Cyber Feed
- Your Digital Footprint Can Lead Right to Your Front Doorby info@thehackernews.com (The Hacker News) on January 16, 2026 at 10:42 am
You lock your doors at night. You avoid sketchy phone calls. You’re careful about what you post on social media. But what about the information about you that’s already out there—without your permission? Your name. Home address. Phone number. Past jobs. Family members. Old usernames. It’s all still online, and it’s a lot easier to find than you think. The hidden safety threat lurking […]
- LOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishingby info@thehackernews.com (The Hacker News) on January 16, 2026 at 10:27 am
Security experts have disclosed details of a new campaign that has targeted U.S. government and policy entities using politically themed lures to deliver a backdoor known as LOTUSLITE. The targeted malware campaign leverages decoys related to the recent geopolitical developments between the U.S. and Venezuela to distribute a ZIP archive (“US now deciding what’s next for Venezuela.zip”)
- Cisco Patches Vulnerability Exploited by Chinese Hackersby Ionut Arghire on January 16, 2026 at 9:43 am
UAT-9686 exploited the bug to deploy the AquaShell backdoor on Cisco appliances with certain ports open to the internet. The post Cisco Patches Vulnerability Exploited by Chinese Hackers appeared first on SecurityWeek.
- Cisco finally fixes AsyncOS zero-day exploited since Novemberby Sergiu Gatlan on January 16, 2026 at 9:20 am
Cisco finally patched a maximum-severity AsyncOS zero-day exploited in attacks targeting Secure Email Gateway (SEG) appliances since November 2025. […]
- Microsoft: Some Windows PCs fail to shut down after January updateby Sergiu Gatlan on January 16, 2026 at 8:35 am
Microsoft has confirmed a new issue that prevents Windows 11 23H2 devices with System Guard Secure Launch enabled from shutting down. […]
- Former CISA Director Jen Easterly Appointed CEO of RSACby Eduard Kovacs on January 16, 2026 at 7:54 am
Easterly will be leading the world-renowned cybersecurity conference and other RSAC programs. The post Former CISA Director Jen Easterly Appointed CEO of RSAC appeared first on SecurityWeek.
- China-Linked APT Exploits Sitecore Zero-Day in Attacks on American Critical Infrastructureby info@thehackernews.com (The Hacker News) on January 16, 2026 at 7:18 am
A threat actor likely aligned with China has been observed targeting critical infrastructure sectors in North America since at least last year. Cisco Talos, which is tracking the activity under the name UAT-8837, assessed it to be a China-nexus advanced persistent threat (APT) actor with medium confidence based on tactical overlaps with other campaigns mounted by threat actors from the region.
- Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gatewaysby info@thehackernews.com (The Hacker News) on January 16, 2026 at 5:38 am
Cisco on Thursday released security updates for a maximum-severity security flaw impacting Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager, nearly a month after the company disclosed that it had been exploited as a zero-day by a China-nexus advanced persistent threat (APT) actor codenamed UAT-9686. The vulnerability, tracked as CVE-2025-20393 (CVSS
- Google now lets you change your @gmail.com address, rolling outby Mayank Parmar on January 16, 2026 at 12:36 am
Google has confirmed that it’s now possible to change your @gmail.com address. This means that if your current email is xyz@gmail.com, you can now change it to abc@gmail.com. […]
- ChatGPT is now more reliable at finding and remembering your past chatby Mayank Parmar on January 16, 2026 at 12:14 am
OpenAI is rolling out a big upgrade for ChatGPT with support for advanced chat history search, but the feature is rolling out to Plus and Pro subscribers only. […]
- Gootloader now uses 1,000-part ZIP archives for stealthy deliveryby Bill Toulas on January 15, 2026 at 10:54 pm
The Gootloader malware, typically used for initial access, is now using a malformed ZIP archive designed to evade detection by concatenating up to 1,000 archives. […]
- Grubhub confirms hackers stole data in recent security breachby Lawrence Abrams on January 15, 2026 at 9:38 pm
Food delivery platform Grubhub has confirmed a recent data breach after hackers accessed its systems, with sources telling BleepingComputer the company is now facing extortion demands. […]
- Hackers exploit Modular DS WordPress plugin flaw for admin accessby Bill Toulas on January 15, 2026 at 8:49 pm
Hackers are actively exploiting a maximum severity flaw in the Modular DS WordPress plugin that allows them to bypass authentication remotely and access the vulnerable sites with admin-level privileges. […]
- Verizon blames nationwide outage on a “software issue”by Lawrence Abrams on January 15, 2026 at 8:13 pm
Verizon has confirmed that yesterday’s nationwide wireless outage was caused by a software issue, though the company has not shared additional details about what went wrong. […]
- AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacksby info@thehackernews.com (The Hacker News) on January 15, 2026 at 7:31 pm
A critical misconfiguration in Amazon Web Services (AWS) CodeBuild could have allowed complete takeover of the cloud service provider’s own GitHub repositories, including its AWS JavaScript SDK, putting every AWS environment at risk. The vulnerability has been codenamed CodeBreach by cloud security company Wiz. The issue was fixed by AWS in September 2025 following responsible disclosure on
- Microsoft Copilot Studio extension for VS Code now publicly availableby Bill Toulas on January 15, 2026 at 7:08 pm
Microsoft announced that the Copilot Studio extension for the Visual Studio Code (VS Code) integrated development environment is now available to all users. […]
- Forget Predictions: True 2026 Cybersecurity Priorities From Leadersby Jennifer Leggio on January 15, 2026 at 6:15 pm
Security leaders chart course beyond predictions with focus on supply chain, governance, and team efficiency. The post Forget Predictions: True 2026 Cybersecurity Priorities From Leaders appeared first on SecurityWeek.
- New ‘StackWarp’ Attack Threatens Confidential VMs on AMD Processorsby Eduard Kovacs on January 15, 2026 at 6:00 pm
Researchers have disclosed technical details on a new AMD processor attack that allows remote code execution inside confidential VMs. The post New ‘StackWarp’ Attack Threatens Confidential VMs on AMD Processors appeared first on SecurityWeek.
- Vibe Coding Tested: AI Agents Nail SQLi but Fail Miserably on Security Controlsby Kevin Townsend on January 15, 2026 at 5:19 pm
Vibe coding generates a curate’s egg program: good in parts, but the bad parts affect the whole program. The post Vibe Coding Tested: AI Agents Nail SQLi but Fail Miserably on Security Controls appeared first on SecurityWeek.
- Critical WhisperPair flaw lets hackers track, eavesdrop via Bluetooth audio devicesby Sergiu Gatlan on January 15, 2026 at 4:13 pm
A critical vulnerability in Google’s Fast Pair protocol can allow attackers to hijack Bluetooth audio accessories like wireless headphones and earbuds, track users, and eavesdrop on their conversations. […]
- DHS prepares replacement for critical infrastructure collaboration frameworkby Eric Geller on January 15, 2026 at 4:04 pm
It remains unclear if the new system will include liability protections that companies say are necessary.
- Critical flaw in AWS Console risked compromise of build environmentby David Jones on January 15, 2026 at 3:54 pm
The CodeBreach vulnerability could have enabled a massive supply chain attack, researchers warn.
- Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Accessby info@thehackernews.com (The Hacker News) on January 15, 2026 at 3:31 pm
A maximum-severity security flaw in a WordPress plugin called Modular DS has come under active exploitation in the wild, according to Patchstack. The vulnerability, tracked as CVE-2026-23550 (CVSS score: 10.0), has been described as a case of unauthenticated privilege escalation impacting all versions of the plugin prior to and including 2.5.1. It has been patched in version 2.5.2. The plugin
- Researchers Reveal Reprompt Attack Allowing Single-Click Data Exfiltration From Microsoft Copilotby info@thehackernews.com (The Hacker News) on January 15, 2026 at 3:09 pm
Cybersecurity researchers have disclosed details of a new attack method dubbed Reprompt that could allow bad actors to exfiltrate sensitive data from artificial intelligence (AI) chatbots like Microsoft Copilot in a single click, while bypassing enterprise security controls entirely. “Only a single click on a legitimate Microsoft link is required to compromise victims,” Varonis security
- How to automate just-in-time access to applications with Tinesby Sponsored by Tines on January 15, 2026 at 3:01 pm
Managing just-in-time access at scale is a growing IAM challenge as speed and auditability collide daily. Tines shows how automated workflows can grant, track, and revoke temporary app access without manual effort. […]
- ThreatsDay Bulletin: AI Voice Cloning Exploit, Wi-Fi Kill Switch, PLC Vulns, and 14 More Storiesby info@thehackernews.com (The Hacker News) on January 15, 2026 at 1:56 pm
The internet never stays quiet. Every week, new hacks, scams, and security problems show up somewhere. This week’s stories show how fast attackers change their tricks, how small mistakes turn into big risks, and how the same old tools keep finding new ways to break in. Read on to catch up before the next wave hits. Unauthenticated RCE risk Security Flaw in Redis
- Depthfirst Raises $40 Million for Vulnerability Managementby Ionut Arghire on January 15, 2026 at 1:42 pm
The startup will use the investment to accelerate R&D, expand go-to-market efforts, and hire new talent. The post Depthfirst Raises $40 Million for Vulnerability Management appeared first on SecurityWeek.
- isVerified Emerges From Stealth With Voice Deepfake Detection Appsby Eduard Kovacs on January 15, 2026 at 1:05 pm
isVerified provides Android and iOS mobile applications designed to protect enterprise communications. The post isVerified Emerges From Stealth With Voice Deepfake Detection Apps appeared first on SecurityWeek.
- New ‘Reprompt’ Attack Silently Siphons Microsoft Copilot Databy Ionut Arghire on January 15, 2026 at 12:09 pm
The attack bypassed Copilot’s data leak protections and allowed for session exfiltration even after the Copilot chat was closed. The post New ‘Reprompt’ Attack Silently Siphons Microsoft Copilot Data appeared first on SecurityWeek.
- Model Security Is the Wrong Frame – The Real Risk Is Workflow Securityby info@thehackernews.com (The Hacker News) on January 15, 2026 at 11:55 am
As AI copilots and assistants become embedded in daily work, security teams are still focused on protecting the models themselves. But recent incidents suggest the bigger risk lies elsewhere: in the workflows that surround those models. Two Chrome extensions posing as AI helpers were recently caught stealing ChatGPT and DeepSeek chat data from over 900,000 users. Separately, researchers
- 4 Outdated Habits Destroying Your SOC’s MTTR in 2026by info@thehackernews.com (The Hacker News) on January 15, 2026 at 11:00 am
It’s 2026, yet many SOCs are still operating the way they did years ago, using tools and processes designed for a very different threat landscape. Given the growth in volumes and complexity of cyber threats, outdated practices no longer fully support analysts’ needs, staggering investigations and incident response. Below are four limiting habits that may be preventing your SOC from evolving at
- Central Maine Healthcare Data Breach Impacts 145,000 Individualsby Ionut Arghire on January 15, 2026 at 10:36 am
Hackers stole patients’ personal, treatment, and health insurance information from the organization’s IT systems. The post Central Maine Healthcare Data Breach Impacts 145,000 Individuals appeared first on SecurityWeek.
- FTC bans GM from selling drivers’ location data for five yearsby Sergiu Gatlan on January 15, 2026 at 9:59 am
The FTC has finalized an order with General Motors, settling charges that it collected and sold the location and driving data of millions of drivers without consent. […]
- Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraudby info@thehackernews.com (The Hacker News) on January 15, 2026 at 9:37 am
Microsoft on Wednesday announced that it has taken a “coordinated legal action” in the U.S. and the U.K. to disrupt a cybercrime subscription service called RedVDS that has allegedly fueled millions in fraud losses. The effort, per the tech giant, is part of a broader law enforcement effort in collaboration with law enforcement authorities that has allowed it to confiscate the malicious
- VoidLink Linux Malware Framework Targets Cloud Environmentsby Ionut Arghire on January 15, 2026 at 9:35 am
Designed for long-term access, the framework targets cloud and container environments with loaders, implants, and rootkits. The post VoidLink Linux Malware Framework Targets Cloud Environments appeared first on SecurityWeek.
- Palo Alto Networks warns of DoS bug letting hackers disable firewallsby Sergiu Gatlan on January 15, 2026 at 9:02 am
Palo Alto Networks patched a high-severity vulnerability that could allow unauthenticated attackers to disable firewall protections in denial-of-service (DoS) attacks. […]
- Palo Alto Fixes GlobalProtect DoS Flaw That Can Crash Firewalls Without Loginby info@thehackernews.com (The Hacker News) on January 15, 2026 at 8:18 am
Palo Alto Networks has released security updates for a high-severity security flaw impacting GlobalProtect Gateway and Portal, for which it said there exists a proof-of-concept (PoC) exploit. The vulnerability, tracked as CVE-2026-0227 (CVSS score: 7.7), has been described as a denial-of-service (DoS) condition impacting GlobalProtect PAN-OS software arising as a result of an improper check for
- Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Serversby info@thehackernews.com (The Hacker News) on January 14, 2026 at 7:03 pm
The Black Lotus Labs team at Lumen Technologies said it null-routed traffic to more than 550 command-and-control (C2) nodes associated with the AISURU/Kimwolf botnet since early October 2025. AISURU and its Android counterpart, Kimwolf, have emerged as some of the biggest botnets in recent times, capable of directing enslaved devices to participate in distributed denial-of-service (DDoS)
- AI surges among top business risk concerns, while cybersecurity holds firmby David Jones on January 14, 2026 at 4:13 pm
A report from Allianz Commercial shows the rapid embrace of AI is posing new challenges for enterprise leaders.
- Trump resubmits Sean Plankey for CISA directorby Eric Geller on January 14, 2026 at 3:59 pm
It’s unclear when the Senate will act on Plankey’s nomination, which stalled last year after multiple senators blocked it.
- AI Agents Are Becoming Authorization Bypass Pathsby info@thehackernews.com (The Hacker News) on January 14, 2026 at 3:07 pm
Not long ago, AI agents were harmless. They wrote snippets of code. They answered questions. They helped individuals move a little faster. Then organizations got ambitious. Instead of personal copilots, companies started deploying shared organizational AI agents – agents embedded into HR, IT, engineering, customer support, and operations. Agents that don’t just suggest, but act. Agents
- Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malwareby info@thehackernews.com (The Hacker News) on January 14, 2026 at 2:18 pm
Security experts have disclosed details of an active malware campaign that’s exploiting a DLL side-loading vulnerability in a legitimate binary associated with the open-source c-ares library to bypass security controls and deliver a wide range of commodity trojans and stealers. “Attackers achieve evasion by pairing a malicious libcares-2.dll with any signed version of the legitimate ahost.exe (
- Fortinet Fixes Critical FortiSIEM Flaw Allowing Unauthenticated Remote Code Executionby info@thehackernews.com (The Hacker News) on January 14, 2026 at 11:53 am
Fortinet has released updates to fix a critical security flaw impacting FortiSIEM that could allow an unauthenticated attacker to achieve code execution on susceptible instances. The operating system (OS) injection vulnerability, tracked as CVE-2025-64155, is rated 9.4 out of 10.0 on the CVSS scoring system. “An improper neutralization of special elements used in an OS command (‘OS command
- New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justificationby info@thehackernews.com (The Hacker News) on January 14, 2026 at 11:00 am
Research analyzing 4,700 leading websites reveals that 64% of third-party applications now access sensitive data without business justification, up from 51% in 2024. Government sector malicious activity spiked from 2% to 12.9%, while 1 in 7 Education sites show active compromise. Specific offenders: Google Tag Manager (8% of violations), Shopify (5%), Facebook Pixel (4%). Download the
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploitedby info@thehackernews.com (The Hacker News) on January 14, 2026 at 9:38 am
Microsoft on Tuesday rolled out its first security update for 2026, addressing 114 security flaws, including one vulnerability that it said has been actively exploited in the wild. Of the 114 flaws, eight are rated Critical, and 106 are rated Important in severity. As many as 58 vulnerabilities have been classified as privilege escalation, followed by 22 information disclosure, 21 remote code
- Critical Node.js Vulnerability Can Cause Server Crashes via async_hooks Stack Overflowby info@thehackernews.com (The Hacker News) on January 14, 2026 at 7:05 am
Node.js has released updates to fix what it described as a critical security issue impacting “virtually every production Node.js app” that, if successfully exploited, could trigger a denial-of-service (DoS) condition. “Node.js/V8 makes a best-effort attempt to recover from stack space exhaustion with a catchable error, which frameworks have come to rely on for service availability,” Node.js’s
- PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forcesby info@thehackernews.com (The Hacker News) on January 14, 2026 at 5:48 am
The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of new cyber attacks targeting its defense forces with malware known as PLUGGYAPE between October and December 2025. The activity has been attributed with medium confidence to a Russian hacking group tracked as Void Blizzard (aka Laundry Bear or UAC-0190). The threat actor is believed to be active since at least
- Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pagesby info@thehackernews.com (The Hacker News) on January 13, 2026 at 5:30 pm
Cybersecurity researchers have discovered a major web skimming campaign that has been active since January 2022, targeting several major payment networks like American Express, Diners Club, Discover, JCB Co., Ltd., Mastercard, and UnionPay. “Enterprise organizations that are clients of these payment providers are the most likely to be impacted,” Silent Push said in a report published today.
- Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Toolby info@thehackernews.com (The Hacker News) on January 13, 2026 at 5:22 pm
Cybersecurity researchers have disclosed details of a malicious Google Chrome extension that’s capable of stealing API keys associated with MEXC, a centralized cryptocurrency exchange (CEX) available in over 170 countries, while masquerading as a tool to automate trading on the platform. The extension, named MEXC API Automator (ID: pppdfgkfdemgfknfnhpkibbkabhghhfh), has 29 downloads and is still
- Majority of hedge funds boosted cybersecurity spending in 2025by David Jones on January 13, 2026 at 4:01 pm
About half of firms suffered a breach, and a large percentage cited third-party risks.
- Healthcare breaches double as shadow AI, vendor risks proliferateby Eric Geller on January 13, 2026 at 4:00 pm
A new report paints a picture of a sector with limited confidence in its defensive capabilities.
- [Webinar] Securing Agentic AI: From MCPs and Tool Access to Shadow API Key Sprawlby info@thehackernews.com (The Hacker News) on January 13, 2026 at 1:44 pm
AI agents are no longer just writing code. They are executing it. Tools like Copilot, Claude Code, and Codex can now build, test, and deploy software end-to-end in minutes. That speed is reshaping engineering—but it’s also creating a security gap most teams don’t see until something breaks. Behind every agentic workflow sits a layer few organizations are actively securing: Machine Control
- New Advanced Linux VoidLink Malware Targets Cloud and container Environmentsby info@thehackernews.com (The Hacker News) on January 13, 2026 at 11:57 am
Cybersecurity researchers have disclosed details of a previously undocumented and feature-rich malware framework codenamed VoidLink that’s specifically designed for long-term, stealthy access to Linux-based cloud environments According to a new report from Check Point Research, the cloud-native Linux malware framework comprises an array of custom loaders, implants, rootkits, and modular
- What Should We Learn From How Attackers Leveraged AI in 2025?by info@thehackernews.com (The Hacker News) on January 13, 2026 at 11:55 am
Old Playbook, New Scale: While defenders are chasing trends, attackers are optimizing the basics The security industry loves talking about “new” threats. AI-powered attacks. Quantum-resistant encryption. Zero-trust architectures. But looking around, it seems like the most effective attacks in 2025 are pretty much the same as they were in 2015. Attackers are exploiting the same entry points that
- ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonationby info@thehackernews.com (The Hacker News) on January 13, 2026 at 11:47 am
ServiceNow has disclosed details of a now-patched critical security flaw impacting its ServiceNow artificial intelligence (AI) Platform that could enable an unauthenticated user to impersonate another user and perform arbitrary actions as that user. The vulnerability, tracked as CVE-2025-12420, carries a CVSS score of 9.3 out of 10.0. It has been codenamed BodySnatcher by AppOmni. “This issue [.
- New Malware Campaign Delivers Remcos RAT Through Multi-Stage Windows Attackby info@thehackernews.com (The Hacker News) on January 13, 2026 at 9:08 am
Cybersecurity researchers have disclosed details of a new campaign dubbed SHADOW#REACTOR that employs an evasive multi-stage attack chain to deliver a commercially available remote administration tool called Remcos RAT and establish persistent, covert remote access. “The infection chain follows a tightly orchestrated execution path: an obfuscated VBS launcher executed via wscript.exe invokes a
- CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Executionby info@thehackernews.com (The Hacker News) on January 13, 2026 at 7:15 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned of active exploitation of a high-severity security flaw impacting Gogs by adding it to its Known Exploited Vulnerabilities (KEV) catalog. The vulnerability, tracked as CVE-2025-8110 (CVSS score: 8.7), relates to a case of path traversal in the repository file editor that could result in code execution. “Gogs Path
- n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokensby info@thehackernews.com (The Hacker News) on January 12, 2026 at 4:39 pm
Threat actors have been observed uploading a set of eight packages on the npm registry that masqueraded as integrations targeting the n8n workflow automation platform to steal developers’ OAuth credentials. One such package, named “n8n-nodes-hfgjf-irtuinvcm-lasdqewriit,” mimics a Google Ads integration, and prompts users to link their advertising account in a seemingly legitimate form and then
- Critical vulnerability found in n8n workflow automation platformby David Jones on January 12, 2026 at 4:28 pm
The open-source platform is widely used across enterprise environments, leaving thousands of instances at risk.
- Executives worry most about cyber-enabled fraud, geopolitics and AIby Eric Geller on January 12, 2026 at 3:56 pm
The World Economic Forum’s wide-ranging new report also found strong global support for cyber regulation.
- ⚡ Weekly Recap: AI Automation Exploits, Telecom Espionage, Prompt Poaching & Moreby info@thehackernews.com (The Hacker News) on January 12, 2026 at 1:41 pm
This week made one thing clear: small oversights can spiral fast. Tools meant to save time and reduce friction turned into easy entry points once basic safeguards were ignored. Attackers didn’t need novel tricks. They used what was already exposed and moved in without resistance. Scale amplified the damage. A single weak configuration rippled out to millions. A repeatable flaw worked again and
- GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentialsby info@thehackernews.com (The Hacker News) on January 12, 2026 at 10:48 am
A new wave of GoBruteforcer attacks has targeted databases of cryptocurrency and blockchain projects to co-opt them into a botnet that’s capable of brute-forcing user passwords for services such as FTP, MySQL, PostgreSQL, and phpMyAdmin on Linux servers. “The current wave of campaigns is driven by two factors: the mass reuse of AI-generated server deployment examples that propagate common
- How to stop insider-driven data loss in browser sessionson January 12, 2026 at 10:00 am
Midmarket teams turn to secure browsers capable of providing deep visibility and enforcing granular user controls during user browsing sessions, the goal being to prevent intentional or unintentional leaks without adding friction to the user experience.
- Anthropic Launches Claude AI for Healthcare with Secure Health Record Accessby info@thehackernews.com (The Hacker News) on January 12, 2026 at 8:37 am
Anthropic has become the latest Artificial intelligence (AI) company to announce a new suite of features that allows users of its Claude platform to better understand their health information. Under an initiative called Claude for Healthcare, the company said U.S. subscribers of Claude Pro and Max plans can opt to give Claude secure access to their lab results and health records by connecting to
- Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraudby info@thehackernews.com (The Hacker News) on January 12, 2026 at 7:34 am
Cybersecurity researchers have shed light on two service providers that supply online criminal networks with the necessary tools and infrastructure to fuel the pig butchering-as-a-service (PBaaS) economy. At least since 2016, Chinese-speaking criminal groups have erected industrial-scale scam centers across Southeast Asia, creating special economic zones that are devoted to fraudulent investment
- MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectorsby info@thehackernews.com (The Hacker News) on January 10, 2026 at 10:35 am
The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting diplomatic, maritime, financial, and telecom entities in the Middle East with a Rust-based implant codenamed RustyWater. “The campaign uses icon spoofing and malicious Word documents to deliver Rust based implants capable of asynchronous C2, anti-analysis, registry persistence, and modular
- Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crimeby info@thehackernews.com (The Hacker News) on January 10, 2026 at 8:59 am
Europol on Friday announced the arrest of 34 individuals in Spain who are alleged to be part of an international criminal organization called Black Axe. As part of an operation conducted by the Spanish National Police, in coordination with the Bavarian State Criminal Police Office and Europol, 28 arrests were made in Seville, along with three others in Madrid, two in Málaga, and one in Barcelona
- China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machinesby info@thehackernews.com (The Hacker News) on January 9, 2026 at 5:43 pm
Chinese-speaking threat actors are suspected to have leveraged a compromised SonicWall VPN appliance as an initial access vector to deploy a VMware ESXi exploit that may have been developed as far back as February 2024. Cybersecurity firm Huntress, which observed the activity in December 2025 and stopped it before it could progress to the final stage, said it may have resulted in a ransomware
- Telecom sector sees steady rise in ransomware attacksby Eric Geller on January 9, 2026 at 3:59 pm
A new threat intelligence report described a potent mix of unpatched flaws and lax perimeter controls.
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizationsby info@thehackernews.com (The Hacker News) on January 9, 2026 at 3:28 pm
Russian state-sponsored threat actors have been linked to a fresh set of credential harvesting attacks targeting individuals associated with a Turkish energy and nuclear research agency, as well as staff affiliated with a European think tank and organizations in North Macedonia and Uzbekistan. The activity has been attributed to APT28 (aka BlueDelta), which was tied to a “sustained”
- Cybersecurity Predictions 2026: The Hype We Can Ignore (And the Risks We Can’t)by info@thehackernews.com (The Hacker News) on January 9, 2026 at 11:09 am
As organizations plan for 2026, cybersecurity predictions are everywhere. Yet many strategies are still shaped by headlines and speculation rather than evidence. The real challenge isn’t a lack of forecasts—it’s identifying which predictions reflect real, emerging risks and which can safely be ignored. An upcoming webinar hosted by Bitdefender aims to cut through the noise with a data-driven
- Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versionsby info@thehackernews.com (The Hacker News) on January 9, 2026 at 10:01 am
Trend Micro has released security updates to address multiple security vulnerabilities impacting on-premise versions of Apex Central for Windows, including a critical bug that could result in arbitrary code execution. The vulnerability, tracked as CVE-2025-69258, carries a CVSS score of 9.8 out of a maximum of 10.0. The vulnerability has been described as a case of remote code execution
- CISA Retires 10 Emergency Cybersecurity Directives Issued Between 2019 and 2024by info@thehackernews.com (The Hacker News) on January 9, 2026 at 9:11 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday said it’s retiring 10 emergency directives (Eds) that were issued between 2019 and 2024. The list of the directives now considered closed is as follows – ED 19-01: Mitigate DNS Infrastructure Tampering ED 20-02: Mitigate Windows Vulnerabilities from January 2020 Patch Tuesday ED 20-03: Mitigate Windows DNS Server
- FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishingby info@thehackernews.com (The Hacker News) on January 9, 2026 at 5:46 am
The U.S. Federal Bureau of Investigation (FBI) on Thursday released an advisory warning of North Korean state-sponsored threat actors leveraging malicious QR codes in spear-phishing campaigns targeting entities in the country. “As of 2025, Kimsuky actors have targeted think tanks, academic institutions, and both U.S. and foreign government entities with embedded malicious Quick Response (QR)
- WhatsApp Worm Spreads Astaroth Banking Trojan Across Brazil via Contact Auto-Messagingby info@thehackernews.com (The Hacker News) on January 8, 2026 at 5:10 pm
Cybersecurity researchers have disclosed details of a new campaign that uses WhatsApp as a distribution vector for a Windows banking trojan called Astaroth in attacks targeting Brazil. The campaign has been codenamed Boto Cor-de-Rosa by Acronis Threat Research Unit. “The malware retrieves the victim’s WhatsApp contact list and automatically sends malicious messages to each contact to further
- China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodesby info@thehackernews.com (The Hacker News) on January 8, 2026 at 2:54 pm
A China-nexus threat actor known as UAT-7290 has been attributed to espionage-focused intrusions against entities in South Asia and Southeastern Europe. The activity cluster, which has been active since at least 2022, primarily focuses on extensive technical reconnaissance of target organizations before initiating attacks, ultimately leading to the deployment of malware families such as RushDrop
- ThreatsDay Bulletin: RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Storiesby info@thehackernews.com (The Hacker News) on January 8, 2026 at 12:49 pm
The internet never stays quiet. Every week, new hacks, scams, and security problems show up somewhere. This week’s stories show how fast attackers change their tricks, how small mistakes turn into big risks, and how the same old tools keep finding new ways to break in. Read on to catch up before the next wave hits. Honeypot Traps Hackers Hackers Fall for
- The State of Trusted Open Sourceby info@thehackernews.com (The Hacker News) on January 8, 2026 at 11:50 am
Chainguard, the trusted source for open source, has a unique view into how modern organizations actually consume open source software and where they run into risk and operational burdens. Across a growing customer base and an extensive catalog of over 1800 container image projects, 148,000 versions, 290,000 images, and 100,000 language libraries, and almost half a billion builds, they can see
- Cisco Patches ISE Security Vulnerability After Public PoC Exploit Releaseby info@thehackernews.com (The Hacker News) on January 8, 2026 at 10:44 am
Cisco has released updates to address a medium-severity security flaw in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) with a public proof-of-concept (PoC) exploit. The vulnerability, tracked as CVE-2026-20029 (CVSS score: 4.9), resides in the licensing feature and could allow an authenticated, remote attacker with administrative privileges to gain access to
- Researchers Uncover NodeCordRAT Hidden in npm Bitcoin-Themed Packagesby info@thehackernews.com (The Hacker News) on January 8, 2026 at 10:31 am
Cybersecurity researchers have discovered three malicious npm packages that are designed to deliver a previously undocumented malware called NodeCordRAT. The names of the packages, all of which were taken down as of November 2025, are listed below. They were uploaded by a user named “wenmoonx.” bitcoin-main-lib (2,300 Downloads) bitcoin-lib-js (193 Downloads) bip40 (970 Downloads) “The
- Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instancesby info@thehackernews.com (The Hacker News) on January 8, 2026 at 9:53 am
Cybersecurity researchers have disclosed details of multiple critical-severity security flaws affecting Coolify, an open-source, self-hosting platform, that could result in authentication bypass and remote code execution. The list of vulnerabilities is as follows – CVE-2025-66209 (CVSS score: 10.0) – A command injection vulnerability in the database backup functionality allows any authenticated
- OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controlsby info@thehackernews.com (The Hacker News) on January 8, 2026 at 6:57 am
Artificial intelligence (AI) company OpenAI on Wednesday announced the launch of ChatGPT Health, a dedicated space that allows users to have conversations with the chatbot about their health. To that end, the sandboxed experience offers users the optional ability to securely connect medical records and wellness apps, including Apple Health, Function, MyFitnessPal, Weight Watchers, AllTrails,
- CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploitedby info@thehackernews.com (The Hacker News) on January 8, 2026 at 4:52 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting Microsoft Office and Hewlett Packard Enterprise (HPE) OneView to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities are listed below – CVE-2009-0556 (CVSS score: 8.8) – A code injection vulnerability in Microsoft Office