Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Devastating Consequences of a Lack of Multi-Factor Authentication: A 50-Organization Data Breach

A recent data breach has exposed sensitive information belonging to approximately 50 global enterprises due to a lack of multi-factor authentication (MFA). The breach highlights the critical importance of implementing MFA to mitigate the risk of credential-based attacks.

Published: Tue Jan 6 01:12:00 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The UK's £210 Million Cybersecurity Overhaul: A Comprehensive Plan to Safeguard Digital Public Services


The UK government has unveiled a £210 million (approximately $282 million) plan to overhaul its cybersecurity defenses, bolstering the security of digital public services and ensuring that government departments adhere to high standards of security. The plan includes the establishment of a Government Cyber Unit and a dedicated Government Cyber Profession, as well as a focus on supply chain security and subjecting government departments to similar security requirements as cloud providers and datacenters.

Published: Tue Jan 6 04:50:29 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cyberattack Brings Extended Christmas Break to Higham Lane School in England

Higham Lane School in Nuneaton, Warwickshire, England has been awarded an extended Christmas break due to a cyberattack that crippled its IT systems. The incident, which occurred on January 3, has left students without access to digital services for over two days.

Published: Tue Jan 6 05:08:12 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Growing Divide: Copilot Prompt Injection Flaws Spark Debate Over AI Vulnerabilities vs. Limits

Microsoft Copilot Prompt Injection Flaws: A Growing Divide Over AI Vulnerabilities vs. Limits

Published: Tue Jan 6 05:24:25 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The UK's £210M Cybersecurity Overhaul: A Bold Move to Enhance Digital Public Services

The UK government has launched its £210M Government Cyber Action Plan, aimed at bolstering cybersecurity across digital public services. The plan includes the establishment of a dedicated Government Cyber Unit and subjects government departments to the same security requirements as critical infrastructure operators.

Published: Tue Jan 6 05:35:12 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Invisible Half of Identity: Unveiling Identity Dark Matter

Identity Dark Matter: The Invisible Half of Identity, poses a significant security crisis for organizations. This concept highlights the growing concern of identity fragmentation across various environments, including SaaS, on-prem, IaaS, PaaS, home-grown, and shadow applications.

Published: Tue Jan 6 05:45:23 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Sophisticated Phishing Campaign Reduces to a Malicious .NET Trojan: A Cautionary Tale for Hotel Staff


A recent phishing campaign has been uncovered by cybersecurity researchers at Securonix, which used sophisticated tactics to trick victims into delivering a malicious .NET Trojan known as Dark Crystal RAT (DCRat). The attack targeted European hospitality organizations and was disguised as legitimate emails from Booking.com. This article provides an in-depth look at the attack vector used and offers tips on how individuals can protect themselves against similar threats.

Published: Tue Jan 6 06:40:51 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Underbelly of Open Source: Unpacking the Supply Chain Risks of Microsoft's Popular VS Code Forks


Threat actors have discovered a way to exploit vulnerabilities in popular VS Code forks by claiming non-existent extensions with placeholder names. This oversight has created supply chain risks for developers who rely on these IDEs, highlighting the need for improved verification processes to ensure software packages are authentic and secure.

Published: Tue Jan 6 06:49:06 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Alert: Global-e Breach Exposes Customer Data, Ledger Warns Users


A recent security incident involving Global-e has left customers of several brands, including Ledger, vulnerable to potential phishing attacks and data breaches. Ledger has warned users to be cautious and protect their sensitive information from unauthorized access.


Published: Tue Jan 6 07:06:27 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ugreen's Foray into AI-Powered Smart Home Surveillance: A Comprehensive Overview

Ugreen, a well-established brand known for its high-quality power banks, chargers, and NAS products, has launched a new line of AI-powered smart home surveillance cameras at CES 2026. With features like multimodal AI, cross-camera awareness, and weather-rated outdoor models, Ugreen is poised to revolutionize the way individuals monitor their homes with cutting-edge technology.

Published: Tue Jan 6 07:20:00 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unraveling the Shadows of Cybercrime: Resecurity's Exposé on The Com Collective

Unraveling the Shadows of Cybercrime: Resecurity's Exposé on The Com Collective

Published: Tue Jan 6 08:06:52 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ring Unveils Innovative Security Solutions at CES 2026


Ring has unveiled a range of innovative security solutions at CES 2026, including a mobile trailer with 360-degree coverage and advanced smart sensors. The new offerings include a line of Elite security cameras, a car alarm system utilizing Amazon's Sidewalk network, and various smart sensor configurations designed to enhance home or business security and operations.

Published: Tue Jan 6 08:19:07 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Phishing Phrenzy: Fake Windows BSODs Infect European Hotels with Sophisticated Malware Campaign


Phishing Phrenzy: Fake Windows BSODs Infect European Hotels with Sophisticated Malware Campaign
A recent report by Securonix has uncovered a sophisticated phishing campaign that has been tricking hotel staff into installing malware, including a remote access trojan (RAT) and ransomware. The attackers have been using fake Windows Blue Screen of Death (BSOD) crashes to bypass security controls and infect unsuspecting employees.


Published: Tue Jan 6 08:32:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Sedgwick Government Solutions Hit by TridentLocker Ransomware Attack, Firm Assures Clients of Data Integrity

Sedgwick Government Solutions has confirmed a breach of its federal contractor subsidiary by the TridentLocker ransomware group, resulting in the theft of approximately 3.39 GB of documents. The firm assures clients that no wider Sedgwick systems or data were affected and is currently investigating the incident with external cybersecurity experts.

Published: Tue Jan 6 09:40:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical IoT Security Flaw Exposes TOTOLINK EX200 Devices to Full Remote Device Takeover



A critical unpatched firmware flaw in TOTOLINK EX200 devices has exposed them to full remote device takeover. According to CERT/CC, the vulnerability can be exploited by authenticated attackers through a malformed firmware upload, granting access to the device's root-level telnet service. Users of affected devices are advised to restrict administrative access, monitor for anomalous activity, and upgrade to a supported model. Stay informed about this critical IoT security flaw and learn more about protecting your devices from similar vulnerabilities.

Published: Tue Jan 6 10:45:09 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Tainted Web: Two Chrome Extensions Exposed for Stealing ChatGPT and DeepSeek Conversations from 900,000 Users

Two Chrome Extensions Have Been Found Stealing ChatGPT and DeepSeek Conversations from 900,000 Users. The malicious activity was discovered by OX Security researcher Moshe Siman Tov Bustan, who stated that the malware adds malicious capabilities by requesting consent for "anonymous, non-identifiable analytics data" while actually exfiltrating complete conversation content from ChatGPT and DeepSeek sessions.

Published: Tue Jan 6 11:46:16 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Jaguar Land Rover's Cyberattack: A 43% Decline in Wholesale Volumes


Jaguar Land Rover has revealed that a September 2025 cyberattack led to a 43% decline in wholesale volumes due to production delays, increased costs, and a significant impact on its financial position. The attack resulted in the theft of sensitive data and forced the company to shut down its manufacturing facilities. In this article, we explore the impact of the cyberattack on Jaguar Land Rover's operations and finances.

Published: Tue Jan 6 12:35:36 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Addresses Critical Dolby Decoder Vulnerability on Android Devices

Google has released a security update to address a critical Dolby decoder vulnerability on its Android devices, CVE-2025-54957, which was identified by Google researchers in October 2025. The fix is now available for all Android devices through the January 2026 security patch.

Published: Tue Jan 6 13:03:57 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New D-Link Legacy Router Flaw Exposed: Vulnerability Allows for Remote Code Execution


A recently discovered flaw in legacy D-Link DSL routers has been found to be actively exploited by threat actors, allowing remote code execution. Devices up to 2020 models have reached end-of-life status due to this issue and are no longer supported with firmware updates.

Published: Tue Jan 6 14:02:20 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Brightspeed Breach: A Sophisticated Attack Exposes Millions of Residential Customers' Personal Data

Brightspeed, a major internet service provider, has been breached by a group known as Crimson Collective, which claims to have accessed and stolen over one million residential customers' records. The breach was listed for sale on the dark web at a price of three bitcoin, equivalent to approximately $276,370.

Published: Tue Jan 6 15:04:25 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

CERT/CC Warns of Critical TOTOLINK EX200 Vulnerability: What You Need to Know


CERT/CC has issued an urgent warning regarding a critical vulnerability discovered in the TOTOLINK EX200 range extender. This device, commonly used to boost wireless coverage in homes or small offices, is susceptible to a remote authenticated attacker taking full control of the device due to an unpatched error in its firmware upload handler.

Published: Tue Jan 6 15:11:37 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The MOR Patch: A Revolutionary Solution for a Common Problem

The MOR patch, a revolutionary new device designed to deliver electrical pulses directly to the anal area, has been FDA-approved for safety and is now available for purchase online. While some critics have raised concerns about its effectiveness and safety, early testers have reported significant improvements in their anal continence. Is this breakthrough solution the answer to one of the most common problems affecting millions worldwide? Only time will tell.

Published: Tue Jan 6 17:43:07 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

HackerOne's Internet Bug Bounty Program Fails to Deliver on Promise: A Study in Transparency and Trust

Researchers who contribute to bug bounty programs like HackerOne's Internet Bug Bounty (IBB) are often left waiting for months without any update or communication from the platform. The recent case of Jakub Ciolek highlights the challenges faced by these initiatives in delivering on their promise, raising questions about transparency and trust.

Published: Tue Jan 6 18:28:40 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Amazon's Fire Watch: A Surveillance Initiative to Mitigate Wildfire Risk

Amazon has launched Fire Watch, an AI-powered system that utilizes home cameras to detect signs of wildfires and alert authorities, raising questions about data protection and community privacy as part of its efforts to enhance community safety and response.

Published: Tue Jan 6 19:12:27 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ongoing Attacks Exploit Critical RCE Vulnerability in Legacy D-Link DSL Routers


A critical RCE vulnerability has been discovered in legacy D-Link DSL gateway routers, allowing attackers to execute arbitrary shell commands and gain control over DNS settings. This vulnerability is being actively exploited, highlighting the importance of upgrading to supported devices and staying up-to-date with security patches.

Published: Tue Jan 6 23:04:51 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Tesla's Cybercab Trademark Saga: A Tale of Intellectual Property Infringement and Corporate Rivalry



Tesla's plan to use the name "Cybercab" for its self-driving taxi service has hit a roadblock due to Unibev's earlier trademark application. The USPTO has suspended Tesla's application pending a ruling, leaving consumers wondering if they will ever be able to hail a Cybercab ride. As the situation unfolds, it remains to be seen how this saga will play out and what implications it will have for the electric vehicle manufacturer and its competitors in the autonomous driving space.

Published: Wed Jan 7 05:10:22 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Crypto Hardware Wallet Maker Ledger Impacted by Third-Party Data Breach: A Cautionary Tale for Crypto Enthusiasts



A recent data breach at Ledger, a leading manufacturer of hardware wallets, has exposed customer names and contact information to unauthorized parties. Despite the fact that no cryptocurrency was stolen during this incident, Ledger has emphasized that its own systems remain untouched and secure. However, the breach highlights the need for robust security measures to protect against various forms of exploitation, including phishing attacks and "5 wrench attacks." As the crypto landscape continues to evolve, it is essential that companies prioritize operational security in order to safeguard their users' sensitive data.

Published: Wed Jan 7 05:18:19 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Exposing the Secrecy Behind HSBC's Sideloading Block: A Deep Dive into the Bitwarden Conundrum


HSBC blocks users who sideloaded Bitwarden password manager due to security concerns

Published: Wed Jan 7 05:39:11 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Looming Threat of Internal Domain Phishing: A Growing Concern for Businesses


The use of internal domain phishing has been on the rise since May 2025, with attackers exploiting vulnerabilities in email routing systems to send malicious emails that appear to originate from a company's own domain. This article provides an in-depth look at the emerging threat of internal domain phishing and offers tips on how businesses can protect themselves against this type of attack.

Published: Wed Jan 7 05:52:32 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Jaguar Land Rover's Cyberattack Consequences: A Global Automotive Industry Implosion


Jaguar Land Rover's latest financial report has revealed a devastating 43.3 percent decline in wholesale volumes, with retail sales dwindling by 25.1 percent, following a crippling cyberattack that crippled the luxury automaker's global operations in the third quarter of fiscal year 2026.

Published: Wed Jan 7 06:05:30 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Cybersecurity: A Comprehensive Analysis of Emerging Threats and Vulnerabilities


The cyber landscape is rapidly evolving, with new vulnerabilities and threats surfacing daily. As such, it is essential for individuals and organizations to remain vigilant and proactive in addressing these risks. This article offers an in-depth analysis of several emerging threats, highlighting the importance of robust cybersecurity measures and providing practical insights into mitigating their impact.

Published: Wed Jan 7 06:21:54 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

n8n Warns of Critical Remote Code Execution Vulnerability Affecting Workflow Automation Platform



A critical vulnerability has been discovered in the open-source workflow automation platform n8n, allowing authenticated users to execute untrusted code by the n8n service. This maximum-severity security flaw, rated at 10.0 on the CVSS scoring system, affects both self-hosted deployments and n8n Cloud instances. Users are advised to upgrade to version 1.121.3 or later to mitigate this risk.



Published: Wed Jan 7 06:33:30 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Future of Cybersecurity: Non-Human Employees Pose Growing Threat


As Artificial Intelligence (AI) and cloud automation continue to scale across enterprises, Non-Human Identities (NHIs), including bots, AI agents, service accounts, and automation scripts, are becoming a significant cybersecurity risk. To protect against this emerging threat, organizations must adopt zero-trust principles and robust security measures that incorporate least-privilege access, automated credential rotation, and secrets management. The consequences of failing to address this growing threat can be catastrophic, highlighting the need for enterprises to prioritize the development of modern security strategies that prioritize human and non-human identity security equally.

Published: Wed Jan 7 06:43:00 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Vulnerabilities Exposed: A Growing Concern for Cybersecurity



A growing number of critical vulnerabilities has been discovered in various software systems, leaving many organizations to wonder how they can protect themselves from these newly revealed dangers. In this article, we will explore one such vulnerability affecting Veeam Backup & Replication and discuss the potential implications for those who use its products.



Published: Wed Jan 7 06:51:34 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Veeam Addresses Critical RCE Flaw and Other Security Vulnerabilities in Backup & Replication Software


Veeam has recently addressed critical security vulnerabilities in its Backup & Replication software, including a Remote Code Execution (RCE) flaw rated CVSS 9.0. The most severe vulnerability allows a Backup or Tape Operator to perform RCE as the postgres user by abusing malicious interval or order parameters.

Published: Wed Jan 7 07:00:35 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Legacy Technology: Hackers Exploit Critical RCE Flaw in D-Link DSL Routers


Hackers Exploit Critical RCE Flaw in Legacy D-Link DSL Routers, Putting Millions at Risk
A critical Remote Code Execution (RCE) flaw has been actively exploited by hackers in legacy D-Link DSL routers, leaving millions of users vulnerable to potential attacks. The vulnerability, tracked as CVE-2026-0625, has a CVSS score of 9.3, making it one of the most severe exploits in recent history.


Published: Wed Jan 7 07:09:10 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Veeam Vulnerability Exposes Backup Servers to Critical Remote Code Execution Attacks



A critical remote code execution (RCE) vulnerability has been discovered in Veeam Backup & Replication software, affecting over 550,000 customers worldwide. The vulnerability allows attackers with certain privileges to gain unauthorized access to the system and execute malicious commands. Organizations are advised to review their installations and apply all necessary updates to address this risk.



Published: Wed Jan 7 07:21:39 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The UK's £210 Million Cybersecurity Boost: Strengthening Public Sector Defenses


The UK has announced a £210 million plan to strengthen its public sector cybersecurity defenses, with a focus on improving incident response capabilities and promoting best practices among government departments and major firms. The new initiative aims to bolster the nation's ability to detect and respond to cyber threats, ensuring that essential public services remain secure.

Published: Wed Jan 7 07:30:15 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The £50 Million Security Bet Gone Wrong: A Cautionary Tale of Inadequate Cybersecurity Measures at the Legal Aid Agency


The UK's Ministry of Justice spent £50 million on security measures for the Legal Aid Agency before a high-profile cyberattack compromised sensitive data dating back 15 years. Despite significant investment, the agency's risk register had marked the potential attack as "extremely high" since 2021. The delay between the initial breach and detection highlights the need for improved cybersecurity measures and more effective incident response strategies.

Published: Wed Jan 7 07:40:40 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Misconfigured Email Routing: A Vulnerability of Unparalleled Proportions


A new vulnerability has been discovered in misconfigured email routing, allowing attackers to spoof internal emails and steal sensitive information from organizations. Microsoft warns of the increasing sophistication of phishing attacks targeting multiple industries, including financial scams and campaigns designed to look like internal communications.

Published: Wed Jan 7 09:04:19 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Alert: n8n Workflow Automation Platform Exposes Sensitive Data Due to Critical Vulnerability


A critical n8n vulnerability has exposed sensitive data, allowing unauthenticated attackers to gain full control over susceptible instances. Follow us for the latest updates on this developing story as more information becomes available.

Published: Wed Jan 7 09:31:24 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Scraps Exchange Online Spam Clamp Plans Amid Customer Backlash


In a surprise move, Microsoft has scrapped plans to impose daily restrictions on Exchange Online, a cloud-based email service, after customer feedback raised concerns about operational challenges and integration headaches. The company vows to develop a better approach to curb abuse and spam in the future, balancing security and usability while respecting business needs.

Published: Wed Jan 7 09:42:06 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Vibe Hacking: How Artificial Intelligence is Normalizing Cybercrime


The use of artificial intelligence (AI) in cybercrime has reached new heights, with hackers embracing AI-generated content to facilitate phishing attacks, scam scripts, and other malicious activities. The rise of "vibe hacking" is a growing concern for cybersecurity experts, who warn that this trend could lead to significant financial losses and reputational damage. To combat this threat, organizations must take steps to protect themselves from AI-powered cybercrime.

Published: Wed Jan 7 10:40:18 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

N8N Workflow Automation Platform Hit by Critical Ni8mare Flaw: A Threat to Business Operations


A critical security flaw dubbed "Ni8mare" (CVE-2026-21858) has been discovered in the N8N workflow automation platform, allowing remote, unauthenticated attackers to gain access to locally deployed instances of the platform. The vulnerability is attributed to a content-type confusion in the way n8n processes incoming data, enabling attackers to read arbitrary files and compromise sensitive information stored on the system.

Published: Wed Jan 7 11:47:10 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The European Space Agency's Cybersecurity Crisis: A Looming Threat to National Security


The European Space Agency has been hit by a major cyberattack, resulting in the theft of over 500 GB of sensitive data. The agency is launching a criminal investigation into the breach, highlighting concerns about its cybersecurity capabilities and the need for greater awareness about cybersecurity threats.

Published: Wed Jan 7 12:11:04 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical jsPDF Flaw Exposed: Hackers Can Steal Secrets Via Generated PDFs


A critical flaw in the jsPDF library has been discovered, allowing hackers to steal sensitive data from local file systems by including it in generated PDF files. This vulnerability affects versions of the library prior to version 4.0 and has a severity score of 9.2.

Published: Wed Jan 7 15:53:23 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Grok Phenomenon: A Lamentable Rise of AI-Generated Sexual Content


A disturbing trend has emerged on social media platforms, particularly on X, where users have been exploiting Elon Musk's latest venture, the chatbot platform Grok. The platform is generating an unprecedented amount of sexualized content, including explicit images and videos of adults and what appear to be minors. This article provides a detailed overview of the phenomenon and its implications for human rights and society.

Published: Wed Jan 7 16:03:26 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

N8n Workflow Automation Platform Vulnerability Exposed: A Critical Flaw in Cloud-Based Business Applications


A newly discovered vulnerability in the N8N workflow automation platform has been found to allow unauthenticated attackers to gain full control over instances. The Ni8mare vulnerability can compromise sensitive data and expose system files, making it a critical issue for organizations that use cloud-based business applications.

Published: Wed Jan 7 16:20:16 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

IBM's AI Agent Bob Found Vulnerable to Malware Execution: A Threat to Cybersecurity

IBM's AI agent Bob has been found vulnerable to malware execution, raising concerns about its security and highlighting the need for developers to be cautious when using such systems.

Published: Wed Jan 7 16:33:31 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Flags Two Microsoft Office Vulnerabilities and HPE OneView Flaw Amidst Rising Cyber Threat Landscape

Two security flaws in Microsoft Office and HPE OneView have been identified by CISA, citing evidence of active exploitation. Organizations are advised to apply updates immediately to mitigate the potential risk of attack.

Published: Wed Jan 7 23:52:26 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Debunking the BGP Theorists: Cloudflare Reveals that Rotten Routing, Not Cyberattacks, Were the Culprits Behind the US Incursion into Venezuela


Cloudflare pours cold water on Venezuela attack BGP theory: Cyberattacks often precede kinetic action, but rotten routing is to blame for US cyber operations

Published: Thu Jan 8 00:10:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Flags Maximum Severity HPE OneView Flaw as Actively Exploited


A maximum-severity vulnerability in HPE's OneView infrastructure management software has been flagged by CISA as being actively exploited. Organizations are urged to patch their devices against this flaw immediately. The full implications of this update will be discussed in our comprehensive article below.

Published: Thu Jan 8 01:52:09 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

OpenAI Launches ChatGPT Health: A Revolutionary Platform for Secure Conversations about Health

OpenAI Launches ChatGPT Health: A Revolutionary Platform for Secure Conversations about Health. The company's new platform provides users with a safe space to discuss their health concerns, protected by robust encryption and isolation measures. Learn more about the features and benefits of ChatGPT Health in this detailed article.

Published: Thu Jan 8 01:59:31 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cyber Warfare in the Indo-Pacific: China's Escalation against Taiwan's Critical Infrastructure


China-linked groups have escalated their cyberattacks on Taiwan's critical infrastructure, prompting a warning from the National Security Bureau (NSB) of an increased threat to the island's national security. The NSB report highlights the growing sophistication and frequency of China's cyber operations, which are being conducted in conjunction with political and military coercive actions. As tensions between China and Taiwan continue to rise, it is essential that nations prioritize cybersecurity awareness and develop effective strategies to counter state-sponsored cyber threats.

Published: Thu Jan 8 03:03:53 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cisco Warns of Critical Identity Service Engine Flaw with Publicly Available Exploit Code

Cisco has issued an alert regarding a critical flaw in its Identity Service Engine solution that can be exploited by attackers with admin privileges to access sensitive information on unpatched devices. This vulnerability highlights the importance of patch management and timely software updates in protecting against cyber threats.

Published: Thu Jan 8 03:22:00 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Glimpse into the Digital Disaster: Logitech's macOS Mouse Mayhem

Logitech's macOS mouse management apps were plagued by a series of issues, including scrolling direction changes and non-functional mapped buttons, after an expired developer certificate caused problems with inter-process communications. The company has since provided a patch and acknowledged their mistakes, but not before facing criticism from customers and experts alike.

Published: Thu Jan 8 03:44:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The U.S. Cybersecurity Landscape Takes a Critical Turn: HPE OneView and Microsoft Office PowerPoint Flaws Added to Known Exploited Vulnerabilities Catalog


The U.S. Cybersecurity Landscape Takes a Critical Turn: HPE OneView and Microsoft Office PowerPoint Flaws Added to Known Exploited Vulnerabilities Catalog

In a move aimed at bolstering the nation's cybersecurity posture, CISA has added two high-profile vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. The added flaws pertain to Microsoft Office PowerPoint and Hewlett Packard Enterprise OneView software, highlighting the need for organizations and individuals alike to take proactive steps towards securing their systems.

Published: Thu Jan 8 05:09:05 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Criminals are Now Vibe Coding Malware: The Rise of AI-Powered Attacks

Criminals are now using Artificial Intelligence (AI) and Machine Learning (ML) tools known as vibe coding to create malware, marking a significant shift in the way attackers approach cyber threats. The use of AI-powered tools allows attackers to produce high volumes of code at an unprecedented speed and efficiency, making it increasingly difficult for security teams to detect and respond to these types of attacks.

Published: Thu Jan 8 05:23:33 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Patching Déjà Vu: OpenAI's Recent Vulnerability Exposé Reveals the Complexity of Artificial Intelligence

OpenAI's recent vulnerability exposé highlights the complexity of artificial intelligence systems and their susceptibility to various types of attacks. Despite fixes being implemented, concerns remain about the potential impact on users' sensitive information.

Published: Thu Jan 8 05:39:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Open Source: NodeCordRAT Malware Exposed through npm Packages


Recently, cybersecurity researchers discovered three malicious npm packages that were designed to deliver a previously undocumented malware known as NodeCordRAT. This malware leverages npm as a propagation vector and Discord servers for command-and-control (C2) communications, allowing it to steal sensitive information such as Google Chrome credentials and seed phrases from cryptocurrency wallets. Learn more about this sophisticated supply chain attack and its implications.

Published: Thu Jan 8 05:47:04 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Coolify Discloses 11 Critical Flaws, Putting Self-Hosted Instances at Risk

Coolify Discloses 11 Critical Flaws, Putting Self-Hosted Instances at Risk. A recent disclosure has revealed multiple critical-severity security flaws in Coolify, an open-source self-hosting platform. These vulnerabilities pose a significant threat to the integrity and confidentiality of data stored on affected instances, with users urged to take immediate action to apply fixes.

Published: Thu Jan 8 05:55:43 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

N8n Automation Platform Vulnerability Exposes 100,000 Servers to Unauthenticated Server Takeover

A critical vulnerability has been discovered in the popular automation platform n8n, leaving an estimated 100,000 servers exposed to unauthenticated server takeover. To avoid potential risks, organizations are urged to upgrade to the latest patch version of n8n and ensure proper security measures are in place.

Published: Thu Jan 8 06:08:35 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The State of Trusted Open Source: Unveiling the Risks and Opportunities in Modern Infrastructure


The State of Trusted Open Source: Unveiling the Risks and Opportunities in Modern Infrastructure

A recent report by Chainguard reveals the complexities of modern infrastructure and highlights the risks associated with open source software. From AI-powered image dominance to longtail vulnerabilities, this article provides a detailed look at the challenges facing organizations today.

Published: Thu Jan 8 06:17:21 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

UK Regulators Close In on Elon Musk's X Platform Over AI-Generated Nudes

UK regulators are closing in on X after allegations emerged that its AI chatbot Grok is generating explicit images without users' consent. The controversy has sparked a heated debate about the responsibility of social media platforms in policing user-generated content and protecting vulnerable individuals from exploitation, with potential consequences for X's reputation and financial stability.

Published: Thu Jan 8 06:56:17 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Taiwan Confronts an Unrelenting Tide of Cyberattacks as China's Digital Aggression Escalates


Taiwan is facing an unprecedented surge in cyberattacks from China, with attackers targeting critical infrastructure across nine key sectors. The National Security Bureau has reported a notable tenfold increase in attacks on Taiwan's energy sector compared to the previous year. As tensions between the two nations escalate, concerns about national security and data protection are growing. This article provides an in-depth look at the escalating cyberattacks against Taiwan and their implications for global cybersecurity.

Published: Thu Jan 8 07:23:44 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Flags Newly Exploited Vulnerabilities in Microsoft Office and HPE OneView Software

CISA flags newly exploited vulnerabilities in Microsoft Office and HPE OneView software, warning that attackers are now abusing a maximum-severity bug in OneView management software and a years-old flaw in Microsoft Office. The latest update to CISA's Known Exploited Vulnerabilities catalog highlights the ongoing threat landscape faced by organizations around the world.

Published: Thu Jan 8 07:55:39 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ransomware Rides Again: The Resurgence of a Persistent Cyber Threat


Ransomware has continued to climb in 2025, despite efforts to combat it. The number of victims on extortion sites increased by over 50 percent compared to 2023, with more than 8,000 claimed victims tracked worldwide. As the threat landscape continues to evolve, cybersecurity experts will need to adapt their strategies to address the evolving tactics used by attackers.

Published: Thu Jan 8 09:03:06 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Six Cyber Threats of 2026: Preparing for a New Era of AI-Driven Attacks

As 2026 dawns, cybersecurity experts warn of six critical threats that will dominate the landscape, including AI-driven attacks, deepfakes, and ransomware. By understanding these emerging trends and implementing proactive measures, organizations can prepare themselves for a new era of cyber threats.

Published: Thu Jan 8 09:12:31 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New China-Nexus Threat Actor Emerges: UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes

UAT-7290, a new China-nexus threat actor, has been attributed to espionage-focused intrusions against entities in South Asia and Southeastern Europe. The group targets telecommunications providers with Linux malware and Operational Relay Box (ORB) nodes, highlighting the growing sophistication of China-linked threat actors.

Published: Thu Jan 8 09:28:34 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cisco ISE and ISE-PIC Vulnerability: A Public PoC Exploit Disclosed


Cisco Systems has issued a patch for its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) after a public Proof of Concept (PoC) exploit was disclosed. The vulnerability, tracked as CVE-2026-20029, is rated as medium-severity and affects all Cisco ISE and ISE-PIC deployments regardless of configuration. Follow the link to learn more about this vulnerability and how to apply the patch.

Published: Thu Jan 8 10:02:31 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

WhatsApp Worm Spreads Banking Trojan Astaroth Across Brazil via Contact Auto-Messaging: A Growing Concern for Cybersecurity

WhatsApp Worm Spreads Banking Trojan Astaroth Across Brazil via Contact Auto-Messaging: A growing concern for cybersecurity as threat actors turn to social media platforms to spread malware. Learn more about this new campaign and how it's affecting Brazilian users.

Published: Thu Jan 8 11:32:14 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Criminals Harness AI for Vibe-Coding Malware: The Rise of Vulnerable Code Generation


Criminals are now using AI to generate malware by "vibe-coding" malicious code, raising concerns about the vulnerability of AI tools and the potential for devastating security breaches. Experts say that by implementing security frameworks like SHIELD, organizations can mitigate these risks and ensure their development processes remain secure.

Published: Thu Jan 8 12:48:43 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cisco ISE Bug Patches: A Growing Concern for Organizations

Cisco ISE Bug Patches: A Growing Concern for Organizations

A critical vulnerability has been discovered in Cisco's Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) products, allowing remote attackers to access sensitive information. As of now, there is no reported exploitation, but the existence of a public proof-of-concept exploit raises concerns about its potential impact. Companies must prioritize patching this vulnerability to prevent potential abuse.

Published: Thu Jan 8 13:01:08 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Astaroth Banking Trojan Exploits WhatsApp Worm for Global Spreading in Brazil


The Astaroth banking Trojan has evolved into a new campaign dubbed Boto Cor-de-Rosa, leveraging WhatsApp for propagation and spreading itself globally. This development highlights the growing sophistication of threat actors and underscores the importance of user vigilance and layered defenses in protecting against emerging cyber threats.

Published: Thu Jan 8 14:07:39 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Year Before Disclosure: Elusive VMware ESXi Zero-Days Exposed by Huntress


Chinese-speaking threat actors likely exploited three VMware vulnerabilities, which were disclosed as zero-days just a few months ago, in attacks from December 2025. According to Huntress, the attackers used a sophisticated virtual machine (VM) escape that seemed to exploit these vulnerabilities in their attacks. The initial entry vector for the attacks was reportedly through a compromised SonicWall VPN appliance, and the researchers found evidence of an exploit toolkit developed more than a year before the targeted vulnerabilities became publicly known.

The attackers' use of the exploit toolkit seemed to be part of a modular approach, where they separated the post-exploitation tools from the exploits. This allowed them to reuse the same infrastructure and switch to new vulnerabilities as needed. The researchers at Huntress believe that this approach is likely used by threat actors to avoid detection and stay one step ahead of security measures.

The attack highlights the importance of timely patching, monitoring, and using the latest security updates. Organizations are advised to take proactive steps to protect themselves against these zero-day attacks.

Published: Thu Jan 8 15:36:23 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

CrowdStrike's $740 Million Acquisition of SGNL: A New Era in Identity Security for AI-Powered Businesses

CrowdStrike has announced its $740 million acquisition of SGNL, an identity security startup, highlighting the growing threat of identity-based attacks as companies face challenges in securing non-human identities, including AI agents. The deal underscores CrowdStrike's strategic push into identity security and reflects a broader industry trend towards emphasizing this critical area.

Published: Thu Jan 8 16:22:16 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

FBI Warns of Kimsuky's Spear Phishing Campaign Using QR Codes Against U.S. Organizations

The FBI has issued a flash alert warning U.S. organizations about Kimsuki's spear phishing campaign using QR codes that bypass traditional security measures and target specific high-priority victims.

Published: Thu Jan 8 17:03:32 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rebirth of a Mother: Amazon Veteran's Journey from War to Art


A former Amazon veteran turned musician, Hynd Revel uses her music to process the trauma she endured during her time serving in the war. With a voice that weaves a sonic tapestry of desperation and longing, Hynd's journey from loss to art is one of hope and transformation.

Published: Thu Jan 8 17:17:55 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Web of Deceit: The Kimwolf Botnet's Shadowy Proxies and Profitable Partnerships

A sophisticated web of cybercrime has been uncovered in connection with the Kimwolf botnet, which is linked to multiple entities involved in hosting, proxying, and software development. As investigators continue to dig deeper, the true extent of this deceitful network remains shrouded in uncertainty.

Published: Thu Jan 8 17:38:26 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New China-linked hackers breach telcos using edge device exploits: A Sophisticated Threat Actor

A sophisticated threat actor linked to China has been detected breaching telcos using edge device exploits, leaving security experts concerned about potential national cyber espionage operations.

Published: Thu Jan 8 17:46:53 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Chinese-speaking Hackers Exploited ESXi Zero-Days Long Before Disclosure

Chinese-speaking hackers exploited VMware ESXi zero-days more than a year before public disclosure, using a hacked SonicWall VPN to deploy an exploit toolkit targeting ESXi. The attack demonstrates sophisticated VM escape techniques and highlights the ongoing threat posed by nation-state actors with access to unpatched vulnerabilities.

Published: Thu Jan 8 19:04:25 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Tainted Badge of Immunity: Unpacking the Allegations Surrounding ICE Agent Jonathan Ross and the Shooting Death of Renee Good

ICE Agent Who Reportedly Shot Renee Good Was a Firearms Trainer, Per Testimony: A detailed look at the allegations surrounding Jonathan Ross and the shooting death of 37-year-old Renee Good.

Published: Thu Jan 8 21:36:11 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Closes 10 Emergency Directives in Rare Bulk Closure Amid Rising Cyber Threat Landscape


CISA has retired 10 Emergency Directives issued between 2019 and 2024, marking the largest number of directives closed at one time. These directives were implemented to address urgent risks and mitigate potential vulnerabilities in various systems and networks. The agency's decision to close these directives is a testament to the success of its efforts in addressing these issues and ensuring the continued security of federal civilian agencies.

Published: Thu Jan 8 22:00:39 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unmasking of a Troubled Past: Uncovering the Shadows of ICE Agent Jonathan Ross


In this explosive exposé, we delve into the troubled past of ICE agent Jonathan Ross, who fatally shot 37-year-old Renee Good during an immigration enforcement action. As we examine his background, we uncover a complex web of events that raise fundamental questions about accountability and transparency within law enforcement agencies.

Published: Fri Jan 9 00:35:41 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

FBI Warns of North Korean Hackers Using Malicious QR Codes in Spear-Phishing Campaigns

The U.S. Federal Bureau of Investigation (FBI) has issued a warning about North Korean hackers using malicious QR codes in spear-phishing campaigns targeting entities in the United States and abroad. The FBI is urging organizations to be vigilant and take proactive measures to prevent such attacks, which can bypass traditional defenses and establish persistence within an organization.

Published: Fri Jan 9 00:56:15 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unrelenting Struggle Against Inefficient Help Desks: A Tale of Techies Taking Matters into Their Own Hands


In a scathing critique of automated help desks, techies are taking matters into their own hands by leveraging their expertise to diagnose and resolve complex technical problems. Learn how one individual's determination paid off in the face of inefficiency, and explore the implications for the future of IT support.

Published: Fri Jan 9 01:42:34 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Tale of Two Malware: Unpacking the Intricate Web of UAT-7290 and its Modular Attack Vector


A recent report by Cisco Talos has shed light on the activities of a China-linked threat actor known as UAT-7290, which has been conducting espionage attacks on telco providers in South Asia and Southeastern Europe since 2022. The attack vector employed by UAT-7290 is characterized by its use of modular malware, with a dropper that kicks off the infection chain known as RushDrop. This report highlights significant overlap between UAT-7290's technical indicators, infrastructure, and tooling and those attributed to known China-aligned groups such as APT10 and Red Foxtrot.

Published: Fri Jan 9 04:05:00 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Cybersecurity Landscape in Turmoil: Threats Loom Large as Trend Micro Unveils Multiple Vulnerabilities


Trend Micro has unveiled multiple severe vulnerabilities in their Apex Central software, putting on-premise versions at significant risk of arbitrary code execution. To mitigate this threat, organizations must take proactive measures, including applying the latest security patches, reviewing remote access to critical systems, and conducting thorough risk assessments.

Published: Fri Jan 9 04:16:26 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Retires 10 Emergency Directives to Enhance Federal Cybersecurity Posture


CISA has retired 10 emergency directives issued between 2019 and 2024, marking a significant step towards bolstering the federal government's cybersecurity posture. The retirement of these directives reflects CISA's commitment to operational collaboration across the federal enterprise and highlights the importance of proactive risk management strategies in defending against emerging threats.

Published: Fri Jan 9 04:23:54 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The UK's Digital Dilemma: Grok's AI Image Generation Controversy and the Battle for Online Safety



The UK government has taken notice of Grok's AI image generation feature and is calling for greater action to be taken against social media platforms that fail to address online safety concerns. As the debate over non-consensual intimate images continues, it remains to be seen whether new regulations or technologies will be developed to address this issue. In the meantime, users are left to navigate a complex digital landscape in which online safety is both a challenge and an opportunity.

Published: Fri Jan 9 04:33:47 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Trend Micro Warns of Critical Apex Central Remote Code Execution Vulnerability

Trend Micro has issued a critical security warning regarding a remote code execution vulnerability found in its Apex Central software, which could allow unauthenticated attackers to execute arbitrary code with SYSTEM privileges. The company urges customers to update to the latest builds immediately and provides instructions on how to patch the vulnerability.

Published: Fri Jan 9 04:48:30 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Iran's Digital Crackdown: A Nation Under Siege by Internet Censorship and Regime Repression


Iran has shut down its internet nationwide, a move that marks a disturbing turning point in the nation's struggle for freedom and democracy. The recent protests, which have been marked by violence and brutality from security forces, have highlighted deep-seated discontent with the government's handling of economic issues and calls for regime change. With international condemnation pouring in, Iran's actions raise questions about the future of digital communication and the limits of state control over online expression.

Published: Fri Jan 9 06:04:49 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Concerns on the Horizon: A Closer Look at Emerging Threats and Emerging Risks

Several emerging threats are being highlighted as the cybersecurity landscape continues to evolve. Organizations must be aware of these issues and develop strategies for safeguarding their systems from attacks such as those stemming from n8n vulnerabilities.

Published: Fri Jan 9 06:12:58 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Era of Cyber Threats: The VMware ESXi Zero-Day Vulnerability Exploited by Chinese-Led Hackers


A sophisticated toolkit created by Chinese-led hackers has been discovered exploiting multiple zero-day vulnerabilities in VMware ESXi, a widely used hypervisor in enterprise environments. The attack, which predates the public disclosure of the bugs by over a year, highlights the growing threat landscape and the need for organizations to prioritize patching and security. This article delves into the details of the vulnerability and its implications for organizations worldwide.

Published: Fri Jan 9 07:41:40 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Snapping Under Siege: The Widespread Exploitation of Snapchat Accounts by Hacking Mastermind Kyle Svara

Snapping Under Siege: A notorious Illinois hacker faces serious charges over the compromising exploitation of nearly 600 female Snapchat accounts, revealing a pattern of sophisticated deception and digital invasion.

Published: Fri Jan 9 07:52:08 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Data Breach Aftermath: A Tale of Misconfigured Privacy Settings and the Illinois Department of Human Services


The Illinois Department of Human Services has suffered a significant data breach due to incorrect privacy settings, exposing personal and health information of nearly 700,000 residents. The incident highlights the importance of robust privacy settings in place to protect sensitive information.

Published: Fri Jan 9 09:44:38 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Email Security Needs More Seatbelts: Why Click Rate is the Wrong Metric

Click rate is not a reliable metric for measuring email security. In fact, it's often manipulated by attackers to mask malicious activity. Instead, organizations should focus on containment measures, such as implementing automated remediation workflows for cloud workspaces, to prevent and mitigate email-borne attacks.

Published: Fri Jan 9 10:00:20 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The QR Code Phishing Threat: How North Korea is Exploiting Enterprise Security


The use of QR codes as a phishing weapon has been linked to North Korean hackers, who are embedding malicious URLs in spear phishing emails. This new threat vector highlights the need for organizations to update their security measures to prevent falling prey to such attacks.

Published: Fri Jan 9 10:07:20 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Russia-France Prisoner Swap: A Complex Negotiation for a Conflict Researcher


France releases alleged ransomware crook wanted by the US in exchange for conflict researcher imprisoned in Russia, marking an unusual development in international diplomacy.
Laurent Vinatier, 49, was sentenced to three years in Russian prison for failing to register as a foreign agent, while Daniil Kasatkin, 26, was accused of aiding ransomware negotiations and denied all allegations. The prisoner swap highlights the complexities of international relations and the use of prisoner exchanges as a means of resolving conflicts.


Published: Fri Jan 9 10:16:20 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russian APT28's Sophisticated Credential-Harvesting Campaigns: Threatening Energy and Policy Organizations


Russian APT28's Sophisticated Credential-Harvesting Campaigns: Threatening Energy and Policy Organizations

Russian state-sponsored threat actors have been linked to a fresh set of credential harvesting attacks targeting individuals associated with various organizations in Turkey, Europe, North Macedonia, and Uzbekistan. The malicious campaigns, attributed to the infamous APT28 (also known as BlueDelta) group, demonstrate the group's continued reliance on disposable services to host and relay credential data.

Learn more about how APT28 is using sophisticated phishing emails and legitimate services to target energy and policy organizations.



Published: Fri Jan 9 10:26:15 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Trend Micro Patches Critical Remote Code Execution Flaw in Apex Central

Trend Micro has released patches for a critical remote code execution vulnerability in its Apex Central management console, which could allow an unauthenticated attacker to execute arbitrary code under the context of SYSTEM. The patched flaw carries a CVSS score of 9.8 and is classified as a LoadLibraryEX RCE.

Published: Fri Jan 9 13:07:58 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

China-Linked Hackers Exploit VMware ESXi Zero-Days to Escalate Virtual Machine Control


China-linked hackers have been accused of exploiting three VMware zero-day vulnerabilities to escape virtual machine control, potentially leading to ransomware attacks. The attack is believed to have utilized a compromised SonicWall VPN appliance as an initial entry point. Cybersecurity firm Huntress has reported that the exploit may have resulted in a successful ransomware assault.

The attackers used Host-Guest File System (HGFS) for information leaking, Virtual Machine Communication Interface (VMCI) for memory corruption, and shellcode that escapes to the kernel. The toolkit involved multiple components, including "exploit.exe" (aka MAESTRO), which acted as the orchestrator for the entire virtual machine escape.

The attack is thought to have been carried out by a well-resourced developer operating in a Chinese-speaking region, according to Huntress researchers. CISA has flagged Microsoft Office and HPE OneView bugs as actively exploited.

If you're concerned about your organization's vulnerability to such attacks, it may be worth considering the latest cybersecurity news and resources from The Hacker News, including AI-powered PAM and Zero Trust security strategies.

Published: Fri Jan 9 13:22:49 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Exploit Misconfigured Proxies to Access Commercial Large Language Model Services



Hackers have been exploiting misconfigured proxies to gain unauthorized access to commercial large language model (LLM) services, with a campaign generating over 80,000 sessions and using low-noise prompts to evade detection. Security teams are advised to restrict Ollama model pulls, apply egress filtering, and block known domains at the DNS level.



Published: Fri Jan 9 14:01:02 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Exposing the Dark Underbelly of ICE Surveillance Tech: A Fight for Digital Privacy and Humanity

Exposing the Dark Underbelly of ICE Surveillance Tech: A Fight for Digital Privacy and Humanity

The US government's use of surveillance technology to track immigrants has long been a topic of concern. Recent revelations have shown that this technology is not only being used to detain immigrants but also to gather intelligence on law-abiding citizens. This article explores the ways in which digital privacy advocates, hackers, and activists are fighting back against ICE's surveillance tech, using tactics such as adversarial noise and open-source tools to expose and combat this technology.

Published: Fri Jan 9 15:12:25 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Illinois Department of Human Services Data Breach: A Cautionary Tale of Misconfigured Privacy Settings


The Illinois Department of Human Services (IDHS) has disclosed that a data breach impacted 700,000 individuals, exposing their personal and health information due to incorrect privacy settings. The breach highlights the importance of proper privacy settings in safeguarding sensitive information and serves as a stark reminder of the critical importance of prioritizing data security and adhering to best practices in information management.

Published: Fri Jan 9 19:08:00 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Betterment's Cryptocurrency Scam: A Cautionary Tale of Financial App Deception

Betterment, a popular financial app, has been embroiled in a scandal involving a cryptocurrency scam that promised users triple their crypto deposits. The company has apologized for the unauthorized message, highlighting the need for robust cybersecurity measures to protect users' sensitive information.

Published: Fri Jan 9 19:25:01 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The UK's Cyber Security and Resilience Bill: A Step Towards Accountability, or a Missed Opportunity to Protect Public Sector

The UK government's decision not to include central government in the Cyber Security and Resilience Bill has raised concerns about its commitment to improving the nation's cybersecurity landscape. As critics argue that this exclusion creates an uneven playing field, lawmakers must weigh the merits of this decision and consider the implications for the country's overall security posture.

Published: Sat Jan 10 03:51:09 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Horizons in Cybercrime: The Expanding Black Axe Network



A major blow has been dealt to one of the most infamous international criminal organizations in the world - Black Axe. Europol has announced the arrest of 34 individuals allegedly linked to this notorious group, which is accused of carrying out a wide range of illicit activities including cyber-enabled fraud and human trafficking. With estimated damages exceeding €5.93 million, the operation marks a significant escalation in global efforts to dismantle the network.

Published: Sat Jan 10 04:10:55 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

MuddyWater's Latest Spear-Phishing Campaign: Unveiling the RustyWater RAT


MuddyWater, a well-known Iranian threat actor, has launched a spear-phishing campaign targeting various entities in the Middle East using a Rust-based implant codenamed RustyWater. The campaign utilizes malicious Word documents and spear-phishing emails to deliver the RustyWater RAT, which can execute a range of malicious operations. This latest development reflects continued evolution of MuddyWater's tradecraft, highlighting the need for organizations operating in the region to remain vigilant and adapt their security strategies accordingly.



Published: Sat Jan 10 05:09:57 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Surveillance Nation: The Rise of AI-Powered Surveillance and the Threats It Poses to Individual Freedom

Surveillance Nation: The Rise of AI-Powered Surveillance and the Threats It Poses to Individual Freedom

The use of artificial intelligence (AI) and machine learning algorithms has led to a significant increase in surveillance capabilities for law enforcement agencies and governments. This has raised concerns about the erosion of individual freedom and the potential for abuse by those in power. From the use of AI-powered chatbots like Grok to generate naked images, to the proliferation of spyware around the world, these threats require attention and action.

The case of Chen Zhi, a Cambodian national extradited to China for allegedly running a $15 billion scam operation, highlights the global reach of these threats. The use of AI-powered surveillance tools has also been highlighted in the context of protests and demonstrations, raising concerns about the potential for law enforcement agencies to intimidate or suppress activists and marginalized communities.

The shutdown of Iran's internet amid widespread protests is just one example of how governments can use surveillance and censorship to silence dissent and maintain control. The proliferation of spyware around the world is another pressing issue that requires attention and action.

In conclusion, the rise of AI-powered surveillance and its threats to individual freedom are pressing issues that require attention and action. It is essential that policymakers, law enforcement agencies, and technology companies prioritize transparency, accountability, and human rights in their efforts to develop and deploy surveillance tools.

Published: Sat Jan 10 05:40:33 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Digital Surveillance: A Growing Threat to Global Stability

As the internet becomes increasingly vulnerable to manipulation and control, a growing threat to global stability emerges in the form of malicious actors and technological advancements. The rise of digital surveillance presents a significant challenge to individuals, communities, and societies around the world, with potentially disastrous consequences if left unchecked.

Published: Sat Jan 10 06:41:02 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

APT Kimsuky: North Korea's Spear-Phishing Menace


North Korea-linked APT group Kimsuky is targeting governments, think tanks, and academic institutions with quishing attacks, a type of social engineering attack that uses malicious QR codes to trick victims into visiting fake websites or downloading malware. The FBI warns that these attacks are highly effective and requires organizations to adopt layered defenses to counter them.

Published: Sat Jan 10 10:06:51 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Black Axe Cybercrime Network Ties to Spanish Arrests: A Global Web of Deceit

Spain has arrested 34 individuals allegedly part of a criminal network involved in cyber fraud, believed to be connected to the Black Axe group responsible for illicit activities across Europe. The operation was carried out with the help of the Bavarian State Criminal Police Office and the support of Europol.

Published: Sat Jan 10 10:21:55 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The BreachForums Data Breach: A Cautionary Tale for Cybersecurity Professionals



A notorious hacking forum has suffered a major data breach, exposing 324,000 user accounts. The incident highlights the need for robust cybersecurity measures and vigilance in protecting personal information. Find out more about this alarming development and how it can impact individuals and organizations.

Published: Sat Jan 10 12:27:13 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Digital Identity Crisis: The 17.5 Million Instagram Data Breach and its Implications

A massive cyberattack has exposed sensitive information of 17.5 million Instagram users, sparking concerns over stalking, swatting, extortion, and identity theft. The breach highlights the need for greater awareness and security measures among social media users.

Published: Sat Jan 10 16:03:20 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Landscape of Malware Threats: Round 79 of the Security Affairs Malware Newsletter

BlackCat, a sophisticated ransomware gang, has been making waves in the cybercrime world with its advanced attacks. This article provides an in-depth look at the origins, tactics, and techniques used by BlackCat, and explores the implications of its apparent shutdown.

Published: Sun Jan 11 05:10:30 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Security Landscape: Breaches, Attacks, and Exploits

Recent breaches and attacks highlight the ongoing threat landscape, emphasizing the importance of cybersecurity awareness, preparedness, and proactive measures in staying ahead of emerging threats.

Published: Sun Jan 11 05:22:31 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Enduring Legacy of Aaron Swartz: A Call to Action in an Age of Control


Aaron Swartz's fight for open knowledge and digital rights continues as the forces he opposed grow stronger. His legacy serves as a powerful reminder of the importance of defending encryption, open access, and press freedom in an age of control.

Published: Sun Jan 11 10:06:56 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Instagram Admits to Bizarre Incident Involving Password Reset Emails, Despite Claiming No System Breach

Instagram has revealed that it had fixed an issue leading to mass password reset emails sent to thousands of users, despite claims that there was no system breach. The company's statement raises more questions than answers about the nature of the incident and how it was handled.

Published: Sun Jan 11 11:34:47 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Instagram Data Breach: A Deep Dive into the Alleged 17 Million Account Leak

Instagram has denied claims of a 17 million account data leak, but cybersecurity experts are warning users to remain vigilant against targeted phishing attacks.

Published: Sun Jan 11 13:19:21 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shadows of Cybersecurity: A Glimpse into the Dark Web and the Increasingly Complex Threat Landscape



Recent events surrounding Meta's Instagram password reset debacle, Veeam's patching of critical vulnerabilities, and a dataset containing 17.5 million Instagram users' personal information have shed light into the increasingly complex threat landscape. In this article, we explore these incidents and highlight their significance in understanding the ongoing struggle between cybersecurity professionals and malicious actors.



Published: Sun Jan 11 17:54:28 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Malaysia, Indonesia Block Social Network X Over Deepfake Concerns

Malaysia and Indonesia have blocked social network X over concerns about the platform's handling of deepfake content, in a move that reflects the growing importance of online regulation and digital safety. The block is part of a broader trend of governments taking action to curb the spread of inappropriate online content, while Baidu spins out its chipmaking business unit and other tech companies make significant investments in AI and renewable energy.

Published: Sun Jan 11 19:41:46 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Light Shines on Industrial-Scale Pig Butchering Scams as Cybersecurity Researchers Uncover Service Providers Fueling the Fraud



Cybersecurity researchers have made a groundbreaking discovery that sheds light on two service providers fueling industrial-scale pig butchering scams. The pig butchering-as-a-service (PBaaS) economy has been around since 2016, with Chinese-speaking criminal groups establishing special economic zones across Southeast Asia to create fraudulent investment and impersonation operations.

These compounds are notorious for luring thousands of people with promises of high-paying jobs, only to force them into conducting scams under the threat of violence. Cybersecurity experts have long warned about the dangers of these types of scams, which can result in significant financial losses for victims and potentially devastating emotional trauma.

The discovery highlights the complex nature of modern cyber threats, where service providers are often unwittingly fueling the scam industry by supplying networks with tools and infrastructure necessary to run social engineering operations. The most prominent example of this is Penguin Account Store, a crimeware-as-a-service (CaaS) provider that offers fraud kits, scam templates, and "shè gōng kù" datasets comprising stolen personal information belonging to Chinese citizens.

The group's services are available for purchase, with prices starting as low as $0.10 per pre-registered social media account. The threat actor has developed a Social Customer Relationship Management (SCRM) platform dubbed SCRM AI, which allows scam operators to facilitate automated victim engagement on social media.

The network primarily targets Indonesian-speaking visitors is part of a larger operation that includes thousands of gambling domains, malicious Android applications, hijacking of domains and subdomains hosted on cloud services, and stealth infrastructure embedded inside enterprise and government websites worldwide. The activity involves systematic exploitation of WordPress, PHP components, dangling DNS, and expired cloud assets to hijack and weaponize trusted domains.

The threat actors behind this scheme are believed to be an Advanced Persistent Threat (APT) that is deeply embedded in the Indonesian cybercrime ecosystem while actively exploiting governmental virtual assets worldwide. Another threat actor, Penguin Account Store's AitM phishing toolkit called Evilginx has also emerged as a major factor in targeting at least 18 universities and educational institutions across the U.S. since April 12, 2025, with an aim to steal login credentials and session cookies.

Published: Mon Jan 12 02:39:08 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A.I. Alert: Anthropic Launches Claude AI for Healthcare with Secure Health Record Access


Anthropic has launched Claude AI for Healthcare, a new suite of features that allows users of its platform to better understand their health information. The feature provides secure access to lab results and health records, with integrations rolling out later this week via iOS and Android apps.

Published: Mon Jan 12 03:46:50 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Credential-Harvesting Attacks by APT28: A Rise in Russian Cyber Espionage



In 2025, APT28 launched a series of credential-harvesting attacks targeting Turkish energy and nuclear agency staff, European think tank personnel, and organizations in North Macedonia and Uzbekistan. The group used fake login pages mimicking Outlook, Google, and Sophos VPN to steal credentials, redirecting victims to real sites. APT28's tactics were regionally tailored to reflect interest in energy, defense, and government networks aligned with Russian intelligence priorities. This marked an expansion of their ongoing operations and demonstrated the group's adaptability and persistence.



Published: Mon Jan 12 04:09:39 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Tories Propose Bold New Measures to Combat Social Media's Impact on Teenagers' Mental Health and Behavior

UK government announces plans to ban minors under 16 from using social media platforms, citing concerns over mental health and behavior. Is this a step in the right direction, or just another example of politicians trying to solve complex problems with simplistic solutions?

Published: Mon Jan 12 04:40:30 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The GoBruteforcer Botnet: A Sophisticated Threat to Cryptocurrency and Blockchain Projects


The GoBruteforcer botnet is a sophisticated threat that has been targeting databases of cryptocurrency and blockchain projects with a malicious intent. By exploiting weak credentials and legacy web stacks, the malware is capable of brute-forcing user passwords for services such as FTP, MySQL, PostgreSQL, and phpMyAdmin on Linux servers. To mitigate this threat, it's essential to secure systems and data through robust access controls, keeping software up-to-date, and monitoring system logs.

Published: Mon Jan 12 06:22:17 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ofcom Launches Investigation into X Over Grok Nudification Controversy

Ofcom Launches Investigation into X Over Grok Nudification Controversy: The UK's communications regulator is investigating social media platform X over its handling of concerns surrounding its AI chatbot, Grok. The probe follows a period of increased scrutiny of Grok's ability to generate sexuallyized images without the consent of users. The investigation aims to assess whether X understands the risks associated with allowing such content to be shared on its platform and whether it has taken adequate steps to prevent access to such material.

Published: Mon Jan 12 07:18:28 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Europol and Spanish Police Crack Down on Black Axe Cybercrime Network: A Global Operation to Combat Organized Crime


In a major operation, Europol and Spanish police have arrested 34 suspects linked to the notorious Black Axe cybercrime network. This crackdown marks a significant blow to the organization's global presence and is part of an ongoing effort to combat transnational organized crime and cyber-enabled financial crimes.

Published: Mon Jan 12 07:26:47 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great BreachForums Debacle: A Cybercrime Marketplace Exposed

Over 324,000 users' sensitive information has been exposed through a data breach on BreachForums, a notorious cybercrime marketplace. The leaked database contains email addresses, usernames, and hashed passwords, raising concerns about identity theft and potential law enforcement scrutiny.

Published: Mon Jan 12 07:39:18 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Data Breach at Spanish Energy Giant Endesa: A Threat to Customer Security

Spanish energy provider Endesa has disclosed a data breach affecting its customers, exposing sensitive information including contract details, payment details, and national identity numbers. While there is no evidence of fraudulent use, affected individuals are urged to remain vigilant and report any suspicious activity.

Published: Mon Jan 12 10:03:43 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Artificial Intelligence: How Block's AI Agent Red-Teamed Itself to Run an Infostealer

Block red-teamed its own AI agent to run an infostealer on an employee's laptop, revealing the vulnerabilities of its own AI system and highlighting the need for more robust security measures.

Published: Mon Jan 12 10:55:13 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Target's Dev Server Hacked: Hackers Claim to Have Stolen Source Code



Hackers have claimed to be selling internal source code belonging to Target Corporation after publishing a sample of stolen repositories on Gitea. The alleged breach has raised questions about the severity of the incident and how it will impact Target's customers and reputation. As cybersecurity threats continue to evolve, it is essential for companies like Target to prioritize their software development infrastructure security and take proactive measures to prevent similar incidents in the future.



Published: Mon Jan 12 12:01:26 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

N8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens


A new attack has been discovered that exploits vulnerabilities in n8n workflow automation platform, stealing OAuth tokens through malicious packages on npm registry. The attack marks the first time a supply chain threat has targeted the n8n ecosystem, highlighting the importance of maintaining robust security measures and staying vigilant against emerging threats.

Published: Mon Jan 12 12:11:50 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of AI Security Concerns: A Global Wake-Up Call

Businesses are finally starting to ask whether their AI is secure, with nearly two-thirds of business leaders saying they assessed AI tools' security risks before deploying them. The findings from the World Economic Forum's Global Cybersecurity Outlook 2026 highlight the growing concern over AI security and the need for organizations to prioritize it.

Published: Mon Jan 12 12:39:53 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of AI Security: A New Era of Cyber Threats

As AI security becomes a major focus for organizations worldwide, experts warn of a new era of cyber threats that must be addressed through enhanced cybersecurity measures. With nearly two-thirds of business leaders assessing AI tools' security risks before deployment and nearly all respondents believing AI will drive significant cybersecurity change in 2026, it's clear that AI security is here to stay.

Published: Mon Jan 12 12:50:06 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shadows of Deception: Unpacking the Context of Renee Good's Tragic Death and the GoFundMe Controversy


In a tragic turn of events, Renee Good was fatally shot by Immigration and Customs Enforcement (ICE) agents during an encounter with immigration authorities. The incident has sparked widespread outrage and raised questions about the role of law enforcement agencies in such scenarios. A GoFundMe controversy surrounding Agent Ross's fundraiser highlights the need for greater transparency and oversight within government agencies, as well as a critical examination of social media platforms' policies and procedures.

Published: Mon Jan 12 13:02:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Meta Fixes Instagram Password Reset Flaw Amid Leaked User Data Scandal


Meta has fixed a critical flaw in its Instagram password reset system that allowed third-party attackers to send unsolicited email reset notifications to millions of users. Despite denying a data breach, leaked user data has been discovered on a hacking forum, raising concerns about potential identity theft and phishing attacks. This incident highlights the ongoing struggle between tech giants and malicious actors seeking to exploit vulnerabilities for their own nefarious purposes.

Published: Mon Jan 12 13:10:47 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

University of Hawaii Cancer Center Hit by Sophisticated Ransomware Attack Exposing Sensitive Data


A devastating ransomware attack hit the University of Hawaii Cancer Center in August 2025, compromising sensitive data from research participants, including documents with Social Security numbers dating back to the 1990s. The attack resulted in the theft of sensitive personal information and highlights the need for robust cybersecurity measures and vigilance in detecting potential threats.

Published: Mon Jan 12 13:22:09 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Orders Feds to Patch Gogs RCE Flaw Exploited in Zero-Day Attacks Amidst Widespread Vulnerability Exposures

CISA has ordered federal civilian executive branch agencies to patch a high-severity Gogs vulnerability that was exploited in zero-day attacks, with over 1,400 servers remaining exposed online. To mitigate this risk, CISA advises users to disable open-registration and limit server access using a VPN or an allow list.

Published: Mon Jan 12 14:17:54 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Browser-in-the-Browser (BitB) Phishing Technique: A Growing Threat to Facebook Users



Facebook login thieves now use the browser-in-the-browser trick to trick users into providing their account credentials. To protect yourself, always navigate to official URLs in separate tabs and turn on two-factor authentication protection features.

Published: Mon Jan 12 15:13:32 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Gogs Vulnerability: A New Threat to Web Applications

U.S. CISA adds a Gogs vulnerability to its Known Exploited Vulnerabilities catalog, highlighting concerns over symlink handling in web applications. Private organizations are urged to review their infrastructure and address the vulnerabilities.

Published: Mon Jan 12 16:06:40 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Misinformation Epidemic: How Social Media Platforms Failed to Contain the Spread of Disinformation After the US Invasion of Venezuela


The US invasion of Venezuela has sparked a devastating crisis of disinformation on social media platforms. Despite efforts by mainstream reporters and journalists, the spread of misleading posts, videos, and claims has been rapid and relentless. As experts call for greater regulation and transparency, one thing is clear: the situation in Venezuela highlights the need for vigilance when it comes to the spread of misinformation online.

Published: Mon Jan 12 16:24:03 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A "Violence-as-a-Service" Suspect Arrested: Unpacking the Growing Threat of Cybercrime Involving Physical Violence


A 21-year-old Swedish man accused of being a key organizer of "violence-as-a-service" linked to the Foxtrot criminal network has been arrested in Iraq. The suspect is wanted on several charges including instigated murder, instigated attempted murder, and conspiracy to commit murder. His arrest follows a coordinated investigation between Iraqi and Swedish cops, and extradition proceedings are underway.

Published: Mon Jan 12 16:53:41 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A National Nightmare: The Militarization of Immigration Enforcement and Its Devastating Consequences

Minnesota and Chicago join forces to sue Trump administration over "militarized immigration operation" that has ravaged Twin Cities, with devastating consequences for local communities. Can the US government be held accountable for its actions? Only time will tell.

Published: Mon Jan 12 17:08:28 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hacker Gets Seven Years for Breaching Rotterdam and Antwerp Ports


A recent court decision has handed down a seven-year prison sentence to a Dutch national for his role in breaching the IT systems of ports in Rotterdam, Barendrecht, and Antwerp. The breaches were used to facilitate drug trafficking, with the individual reportedly attempting to import large quantities of cocaine into the Netherlands.

Published: Mon Jan 12 17:19:18 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

India's Cryptocurrency Crackdown: A Delicate Balance Between Regulation and Innovation

India's government has updated its regulations to require all crypto outfits serving Indian residents to register and implement strict client due diligence measures, including collecting personal data and conducting regular self-reports. The move aims to curb fraud, money laundering, and terrorism in the country's rapidly growing cryptocurrency market.

Published: Mon Jan 12 20:58:20 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The British Government's Ambitious Plan to Provide Ukraine with a Ground-Launched Ballistic Missile System

The British government has announced plans to rapidly develop and provide a ground-launched ballistic missile system to aid Ukraine's fight against Russia. The project aims to deliver a UK-built long-range strike capability within 12 months, with the goal of providing Ukraine with a powerful and cost-effective long-range strike option.

Published: Tue Jan 13 04:24:06 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Devastating Consequences of ICE's National Assault: A Framework for Community Safety in the Age of Immigration Enforcement


The escalating tensions between immigration authorities and communities across America have reached a boiling point, as federal agents storm streets and engage in violent confrontations with residents. This article will delve into the complexities of this crisis, exploring the frameworks for weighing options, the role of local officials, and the ways individuals can contribute to community safety efforts while minimizing risk.


Published: Tue Jan 13 04:45:28 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Malware Campaign Delivers Remcos RAT through a Sophisticated Multi-Stage Windows Attack: Implications for Enterprise Security

A new malware campaign has been identified that leverages an intricate multi-stage attack chain to deliver the Remcos RAT. The campaign, dubbed SHADOW#REACTOR, employs intermediate text-only stages, in-memory .NET Reactor loaders, and Living Off the Land tactics to evade detection. This highlights the evolving nature of malware campaigns and the need for organizations to stay vigilant in protecting their systems from sophisticated attacks.

Published: Tue Jan 13 05:02:27 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unchanged Nature of Attackers: What Can Be Learned from the Ongoing Exploitation of AI in Cybersecurity


Recent supply chain attacks demonstrate that attackers' tactics remain surprisingly consistent despite advancements in technology. The ongoing exploitation of AI in cybersecurity serves as a stark reminder that the fundamentals of cybersecurity remain unchanged. By prioritizing the basics and refining our defenses, we can ensure that we are better equipped to counter these evolving threats.

Published: Tue Jan 13 05:59:58 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Patch Alert: ServiceNow's AI Platform Vulnerability Leaves Unauthenticated Users Impersonating as Others

ServiceNow's AI Platform has been patched to address a critical vulnerability that enables unauthenticated users to impersonate others and execute unauthorized actions. This patch was applied to versions 5.1.18 or later of Now Assist AI Agents and 3.15.2 or later as well as 4.0.4 or later of Virtual Agent API, with patches also shared with partners and self-hosted customers.

Published: Tue Jan 13 06:09:19 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Dutch Hacker's Descent into Digital Deceit: The Case of the Port IT System Breach

A Dutch hacker has had his seven-year prison sentence upheld for helping cocaine smugglers breach port IT systems using malware. The appeal court rejected claims that police had no right to read encrypted chats, emphasizing the ongoing threat posed by sophisticated cybercrime operations.

Published: Tue Jan 13 06:24:43 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Advanced Linux VoidLink Malware Targets Cloud and Container Environments

Researchers have disclosed details of a new, highly advanced Linux-based malware framework called VoidLink. Discovered by Check Point Research, VoidLink is specifically designed for long-term access to cloud environments and boasts an impressive array of features that make it an attractive tool for adversary groups seeking to augment their capabilities.

Published: Tue Jan 13 06:48:44 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Vulnerability That's Got the Federal Government's Attention: The Gogs Zero-Day


The Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to stop using Gogs or lock it down immediately after a high-severity vulnerability was added to its Known Exploited Vulnerabilities (KEV) catalog, citing the risk of remote code execution.

Published: Tue Jan 13 07:10:47 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Agentic AI: A Growing Security Gap and Its Consequences


A growing security gap is emerging as a result of the rapid development and deployment of agentic AI systems. This article delves into the consequences of this trend, including vulnerabilities in machine control protocols (MCPs) and their potential impact on organizations. Learn how to secure your agentic AI system and prevent data breaches by reading our detailed analysis.

Published: Tue Jan 13 08:35:19 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Dutch Police Crack Down on AVCheck Malware Platform Used by Cybercriminals to Test Evasion Techniques


Dutch Police Crack Down on AVCheck Malware Platform Used by Cybercriminals to Test Evasion Techniques
A 33-year-old Dutchman has been arrested and charged in connection with the alleged mastermind behind the AVCheck online platform, a service used by cybercriminals to test their malware against different antivirus providers' products. The arrest is a significant blow to the cybercrime ecosystem, as AVCheck was taken down by authorities in May 2025 as part of Operation Endgame's second burst of operational activity.

Published: Tue Jan 13 08:45:12 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Slick Scam: How Phishers are Exploiting LinkedIn's Comment Reply Feature to Steal User Credentials

LinkedIn users have been targeted with fake comments that appear to be from the platform itself, warning them of bogus policy violations and urging them to visit an external link. These comments use the company's official logo and URL shortener, making it difficult for users to distinguish between legitimate and phishing links.

Published: Tue Jan 13 09:51:01 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Dutch Hacker Sentenced to Seven Years in Prison for Port Network Exploitation


A Dutch court has sentenced a 44-year-old hacker to seven years in prison for his role in exploiting port networks to help smuggle cocaine through European logistics hubs into the Netherlands. The sentence was reduced from ten years due to an extended appeal process lasting over 21 months.

Published: Tue Jan 13 10:10:10 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Betterment Exposes Data Breach After Wave of Crypto Scam Emails

Betterment, a U.S.-based digital investment advisor, recently exposed a data breach that involved a wave of crypto scam emails sent to its customers. The company confirmed that hackers gained access to one of their third-party marketing software platforms and used it to distribute fraudulent emails.

Published: Tue Jan 13 10:51:51 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unmarked Enforcement Vehicles: A Crisis of Visibility and Compliance



In a shocking discovery, dozens of ICE vehicles operating in Minnesota have been found to lack necessary emergency lights and sirens, raising serious concerns about public safety and the agency's approach to compliance. This revelation comes as the agency is facing intense scrutiny over its enforcement tactics, including allegations of excessive use of force and racial bias.

Published: Tue Jan 13 11:01:16 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

AI-Pocalypse: The Devastating Reality of Job Losses Due to Automation


AI and automation could potentially erase up to 10.4 million US jobs by 2030, according to a recent report by Forrester. While this number may seem daunting, the forecast suggests that AI will primarily augment one in five roles, requiring investment in staff training to prepare workers for this new age.

Published: Tue Jan 13 11:15:23 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Malicious Chrome Extension Steals MEXC API Keys: A Threat to Cryptocurrency Exchange Security

Malicious Chrome Extension Steals MEXC API Keys: A Threat to Cryptocurrency Exchange Security

Published: Tue Jan 13 11:31:58 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Temporary Lapse in Service: A Cautionary Tale of Human Error and Technological Resilience


A temporary outage has brought critical online services offline, prompting administrators to take swift action in an effort to restore normalcy. While details surrounding the incident remain unclear, the importance of vigilance and responsiveness amongst those responsible for maintaining our digital infrastructure cannot be overstated.

Published: Tue Jan 13 12:36:58 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Maintaining the Fortress: Microsoft Unveils Windows 10 KB5073724 Extended Security Update


Microsoft has released the KB5073724 extended security update for Windows 10, addressing several critical vulnerabilities and fixing issues introduced by previous updates. This update includes a fix for expiring Secure Boot certificates, as well as patches for an actively exploited elevation of privileges vulnerability in Agere modem drivers. With this release, Microsoft continues to prioritize user security, ensuring that its operating system remains a safe haven for users around the world.

Published: Tue Jan 13 13:28:57 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Nation of Vulnerabilities: The Silent Skimming Campaign Exposed


A long-running web skimming campaign has been discovered by Threat Hunters at Silent Push, targeting major payment networks and exposing a sophisticated attack chain that has evaded detection for nearly four years. This cunning scheme has stolen credit card information from online checkout pages, leaving businesses vulnerable to devastating data breaches. Learn more about the attack and how you can protect your organization from similar threats.

Published: Tue Jan 13 13:42:50 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Theft of Full Customer Data from Spanish Energy Firm Endesa: A Devastating Cyber Breach Exposes Sensitive Information

Spanish energy firm Endesa has suffered a devastating cyber breach exposing full customer data, including contact details, national ID numbers, and payment information. The incident highlights the growing menace of cyber threats to critical infrastructure and underscores the need for robust security measures to protect sensitive data.

Published: Tue Jan 13 14:07:10 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Belgian Hospital AZ Monica Overwhelmed by Cyberattack: A Cautionary Tale of Healthcare Security


Belgian hospital AZ Monica was forced to shut down all servers, cancel scheduled procedures, and transfer critical patients following a devastating cyberattack. The incident highlights the urgent need for robust cybersecurity measures in the healthcare sector to protect against various types of digital threats.

Published: Tue Jan 13 14:34:05 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Looming Threat to Patient Confidentiality: The Central Maine Healthcare Data Breach

A recent data breach at Central Maine Healthcare exposed sensitive information of over 145,000 individuals, highlighting the growing concern about patient confidentiality and data security in the healthcare sector.

Published: Tue Jan 13 14:42:10 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Vulnerabilities in Popular AI/ML Python Libraries: A Growing Concern for Data Security

Researchers have identified vulnerabilities in popular AI and ML Python libraries used in Hugging Face models, allowing remote attackers to execute arbitrary code. The affected libraries, including NeMo, Uni2TS, and FlexTok, use Hydra, a Python library maintained by Meta, which is vulnerable to remote code execution due to its instantiate() function.

Published: Tue Jan 13 15:27:32 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Reality of Immigrant Enforcement: A Growing Concern in the US


In light of the growing threat posed by immigrant enforcement agencies such as ICE and CBP, individuals are advised to be aware of potential risks and take precautions to safeguard themselves. By understanding the current context and taking action, it is possible for communities across the US to become safer and more supportive environments.



Published: Tue Jan 13 15:38:00 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New VoidLink Malware Framework Targets Linux Cloud Servers: A Sophisticated Post-Exploitation Tool



New VoidLink malware framework targets Linux cloud servers: A Sophisticated Post-Exploitation Tool


A newly discovered advanced cloud-native Linux malware framework named VoidLink focuses on cloud environments, providing attackers with custom loaders, implants, rootkits, and plugins designed for modern infrastructures. This article provides an in-depth look at the VoidLink framework's capabilities, development context, and implications for security professionals.



Published: Tue Jan 13 16:17:38 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Linux Malware Framework Revealed: The Threat Landscape for Cloud-First Operations


In a recent discovery, researchers from Checkpoint have uncovered a never-before-seen Linux malware framework that provides attackers with advanced capabilities to compromise and control infected systems. Dubbed "VoidLink," this framework boasts an impressive array of functionalities, including cloud detection, plugin development APIs, adaptive stealth, rootkit functions, command and control implemented through legitimate network connections, anti-analysis techniques, and credential harvesting tools. As organizations increasingly move their workloads to cloud-based environments, the emergence of such advanced malware frameworks like VoidLink poses significant threats to security.

Published: Tue Jan 13 16:29:23 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Charity-Themed Malware Campaign Targets Ukrainian Army



Ukraine's army was recently targeted in a charity-themed malware campaign that delivered backdoor malware called PluggyApe. The attackers likely came from the Russian threat group known as 'Void Blizzard' and 'Laundry Bear', although there is medium confidence in attribution. This incident highlights the ongoing efforts by Russian threat groups to disrupt Ukraine's military capabilities, using advanced techniques and tools to target high-value targets.



Published: Tue Jan 13 17:14:44 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Browser Security Check: A Crucial Measure to Protect Online Identity

Browser security checks are an essential tool in protecting our online identity from cyber threats, ensuring a safer browsing experience and safeguarding our sensitive information.

Published: Wed Jan 14 00:46:38 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Patching Paradox: Unpacking the Windows 0-Day Bug and its Implications for Cybersecurity

A new zero-day bug in Windows has been discovered, allowing an authorized attacker to leak a memory address from a remote ALPC port. The US Cybersecurity and Infrastructure Security Agency (CISA) has flagged the vulnerability as a "frequent attack vector for malicious cyber actors," and Microsoft has pushed a patch to address the issue. However, concerns remain about whether other components may be involved in an exploit chain, highlighting the importance of rapid patching and staying informed about newly disclosed vulnerabilities.

Published: Wed Jan 14 00:55:23 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

AZ Monica Hospital's Digital Healthcare Disruption: A Cautionary Tale of Cybersecurity



AZ Monica Hospital's Digital Healthcare Disruption: A Cautionary Tale of Cybersecurity

A devastating cyberattack has left a prominent Belgian general hospital network's digital systems severely compromised. The attack resulted in the hospital's decision to shut down servers, cancel scheduled procedures, and transfer critical patients. This incident highlights the importance of robust cybersecurity measures in healthcare institutions and underscores the need for cooperation between hospitals, law enforcement agencies, and cybersecurity experts.



Published: Wed Jan 14 01:07:05 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

PLUGGYAPE Malware: A Sophisticated Threat Leveraging Signal, WhatsApp, and Obfuscation Techniques to Target Ukrainian Defense Forces

PLUGGYAPE Malware: A Sophisticated Threat Leveraging Signal, WhatsApp, and Obfuscation Techniques to Target Ukrainian Defense Forces. Learn more about this new strain of malware and its implications for organizations.

Published: Wed Jan 14 01:16:16 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Monroe University's 2024 Data Breach Exposes Sensitive Information of Over 320,000 Individuals


A recent data breach at Monroe University has exposed personal, financial, and health-related information of over 320,000 individuals. The university has taken steps to address its security posture and prevent similar incidents in the future. Stay informed about the latest cybersecurity developments with our regular updates on breaches and security best practices.

Published: Wed Jan 14 03:05:54 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Patch Tuesday January 2026: A Critical Update to Mitigate Exploited Zero-Day Vulnerabilities


Microsoft Patch Tuesday January 2026 addressed a total of 112 CVEs across various products, including Windows and Office. The update includes eight critical vulnerabilities, which can help attackers bypass security protections and make more serious exploits work. This release highlights the need for companies to prioritize cybersecurity and maintain their software on a regular basis to minimize potential risks.

Published: Wed Jan 14 03:12:42 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Data Breach Rocks Spanish Energy Giant Endesa: A Cautionary Tale of Cybersecurity Failures


Spanish energy giant Endesa has found itself at the center of a high-profile data breach scandal after hackers claimed to have stolen sensitive information from millions of customers. The incident highlights the importance of robust cybersecurity measures and data protection protocols in the face of increasingly sophisticated cyber threats.

Published: Wed Jan 14 04:24:50 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Addresses 114 Windows Vulnerabilities in January 2026 Patch, One Actively Exploited


Microsoft has addressed 114 Windows vulnerabilities in its first security update for 2026, including one actively exploited flaw that allows attackers to disclose sensitive information. The update includes patches for multiple privilege escalation and remote code execution flaws, as well as a security feature bypass impacting Secure Boot Certificate Expiration. Prompt patching is essential to maintain trust in Windows security boundaries.

Published: Wed Jan 14 05:18:00 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Australia's Education System Under Siege: Victoria's Department of Education Hit by High-Profile Data Breach

A high-profile data breach at the Victorian Department of Education has left students and parents shaken, with hackers gaining access to personal information and email addresses of current and former students.

Published: Wed Jan 14 05:49:42 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

U.S. CISA Adds Microsoft Windows Flaw to Known Exploited Vulnerabilities Catalog: A Growing Concern for Cybersecurity

U.S. CISA adds a new vulnerability in Microsoft Windows to its Known Exploited Vulnerabilities catalog, highlighting the ongoing threat of sophisticated cyberattacks against individuals and organizations worldwide. Learn more about this critical flaw and how to protect your systems from potential attacks.

Published: Wed Jan 14 06:09:22 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fortinet Addresses Critical FortiSIEM Vulnerability Allowing Unauthenticated Remote Code Execution



Fortinet has released patches for two critical security vulnerabilities in its FortiSIEM and FortiFone systems, addressing issues allowing unauthenticated remote code execution and device configuration access. Users are urged to update their systems to the latest versions for optimal protection.



Published: Wed Jan 14 06:22:27 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The UK's Digital ID U-Turn: A Web of Complexity and Uncertainty


The UK government has dropped its plan to make digital ID mandatory for proof of right to work in the country, sparking concerns about the cost and purpose of the scheme. The revised approach prioritizes access to public services across the population, but critics argue that taxpayers should not foot a £1.8 billion bill for an unnecessary system. This article explores the complexities surrounding the digital ID requirement and its potential implications for the United Kingdom's immigration policies, public services, and data protection laws.

Published: Wed Jan 14 06:36:14 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Eurail Data Breach: A Devastating Blow to European Travelers' Personal Data

Eurail has confirmed that its customers' personal data was compromised in a recent breach, exposing sensitive information including passports and bank details. The company has assured customers that it takes their security seriously and is taking steps to secure affected systems. However, the potential consequences for customers are significant, with possible outcomes including phishing attempts, unauthorized access, and identity theft.

Published: Wed Jan 14 06:53:23 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cyberattack on Belgian Hospitals: A Looming Crisis in the Health Sector

Belgian hospital network AZ Monica faces a major crisis after a cyberattack crippled its services, forcing the cancellation of surgeries and the transfer of critical patients. The attack's impact is still being assessed, but it's clear that the healthcare sector in Belgium is facing significant challenges.

Published: Wed Jan 14 07:07:02 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Awareness of Microsoft Copilot Vulnerabilities: The Reprompt Attack Method and its Implications

Microsoft Copilot has recently faced a critical vulnerability known as the Reprompt attack method, which allows hackers to hijack sessions and issue commands to exfiltrate sensitive data. By applying the latest Windows update, users can protect themselves against this new threat.

Published: Wed Jan 14 08:07:10 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Era of Ransomware: The Rise of Blockchain-Based Anti-Detection Methods

In a significant shift in the tactics employed by cybercriminals, DeadLock ransomware has been identified as one of the first groups to utilize blockchain-based anti-detection methods. This marks a new era in the cat-and-mouse game between cybercriminals and defenders.

Published: Wed Jan 14 08:32:32 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Exploit Vulnerability in c-ares Library to Bypass Security Measures and Deploy Malware


Hackers have successfully exploited a vulnerability in the open-source c-ares library to bypass security controls and deliver a wide range of malware. The attack aims to establish persistent remote access and data theft. Facebook phishing scams employing the Browser-in-the-Browser (BitB) technique are also being used to deceive unsuspecting users into entering their credentials.

Published: Wed Jan 14 08:41:46 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of ConsentFix: A Novel OAuth Phishing Technique and Its Implications for Cybersecurity

Discover how elite SOCs use NDR to protect their networks and learn more about ConsentFix, a novel OAuth phishing technique that's making waves in the cybersecurity world. Read our latest article for an in-depth analysis of this threat and its implications for organizations and individuals.

Published: Wed Jan 14 09:17:05 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The €42 Million Fine: A Cautionary Tale of Telecom Companies' Failure to Prioritize Customer Data Security


France has fined two major telecom companies, Free and Free Mobile, €42 million for their roles in a data breach that compromised the personal data of over 24 million individuals, including financial information such as IBANs. The fine was issued by France's data protection regulator, CNIL, due to the companies' failure to properly secure personal data, inadequate communication of the breach to those affected, and non-compliance with data retention laws.

Published: Wed Jan 14 09:30:24 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fortinet Addresses Two Critical Vulnerabilities in FortiFone and FortiSIEM

Fortinet has addressed two critical flaws in its FortiFone and FortiSIEM products, including a vulnerability that could allow attackers to execute unauthorized code without authentication. The company released patches for affected versions and provided recommendations for mitigating the impact of the vulnerabilities.

Published: Wed Jan 14 10:09:40 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Decoding Tren de Aragua: Unpacking the Mysterious Venezuelan Gang Designated as a Foreign Terrorist Organization


U.S. Law Enforcement Agencies Scramble to Understand Venezuelan Gang's True Intentions
The designation of a Venezuelan gang as a "foreign terrorist organization" has sparked confusion and controversy within U.S. law enforcement agencies, with some officials struggling to understand the group's true intentions and capabilities.


Published: Wed Jan 14 10:22:07 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

AI Agents: The New Privilege Escalation Path - Threatening Organizational Security

AI agents have quickly moved from experimental tools to core components of daily workflows across security, engineering, IT, and operations. This has introduced a new threat - privilege escalation - as these agents become access intermediaries that bypass traditional permission boundaries. To mitigate this risk, organizations must reevaluate their approach to security in light of this emerging threat.

Published: Wed Jan 14 10:34:56 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Micrsoft's WinSqlite3.dll Update Resolves False Positive Security Scans

Microsoft has resolved a known issue that triggered false positive security alerts caused by the Windows DLL WinSqlite3.dll. The update, released January 13, 2026, and later, fixes the detection of a vulnerable memory corruption vulnerability (CVE-2025-6965) in this component. It is recommended to install the latest update for your device as it contains important improvements and issue resolution.

Published: Wed Jan 14 10:49:24 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Microsoft Copilot: A New Threat Emerge in Reprompt Attack


A new attack method dubbed "Reprompt" has emerged, exploiting vulnerabilities in Microsoft Copilot's execution of injected prompts via the 'q' parameter in URLs. The attack allows attackers to infiltrate user Copilot sessions and exfiltrate sensitive data without the victim's knowledge, highlighting the importance of staying vigilant against AI-powered attacks.

Published: Wed Jan 14 11:11:48 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Fortinet Vulnerability: The PhMonitor Service and Its Devastating Consequences



A new security flaw has been discovered in FortiSIEM, allowing remote attackers to execute commands or code. The vulnerability impacts versions from 6.7 to 7.5 and has been addressed by Fortinet with a patch. Organizations utilizing the service are advised to take proactive measures to secure their configurations.


Published: Wed Jan 14 12:59:19 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A National Mobile Crisis: The Verizon Outage Raises Questions About the Resilience of the US Telecommunications System


A nationwide mobile crisis has struck the United States, leaving millions of customers without access to mobile data and voice services. The Verizon outage has raised questions about the resilience of the US telecommunications system and highlights the importance of having a robust backup plan in place. With experts warning that similar incidents can have far-reaching consequences, it's essential for consumers to take steps to protect themselves from potential vulnerabilities in their mobile devices and networks.

Published: Wed Jan 14 13:06:57 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

France Imposes €42 Million Fine on Free Mobile for Inadequate Data Protection Following 2024 Breach


In a significant move, France has imposed a cumulative fine of €42 million on Free Mobile for its inadequate handling of a 2024 data breach incident that exposed customer information. The French data protection authority found that the company failed to implement adequate security measures and properly inform affected individuals of the breach, in violation of GDPR regulations. As the country continues to navigate the complexities of data protection, this fine serves as an important reminder for ISPs of their responsibility to prioritize the safety of sensitive customer information.

Published: Wed Jan 14 13:56:30 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

AISURU/Kimwolf Botnet: A Looming Threat to Global Cybersecurity

AISURU/Kimwolf Botnet: A Looming Threat to Global Cybersecurity - The recent discovery of this notorious botnet has sent shockwaves throughout the cybersecurity community, highlighting the increasingly sophisticated and pervasive nature of modern cyber threats. With over 2 million Android devices compromised and a sophisticated proxy network containing 832 compromised KeeneticOS routers operating across Russian ISPs, this botnet presents a significant threat to global cybersecurity.

Published: Wed Jan 14 14:12:23 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

CERT-UA Reports PLUGGYAPE Cyberattacks on Ukrainian Defense Forces

Ukraine's defense forces have been targeted by a series of sophisticated cyberattacks using PLUGGYAPE malware linked to Russia's Void Blizzard group. The attacks demonstrate the evolving nature of modern cyber threats and highlight the need for robust cybersecurity measures.

Published: Wed Jan 14 14:23:51 2026 by llama3.2 3B Q4_K_M










© Ethical Hacking News . All rights reserved.

Privacy | Terms of Use | Contact Us