A critical AWS CodeBuild misconfiguration has exposed core repositories to potential attack – Read More –
Author: Joe-W
ThreatsDay Bulletin: AI Voice Cloning Exploit, Wi-Fi Kill Switch, PLC Vulns, and 14 More Stories – The Hacker News
The internet never stays quiet. Every week, new hacks, scams, and security problems show up somewhere. This week’s stories show how fast attackers change their tricks, how small mistakes turn into big risks, and how the same old tools keep finding new ways to break in. Read on to catch up before the next wave … Read More “ThreatsDay Bulletin: AI Voice Cloning Exploit, Wi-Fi Kill Switch, PLC Vulns, and 14 More Stories – The Hacker News” »
Americans are being taught to trust propaganda. Often, it’s not intentional. A classic bit of advice for separating propaganda from real research is “Check the citations.” If the sources support the analysis, the material can be trusted. But AI is changing the rules of the game. In December, the White House announced new guidance to … Read More “The quiet way AI normalizes foreign influence – CyberScoop” »
Confusion reigns after claims that data linked to 17.5 million Instagram accounts is up for sale – sparked by a vague post, contradictory statements, and a flood of password reset emails nobody asked for. And we dig into Grok, Elon Musk’s AI chatbot, after it started generating sexualised images of women and children – raising … Read More “Smashing Security podcast #450: From Instagram panic to Grok gone wild – GRAHAM CLULEY” »
IANS Research reveals a growth in executive-level CISO titles, amid resource challenges – Read More –
Years-Old Vulnerable Apache Struts 2 Versions See 387K Weekly Downloads – Hackread – Cybersecurity News, Data Breaches, AI, and More
Over 387,000 users downloaded vulnerable Apache Struts versions this week. Exclusive Sonatype research reveals a high-risk flaw found by AI. Is your system at risk? – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
As AI copilots and assistants become embedded in daily work, security teams are still focused on protecting the models themselves. But recent incidents suggest the bigger risk lies elsewhere: in the workflows that surround those models. Two Chrome extensions posing as AI helpers were recently caught stealing ChatGPT and DeepSeek chat data from over 900,000 … Read More “Model Security Is the Wrong Frame – The Real Risk Is Workflow Security – The Hacker News” »
Aembit Announces Agenda and Speaker Lineup for NHIcon 2026 on Agentic AI Security – Hackread – Cybersecurity News, Data Breaches, AI, and More
Silver Spring, Maryland, 15th January 2026, CyberNewsWire – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
New CastleLoader Variant Linked to 469 Infections Across Critical Sectors – Hackread – Cybersecurity News, Data Breaches, AI, and More
ANY.RUN report reveals how the new CastleLoader malware targets US government agencies using stealthy ClickFix tricks and memory-based attacks to bypass security. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
The Black Lotus Labs team at Lumen Technologies said it null-routed traffic to more than 550 command-and-control (C2) nodes associated with the AISURU/Kimwolf botnet since early October 2025. AISURU and its Android counterpart, Kimwolf, have emerged as some of the biggest botnets in recent times, capable of directing enslaved devices to participate in distributed denial-of-service … Read More “Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers – The Hacker News” »
It’s 2026, yet many SOCs are still operating the way they did years ago, using tools and processes designed for a very different threat landscape. Given the growth in volumes and complexity of cyber threats, outdated practices no longer fully support analysts’ needs, staggering investigations and incident response. Below are four limiting habits that may … Read More “4 Outdated Habits Destroying Your SOC’s MTTR in 2026 – The Hacker News” »
ISACA’s State of Privacy 2026 report reveals that data privacy teams remain understaffed and underfunded, despite growing regulatory demands and rising technical privacy challenges – Read More –
DDoS-ers are striking a website linked to a data breach at the Department of Homeland Security – Read More –
Palo Alto Networks has released security updates for a high-severity security flaw impacting GlobalProtect Gateway and Portal, for which it said there exists a proof-of-concept (PoC) exploit. The vulnerability, tracked as CVE-2026-0227 (CVSS score: 7.7), has been described as a denial-of-service (DoS) condition impacting GlobalProtect PAN-OS software arising as a result of an improper check … Read More “Palo Alto Fixes GlobalProtect DoS Flaw That Can Crash Firewalls Without Login – The Hacker News” »
Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud – The Hacker News
Microsoft on Wednesday announced that it has taken a “coordinated legal action” in the U.S. and the U.K. to disrupt a cybercrime subscription service called RedVDS that has allegedly fueled millions in fraud losses. The effort, per the tech giant, is part of a broader law enforcement effort in collaboration with law enforcement authorities that … Read More “Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud – The Hacker News” »
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Adobe Bridge is a creative asset manager that lets you preview, organize, edit, and publish multiple creative assets quickly and easily. Adobe Dreamweaver is a web design integrated development environment (IDE) that is used to develop … Read More “Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
South Africa Facing Continued Financial Fraud Crime Wave – Da Vinci Cybersecurity: Leading Cyber Security Services in South Africa.
One only has to read the daily newsfeeds to see how drastic digital financial crime is around the world. South Africa is particularly vulnerable. It’s been reported that around 70% of South Africans have been victims of some form of cybercrime as compared to the global rate of 50%. South Africa has not only maintained … Read More “South Africa Facing Continued Financial Fraud Crime Wave – Da Vinci Cybersecurity: Leading Cyber Security Services in South Africa.” »
Posted by Matteo Beccati on Jan 14 ======================================================================== Revive Adserver Security Advisory REVIVE-SA-2026-001 ———————————————————————— https://www.revive-adserver.com/security/revive-sa-2026-001 ———————————————————————— Date: 2026-01-14 Risk Level: High Applications affected: Revive… – Read More – Full Disclosure
In modern enterprises, data is not a fixed resource that can be assigned to a particular system or department…. The post Understanding the enterprise data lifecycle appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
The Kimwolf botnet, which splintered off from the record-setting Aisuru DDoS botnet in August, gained the widespread attention of security researchers when it temporarily claimed the top spot in Cloudflare’s global domain rankings in late October 2025. Within weeks it spread like a wildfire, eventually taking over more than 2 million unofficial Android TV devices, … Read More “Kimwolf botnet’s swift rise to 2M infected devices agitates security researchers – CyberScoop” »
Sources: DHS finalizing replacement for disbanded critical infrastructure security council – CyberScoop
The Department of Homeland Security is finalizing plans for a new body that would replace the functions of the Critical Infrastructure Partnership Advisory Council (CIPAC) and serve as a communications hub between industry and government to discuss ongoing threats to U.S. critical infrastructure, including from cyber attacks. Under previous administrations, CIPAC served as a nerve … Read More “Sources: DHS finalizing replacement for disbanded critical infrastructure security council – CyberScoop” »
Sources: DHS finalizing replacement for disbanded critical infrastructure security council – CyberScoop
The Department of Homeland Security is finalizing plans for a new body that would replace the functions of the Critical Infrastructure Partnership Advisory Council (CIPAC) and serve as a communications hub between industry and government to discuss ongoing threats to U.S. critical infrastructure, including from cyber attacks. Under previous administrations, CIPAC served as a nerve … Read More “Sources: DHS finalizing replacement for disbanded critical infrastructure security council – CyberScoop” »
Structure and reliability in e-commerce platforms – Hackread – Cybersecurity News, Data Breaches, AI, and More
A successful e-commerce platform requires more than just a good-looking design. Security, stability, speed, and scalability are key… – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
New China Linked VoidLink Linux Malware Targets Major Cloud Providers – Hackread – Cybersecurity News, Data Breaches, AI, and More
Researchers have discovered VoidLink, a sophisticated new Linux malware framework designed to infiltrate AWS, Google Cloud, and Azure. Learn how this Chinese-affiliated toolkit uses adaptive stealth to stay hidden. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
California Attorney General Rob Bonta announced an investigation Wednesday into xAI over allegations that its artificial intelligence model Grok is being used to create nonconsensual sexually explicit images of women and children on a large scale, marking the latest escalation in regulatory efforts to address AI-generated deepfakes. The California investigation focuses on Grok’s “spicy mode,” … Read More “California AG launches investigation into X’s sexualized deepfakes – CyberScoop” »
Predator spyware operators have the ability to recognize why an infection failed, and the tech has more sophisticated capabilities for averting detection than previously known, according to research published Wednesday. Jamf Threat Labs found from an analysis of a Predator sample that it has an error code system that can alert operators to why an … Read More “Predator spyware demonstrates troubleshooting, researcher-dodging capabilities – CyberScoop” »
RedVDS cyber-crime-as-a-service platform powering phishing, BEC attacks and other fraud has cost victims millions – Read More –
AI agents have quickly moved from experimental tools to core components of daily workflows across security, engineering, IT, and operations. What began as individual productivity aids, like personal code assistants, chatbots, and copilots, has evolved into shared, organization-wide agents embedded in critical processes. These agents can orchestrate workflows across multiple systems, for example: – Read … Read More “AI Agents Are Becoming Privilege Escalation Paths – The Hacker News” »
Phishing attacks have been identified using fake PayPal alerts to exploit remote monitoring and management tools – Read More –
Hacker Claims Full Breach of Russia’s Max Messenger, Threatens Public Leak – Hackread – Cybersecurity News, Data Breaches, AI, and More
A hacker claims a full breach of Russia’s Max Messenger, threatening to leak user data and backend systems if demands are not met. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Microsoft announced Wednesday that it worked with international law enforcement to seize infrastructure used to run cybercrime subscription service RedVDS and organized civil actions in the United States and United Kingdom to disrupt its further use. RedVDS has enabled at least $40 million in fraud losses in the U.S. since March 2025, according to Microsoft. … Read More “Microsoft seizes RedVDS infrastructure, disrupts fast-growing cybercrime marketplace – CyberScoop” »
A new DeadLock ransomware operation uses Polygon blockchain smart contracts to manage proxy server addresses – Read More –
SpyCloud Launches Supply Chain Solution to Combat Rising Third-Party Identity Threats – Hackread – Cybersecurity News, Data Breaches, AI, and More
Austin, TX / USA, 14th January 2026, CyberNewsWire – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Microsoft January 2026 Patch Tuesday: 115 Vulnerabilities Fixed – Hackread – Cybersecurity News, Data Breaches, AI, and More
Microsoft kicks off 2026 with 115 security updates, including a fix for an actively exploited zero-day. Protect your Windows and Office systems today. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Survey: Rapid AI Adoption Causes Major Cyber Risk Visibility Gaps – Hackread – Cybersecurity News, Data Breaches, AI, and More
As software supply chains become longer and more interconnected, enterprises have become well aware of the need to… – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Security experts have disclosed details of an active malware campaign that’s exploiting a DLL side-loading vulnerability in a legitimate binary associated with the open-source c-ares library to bypass security controls and deliver a wide range of commodity trojans and stealers. “Attackers achieve evasion by pairing a malicious libcares-2.dll with any signed version of the legitimate … Read More “Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware – The Hacker News” »
When Does a Chatbot Make Sense in Freshdesk and When It Doesn’t – Hackread – Cybersecurity News, Data Breaches, AI, and More
Customer support teams adopt chatbots to reduce workload, shorten response times, and control costs. Freshdesk makes chatbot deployment… – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
GitGuardian Closes 2025 with Strong Enterprise Momentum, Protecting Millions of Developers Worldwide – Hackread – Cybersecurity News, Data Breaches, AI, and More
New York, NY, 14th January 2026, CyberNewsWire – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Convert Video to Text: A Comprehensive Guide – Hackread – Cybersecurity News, Data Breaches, AI, and More
In today’s digital age, video content has become an essential tool for communication, education, and entertainment. Whether it’s… – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Hackers Launch Over 91,000 Attacks on AI Systems Using Fake Ollama Servers – Hackread – Cybersecurity News, Data Breaches, AI, and More
A new investigation by GreyNoise reveals a massive wave of over 90,000 attacks targeting AI tools like Ollama and OpenAI. Experts warn that hackers are conducting “reconnaissance” to map out vulnerabilities in enterprise AI systems. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Fortinet Fixes Critical FortiSIEM Flaw Allowing Unauthenticated Remote Code Execution – The Hacker News
Fortinet has released updates to fix a critical security flaw impacting FortiSIEM that could allow an unauthenticated attacker to achieve code execution on susceptible instances. The operating system (OS) injection vulnerability, tracked as CVE-2025-64155, is rated 9.4 out of 10.0 on the CVSS scoring system. “An improper neutralization of special elements used in an OS … Read More “Fortinet Fixes Critical FortiSIEM Flaw Allowing Unauthenticated Remote Code Execution – The Hacker News” »
The financial sector should finalize its post-quantum cryptography transition circa 2034, G7 cyber experts said – Read More –
Microsoft on Tuesday rolled out its first security update for 2026, addressing 114 security flaws, including one vulnerability that it said has been actively exploited in the wild. Of the 114 flaws, eight are rated Critical, and 106 are rated Important in severity. As many as 58 vulnerabilities have been classified as privilege escalation, followed … Read More “Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited – The Hacker News” »
New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification – The Hacker News
Research analyzing 4,700 leading websites reveals that 64% of third-party applications now access sensitive data without business justification, up from 51% in 2024. Government sector malicious activity spiked from 2% to 12.9%, while 1 in 7 Education sites show active compromise. Specific offenders: Google Tag Manager (8% of violations), Shopify (5%), Facebook Pixel (4%). Download … Read More “New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification – The Hacker News” »
Chainalysis estimates $17bn will be lost to crypto scams in 2025 as AI takes hold – Read More –
Microsoft has patched three zero-day vulnerabilities in the first patch Tuesday of 2026, including one under active exploitation – Read More –
How Cybercrime Markets Launder Breach Proceeds and What Security Teams Miss – Hackread – Cybersecurity News, Data Breaches, AI, and More
Explore how cybercrime markets turn stolen data into laundered funds using dollar‑pegged assets, mixers and exchanges-and why tracking BTC USDT price and stablecoin flows now matters for security, fraud and AML teams. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Critical Node.js Vulnerability Can Cause Server Crashes via async_hooks Stack Overflow – The Hacker News
Node.js has released updates to fix what it described as a critical security issue impacting “virtually every production Node.js app” that, if successfully exploited, could trigger a denial-of-service (DoS) condition. “Node.js/V8 makes a best-effort attempt to recover from stack space exhaustion with a catchable error, which frameworks have come to rely on for service availability,” … Read More “Critical Node.js Vulnerability Can Cause Server Crashes via async_hooks Stack Overflow – The Hacker News” »
New principles help organisations to design, review, and secure connectivity to (and within) OT systems. – Read More – NCSC Feed
The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of new cyber attacks targeting its defense forces with malware known as PLUGGYAPE between October and December 2025. The activity has been attributed with medium confidence to a Russian hacking group tracked as Void Blizzard (aka Laundry Bear or UAC-0190). The threat actor is … Read More “PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces – The Hacker News” »