Google Project Zero revealed a working zero-click exploit chain against Pixel 9 phones.
A bug in the Dolby audio decoder let Google Messages process a malicious audio file in the background, gaining code execution, then a kernel bug completed the takeover. Pixel patches shipped in early Jan 2026.
๐ Read โ https://thehackernews.com/2026/01/threatsday-bulletin-pixel-zero-click.html#zero-click-chain-hits-pixel
A bug in the Dolby audio decoder let Google Messages process a malicious audio file in the background, gaining code execution, then a kernel bug completed the takeover. Pixel patches shipped in early Jan 2026.
๐ Read โ https://thehackernews.com/2026/01/threatsday-bulletin-pixel-zero-click.html#zero-click-chain-hits-pixel
๐ฅ20๐7
๐ URGENT: Microsoft rushed out out-of-band fixes for an actively exploited Office zero-day.
CVE-2026-21509 (CVSS 7.8) lets attackers bypass Office security using a malicious file that must be opened by the victim.
๐ Details โ https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
CVE-2026-21509 (CVSS 7.8) lets attackers bypass Office security using a malicious file that must be opened by the victim.
๐ Details โ https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
๐ฅ15๐7๐คฏ4โก3๐1๐ฑ1
โ ๏ธ Most OT incidents donโt start in OT. They start with routine IT gaps reaching operations.
Sygnia found risk centered on remote access, management systems, identity, and recoveryโnot the process network. ~60% of OT access came via trusted management paths.
๐ Why this pattern keeps repeating across industries โ https://thehackernews.com/expert-insights/2026/01/ot-security-in-practice-4-crossindustry.html
Sygnia found risk centered on remote access, management systems, identity, and recoveryโnot the process network. ~60% of OT access came via trusted management paths.
๐ Why this pattern keeps repeating across industries โ https://thehackernews.com/expert-insights/2026/01/ot-security-in-practice-4-crossindustry.html
๐10โก4
๐จ๐ณ China-aligned APTs are using PeckBirdy, a JScript-based C2 framework active since 2023, to move quietly across browsers, Windows tools, and servers.
๐ต๏ธโโ๏ธ It relies on LOLBins to deliver modular backdoors and steal data, leaving little trace on disk.
๐ See how PeckBirdy works โ https://thehackernews.com/2026/01/china-linked-hackers-have-used.html
๐ต๏ธโโ๏ธ It relies on LOLBins to deliver modular backdoors and steal data, leaving little trace on disk.
๐ See how PeckBirdy works โ https://thehackernews.com/2026/01/china-linked-hackers-have-used.html
โก11๐5๐คฏ2
โ ๏ธ A single spreadsheet formula can now lead to full server takeover in Grist-Core.
The flaw, CVE-2026-24002 (CVSS 9.1), breaks out of the Pyodide sandbox, letting attackers run OS commands and access files and secrets.
๐ Read โ https://thehackernews.com/2026/01/critical-grist-core-vulnerability.html
The flaw, CVE-2026-24002 (CVSS 9.1), breaks out of the Pyodide sandbox, letting attackers run OS commands and access files and secrets.
๐ Read โ https://thehackernews.com/2026/01/critical-grist-core-vulnerability.html
๐ฅ6โก5
โ ๏ธ Update: Alma Security calls CVE-2026-1245 ParserPoison.
binary-parser drops unvalidated field names and encodings into new Function(). Untrusted schemas = JavaScript execution.
๐ How ParserPoison works under the hood โ https://thehackernews.com/2026/01/certcc-warns-binary-parser-bug-allows.html
binary-parser drops unvalidated field names and encodings into new Function(). Untrusted schemas = JavaScript execution.
๐ How ParserPoison works under the hood โ https://thehackernews.com/2026/01/certcc-warns-binary-parser-bug-allows.html
๐ฅ8โก1
๐จ ClickFix attacks are evolving fast.
๐งฉ Fake CAPTCHAs trick users into running commands that abuse signed Windows App-V scripts to proxy PowerShell.
โ๏ธ Malware like Amatera Stealer is staged via trusted services, runs in memory, and mainly hits enterprise systemsโstaying under EDR radar.
๐ Inside the new ClickFix playbook โ https://thehackernews.com/2026/01/clickfix-attacks-expand-using-fake.html
๐งฉ Fake CAPTCHAs trick users into running commands that abuse signed Windows App-V scripts to proxy PowerShell.
โ๏ธ Malware like Amatera Stealer is staged via trusted services, runs in memory, and mainly hits enterprise systemsโstaying under EDR radar.
๐ Inside the new ClickFix playbook โ https://thehackernews.com/2026/01/clickfix-attacks-expand-using-fake.html
๐5โก3๐ฅ2
๐ฎ๐ณ Indian government networks were targeted in two cyber campaigns linked to a Pakistan-based actor.
Tracked by Zscaler as Gopher Strike and Sheet Attack, the key tactic was India-only malware delivery, filtered by IP and Windows systems to evade analysis.
๐ Attack chain and tools explained โ https://thehackernews.com/2026/01/experts-detect-pakistan-linked-cyber.html
Tracked by Zscaler as Gopher Strike and Sheet Attack, the key tactic was India-only malware delivery, filtered by IP and Windows systems to evade analysis.
๐ Attack chain and tools explained โ https://thehackernews.com/2026/01/experts-detect-pakistan-linked-cyber.html
๐7๐4
๐ WhatsApp is adding a lockdown-style security mode for high-risk users, including journalists and public figures.
It blocks media from unknown senders, silences unknown calls, and locks risky settings to reduce spyware exposure.
๐ How it works โ https://thehackernews.com/2026/01/whatsapp-rolls-out-lockdown-style.html
It blocks media from unknown senders, silences unknown calls, and locks risky settings to reduce spyware exposure.
๐ How it works โ https://thehackernews.com/2026/01/whatsapp-rolls-out-lockdown-style.html
๐16๐12โก3๐ค2๐1
โก WEBINAR ALERT โ AI is redefining how MSSPs scale in 2026.
This session breaks down how one MSSP cut manual work, delivered CISO-grade services, and grew recurring revenue -- without adding headcount. The advantage came from automation, not expansion.
๐ Register now to see how it works โ https://thehacker.news/ai-security-management
This session breaks down how one MSSP cut manual work, delivered CISO-grade services, and grew recurring revenue -- without adding headcount. The advantage came from automation, not expansion.
๐ Register now to see how it works โ https://thehacker.news/ai-security-management
๐6โก1
๐ง Fortinet issues patch update for actively exploited FortiOS SSO flaw.
The fix addresses CVE-2026-24858 (CVSS 9.4), an SSO authentication bypass that can allow cross-tenant device access when FortiCloud SSO is enabled. CISA has added the issue to its KEV list, setting a Jan 30 remediation deadline.
๐ Details โ https://thehackernews.com/2026/01/fortinet-patches-cve-2026-24858-after.html
The fix addresses CVE-2026-24858 (CVSS 9.4), an SSO authentication bypass that can allow cross-tenant device access when FortiCloud SSO is enabled. CISA has added the issue to its KEV list, setting a Jan 30 remediation deadline.
๐ Details โ https://thehackernews.com/2026/01/fortinet-patches-cve-2026-24858-after.html
๐ฅ14๐2
๐ A WinRAR bug fixed in July 2025 is still being exploited.
Researchers at Google ties CVE-2025-8088 to Russia- and China-linked actors, plus cybercrime groups deploying RATs and stealers, showing how quickly n-days get reused.
๐ Read โ https://thehackernews.com/2026/01/google-warns-of-active-exploitation-of.html
Researchers at Google ties CVE-2025-8088 to Russia- and China-linked actors, plus cybercrime groups deploying RATs and stealers, showing how quickly n-days get reused.
๐ Read โ https://thehackernews.com/2026/01/google-warns-of-active-exploitation-of.html
๐ฅ12โก3๐ค3
China-linked Mustang Panda is using an updated COOLCLIENT backdoor in 2025 espionage attacks on government networks across Asia and Russia.
๐๏ธ Enables file theft
โจ๏ธ keylogging
๐ clipboard monitoring
๐ proxy credential theft
๐ Read โ https://thehackernews.com/2026/01/mustang-panda-deploys-updated.html
๐๏ธ Enables file theft
โจ๏ธ keylogging
๐ clipboard monitoring
๐ proxy credential theft
๐ Read โ https://thehackernews.com/2026/01/mustang-panda-deploys-updated.html
๐ค4
โ ๏ธ n8n disclosed two sandbox escape flaws that let authenticated users seize control of automation servers.
One issue is rated CVSS 9.9 and enables full RCE. Risk is higher in internal execution mode, which n8n already advises against.
๐ Details โ https://thehackernews.com/2026/01/two-high-severity-n8n-flaws-allow.html
One issue is rated CVSS 9.9 and enables full RCE. Risk is higher in internal execution mode, which n8n already advises against.
๐ Details โ https://thehackernews.com/2026/01/two-high-severity-n8n-flaws-allow.html
๐11
๐จ A critical flaw in the vm2 Node.js library lets attackers escape the sandbox and run code on the host system.
Tracked as CVE-2026-22709 (CVSS 9.8), the issue stems from improper Promise handler sanitization.
๐ How the flaw works โ https://thehackernews.com/2026/01/critical-vm2-nodejs-flaw-allows-sandbox.html
Tracked as CVE-2026-22709 (CVSS 9.8), the issue stems from improper Promise handler sanitization.
๐ How the flaw works โ https://thehackernews.com/2026/01/critical-vm2-nodejs-flaw-allows-sandbox.html
๐5
๐ค AI didnโt replace SOC analysts. It fixed the scale gap.
Agentic AI investigates every alert first, then hands a verdict to humans.
๐ซ No sampling. No skipped signals.
๐ Full context by default.
๐ How triage really changes โ https://thehackernews.com/2026/01/from-triage-to-threat-hunts-how-ai.html
Agentic AI investigates every alert first, then hands a verdict to humans.
๐ซ No sampling. No skipped signals.
๐ Full context by default.
๐ How triage really changes โ https://thehackernews.com/2026/01/from-triage-to-threat-hunts-how-ai.html
๐ฅ8
Researchers find Russian-linked ELECTRUM targeted Polandโs โก power infrastructure in December.
The coordinated attack hit wind, solar, and CHP sites, breaching OT systems and damaging some equipment beyond repair.
๐ Read โ https://thehackernews.com/2026/01/russian-electrum-tied-to-december-2025.html
The coordinated attack hit wind, solar, and CHP sites, breaching OT systems and damaging some equipment beyond repair.
๐ Read โ https://thehackernews.com/2026/01/russian-electrum-tied-to-december-2025.html
๐ฅ6๐คฏ3
๐จ Fake VS Code extension abused #Moltbotโs name to deliver remote access malware.
It posed as an AI assistant, despite Moltbot having no official VS Code plugin. Once installed, it auto-ran on IDE launch and dropped ScreenConnect for persistent remote control.
๐ Read โ https://thehackernews.com/2026/01/fake-moltbot-ai-coding-assistant-on-vs.html
It posed as an AI assistant, despite Moltbot having no official VS Code plugin. Once installed, it auto-ran on IDE launch and dropped ScreenConnect for persistent remote control.
๐ Read โ https://thehackernews.com/2026/01/fake-moltbot-ai-coding-assistant-on-vs.html
๐คฏ11๐5โก1