π¨ An 11-year-old critical flaw in GNU InetUtils telnetd lets attackers log in as root with no password.
Tracked as CVE-2026-24061 (CVSS 9.8), it affects all versions 1.9.3β2.7 due to an unsanitized USER environment value passed to login.
β οΈ Exploitation has already been observed in the wild.
π Read βhttps://thehackernews.com/2026/01/critical-gnu-inetutils-telnetd-flaw.html
Tracked as CVE-2026-24061 (CVSS 9.8), it affects all versions 1.9.3β2.7 due to an unsanitized USER environment value passed to login.
β οΈ Exploitation has already been observed in the wild.
π Read βhttps://thehackernews.com/2026/01/critical-gnu-inetutils-telnetd-flaw.html
π€―18π±4π₯2β‘1π1
β οΈ Osiris ransomware hit a major food service operator in Southeast Asia, researchers say.
The attack used a custom POORTRY driver to shut down security tools, then encrypted systems and exfiltrated data to cloud storage.
π Details here β https://thehackernews.com/2026/01/new-osiris-ransomware-emerges-as-new.html
The attack used a custom POORTRY driver to shut down security tools, then encrypted systems and exfiltrated data to cloud storage.
π Details here β https://thehackernews.com/2026/01/new-osiris-ransomware-emerges-as-new.html
π12π±7β‘1π₯1
π οΈβ οΈ Attackers are abusing trusted IT tools, not deploying malware.
A new campaign steals email logins, then installs legitimate RMM software for silent, long-term access.
Because the tools are signed and allowed, many security controls donβt trigger.
π Details β https://thehackernews.com/2026/01/phishing-attack-uses-stolen-credentials.html
A new campaign steals email logins, then installs legitimate RMM software for silent, long-term access.
Because the tools are signed and allowed, many security controls donβt trigger.
π Details β https://thehackernews.com/2026/01/phishing-attack-uses-stolen-credentials.html
π5π3π±3β‘1
πΊπΈ TikTok confirmed a new U.S. joint venture to stay operational in the country.
ByteDance will reduce its stake to 19.9%, giving majority control to U.S. investors.
U.S. user data and algorithms will move to Oracleβs U.S. cloud with third-party security audits.
π Read β https://thehackernews.com/2026/01/tiktok-forms-us-joint-venture-to.html
ByteDance will reduce its stake to 19.9%, giving majority control to U.S. investors.
U.S. user data and algorithms will move to Oracleβs U.S. cloud with third-party security audits.
π Read β https://thehackernews.com/2026/01/tiktok-forms-us-joint-venture-to.html
π9π±5π€3π€―1
π¨ Fortinet confirms active exploitation of CVE-2025-59718 / 59719, allowing FortiGate FortiCloud SSO bypass β even on fully patched devices.
Attackers abuse crafted SAML logins to gain admin access, add persistent accounts, enable VPN, and steal configs. Disabling FortiCloud SSO is advised.
π Details β https://thehackernews.com/2026/01/fortinet-confirms-active-forticloud-sso.html
Attackers abuse crafted SAML logins to gain admin access, add persistent accounts, enable VPN, and steal configs. Disabling FortiCloud SSO is advised.
π Details β https://thehackernews.com/2026/01/fortinet-confirms-active-forticloud-sso.html
π8π±5β‘1
π¨ CISA added four exploited vulnerabilities to its KEV list, impacting Zimbra, Versa SD-WAN, Vite, and a compromised npm package linked to a supply-chain attack.
β³ U.S. federal agencies must apply fixes by Feb 12 under BOD 22-01.
π CVEs, fixes, and deadlines β https://thehackernews.com/2026/01/cisa-updates-kev-catalog-with-four.html
β³ U.S. federal agencies must apply fixes by Feb 12 under BOD 22-01.
π CVEs, fixes, and deadlines β https://thehackernews.com/2026/01/cisa-updates-kev-catalog-with-four.html
π₯7π3β‘1
π¨ CISA confirms active exploitation of a critical VMware vCenter Server flaw.
CVE-2024-37079 allows remote code execution via a DCE/RPC heap overflow if an attacker has network access.
π Details β https://thehackernews.com/2026/01/cisa-adds-actively-exploited-vmware.html
CVE-2024-37079 allows remote code execution via a DCE/RPC heap overflow if an attacker has network access.
π Details β https://thehackernews.com/2026/01/cisa-adds-actively-exploited-vmware.html
π₯10π€―6π€2
π΅π± Poland blocked what officials described as its strongest cyberattack on the energy sector in years.
ESET links it to Russia-aligned Sandworm, which used a new DynoWiper malware to target β‘ power plants and renewable energy systems in late Dec 2025.
πDetails β https://thehackernews.com/2026/01/new-dynowiper-malware-used-in-attempted.html
ESET links it to Russia-aligned Sandworm, which used a new DynoWiper malware to target β‘ power plants and renewable energy systems in late Dec 2025.
πDetails β https://thehackernews.com/2026/01/new-dynowiper-malware-used-in-attempted.html
π8π7
π€ AI agents now move faster than IAM can see.
Shared agents quietly gain broad, long-lived access across systems, often with no clear owner. Thatβs how access drift begins.
The risk isnβt stolen credsβitβs valid access used in unsafe ways that never trigger alerts.
π Read β https://thehackernews.com/2026/01/who-approved-this-agent-rethinking.html
Shared agents quietly gain broad, long-lived access across systems, often with no clear owner. Thatβs how access drift begins.
The risk isnβt stolen credsβitβs valid access used in unsafe ways that never trigger alerts.
π Read β https://thehackernews.com/2026/01/who-approved-this-agent-rethinking.html
π4β‘3
β οΈ Russian users hit by a new phishing chain delivering Amnesia RAT and ransomware.
Fake business docs and LNK files do the work β no exploits. Payloads are split across GitHub and Dropbox, then Microsoft Defender is disabled using defendnot.
πFull attack chain and defenses β https://thehackernews.com/2026/01/multi-stage-phishing-campaign-targets.html
Fake business docs and LNK files do the work β no exploits. Payloads are split across GitHub and Dropbox, then Microsoft Defender is disabled using defendnot.
πFull attack chain and defenses β https://thehackernews.com/2026/01/multi-stage-phishing-campaign-targets.html
π₯28π€―4π±3π€2β‘1π1
π§βπ» North Koreaβs Konni group is using AI-assisted PowerShell malware to target blockchain developers.
Campaigns hit Japan, Australia, and India via Google adβstyle phishing links that bypass filters and drop EndRAT.
π Inside the full attack chain β https://thehackernews.com/2026/01/konni-hackers-deploy-ai-generated.html
Campaigns hit Japan, Australia, and India via Google adβstyle phishing links that bypass filters and drop EndRAT.
π Inside the full attack chain β https://thehackernews.com/2026/01/konni-hackers-deploy-ai-generated.html
π₯9β‘5π€―4π3π1
π Attackers now use π€ AI to write, hide, and mutate malware in real time. Google and Anthropic confirm AI-orchestrated attacks running autonomously end to end.
They bypass EDR by looking normal on each endpoint. The tell is in network behavior.
π How network signals expose what endpoints miss β https://thehackernews.com/2026/01/winning-against-ai-based-attacks.html
They bypass EDR by looking normal on each endpoint. The tell is in network behavior.
π How network signals expose what endpoints miss β https://thehackernews.com/2026/01/winning-against-ai-based-attacks.html
β‘14π4π€―3π2
π¨ Two popular VS Code AI assistant extensions were caught spying on developers.
They looked normal but quietly sent opened files and code edits to servers in π¨π³ China.
Koi Security says 1.5M installs were exposed without consent.
πRead β https://thehackernews.com/2026/01/malicious-vs-code-ai-extensions-with-15.html
They looked normal but quietly sent opened files and code edits to servers in π¨π³ China.
Koi Security says 1.5M installs were exposed without consent.
πRead β https://thehackernews.com/2026/01/malicious-vs-code-ai-extensions-with-15.html
π10π5β‘4
π¨ Weekly Cybersecurity Recap
β οΈ Old flaws, new attacks
π§ AI writing malware
π§© Trusted software abused
β±οΈ Exploits moving fast
π Read the full recap. Stay alert β https://thehackernews.com/2026/01/weekly-recap-firewall-flaws-ai-built.html
β οΈ Old flaws, new attacks
π§ AI writing malware
π§© Trusted software abused
β±οΈ Exploits moving fast
π Read the full recap. Stay alert β https://thehackernews.com/2026/01/weekly-recap-firewall-flaws-ai-built.html
π5π3
π¨ ALERT: Indian users are being hit by a cyber-espionage campaign posing as Income Tax emails.
Opening the attachment installs a stealth backdoor that disguises itself as Windows Explorer, bypasses UAC, and stays hidden.
π Inside the attack chain and payloads β https://thehackernews.com/2026/01/indian-users-targeted-in-tax-phishing.html
Opening the attachment installs a stealth backdoor that disguises itself as Windows Explorer, bypasses UAC, and stays hidden.
π Inside the attack chain and payloads β https://thehackernews.com/2026/01/indian-users-targeted-in-tax-phishing.html
π8π8π5
Google Project Zero revealed a working zero-click exploit chain against Pixel 9 phones.
A bug in the Dolby audio decoder let Google Messages process a malicious audio file in the background, gaining code execution, then a kernel bug completed the takeover. Pixel patches shipped in early Jan 2026.
π Read β https://thehackernews.com/2026/01/threatsday-bulletin-pixel-zero-click.html#zero-click-chain-hits-pixel
A bug in the Dolby audio decoder let Google Messages process a malicious audio file in the background, gaining code execution, then a kernel bug completed the takeover. Pixel patches shipped in early Jan 2026.
π Read β https://thehackernews.com/2026/01/threatsday-bulletin-pixel-zero-click.html#zero-click-chain-hits-pixel
π₯19π6
π URGENT: Microsoft rushed out out-of-band fixes for an actively exploited Office zero-day.
CVE-2026-21509 (CVSS 7.8) lets attackers bypass Office security using a malicious file that must be opened by the victim.
π Details β https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
CVE-2026-21509 (CVSS 7.8) lets attackers bypass Office security using a malicious file that must be opened by the victim.
π Details β https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
π₯14π7π€―4β‘3π±1
β οΈ Most OT incidents donβt start in OT. They start with routine IT gaps reaching operations.
Sygnia found risk centered on remote access, management systems, identity, and recoveryβnot the process network. ~60% of OT access came via trusted management paths.
π Why this pattern keeps repeating across industries β https://thehackernews.com/expert-insights/2026/01/ot-security-in-practice-4-crossindustry.html
Sygnia found risk centered on remote access, management systems, identity, and recoveryβnot the process network. ~60% of OT access came via trusted management paths.
π Why this pattern keeps repeating across industries β https://thehackernews.com/expert-insights/2026/01/ot-security-in-practice-4-crossindustry.html
π10β‘4
π¨π³ China-aligned APTs are using PeckBirdy, a JScript-based C2 framework active since 2023, to move quietly across browsers, Windows tools, and servers.
π΅οΈββοΈ It relies on LOLBins to deliver modular backdoors and steal data, leaving little trace on disk.
π See how PeckBirdy works β https://thehackernews.com/2026/01/china-linked-hackers-have-used.html
π΅οΈββοΈ It relies on LOLBins to deliver modular backdoors and steal data, leaving little trace on disk.
π See how PeckBirdy works β https://thehackernews.com/2026/01/china-linked-hackers-have-used.html
β‘11π5π€―2
β οΈ A single spreadsheet formula can now lead to full server takeover in Grist-Core.
The flaw, CVE-2026-24002 (CVSS 9.1), breaks out of the Pyodide sandbox, letting attackers run OS commands and access files and secrets.
π Read β https://thehackernews.com/2026/01/critical-grist-core-vulnerability.html
The flaw, CVE-2026-24002 (CVSS 9.1), breaks out of the Pyodide sandbox, letting attackers run OS commands and access files and secrets.
π Read β https://thehackernews.com/2026/01/critical-grist-core-vulnerability.html
π₯6β‘5
β οΈ Update: Alma Security calls CVE-2026-1245 ParserPoison.
binary-parser drops unvalidated field names and encodings into new Function(). Untrusted schemas = JavaScript execution.
π How ParserPoison works under the hood β https://thehackernews.com/2026/01/certcc-warns-binary-parser-bug-allows.html
binary-parser drops unvalidated field names and encodings into new Function(). Untrusted schemas = JavaScript execution.
π How ParserPoison works under the hood β https://thehackernews.com/2026/01/certcc-warns-binary-parser-bug-allows.html
π₯8β‘1