๐จ ClickFix attacks are evolving fast.
๐งฉ Fake CAPTCHAs trick users into running commands that abuse signed Windows App-V scripts to proxy PowerShell.
โ๏ธ Malware like Amatera Stealer is staged via trusted services, runs in memory, and mainly hits enterprise systemsโstaying under EDR radar.
๐ Inside the new ClickFix playbook โ https://thehackernews.com/2026/01/clickfix-attacks-expand-using-fake.html
๐งฉ Fake CAPTCHAs trick users into running commands that abuse signed Windows App-V scripts to proxy PowerShell.
โ๏ธ Malware like Amatera Stealer is staged via trusted services, runs in memory, and mainly hits enterprise systemsโstaying under EDR radar.
๐ Inside the new ClickFix playbook โ https://thehackernews.com/2026/01/clickfix-attacks-expand-using-fake.html
๐5โก3๐ฅ2
๐ฎ๐ณ Indian government networks were targeted in two cyber campaigns linked to a Pakistan-based actor.
Tracked by Zscaler as Gopher Strike and Sheet Attack, the key tactic was India-only malware delivery, filtered by IP and Windows systems to evade analysis.
๐ Attack chain and tools explained โ https://thehackernews.com/2026/01/experts-detect-pakistan-linked-cyber.html
Tracked by Zscaler as Gopher Strike and Sheet Attack, the key tactic was India-only malware delivery, filtered by IP and Windows systems to evade analysis.
๐ Attack chain and tools explained โ https://thehackernews.com/2026/01/experts-detect-pakistan-linked-cyber.html
๐8๐4
๐ WhatsApp is adding a lockdown-style security mode for high-risk users, including journalists and public figures.
It blocks media from unknown senders, silences unknown calls, and locks risky settings to reduce spyware exposure.
๐ How it works โ https://thehackernews.com/2026/01/whatsapp-rolls-out-lockdown-style.html
It blocks media from unknown senders, silences unknown calls, and locks risky settings to reduce spyware exposure.
๐ How it works โ https://thehackernews.com/2026/01/whatsapp-rolls-out-lockdown-style.html
๐17๐12โก3๐ค3๐1
โก WEBINAR ALERT โ AI is redefining how MSSPs scale in 2026.
This session breaks down how one MSSP cut manual work, delivered CISO-grade services, and grew recurring revenue -- without adding headcount. The advantage came from automation, not expansion.
๐ Register now to see how it works โ https://thehacker.news/ai-security-management
This session breaks down how one MSSP cut manual work, delivered CISO-grade services, and grew recurring revenue -- without adding headcount. The advantage came from automation, not expansion.
๐ Register now to see how it works โ https://thehacker.news/ai-security-management
๐6โก1
๐ง Fortinet issues patch update for actively exploited FortiOS SSO flaw.
The fix addresses CVE-2026-24858 (CVSS 9.4), an SSO authentication bypass that can allow cross-tenant device access when FortiCloud SSO is enabled. CISA has added the issue to its KEV list, setting a Jan 30 remediation deadline.
๐ Details โ https://thehackernews.com/2026/01/fortinet-patches-cve-2026-24858-after.html
The fix addresses CVE-2026-24858 (CVSS 9.4), an SSO authentication bypass that can allow cross-tenant device access when FortiCloud SSO is enabled. CISA has added the issue to its KEV list, setting a Jan 30 remediation deadline.
๐ Details โ https://thehackernews.com/2026/01/fortinet-patches-cve-2026-24858-after.html
๐ฅ15๐2
๐ A WinRAR bug fixed in July 2025 is still being exploited.
Researchers at Google ties CVE-2025-8088 to Russia- and China-linked actors, plus cybercrime groups deploying RATs and stealers, showing how quickly n-days get reused.
๐ Read โ https://thehackernews.com/2026/01/google-warns-of-active-exploitation-of.html
Researchers at Google ties CVE-2025-8088 to Russia- and China-linked actors, plus cybercrime groups deploying RATs and stealers, showing how quickly n-days get reused.
๐ Read โ https://thehackernews.com/2026/01/google-warns-of-active-exploitation-of.html
๐ฅ14โก3๐ค3
China-linked Mustang Panda is using an updated COOLCLIENT backdoor in 2025 espionage attacks on government networks across Asia and Russia.
๐๏ธ Enables file theft
โจ๏ธ keylogging
๐ clipboard monitoring
๐ proxy credential theft
๐ Read โ https://thehackernews.com/2026/01/mustang-panda-deploys-updated.html
๐๏ธ Enables file theft
โจ๏ธ keylogging
๐ clipboard monitoring
๐ proxy credential theft
๐ Read โ https://thehackernews.com/2026/01/mustang-panda-deploys-updated.html
๐ค6
โ ๏ธ n8n disclosed two sandbox escape flaws that let authenticated users seize control of automation servers.
One issue is rated CVSS 9.9 and enables full RCE. Risk is higher in internal execution mode, which n8n already advises against.
๐ Details โ https://thehackernews.com/2026/01/two-high-severity-n8n-flaws-allow.html
One issue is rated CVSS 9.9 and enables full RCE. Risk is higher in internal execution mode, which n8n already advises against.
๐ Details โ https://thehackernews.com/2026/01/two-high-severity-n8n-flaws-allow.html
๐11๐ฅ1
๐จ A critical flaw in the vm2 Node.js library lets attackers escape the sandbox and run code on the host system.
Tracked as CVE-2026-22709 (CVSS 9.8), the issue stems from improper Promise handler sanitization.
๐ How the flaw works โ https://thehackernews.com/2026/01/critical-vm2-nodejs-flaw-allows-sandbox.html
Tracked as CVE-2026-22709 (CVSS 9.8), the issue stems from improper Promise handler sanitization.
๐ How the flaw works โ https://thehackernews.com/2026/01/critical-vm2-nodejs-flaw-allows-sandbox.html
๐5
๐ค AI didnโt replace SOC analysts. It fixed the scale gap.
Agentic AI investigates every alert first, then hands a verdict to humans.
๐ซ No sampling. No skipped signals.
๐ Full context by default.
๐ How triage really changes โ https://thehackernews.com/2026/01/from-triage-to-threat-hunts-how-ai.html
Agentic AI investigates every alert first, then hands a verdict to humans.
๐ซ No sampling. No skipped signals.
๐ Full context by default.
๐ How triage really changes โ https://thehackernews.com/2026/01/from-triage-to-threat-hunts-how-ai.html
๐ฅ8
Researchers find Russian-linked ELECTRUM targeted Polandโs โก power infrastructure in December.
The coordinated attack hit wind, solar, and CHP sites, breaching OT systems and damaging some equipment beyond repair.
๐ Read โ https://thehackernews.com/2026/01/russian-electrum-tied-to-december-2025.html
The coordinated attack hit wind, solar, and CHP sites, breaching OT systems and damaging some equipment beyond repair.
๐ Read โ https://thehackernews.com/2026/01/russian-electrum-tied-to-december-2025.html
๐ฅ8๐คฏ6โก1
๐จ Fake VS Code extension abused #Moltbotโs name to deliver remote access malware.
It posed as an AI assistant, despite Moltbot having no official VS Code plugin. Once installed, it auto-ran on IDE launch and dropped ScreenConnect for persistent remote control.
๐ Read โ https://thehackernews.com/2026/01/fake-moltbot-ai-coding-assistant-on-vs.html
It posed as an AI assistant, despite Moltbot having no official VS Code plugin. Once installed, it auto-ran on IDE launch and dropped ScreenConnect for persistent remote control.
๐ Read โ https://thehackernews.com/2026/01/fake-moltbot-ai-coding-assistant-on-vs.html
๐คฏ19๐7โก2
๐จ Container adoption has outpaced security.
82% of organizations suffered a container breach last year, and most now assume one will happen every year. Fast-moving containers and unchecked public images keep adding risk faster than teams can fix it.
๐ Why container security prevention is failing in 2026 โ https://thehackernews.com/expert-insights/2026/01/the-great-container-disconnect-security.html
82% of organizations suffered a container breach last year, and most now assume one will happen every year. Fast-moving containers and unchecked public images keep adding risk faster than teams can fix it.
๐ Why container security prevention is failing in 2026 โ https://thehackernews.com/expert-insights/2026/01/the-great-container-disconnect-security.html
๐7โก3๐2๐1๐ค1
๐ช Google dismantles IPIDEA, a major residential proxy network.
GTIG says 550+ threat groups used it this month to hide espionage, cybercrime, and password-spray attacks by routing traffic through hijacked home devices worldwide.
๐ Read โ https://thehackernews.com/2026/01/google-disrupts-ipidea-one-of-worlds.html
GTIG says 550+ threat groups used it this month to hide espionage, cybercrime, and password-spray attacks by routing traffic through hijacked home devices worldwide.
๐ Read โ https://thehackernews.com/2026/01/google-disrupts-ipidea-one-of-worlds.html
๐7๐ฅ5
๐จ SolarWinds patches unauthenticated RCE paths โ https://thehackernews.com/2026/01/solarwinds-fixes-four-critical-web-help.html
Four critical Web Help Desk bugs let attackers skip login, run code.
Deserialization + auth bypass chained. Update closes it.
Four critical Web Help Desk bugs let attackers skip login, run code.
Deserialization + auth bypass chained. Update closes it.
๐ฅ4๐3๐2
๐จ Fake ChatGPT Chrome add-on stole 459+ API keys: https://thehackernews.com/2026/01/weekly-recap-firewall-flaws-ai-built.html#:~:text=Malicious%20Chrome%20Extensions%20Steal%20OpenAI%20API%20Keys%20and%20User%20Prompts
Keys sent to Telegram after logout or chat delete.
Hidden Google access raised the real stakes.
Keys sent to Telegram after logout or chat delete.
Hidden Google access raised the real stakes.
๐6๐3๐ฑ3
๐๐ก๏ธ Poor threat intel drives downtime and analyst burnout in modern SOCs.
Fresh, validated feeds shorten MTTD/MTTR and reduce false positives at scale.
Full details: https://thehackernews.com/2026/01/3-decisions-cisos-need-to-make-to.html
Fresh, validated feeds shorten MTTD/MTTR and reduce false positives at scale.
Full details: https://thehackernews.com/2026/01/3-decisions-cisos-need-to-make-to.html
๐4
๐ฅ This weekโs ThreatsDay tracks exploits, ransomware trends, crypto laundering, and phishing operations.
Patterns point to scale and repetition, not one-off incidents, across platforms teams already trust.
Full details โก๏ธ https://thehackernews.com/2026/01/threatsday-bulletin-new-rces-darknet.html
Patterns point to scale and repetition, not one-off incidents, across platforms teams already trust.
Full details โก๏ธ https://thehackernews.com/2026/01/threatsday-bulletin-new-rces-darknet.html
๐ฅ1