Cyber Feed
- Secure Your Spot at RSAC 2026 Conferenceon March 23, 2026 at 11:00 am
- Critical flaw lets hackers track, eavesdrop via Bluetooth audio devicesby Sergiu Gatlan on January 15, 2026 at 4:13 pm
A critical vulnerability in Google’s Fast Pair protocol can allow attackers to hijack Bluetooth audio accessories like wireless headphones and earbuds, track users, and eavesdrop on their conversations. […]
- DHS prepares replacement for critical infrastructure collaboration frameworkby Eric Geller on January 15, 2026 at 4:04 pm
It remains unclear if the new system will include liability protections that companies say are necessary.
- Critical flaw in AWS Console risked compromise of build environmentby David Jones on January 15, 2026 at 3:54 pm
The CodeBreach vulnerability could have enabled a massive supply chain attack, researchers warn.
- Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Accessby info@thehackernews.com (The Hacker News) on January 15, 2026 at 3:31 pm
A maximum-severity security flaw in a WordPress plugin called Modular DS has come under active exploitation in the wild, according to Patchstack. The vulnerability, tracked as CVE-2026-23550 (CVSS score: 10.0), has been described as a case of unauthenticated privilege escalation impacting all versions of the plugin prior to and including 2.5.1. It has been patched in version 2.5.2. The plugin
- Vulnerabilities Surge, But Messy Reporting Blurs Pictureby Robert Lemos, Contributing Writer on January 15, 2026 at 3:19 pm
MITRE loses its lead as the top reporter of vulnerabilities, while new organizations pump out CVEs and reported bugs in WordPress plug-ins surge.
- Researchers Reveal Reprompt Attack Allowing Single-Click Data Exfiltration From Microsoft Copilotby info@thehackernews.com (The Hacker News) on January 15, 2026 at 3:09 pm
Cybersecurity researchers have disclosed details of a new attack method dubbed Reprompt that could allow bad actors to exfiltrate sensitive data from artificial intelligence (AI) chatbots like Microsoft Copilot in a single click, while bypassing enterprise security controls entirely. “Only a single click on a legitimate Microsoft link is required to compromise victims,” Varonis security
- How to automate just-in-time access to applications with Tinesby Sponsored by Tines on January 15, 2026 at 3:01 pm
Managing just-in-time access at scale is a growing IAM challenge as speed and auditability collide daily. Tines shows how automated workflows can grant, track, and revoke temporary app access without manual effort. […]
- ThreatsDay Bulletin: AI Voice Cloning Exploit, Wi-Fi Kill Switch, PLC Vulns, and 14 More Storiesby info@thehackernews.com (The Hacker News) on January 15, 2026 at 1:56 pm
The internet never stays quiet. Every week, new hacks, scams, and security problems show up somewhere. This week’s stories show how fast attackers change their tricks, how small mistakes turn into big risks, and how the same old tools keep finding new ways to break in. Read on to catch up before the next wave hits. Unauthenticated RCE risk Security Flaw in Redis
- Model Security Is the Wrong Frame – The Real Risk Is Workflow Securityby info@thehackernews.com (The Hacker News) on January 15, 2026 at 11:55 am
As AI copilots and assistants become embedded in daily work, security teams are still focused on protecting the models themselves. But recent incidents suggest the bigger risk lies elsewhere: in the workflows that surround those models. Two Chrome extensions posing as AI helpers were recently caught stealing ChatGPT and DeepSeek chat data from over 900,000 users. Separately, researchers
- 4 Outdated Habits Destroying Your SOC’s MTTR in 2026by info@thehackernews.com (The Hacker News) on January 15, 2026 at 11:00 am
It’s 2026, yet many SOCs are still operating the way they did years ago, using tools and processes designed for a very different threat landscape. Given the growth in volumes and complexity of cyber threats, outdated practices no longer fully support analysts’ needs, staggering investigations and incident response. Below are four limiting habits that may be preventing your SOC from evolving at
- Trio of Critical Bugs Spotted in Delta Industrial PLCsby Nate Nelson, Contributing Writer on January 15, 2026 at 11:00 am
Experts disagree on whether the vulnerabilities in a programmable logic controller from Delta are a five-alarm fire or not much to worry over.
- FTC bans GM from selling drivers’ location data for five yearsby Sergiu Gatlan on January 15, 2026 at 9:59 am
The FTC has finalized an order with General Motors, settling charges that it collected and sold the location and driving data of millions of drivers without consent. […]
- Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraudby info@thehackernews.com (The Hacker News) on January 15, 2026 at 9:37 am
Microsoft on Wednesday announced that it has taken a “coordinated legal action” in the U.S. and the U.K. to disrupt a cybercrime subscription service called RedVDS that has allegedly fueled millions in fraud losses. The effort, per the tech giant, is part of a broader law enforcement effort in collaboration with law enforcement authorities that has allowed it to confiscate the malicious
- Palo Alto Networks warns of DoS bug letting hackers disable firewallsby Sergiu Gatlan on January 15, 2026 at 9:02 am
Palo Alto Networks patched a high-severity vulnerability that could allow unauthenticated attackers to disable firewall protections in denial-of-service (DoS) attacks. […]
- Palo Alto Fixes GlobalProtect DoS Flaw That Can Crash Firewalls Without Loginby info@thehackernews.com (The Hacker News) on January 15, 2026 at 8:18 am
Palo Alto Networks has released security updates for a high-severity security flaw impacting GlobalProtect Gateway and Portal, for which it said there exists a proof-of-concept (PoC) exploit. The vulnerability, tracked as CVE-2026-0227 (CVSS score: 7.7), has been described as a denial-of-service (DoS) condition impacting GlobalProtect PAN-OS software arising as a result of an improper check for
- Microsoft disrupts massive RedVDS cybercrime virtual desktop serviceby Sergiu Gatlan on January 15, 2026 at 7:11 am
Microsoft announced on Wednesday that it disrupted RedVDS, a massive cybercrime platform linked to at least $40 million in reported losses in the United States alone since March 2025. […]
- ChatGPT’s upcoming cross-platform feature is codenamed “Agora”by Mayank Parmar on January 15, 2026 at 3:00 am
OpenAI is internally testing a new feature called “Agora,” and it could be related to some sort of cross-platform feature that works in real time or some other new product. […]
- Google plans to make Chrome for Android an agentic browser with Geminiby Mayank Parmar on January 15, 2026 at 1:30 am
Google appears to be testing a new feature that integrates Gemini into Chrome for Android, allowing you to use agentic browser capabilities on your mobile device. […]
- Google’s Personal Intelligence links Gmail, Photos and Search to Geminiby Mayank Parmar on January 15, 2026 at 12:00 am
Google is rolling out ‘Personal Intelligence,’ a new Gemini feature that pulls your data from Gmail, Photos, Google Search, and other products. […]
- OpenAI’s hidden ChatGPT Translate tool takes on Google Translateby Mayank Parmar on January 14, 2026 at 10:52 pm
OpenAI has quietly rolled out a new ChatGPT feature called ChatGPT Translate, and it looks very similar to Google Translate on the web. […]
- South Korean giant Kyowon confirms data theft in ransomware attackby Bill Toulas on January 14, 2026 at 9:49 pm
The Kyowon Group (Kyowon), a South Korean conglomerate, disclosed that a cyberattack has disrupted its operations and customer information may have been exposed in the incident. […]
- Retail, Services Industries Under Fire in Oceaniaby Nate Nelson, Contributing Writer on January 14, 2026 at 9:19 pm
Last year in Australia, New Zealand, and the South Pacific, Main Street businesses like retail and construction suffered more cyberattacks than their critical sector counterparts.
- France fines Free Mobile €42 million over 2024 data breach incidentby Bill Toulas on January 14, 2026 at 7:50 pm
The French data protection authority (CNIL) has imposed cumulative fines of €42 million on Free Mobile and its parent company, Free, for inadequate protection of customer data against cyber threats. […]
- Microsoft Disrupts Cybercrime Service RedVDSby Alexander Culafi on January 14, 2026 at 7:07 pm
RedVDS, a cybercrime-as-a-service operation that has stolen millions from victims, lost two domains to a law enforcement operation.
- Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Serversby info@thehackernews.com (The Hacker News) on January 14, 2026 at 7:03 pm
The Black Lotus Labs team at Lumen Technologies said it null-routed traffic to more than 550 command-and-control (C2) nodes associated with the AISURU/Kimwolf botnet since early October 2025. AISURU and its Android counterpart, Kimwolf, have emerged as some of the biggest botnets in recent times, capable of directing enslaved devices to participate in distributed denial-of-service (DDoS)
- Exploit code public for critical FortiSIEM command injection flawby Bill Toulas on January 14, 2026 at 6:51 pm
Technical details and a public exploit have been published for a critical vulnerability affecting Fortinet’s Security Information and Event Management (SIEM) solution that could be leveraged by a remote, unauthenticated attacker to execute commands or code. […]
- Verizon Wireless outage puts phones in SOS mode without cell serviceby Lawrence Abrams on January 14, 2026 at 6:27 pm
Verizon Wireless is suffering a massive outage in the US, with customers reporting their phones stuck in SOS mode with no cellular service. […]
- AI surges among top business risk concerns, while cybersecurity holds firmby David Jones on January 14, 2026 at 4:13 pm
A report from Allianz Commercial shows the rapid embrace of AI is posing new challenges for enterprise leaders.
- ‘VoidLink’ Malware Poses Advanced Threat to Linux Systemsby Elizabeth Montalbano, Contributing Writer on January 14, 2026 at 3:59 pm
Researchers discovered a modular, “cloud-first” framework that is feature-rich and designed to maintain stealthy, long-term access to Linux environments.
- Trump resubmits Sean Plankey for CISA directorby Eric Geller on January 14, 2026 at 3:59 pm
It’s unclear when the Senate will act on Plankey’s nomination, which stalled last year after multiple senators blocked it.
- AI Agents Are Becoming Authorization Bypass Pathsby info@thehackernews.com (The Hacker News) on January 14, 2026 at 3:07 pm
Not long ago, AI agents were harmless. They wrote snippets of code. They answered questions. They helped individuals move a little faster. Then organizations got ambitious. Instead of personal copilots, companies started deploying shared organizational AI agents – agents embedded into HR, IT, engineering, customer support, and operations. Agents that don’t just suggest, but act. Agents
- Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malwareby info@thehackernews.com (The Hacker News) on January 14, 2026 at 2:18 pm
Security experts have disclosed details of an active malware campaign that’s exploiting a DLL side-loading vulnerability in a legitimate binary associated with the open-source c-ares library to bypass security controls and deliver a wide range of commodity trojans and stealers. “Attackers achieve evasion by pairing a malicious libcares-2.dll with any signed version of the legitimate ahost.exe (
- Fortinet Fixes Critical FortiSIEM Flaw Allowing Unauthenticated Remote Code Executionby info@thehackernews.com (The Hacker News) on January 14, 2026 at 11:53 am
Fortinet has released updates to fix a critical security flaw impacting FortiSIEM that could allow an unauthenticated attacker to achieve code execution on susceptible instances. The operating system (OS) injection vulnerability, tracked as CVE-2025-64155, is rated 9.4 out of 10.0 on the CVSS scoring system. “An improper neutralization of special elements used in an OS command (‘OS command
- New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justificationby info@thehackernews.com (The Hacker News) on January 14, 2026 at 11:00 am
Research analyzing 4,700 leading websites reveals that 64% of third-party applications now access sensitive data without business justification, up from 51% in 2024. Government sector malicious activity spiked from 2% to 12.9%, while 1 in 7 Education sites show active compromise. Specific offenders: Google Tag Manager (8% of violations), Shopify (5%), Facebook Pixel (4%). Download the
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploitedby info@thehackernews.com (The Hacker News) on January 14, 2026 at 9:38 am
Microsoft on Tuesday rolled out its first security update for 2026, addressing 114 security flaws, including one vulnerability that it said has been actively exploited in the wild. Of the 114 flaws, eight are rated Critical, and 106 are rated Important in severity. As many as 58 vulnerabilities have been classified as privilege escalation, followed by 22 information disclosure, 21 remote code
- Critical Node.js Vulnerability Can Cause Server Crashes via async_hooks Stack Overflowby info@thehackernews.com (The Hacker News) on January 14, 2026 at 7:05 am
Node.js has released updates to fix what it described as a critical security issue impacting “virtually every production Node.js app” that, if successfully exploited, could trigger a denial-of-service (DoS) condition. “Node.js/V8 makes a best-effort attempt to recover from stack space exhaustion with a catchable error, which frameworks have come to rely on for service availability,” Node.js’s
- PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forcesby info@thehackernews.com (The Hacker News) on January 14, 2026 at 5:48 am
The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of new cyber attacks targeting its defense forces with malware known as PLUGGYAPE between October and December 2025. The activity has been attributed with medium confidence to a Russian hacking group tracked as Void Blizzard (aka Laundry Bear or UAC-0190). The threat actor is believed to be active since at least
- Taiwan Endures Greater Cyber Pressure From Chinaby Robert Lemos, Contributing Writer on January 14, 2026 at 2:00 am
Chinese cyberattacks on Taiwan’s critical infrastructure — including energy utilities and hospitals — rose 6% in 2025, averaging 2.63 million attacks a day.
- CrowdStrike to Buy Seraphic Security in Bid to Boost Browser Securityby Fahmida Y. Rashid on January 13, 2026 at 11:59 pm
The browser protection and detection technology will be integrated into CrowdStrike’s Falcon platform to protect endpoints, browser sessions, and cloud applications.
- CISO Succession Crisis Highlights How Turnover Amplifies Security Risksby Joan Goodchild on January 13, 2026 at 11:45 pm
When cybersecurity leadership turns over too fast, risk does not reset. It compounds.
- ‘Most Severe AI Vulnerability to Date’ Hits ServiceNowby Nate Nelson, Contributing Writer on January 13, 2026 at 9:44 pm
The ITSM giant tacked agentic AI onto a largely unguarded legacy chatbot, exposing customers’ data and connected systems.
- Microsoft Starts 2026 With a Bang: A Freshly Exploited Zero-Dayby Jai Vijayan, Contributing Writer on January 13, 2026 at 9:11 pm
The vendor’s first Patch Tuesday of the year also contains fixes for 112 CVEs, nearly double the amount from last month.
- Shadow#Reactor Uses Text Files to Deliver Remcos RATby Alexander Culafi on January 13, 2026 at 5:46 pm
Attackers use a sophisticated delivery mechanism of text-only files for RAT deployment, showcasing a clever way to bypass defensive tools and rely on the target’s own utilities.
- Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pagesby info@thehackernews.com (The Hacker News) on January 13, 2026 at 5:30 pm
Cybersecurity researchers have discovered a major web skimming campaign that has been active since January 2022, targeting several major payment networks like American Express, Diners Club, Discover, JCB Co., Ltd., Mastercard, and UnionPay. “Enterprise organizations that are clients of these payment providers are the most likely to be impacted,” Silent Push said in a report published today.
- Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Toolby info@thehackernews.com (The Hacker News) on January 13, 2026 at 5:22 pm
Cybersecurity researchers have disclosed details of a malicious Google Chrome extension that’s capable of stealing API keys associated with MEXC, a centralized cryptocurrency exchange (CEX) available in over 170 countries, while masquerading as a tool to automate trading on the platform. The extension, named MEXC API Automator (ID: pppdfgkfdemgfknfnhpkibbkabhghhfh), has 29 downloads and is still
- Majority of hedge funds boosted cybersecurity spending in 2025by David Jones on January 13, 2026 at 4:01 pm
About half of firms suffered a breach, and a large percentage cited third-party risks.
- Healthcare breaches double as shadow AI, vendor risks proliferateby Eric Geller on January 13, 2026 at 4:00 pm
A new report paints a picture of a sector with limited confidence in its defensive capabilities.
- Attackers Abuse Python, Cloudflare to Deliver AsyncRATby Elizabeth Montalbano, Contributing Writer on January 13, 2026 at 2:58 pm
The phishing campaign shows how attackers continue to weaponize legitimate cloud services and open source tools to evade detection and gain trust.
- [Webinar] Securing Agentic AI: From MCPs and Tool Access to Shadow API Key Sprawlby info@thehackernews.com (The Hacker News) on January 13, 2026 at 1:44 pm
AI agents are no longer just writing code. They are executing it. Tools like Copilot, Claude Code, and Codex can now build, test, and deploy software end-to-end in minutes. That speed is reshaping engineering—but it’s also creating a security gap most teams don’t see until something breaks. Behind every agentic workflow sits a layer few organizations are actively securing: Machine Control
- New Advanced Linux VoidLink Malware Targets Cloud and container Environmentsby info@thehackernews.com (The Hacker News) on January 13, 2026 at 11:57 am
Cybersecurity researchers have disclosed details of a previously undocumented and feature-rich malware framework codenamed VoidLink that’s specifically designed for long-term, stealthy access to Linux-based cloud environments According to a new report from Check Point Research, the cloud-native Linux malware framework comprises an array of custom loaders, implants, rootkits, and modular
- What Should We Learn From How Attackers Leveraged AI in 2025?by info@thehackernews.com (The Hacker News) on January 13, 2026 at 11:55 am
Old Playbook, New Scale: While defenders are chasing trends, attackers are optimizing the basics The security industry loves talking about “new” threats. AI-powered attacks. Quantum-resistant encryption. Zero-trust architectures. But looking around, it seems like the most effective attacks in 2025 are pretty much the same as they were in 2015. Attackers are exploiting the same entry points that
- ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonationby info@thehackernews.com (The Hacker News) on January 13, 2026 at 11:47 am
ServiceNow has disclosed details of a now-patched critical security flaw impacting its ServiceNow artificial intelligence (AI) Platform that could enable an unauthenticated user to impersonate another user and perform arbitrary actions as that user. The vulnerability, tracked as CVE-2025-12420, carries a CVSS score of 9.3 out of 10.0. It has been codenamed BodySnatcher by AppOmni. “This issue [.
- New Malware Campaign Delivers Remcos RAT Through Multi-Stage Windows Attackby info@thehackernews.com (The Hacker News) on January 13, 2026 at 9:08 am
Cybersecurity researchers have disclosed details of a new campaign dubbed SHADOW#REACTOR that employs an evasive multi-stage attack chain to deliver a commercially available remote administration tool called Remcos RAT and establish persistent, covert remote access. “The infection chain follows a tightly orchestrated execution path: an obfuscated VBS launcher executed via wscript.exe invokes a
- CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Executionby info@thehackernews.com (The Hacker News) on January 13, 2026 at 7:15 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned of active exploitation of a high-severity security flaw impacting Gogs by adding it to its Known Exploited Vulnerabilities (KEV) catalog. The vulnerability, tracked as CVE-2025-8110 (CVSS score: 8.7), relates to a case of path traversal in the repository file editor that could result in code execution. “Gogs Path
- BreachForums Breached, Exposing 324K Cybercriminalsby Jai Vijayan, Contributing Writer on January 12, 2026 at 10:01 pm
A massive data dump reveals real identities and details of administrators and members of the notorious hacker forum.
- Multipurpose GoBruteforcer Botnet Targets 50K+ Linux Serversby Alexander Culafi on January 12, 2026 at 9:19 pm
Researchers detailed a souped-up version of the GoBruteforcer botnet that preys on servers with weak credentials and AI-generated configurations.
- Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficultby Arielle Waldman on January 12, 2026 at 8:14 pm
No matter what new laws or regulations make the cut for 2026, it’s clear that compliance challenges will persist and federal legislation will be limited.
- FBI Flags Quishing Attacks From North Korean APTby Rob Wright on January 12, 2026 at 7:26 pm
A state-sponsored threat group tracked as “Kimsuky” sent QR-code-filled phishing emails to US and foreign government agencies, NGOs, and academic institutions.
- Hexnode Moves into Endpoint Security With Hexnode XDRon January 12, 2026 at 7:20 pm
- n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokensby info@thehackernews.com (The Hacker News) on January 12, 2026 at 4:39 pm
Threat actors have been observed uploading a set of eight packages on the npm registry that masqueraded as integrations targeting the n8n workflow automation platform to steal developers’ OAuth credentials. One such package, named “n8n-nodes-hfgjf-irtuinvcm-lasdqewriit,” mimics a Google Ads integration, and prompts users to link their advertising account in a seemingly legitimate form and then
- Critical vulnerability found in n8n workflow automation platformby David Jones on January 12, 2026 at 4:28 pm
The open-source platform is widely used across enterprise environments, leaving thousands of instances at risk.
- Executives worry most about cyber-enabled fraud, geopolitics and AIby Eric Geller on January 12, 2026 at 3:56 pm
The World Economic Forum’s wide-ranging new report also found strong global support for cyber regulation.
- 2 Separate Campaigns Probe Corporate LLMs for Secretsby Elizabeth Montalbano, Contributing Writer on January 12, 2026 at 3:37 pm
A total of 91,403 sessions targeted public LLM endpoints to find leaks in organizations’ use of AI and map an expanding attack surface.
- ⚡ Weekly Recap: AI Automation Exploits, Telecom Espionage, Prompt Poaching & Moreby info@thehackernews.com (The Hacker News) on January 12, 2026 at 1:41 pm
This week made one thing clear: small oversights can spiral fast. Tools meant to save time and reduce friction turned into easy entry points once basic safeguards were ignored. Attackers didn’t need novel tricks. They used what was already exposed and moved in without resistance. Scale amplified the damage. A single weak configuration rippled out to millions. A repeatable flaw worked again and
- GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentialsby info@thehackernews.com (The Hacker News) on January 12, 2026 at 10:48 am
A new wave of GoBruteforcer attacks has targeted databases of cryptocurrency and blockchain projects to co-opt them into a botnet that’s capable of brute-forcing user passwords for services such as FTP, MySQL, PostgreSQL, and phpMyAdmin on Linux servers. “The current wave of campaigns is driven by two factors: the mass reuse of AI-generated server deployment examples that propagate common
- How to stop insider-driven data loss in browser sessionson January 12, 2026 at 10:00 am
Midmarket teams turn to secure browsers capable of providing deep visibility and enforcing granular user controls during user browsing sessions, the goal being to prevent intentional or unintentional leaks without adding friction to the user experience.
- Anthropic Launches Claude AI for Healthcare with Secure Health Record Accessby info@thehackernews.com (The Hacker News) on January 12, 2026 at 8:37 am
Anthropic has become the latest Artificial intelligence (AI) company to announce a new suite of features that allows users of its Claude platform to better understand their health information. Under an initiative called Claude for Healthcare, the company said U.S. subscribers of Claude Pro and Max plans can opt to give Claude secure access to their lab results and health records by connecting to
- Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraudby info@thehackernews.com (The Hacker News) on January 12, 2026 at 7:34 am
Cybersecurity researchers have shed light on two service providers that supply online criminal networks with the necessary tools and infrastructure to fuel the pig butchering-as-a-service (PBaaS) economy. At least since 2016, Chinese-speaking criminal groups have erected industrial-scale scam centers across Southeast Asia, creating special economic zones that are devoted to fraudulent investment
- MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectorsby info@thehackernews.com (The Hacker News) on January 10, 2026 at 10:35 am
The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting diplomatic, maritime, financial, and telecom entities in the Middle East with a Rust-based implant codenamed RustyWater. “The campaign uses icon spoofing and malicious Word documents to deliver Rust based implants capable of asynchronous C2, anti-analysis, registry persistence, and modular
- Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crimeby info@thehackernews.com (The Hacker News) on January 10, 2026 at 8:59 am
Europol on Friday announced the arrest of 34 individuals in Spain who are alleged to be part of an international criminal organization called Black Axe. As part of an operation conducted by the Spanish National Police, in coordination with the Bavarian State Criminal Police Office and Europol, 28 arrests were made in Seville, along with three others in Madrid, two in Málaga, and one in Barcelona
- Deepfake Fraud Tools Are Lagging Behind Expectationsby Nate Nelson, Contributing Writer on January 9, 2026 at 10:08 pm
Deepfakes are becoming more realistic and more popular. Luckily, defenders are still ahead in the arms race.
- China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machinesby info@thehackernews.com (The Hacker News) on January 9, 2026 at 5:43 pm
Chinese-speaking threat actors are suspected to have leveraged a compromised SonicWall VPN appliance as an initial access vector to deploy a VMware ESXi exploit that may have been developed as far back as February 2024. Cybersecurity firm Huntress, which observed the activity in December 2025 and stopped it before it could progress to the final stage, said it may have resulted in a ransomware
- Illicit Crypto Economy Surges Amid Increased Nation-State Activityby Robert Lemos, Contributing Writer on January 9, 2026 at 4:56 pm
Cybercriminal cryptocurrency transactions totaled billions in 2025, with activity from sanctioned countries like Russia and Iran causing the largest jump.
- Telecom sector sees steady rise in ransomware attacksby Eric Geller on January 9, 2026 at 3:59 pm
A new threat intelligence report described a potent mix of unpatched flaws and lax perimeter controls.
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizationsby info@thehackernews.com (The Hacker News) on January 9, 2026 at 3:28 pm
Russian state-sponsored threat actors have been linked to a fresh set of credential harvesting attacks targeting individuals associated with a Turkish energy and nuclear research agency, as well as staff affiliated with a European think tank and organizations in North Macedonia and Uzbekistan. The activity has been attributed to APT28 (aka BlueDelta), which was tied to a “sustained”
- Cybersecurity Predictions 2026: The Hype We Can Ignore (And the Risks We Can’t)by info@thehackernews.com (The Hacker News) on January 9, 2026 at 11:09 am
As organizations plan for 2026, cybersecurity predictions are everywhere. Yet many strategies are still shaped by headlines and speculation rather than evidence. The real challenge isn’t a lack of forecasts—it’s identifying which predictions reflect real, emerging risks and which can safely be ignored. An upcoming webinar hosted by Bitdefender aims to cut through the noise with a data-driven
- Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versionsby info@thehackernews.com (The Hacker News) on January 9, 2026 at 10:01 am
Trend Micro has released security updates to address multiple security vulnerabilities impacting on-premise versions of Apex Central for Windows, including a critical bug that could result in arbitrary code execution. The vulnerability, tracked as CVE-2025-69258, carries a CVSS score of 9.8 out of a maximum of 10.0. The vulnerability has been described as a case of remote code execution
- CISA Retires 10 Emergency Cybersecurity Directives Issued Between 2019 and 2024by info@thehackernews.com (The Hacker News) on January 9, 2026 at 9:11 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday said it’s retiring 10 emergency directives (Eds) that were issued between 2019 and 2024. The list of the directives now considered closed is as follows – ED 19-01: Mitigate DNS Infrastructure Tampering ED 20-02: Mitigate Windows Vulnerabilities from January 2020 Patch Tuesday ED 20-03: Mitigate Windows DNS Server
- Russia’s Fancy Bear APT Doubles Down on Global Secrets Theftby Nate Nelson, Contributing Writer on January 9, 2026 at 7:00 am
The notorious state-sponsored group relies on basic techniques that are highly effective, often delivering greater ROI than more complex malware-heavy operations.
- FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishingby info@thehackernews.com (The Hacker News) on January 9, 2026 at 5:46 am
The U.S. Federal Bureau of Investigation (FBI) on Thursday released an advisory warning of North Korean state-sponsored threat actors leveraging malicious QR codes in spear-phishing campaigns targeting entities in the country. “As of 2025, Kimsuky actors have targeted think tanks, academic institutions, and both U.S. and foreign government entities with embedded malicious Quick Response (QR)
- CrowdStrike to Buy SGNL to Expand Identity Security Capabilitiesby Fahmida Y. Rashid on January 8, 2026 at 11:37 pm
The CrowdStrike-SGNL deal underscores how identity security has become a critical component of enterprise cybersecurity as companies add cloud services and deploy AI-driven tools.
- Maximum Severity HPE OneView Flaw Exploited in the Wildby Rob Wright on January 8, 2026 at 10:21 pm
Exploitation of CVE-2025-37164 can enable remote code execution on HPE’s IT infrastructure management platform, leading to devastating consequences.
- Fake AI Chrome Extensions Steal 900K Users’ Databy Alexander Culafi on January 8, 2026 at 9:34 pm
Threat actors ripped off a legitimate AI-powered Chrome extension in order to harvest ChatGPT and DeepSeek data before sending it to a C2 server.
- ChatGPT’s Memory Feature Supercharges Prompt Injectionby Nate Nelson, Contributing Writer on January 8, 2026 at 8:23 pm
The “ZombieAgent” exploit makes use of ChatGPT’s long-term memory and advanced capabilities.
- WhatsApp Worm Spreads Astaroth Banking Trojan Across Brazil via Contact Auto-Messagingby info@thehackernews.com (The Hacker News) on January 8, 2026 at 5:10 pm
Cybersecurity researchers have disclosed details of a new campaign that uses WhatsApp as a distribution vector for a Windows banking trojan called Astaroth in attacks targeting Brazil. The campaign has been codenamed Boto Cor-de-Rosa by Acronis Threat Research Unit. “The malware retrieves the victim’s WhatsApp contact list and automatically sends malicious messages to each contact to further
- Here’s What Cloud Security’s Future Holds for the Year Aheadby Melinda Marks on January 8, 2026 at 3:00 pm
Here are the top cloud security trends I’m seeing in my crystal ball for the New Year — particularly arming us for AI adoption.
- China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodesby info@thehackernews.com (The Hacker News) on January 8, 2026 at 2:54 pm
A China-nexus threat actor known as UAT-7290 has been attributed to espionage-focused intrusions against entities in South Asia and Southeastern Europe. The activity cluster, which has been active since at least 2022, primarily focuses on extensive technical reconnaissance of target organizations before initiating attacks, ultimately leading to the deployment of malware families such as RushDrop
- ThreatsDay Bulletin: RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Storiesby info@thehackernews.com (The Hacker News) on January 8, 2026 at 12:49 pm
The internet never stays quiet. Every week, new hacks, scams, and security problems show up somewhere. This week’s stories show how fast attackers change their tricks, how small mistakes turn into big risks, and how the same old tools keep finding new ways to break in. Read on to catch up before the next wave hits. Honeypot Traps Hackers Hackers Fall for
- The State of Trusted Open Sourceby info@thehackernews.com (The Hacker News) on January 8, 2026 at 11:50 am
Chainguard, the trusted source for open source, has a unique view into how modern organizations actually consume open source software and where they run into risk and operational burdens. Across a growing customer base and an extensive catalog of over 1800 container image projects, 148,000 versions, 290,000 images, and 100,000 language libraries, and almost half a billion builds, they can see
- Cisco Patches ISE Security Vulnerability After Public PoC Exploit Releaseby info@thehackernews.com (The Hacker News) on January 8, 2026 at 10:44 am
Cisco has released updates to address a medium-severity security flaw in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) with a public proof-of-concept (PoC) exploit. The vulnerability, tracked as CVE-2026-20029 (CVSS score: 4.9), resides in the licensing feature and could allow an authenticated, remote attacker with administrative privileges to gain access to
- Researchers Uncover NodeCordRAT Hidden in npm Bitcoin-Themed Packagesby info@thehackernews.com (The Hacker News) on January 8, 2026 at 10:31 am
Cybersecurity researchers have discovered three malicious npm packages that are designed to deliver a previously undocumented malware called NodeCordRAT. The names of the packages, all of which were taken down as of November 2025, are listed below. They were uploaded by a user named “wenmoonx.” bitcoin-main-lib (2,300 Downloads) bitcoin-lib-js (193 Downloads) bip40 (970 Downloads) “The
- Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instancesby info@thehackernews.com (The Hacker News) on January 8, 2026 at 9:53 am
Cybersecurity researchers have disclosed details of multiple critical-severity security flaws affecting Coolify, an open-source, self-hosting platform, that could result in authentication bypass and remote code execution. The list of vulnerabilities is as follows – CVE-2025-66209 (CVSS score: 10.0) – A command injection vulnerability in the database backup functionality allows any authenticated
- OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controlsby info@thehackernews.com (The Hacker News) on January 8, 2026 at 6:57 am
Artificial intelligence (AI) company OpenAI on Wednesday announced the launch of ChatGPT Health, a dedicated space that allows users to have conversations with the chatbot about their health. To that end, the sandboxed experience offers users the optional ability to securely connect medical records and wellness apps, including Apple Health, Function, MyFitnessPal, Weight Watchers, AllTrails,
- CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploitedby info@thehackernews.com (The Hacker News) on January 8, 2026 at 4:52 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting Microsoft Office and Hewlett Packard Enterprise (HPE) OneView to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities are listed below – CVE-2009-0556 (CVSS score: 8.8) – A code injection vulnerability in Microsoft Office
- Attackers Exploit Zero-Day in End-of-Life D-Link Routersby Jai Vijayan, Contributing Writer on January 7, 2026 at 10:19 pm
Hackers are attacking a critical zero-day flaw in unsupported D-Link DSL routers to run arbitrary commands.
- Phishers Exploit Office 365 Users Who Let Their Guard Downby Alexander Culafi on January 7, 2026 at 9:42 pm
Microsoft said that Office 365 tenants with weak configurations and who don’t have strict anti-spoofing protection enabled are especially vulnerable.
- Webinar: Learn How AI-Powered Zero Trust Detects Attacks with No Files or Indicatorsby info@thehackernews.com (The Hacker News) on January 7, 2026 at 5:19 pm
Security teams are still catching malware. The problem is what they’re not catching. More attacks today don’t arrive as files. They don’t drop binaries. They don’t trigger classic alerts. Instead, they run quietly through tools that already exist inside the environment — scripts, remote access, browsers, and developer workflows. That shift is creating a blind spot. Join us for a deep-dive
- Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searchesby info@thehackernews.com (The Hacker News) on January 7, 2026 at 5:09 pm
A cybercrime gang known as Black Cat has been attributed to a search engine optimization (SEO) poisoning campaign that employs fraudulent sites advertising popular software to trick users into downloading a backdoor capable of stealing sensitive data. According to a report published by the National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC) and
- DDoSia Powers Affiliate-Driven Hacktivist Attacksby Jai Vijayan, Contributing Writer on January 7, 2026 at 2:00 pm
Pro-Russian group NoName057(16) uses a custom denial-of-service tool to mobilize volunteers and disrupt government, media, and institutional sites tied to Ukraine and the West.