusion vulnerability (CVE-2024-54529) and a double-free vulnerability (CVE-2025-31235) in the coreaudiod system daemon through a process I call knowledge-driven fuzzing. W...
Read Full Article →
Meta confirms it’s working on premium subscription for its apps
▼
Details are currently thin, but one thing is clear: paying more is unlikely to buy users meaningful privacy or less tracking.
Read Full Article →
I'm locked in!
▼
Hazel reflects on how to find balance while staying informed, then delivers practical updates and insights on the latest cybersecurity threats.
Read Full Article →
Top 10 Cloud Compliance Tools for Enterprise Security and Audit Readiness in 2026
▼
Key Takeaways Compliance Breaks When Proof Lags Infrastructure Cloud compliance has changed. It is no longer an audit milestone. It is a continuous expectation. Boards demand visibility into regulatory exposure. Regulators expect evidence, not intent. Enterprise customers want assurance in real t...
Read Full Article →
Microsoft Office zero-day lets malicious documents slip past security checks
▼
Microsoft issued an emergency patch for a flaw attackers are using to slip malicious code past Office’s document security checks.
Read Full Article →
Microsoft releases update to address zero-day vulnerability in Microsoft Office
▼
Microsoft has published three out-of-band (OOB) updates so far in January 2026. One of these updates was released to address a vulnerability, CVE-2026-21509, affecting Microsoft Office that has been reportedly exploited in the wild.
Read Full Article →
Clawdbot’s rename to Moltbot sparks impersonation campaign
▼
This Moltbot impersonation campaign is a case study in supply-chain risk, brand hijacking, and what happens when open source goes viral.
Read Full Article →
The Mob Museum, Las Vegas: Explore the Past, Present and Future of Cybercrime
▼
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 29, 2026 –Watch the YouTube video The Mob Museum’s timely new exhibit “Digital Underworld” explores the rise of cybercrime as the newest frontier of organized crime, and it’s captured in a new The post The...
Read Full Article →
Dissecting UAT-8099: New persistence mechanisms and regional focus
▼
Cisco Talos has identified a new, regionally targeted campaign by UAT-8099 that leverages advanced persistence techniques and custom BadIIS malware variants to compromise IIS servers, particularly in Thailand and Vietnam.
Read Full Article →
IR Trends Q4 2025: Exploitation remains dominant, phishing campaign targets Native American tribal organizations
▼
A drop in exploitation and ransomware, but a spike in phishing and credential abuse, show why timely patching and robust MFA matter more than ever.
Read Full Article →- SOC & Business Success with ANY.RUN: Real-World Results & Cases — Running a SOC today means constant trade-offs: too many alerts, not enough people, strict SLAs, and attacks that keep getting smarter. Most leaders aren’t asking for “the next cool product” but a proof that something actually cuts time, risk, and workload in real environments like theirs. Thousan…
Smashing Security podcast #452: The dark web’s worst assassins, and Pegasus in the dock
▼
In episode 452, a London-based YouTuber wins a landmark court case against Saudi Arabia after his phone was hacked with Pegasus spyware — exposing how a single, seemingly harmless text message can turn a smartphone into a round-the-clock surveillance device. Plus, we go looking for professional h...
Read Full Article →
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network
▼
Introduction This week Google and partners took action to disrupt what we believe is one of the largest residential proxy networks in the world, the IPIDEA proxy network. IPIDEA’s proxy infrastructure is a little-known component of the digital ecosystem leveraged by a wide array of bad actors. Th...
Read Full Article →- Attackers Are Taking Over Real Email Threads to Deliver Phishing: New Enterprise Risk — Think you can trust every email that comes from a business partner? Unfortunately, that’s no longer guaranteed; attackers now slip into legitimate threads and send messages that look fully authentic. That’s exactly what happened in a new case uncovered by ANY.RUN researchers; a trust takeover ins…
RSAC 2026—Where The World Talks Security
▼
What founders and CEOs are saying about this year’s conference Register – Steve Morgan, Editor-in-Chief Sausalito, Calif. – Jan. 27, 2026 For 35 years, RSAC has been a driving force behind the world’s cybersecurity community. The power of community is a key focus for the The post RSAC 2026—Where ...
Read Full Article →
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088
▼
Introduction The Google Threat Intelligence Group (GTIG) has identified widespread, active exploitation of the critical vulnerability CVE-2025-8088 in WinRAR, a popular file archiver tool for Windows, to establish initial access and deliver diverse payloads. Discovered and patched in July 2025, g...
Read Full Article →
Introducing Tenable One AI Exposure: A New Standard for Securing AI Usage at Scale
▼
Continuously discover and monitor all AI usage across your organization, including shadow AI, agents, browser plug-ins, and more, with Tenable One AI Exposure. Map complex AI workflows to reveal high-impact exposures and monitor compliance with security and AI acceptable use policies. Key takeawa...
Read Full Article →
Talking Points for Government CISOs and Cybersecurity Leaders in 2026
▼
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Jan. 27, 2026 –Read the full story in Government Technology Dan Lohrmann is calling all government CISOs (and yes, CTOs, CIOs, CFOs, COOs, and even a few corporate CEOs can listen in): In The post Talking Point...
Read Full Article →- Fix Staff Shortage & Burnout in Your SOC with Better Threat Intelligence — In cybersecurity, humans occupy both ends of the vulnerability spectrum. They click what should never be clicked, reuse passwords like heirlooms, and generously donate credentials to phishing pages that look “kind of legit.” Yet the same species becomes the strongest link once you step inside a S…
Bypassing Windows Administrator Protection
▼
A headline feature introduced in the latest release of Windows 11, 25H2 is Administrator Protection. The goal of this feature is to replace User Account Control (UAC) with a more robust and importantly, securable system to allow a local user to access administrator privileges only when necessary....
Read Full Article →
I scan, you scan, we all scan for... knowledge?
▼
In this week's newsletter, Bill hammers home the old adage, "Know your environment" — even throughout alert fatigue.
Read Full Article →
How Public Container Registries Have Become a Silent Risk Multiplier in a Modern Supply Chain
▼
Key Takeaways The Risk Introduced by Implicit Trust in Public Container Images Public container registries have become foundational to modern software development. A single docker pull can accelerate application delivery, standardize environments, and reduce operational friction across teams. How...
Read Full Article →
Foxit, Epic Games Store, MedDreams vulnerabilities
▼
Cisco Talos’ Vulnerability Discovery & Research team recently disclosed three vulnerabilities in Foxit PDF Editor, one in the Epic Games Store, and twenty-one in MedDream PACS.
Read Full Article →- ANY.RUN Sandbox & MISP Integration: Confirm Alerts Faster, Stop Incidents Early — Most SOC teams are overloaded with routine work. Tier 1 & 2 analysts spend too much time validating alerts, moving samples between tools, and chasing missing context. When integrations are weak, investigations slow down, MTTR grows, and SLAs suffer delays. That directly increases operational risk…
Qualys Named a Leader and Outperformer in the 2025 GigaOm Radar for CNAPP
▼
We’re proud to share that Qualys has been recognized as a Leader and Outperformer in the 2025 GigaOm Radar Report for Cloud-Native Application Protection Platforms (CNAPP). This year’s evaluation underscores an important reality of the CNAPP market: while 18 vendors were evaluated, only a small s...
Read Full Article →
Under Armour - 72,742,892 breached accounts
▼
In November 2025, the Everest ransomware group claimed Under Armour as a victim and attempted to extort a ransom , alleging they had obtained access to 343GB of data. In January 2026, customer data from the incident was published publicly on a popular hacking forum , including 72M email addresses...
Read Full Article →
Oracle January 2026 Critical Patch Update Addresses 158 CVEs
▼
Oracle addresses 158 CVEs in its first quarterly update of 2026 with 337 patches, including 27 critical updates. Key takeaways: The first Critical Patch Update (CPU) for 2026, contains fixes for 158 unique CVEs in 337 security updates. 27 issues (8% of all patches) were assigned a critical severi...
Read Full Article →
Tenable Discovers SSRF Vulnerability in Java TLS Handshakes That Creates DoS Risk
▼
Tenable Research has discovered a server-side request forgery (SSRF) vulnerability in Java’s handling of client certificates during a TLS handshake. In certain configurations, this can be abused to cause a denial-of-service (DoS) condition. Key takeaways Tenable Research identified a vulnerabilit...
Read Full Article →
VU#481830: Libheif uncompressed codec lacks bounds check leading to application crash
▼
Overview An out-of-bounds memory access vulnerability exists in the uncompressed decoder component of libheif . A maliciously crafted HEIF image can trigger a denial-of-service condition by causing the libheif library to crash or exhibit other unexpected behavior due to an out-of-bounds memory ac...
Read Full Article →
VU#102648: Code injection vulnerability in binary-parser library
▼
Overview The binary-parser library for Node.js contains a code injection vulnerability that may allow arbitrary JavaScript code execution if untrusted input is used to construct parser definitions. Versions prior to 2.3.0 are affected. The issue has been resolved by the developer in a public upda...
Read Full Article →
VU#458022: Open5GS WebUI uses a hard-coded secrets including JSON Web Token signing key
▼
Overview The Open5GS WebUI component contains default hardcoded secrets used for security-sensitive operations, including JSON Web Token (JWT) signing. If these defaults are not changed, an attacker can forge valid authentication tokens and gain administrative access to the WebUI. This can result...
Read Full Article →
VU#271649: Stack-based buffer overflow in libtasn1 versions v4.20.0 and earlier
▼
Overview A stack-based buffer overflow vulnerability exists in GNU libtasn1, a low-level ASN.1 parsing library. The issue is caused by unsafe string concatenation in the asn1_expand_octet_string function located in decoding.c . Under worst-case conditions, this results in a one-byte stack overflo...
Read Full Article →
Cybersecurity Predictions for 2026 Signal the Maturation of Risk-First Security Models
▼
Key Takeaways The Signals Are Loud, the Dashboards Are Full, Yet Decisive Action Remains Elusive By the end of 2025, many security leaders reached a quiet conclusion. The challenge was no longer a lack of tools, telemetry, or frameworks. Most enterprises already had all three. What remained unres...
Read Full Article →
VU#818729: Safetica contains a kernel driver vulnerability
▼
Overview Kernel driver ProcessMonitorDriver.sys in Safetica's endpoint client x64, versions 10.5.75.0 and 11.11.4.0, allows for an unprivileged user to abuse an IOCTL path and terminate protected system processes. Description Safetica is a Data Loss Prevention (DLP) and Insider Risk Management (I...
Read Full Article →
VU#244846: Server-Side Template Injection (SSTI) vulnerability exist in Genshi
▼
Overview A Server-Side Template Injection (SSTI) vulnerability exists in the Genshi template engine due to unsafe evaluation of template expressions. Genshi processes template expressions using Python’s 'eval()’ and ‘exec()’ functions while allowing fallback access to Python built-in objects. If ...
Read Full Article →
VU#924114: dr_flac contains an integer overflow vulnerability that allows for DoS when provided a crafted file
▼
Overview dr_flac , an open-source FLAC audio decoder, part of the dr_libs audio decoder toolset, contains an integer overflow vulnerability allowing for denial of service (DoS) when provided a specific crafted file. An attacker can exploit this vulnerability through providing a tool that uses dr_...
Read Full Article →- Malware Trends Report 2025: New Security Risks for Businesses in 2026 — Summarizing the past year’s threat landscape based on activity observed in ANY.RUN’s Interactive Sandbox, this annual report provides insights into the most detected malware types, families, TTPs, and phishing threats of 2025. For additional insights, view ANY.RUN’s quarterly malware trends repor…
VU#383552: thelibrarian does not secure its interface, allowing for access to internal system data
▼
Overview Multiple vulnerabilities were discovered in The Librarian, an AI-powered personal assistant tool provided by the company TheLibrarian.io . The Librarian can be used to manage personal email, calendar, documents, and other information through external services, such as Gmail and Google Dr...
Read Full Article →
VU#650657: Livewire Filemanager contains an insecure .php component that allows for unauthenticated RCE in Laravel Products
▼
Overview A vulnerability, tracked as CVE-2025-14894, has been discovered within Livewire Filemanager, a tool designed for usage within Laravel applications. The Livewire Filemanager tool allows for users to upload various files, including PHP files, and host them within the Laravel application. W...
Read Full Article →
Threat and Vulnerability Management in 2026
▼
Understand the future of threat and vulnerability management (TVM). Learn what TVM is, why traditional tools fail, and how intelligence is essential in today’s landscape.
Read Full Article →
Predicting 2026
▼
In this week’s newsletter, Martin examines the evolving landscape for 2026, highlighting key threats, emerging trends like AI-driven risks, and the continued importance of addressing familiar vulnerabilities.
Read Full Article →
Your VMDR Year in Review: Making Security Progress Visible and Actionable
▼
Security Teams Rarely Stop to Reflect When a security program is working well, very little seems to happen. That is by design. There is no alert for the incident that was prevented. No visibility into the attack path that was quietly closed. No recognition for the vulnerability that was fixed bef...
Read Full Article →
WEF: AI overtakes ransomware as fastest-growing cyber risk
▼
We can no longer say that artificial intelligence is a "future risk", lurking somewhere on a speculative threat horizon. The truth is that it is a fast-growing cybersecurity risk that organizations are facing today. That's not just my opinion, that's also the message that comes loud and clear fro...
Read Full Article →
Why Serverless Risk Demands Identity-Aware Security at Cloud Scale
▼
Key Takeaways The Current Picture Serverless adoption is accelerating as organizations prioritize speed, scalability, and operational efficiency. According to the Data Bridge Market Research’s Global Serverless Security Market Report, the serverless security market reached USD 12.08 billion in 20...
Read Full Article →
VU#472136: Information Leak and DoS Vulnerabilities in Redmi Buds 3 Pro through 6 Pro
▼
Overview Redmi Buds , a series of Bluetooth earbuds produced and sold by Xiaomi , contain an Information Leak vulnerability and a Denial of Service (DoS) vulnerability in versions 3 Pro through 6 Pro. An attacker within Bluetooth radio range can send specially crafted RFCOMM protocol interactions...
Read Full Article →
Closing the Door on Net-NTLMv1: Releasing Rainbow Tables to Accelerate Protocol Deprecation
▼
Written by: Nic Losby Introduction Mandiant is publicly releasing a comprehensive dataset of Net-NTLMv1 rainbow tables to underscore the urgency of migrating away from this outdated protocol. Despite Net-NTLMv1 being deprecated and known to be insecure for over two decades—with cryptanalysis dati...
Read Full Article →
UAT-8837 targets critical infrastructure sectors in North America
▼
Cisco Talos is closely tracking UAT-8837, a threat actor we assess with medium confidence is a China-nexus advanced persistent threat (APT) actor.
Read Full Article →
CVE-2025-64155: Exploit Code Released for Critical Fortinet FortiSIEM Command Injection Vulnerability
▼
Exploit code has been published for CVE-2025-64155, a critical command injection vulnerability affecting Fortinet FortiSIEM devices. Key takeaways: CVE-2025-64155 is a critical operating system (OS) command injection vulnerability affecting Fortinet FortiSIEM. Fortinet vulnerabilities have histor...
Read Full Article →
Brushstrokes and breaches with Terryn Valikodath
▼
Terryn’s path to cybersecurity started with a fascination for criminal forensics and a knack for jailbreaking his family's tech — interests that eventually steered him toward the fast-paced world of digital investigations.
Read Full Article →- German Manufacturing Under Phishing Attacks: Tracking a Stealthy AsyncRAT Campaign — Manufacturing companies have quietly become one of the most hunted species in the modern threat landscape. Not because they are careless, but because they are operationally critical, geographically distributed, and often rely on complex IT and OT environments that attackers love to probe. Key Tak…
A 0-click exploit chain for the Pixel 9 Part 3: Where do we go from here?
▼
While our previous two blog posts provided technical recommendations for increasing the effort required by attackers to develop 0-click exploit chains, our experience finding, reporting and exploiting these vulnerabilities highlighted some broader issues in the Android ecosystem. This post descri...
Read Full Article →
A 0-click exploit chain for the Pixel 9 Part 2: Cracking the Sandbox with a Big Wave
▼
With the advent of a potential Dolby Unified Decoder RCE exploit, it seemed prudent to see what kind of Linux kernel drivers might be accessible from the resulting userland context, the mediacodec context. As per the AOSP documentation, the mediacodec SELinux context is intended to be a constrain...
Read Full Article →
A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby
▼
Over the past few years, several AI-powered features have been added to mobile phones that allow users to better search and understand their messages. One effect of this change is increased 0-click attack surface, as efficient analysis often requires message media to be decoded before the message...
Read Full Article →
Microsoft and Adobe Patch Tuesday, January 2026 Security Update Review
▼
Starting the year on a security-first note, Microsoft’s January 2026 Patch Tuesday resolves several vulnerabilities that could impact enterprise environments. Here’s a quick breakdown of what you need to know. Microsoft Patch Tuesday for January 2026 This month’s release addresses 115 vulnerabili...
Read Full Article →
Microsoft Patch Tuesday for January 2026 — Snort rules and prominent vulnerabilities
▼
Microsoft has released its monthly security update for January 2026, which includes 112 vulnerabilities affecting a range of products, including 8 that Microsoft marked as “critical”.
Read Full Article →
The AI Fix #83: ChatGPT Health, Victorian LLMs, and the biggest AI bluffers
▼
In episode 83 of The AI Fix, Graham reveals he's taken up lying to LLMs, and shows how a journalist exposed AI bluffers with a made-up idiom. Meanwhile Mark invents a "Godwin's Law" for AI, and explains how to ruin any LLM with humus. Also in this episode, a marriage is declared invalid thanks to...
Read Full Article →
Hackers get hacked, as BreachForums database is leaked
▼
Have you ever stolen data, traded a hacking tool, or just lurked on a dark web forum believing that you are anonymous? If so, I might have some unsettling news for you. Read more in my article on the Hot for Security blog.
Read Full Article →
Best Ransomware Detection Tools
▼
Stop ransomware before encryption begins. Learn how intelligence-driven detection tools can help identify precursor behaviors and reduce false positives for faster response.
Read Full Article →
December 2025 CVE Landscape: 22 Critical Vulnerabilities Mark 120% Surge, React2Shell Dominates Threat Activity
▼
December 2025 saw a 120% surge in critical CVEs, with 22 exploited flaws and React2Shell (CVE-2025-55182) dominating threat activity across Meta’s React framework.
Read Full Article →
BreachForums (2025) - 672,247 breached accounts
▼
In October 2025, a reincarnation of the hacking forum BreachForums, which had previously been shut down multiple times, was taken offline by a coalition of law enforcement agencies . In the months leading up to the takedown, the site itself suffered a data breach that exposed a total of 672k uniq...
Read Full Article →