๐จ CISA confirms active exploitation of a critical VMware vCenter Server flaw.
CVE-2024-37079 allows remote code execution via a DCE/RPC heap overflow if an attacker has network access.
๐ Details โ https://thehackernews.com/2026/01/cisa-adds-actively-exploited-vmware.html
CVE-2024-37079 allows remote code execution via a DCE/RPC heap overflow if an attacker has network access.
๐ Details โ https://thehackernews.com/2026/01/cisa-adds-actively-exploited-vmware.html
๐ฅ10๐คฏ6๐ค2
๐ต๐ฑ Poland blocked what officials described as its strongest cyberattack on the energy sector in years.
ESET links it to Russia-aligned Sandworm, which used a new DynoWiper malware to target โก power plants and renewable energy systems in late Dec 2025.
๐Details โ https://thehackernews.com/2026/01/new-dynowiper-malware-used-in-attempted.html
ESET links it to Russia-aligned Sandworm, which used a new DynoWiper malware to target โก power plants and renewable energy systems in late Dec 2025.
๐Details โ https://thehackernews.com/2026/01/new-dynowiper-malware-used-in-attempted.html
๐8๐7
๐ค AI agents now move faster than IAM can see.
Shared agents quietly gain broad, long-lived access across systems, often with no clear owner. Thatโs how access drift begins.
The risk isnโt stolen credsโitโs valid access used in unsafe ways that never trigger alerts.
๐ Read โ https://thehackernews.com/2026/01/who-approved-this-agent-rethinking.html
Shared agents quietly gain broad, long-lived access across systems, often with no clear owner. Thatโs how access drift begins.
The risk isnโt stolen credsโitโs valid access used in unsafe ways that never trigger alerts.
๐ Read โ https://thehackernews.com/2026/01/who-approved-this-agent-rethinking.html
๐4โก3
โ ๏ธ Russian users hit by a new phishing chain delivering Amnesia RAT and ransomware.
Fake business docs and LNK files do the work โ no exploits. Payloads are split across GitHub and Dropbox, then Microsoft Defender is disabled using defendnot.
๐Full attack chain and defenses โ https://thehackernews.com/2026/01/multi-stage-phishing-campaign-targets.html
Fake business docs and LNK files do the work โ no exploits. Payloads are split across GitHub and Dropbox, then Microsoft Defender is disabled using defendnot.
๐Full attack chain and defenses โ https://thehackernews.com/2026/01/multi-stage-phishing-campaign-targets.html
๐ฅ28๐คฏ4๐ฑ3๐ค2โก1๐1
๐งโ๐ป North Koreaโs Konni group is using AI-assisted PowerShell malware to target blockchain developers.
Campaigns hit Japan, Australia, and India via Google adโstyle phishing links that bypass filters and drop EndRAT.
๐ Inside the full attack chain โ https://thehackernews.com/2026/01/konni-hackers-deploy-ai-generated.html
Campaigns hit Japan, Australia, and India via Google adโstyle phishing links that bypass filters and drop EndRAT.
๐ Inside the full attack chain โ https://thehackernews.com/2026/01/konni-hackers-deploy-ai-generated.html
๐ฅ9โก5๐คฏ4๐3๐1
๐ Attackers now use ๐ค AI to write, hide, and mutate malware in real time. Google and Anthropic confirm AI-orchestrated attacks running autonomously end to end.
They bypass EDR by looking normal on each endpoint. The tell is in network behavior.
๐ How network signals expose what endpoints miss โ https://thehackernews.com/2026/01/winning-against-ai-based-attacks.html
They bypass EDR by looking normal on each endpoint. The tell is in network behavior.
๐ How network signals expose what endpoints miss โ https://thehackernews.com/2026/01/winning-against-ai-based-attacks.html
โก14๐4๐คฏ3๐2
๐จ Two popular VS Code AI assistant extensions were caught spying on developers.
They looked normal but quietly sent opened files and code edits to servers in ๐จ๐ณ China.
Koi Security says 1.5M installs were exposed without consent.
๐Read โ https://thehackernews.com/2026/01/malicious-vs-code-ai-extensions-with-15.html
They looked normal but quietly sent opened files and code edits to servers in ๐จ๐ณ China.
Koi Security says 1.5M installs were exposed without consent.
๐Read โ https://thehackernews.com/2026/01/malicious-vs-code-ai-extensions-with-15.html
๐10๐5โก4
๐จ Weekly Cybersecurity Recap
โ ๏ธ Old flaws, new attacks
๐ง AI writing malware
๐งฉ Trusted software abused
โฑ๏ธ Exploits moving fast
๐ Read the full recap. Stay alert โ https://thehackernews.com/2026/01/weekly-recap-firewall-flaws-ai-built.html
โ ๏ธ Old flaws, new attacks
๐ง AI writing malware
๐งฉ Trusted software abused
โฑ๏ธ Exploits moving fast
๐ Read the full recap. Stay alert โ https://thehackernews.com/2026/01/weekly-recap-firewall-flaws-ai-built.html
๐5๐3
๐จ ALERT: Indian users are being hit by a cyber-espionage campaign posing as Income Tax emails.
Opening the attachment installs a stealth backdoor that disguises itself as Windows Explorer, bypasses UAC, and stays hidden.
๐ Inside the attack chain and payloads โ https://thehackernews.com/2026/01/indian-users-targeted-in-tax-phishing.html
Opening the attachment installs a stealth backdoor that disguises itself as Windows Explorer, bypasses UAC, and stays hidden.
๐ Inside the attack chain and payloads โ https://thehackernews.com/2026/01/indian-users-targeted-in-tax-phishing.html
๐8๐8๐5
Google Project Zero revealed a working zero-click exploit chain against Pixel 9 phones.
A bug in the Dolby audio decoder let Google Messages process a malicious audio file in the background, gaining code execution, then a kernel bug completed the takeover. Pixel patches shipped in early Jan 2026.
๐ Read โ https://thehackernews.com/2026/01/threatsday-bulletin-pixel-zero-click.html#zero-click-chain-hits-pixel
A bug in the Dolby audio decoder let Google Messages process a malicious audio file in the background, gaining code execution, then a kernel bug completed the takeover. Pixel patches shipped in early Jan 2026.
๐ Read โ https://thehackernews.com/2026/01/threatsday-bulletin-pixel-zero-click.html#zero-click-chain-hits-pixel
๐ฅ19๐6
๐ URGENT: Microsoft rushed out out-of-band fixes for an actively exploited Office zero-day.
CVE-2026-21509 (CVSS 7.8) lets attackers bypass Office security using a malicious file that must be opened by the victim.
๐ Details โ https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
CVE-2026-21509 (CVSS 7.8) lets attackers bypass Office security using a malicious file that must be opened by the victim.
๐ Details โ https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
๐ฅ13๐7๐คฏ4โก3๐ฑ1
โ ๏ธ Most OT incidents donโt start in OT. They start with routine IT gaps reaching operations.
Sygnia found risk centered on remote access, management systems, identity, and recoveryโnot the process network. ~60% of OT access came via trusted management paths.
๐ Why this pattern keeps repeating across industries โ https://thehackernews.com/expert-insights/2026/01/ot-security-in-practice-4-crossindustry.html
Sygnia found risk centered on remote access, management systems, identity, and recoveryโnot the process network. ~60% of OT access came via trusted management paths.
๐ Why this pattern keeps repeating across industries โ https://thehackernews.com/expert-insights/2026/01/ot-security-in-practice-4-crossindustry.html
๐10โก4
๐จ๐ณ China-aligned APTs are using PeckBirdy, a JScript-based C2 framework active since 2023, to move quietly across browsers, Windows tools, and servers.
๐ต๏ธโโ๏ธ It relies on LOLBins to deliver modular backdoors and steal data, leaving little trace on disk.
๐ See how PeckBirdy works โ https://thehackernews.com/2026/01/china-linked-hackers-have-used.html
๐ต๏ธโโ๏ธ It relies on LOLBins to deliver modular backdoors and steal data, leaving little trace on disk.
๐ See how PeckBirdy works โ https://thehackernews.com/2026/01/china-linked-hackers-have-used.html
โก11๐5๐คฏ2
โ ๏ธ A single spreadsheet formula can now lead to full server takeover in Grist-Core.
The flaw, CVE-2026-24002 (CVSS 9.1), breaks out of the Pyodide sandbox, letting attackers run OS commands and access files and secrets.
๐ Read โ https://thehackernews.com/2026/01/critical-grist-core-vulnerability.html
The flaw, CVE-2026-24002 (CVSS 9.1), breaks out of the Pyodide sandbox, letting attackers run OS commands and access files and secrets.
๐ Read โ https://thehackernews.com/2026/01/critical-grist-core-vulnerability.html
๐ฅ6โก4
โ ๏ธ Update: Alma Security calls CVE-2026-1245 ParserPoison.
binary-parser drops unvalidated field names and encodings into new Function(). Untrusted schemas = JavaScript execution.
๐ How ParserPoison works under the hood โ https://thehackernews.com/2026/01/certcc-warns-binary-parser-bug-allows.html
binary-parser drops unvalidated field names and encodings into new Function(). Untrusted schemas = JavaScript execution.
๐ How ParserPoison works under the hood โ https://thehackernews.com/2026/01/certcc-warns-binary-parser-bug-allows.html
๐ฅ8
๐จ ClickFix attacks are evolving fast.
๐งฉ Fake CAPTCHAs trick users into running commands that abuse signed Windows App-V scripts to proxy PowerShell.
โ๏ธ Malware like Amatera Stealer is staged via trusted services, runs in memory, and mainly hits enterprise systemsโstaying under EDR radar.
๐ Inside the new ClickFix playbook โ https://thehackernews.com/2026/01/clickfix-attacks-expand-using-fake.html
๐งฉ Fake CAPTCHAs trick users into running commands that abuse signed Windows App-V scripts to proxy PowerShell.
โ๏ธ Malware like Amatera Stealer is staged via trusted services, runs in memory, and mainly hits enterprise systemsโstaying under EDR radar.
๐ Inside the new ClickFix playbook โ https://thehackernews.com/2026/01/clickfix-attacks-expand-using-fake.html
๐5โก2๐ฅ2
๐ฎ๐ณ Indian government networks were targeted in two cyber campaigns linked to a Pakistan-based actor.
Tracked by Zscaler as Gopher Strike and Sheet Attack, the key tactic was India-only malware delivery, filtered by IP and Windows systems to evade analysis.
๐ Attack chain and tools explained โ https://thehackernews.com/2026/01/experts-detect-pakistan-linked-cyber.html
Tracked by Zscaler as Gopher Strike and Sheet Attack, the key tactic was India-only malware delivery, filtered by IP and Windows systems to evade analysis.
๐ Attack chain and tools explained โ https://thehackernews.com/2026/01/experts-detect-pakistan-linked-cyber.html
๐6๐4
๐ WhatsApp is adding a lockdown-style security mode for high-risk users, including journalists and public figures.
It blocks media from unknown senders, silences unknown calls, and locks risky settings to reduce spyware exposure.
๐ How it works โ https://thehackernews.com/2026/01/whatsapp-rolls-out-lockdown-style.html
It blocks media from unknown senders, silences unknown calls, and locks risky settings to reduce spyware exposure.
๐ How it works โ https://thehackernews.com/2026/01/whatsapp-rolls-out-lockdown-style.html
๐12๐9โก3๐1๐ค1
โก WEBINAR ALERT โ AI is redefining how MSSPs scale in 2026.
This session breaks down how one MSSP cut manual work, delivered CISO-grade services, and grew recurring revenue -- without adding headcount. The advantage came from automation, not expansion.
๐ Register now to see how it works โ https://thehacker.news/ai-security-management
This session breaks down how one MSSP cut manual work, delivered CISO-grade services, and grew recurring revenue -- without adding headcount. The advantage came from automation, not expansion.
๐ Register now to see how it works โ https://thehacker.news/ai-security-management
๐6
๐ง Fortinet issues patch update for actively exploited FortiOS SSO flaw.
The fix addresses CVE-2026-24858 (CVSS 9.4), an SSO authentication bypass that can allow cross-tenant device access when FortiCloud SSO is enabled. CISA has added the issue to its KEV list, setting a Jan 30 remediation deadline.
๐ Details โ https://thehackernews.com/2026/01/fortinet-patches-cve-2026-24858-after.html
The fix addresses CVE-2026-24858 (CVSS 9.4), an SSO authentication bypass that can allow cross-tenant device access when FortiCloud SSO is enabled. CISA has added the issue to its KEV list, setting a Jan 30 remediation deadline.
๐ Details โ https://thehackernews.com/2026/01/fortinet-patches-cve-2026-24858-after.html
๐ฅ8