
Identity Under Siege: What the Salt Typhoon Campaign Reveals About Trusted Access Risks
The Salt Typhoon espionage campaign compromised email accounts of U.S. congressional staff by exploiting stolen credentials rather than deploying malware. Attackers blended into normal email and cloud traffic, maintaining persistent, low‑noise access to sensitive communications. The breach underscores that identity systems have become a primary attack surface, allowing threat actors to operate inside trusted environments without triggering conventional defenses. Vendors like Seceon argue that unified, behavior‑based platforms are essential to detect and remediate such credential‑based intrusions.

GitGuardian Closes 2025 with Strong Enterprise Momentum, Protecting Millions of Developers Worldwide
GitGuardian reported record ARR growth in 2025, fueled by rapid enterprise adoption across North America and Europe. The platform now safeguards over 115,000 developers, monitors more than 610,000 repositories and 210,000 collaboration‑tool sources, a seven‑fold increase from the prior year....

Convincing LinkedIn Comment-Reply Tactic Used in New Phishing
Scammers are posting fake LinkedIn reply comments that mimic official policy‑violation notices and direct users to malicious links. The fraudsters leverage LinkedIn’s own lnkd.in URL shortener, making the phishing URLs appear legitimate. Impersonated company pages also use the LinkedIn logo...
Antwerp’s AZ Monica Hospital Hit by Cyber Attack
AZ Monica hospital in Antwerp suffered a cyber attack on Tuesday, forcing a shutdown of computer systems at its Deurne and Harmonie campuses. The breach was detected at 6:30 am, prompting staff to power down servers and initiate an investigation by...

When the Marketing Graph Becomes the Target Map
A Wired investigation uncovered that Google’s ad service hosted audience segments tied to highly sensitive groups, allowing marketers and potential adversaries to target mobile devices linked to government employees and executives. The article warns that modern ad‑tech pipelines collect granular...

F5 NGINXaaS for Google Cloud Protects Cloud-Native Applications
F5 has introduced F5 NGINXaaS for Google Cloud, a managed, cloud‑native application delivery‑as‑a‑service that unifies load balancing, security and observability. Developed with Google Cloud, the service is available through the Marketplace and targets containerized, AI‑enabled workloads. It offers programmable traffic...
Widespread Magecart Campaign Targets Users of All Major Credit Cards
Silent Push researchers have uncovered a global Magecart campaign that has been skimming credit‑card data from all major networks since 2022. The attackers host malicious JavaScript on innocuous domains such as cdn‑cookie.com and erase the code when a WordPress admin bar...

Concentric AI Releases Private Scan Manager for AWS GovCloud (US)
Concentric AI has added Private Scan Manager support for AWS GovCloud (US), allowing federal agencies, contractors, and partners to run its Semantic Intelligence platform within isolated, U.S.-only cloud regions. The extension follows earlier 2025 announcements of private‑cloud scanning for Azure...
![[Webinar] Securing Agentic AI: From MCPs and Tool Access to Shadow API Key Sprawl](/cdn-cgi/image/width=1200,quality=75,format=auto,fit=cover/https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2N9qZuwkcslheNUOsWaTDrMYeXiBUfw1y-hItTvuGo71srarOm7AWzq3o7ro9E0x_CnC7XmJGXKl1tfkc6gTMK288y6M_zN6Yg1FATduXSQmMlp_jnHESxVYZDuJnNozO_Ff-r-lWIyG5AikC8AwrOckeYVYcCQv2RjeLof2bxV_TrcbvRvZqrTIcjD0/s2600/ai-agent.jpg)
[Webinar] Securing Agentic AI: From MCPs and Tool Access to Shadow API Key Sprawl
The Hacker News webinar spotlights the emerging security gap as agentic AI tools like Copilot, Claude Code, and Codex move from code generation to full‑cycle software deployment. Central to the risk are Machine Control Protocols (MCPs), which dictate which tools,...

PowerShell-Driven Multi-Stage Windows Malware Using Text Payloads
Researchers have uncovered the SHADOW#REACTOR campaign, a multi‑stage Windows malware chain that starts with an obfuscated VBS script and escalates through a PowerShell stager, text‑only payloads, and a .NET Reactor‑protected loader. The loader reflectively injects a Remcos RAT payload entirely...

Can You Afford the Total Cost of Free Java?
Running Java on a free, unsupported JVM carries hidden risks as exploit timelines have accelerated dramatically. In 2023, attackers began leveraging newly disclosed Java flaws within five days, and some incidents occurred in under an hour. Without commercial support, organizations...

BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNow
ServiceNow’s Virtual Agent API and Now Assist AI Agents contain a critical broken‑authentication flaw (CVE‑2025‑12420) that lets unauthenticated attackers impersonate any user using only an email address. The vulnerability exploits a static provider secret and email‑only auto‑linking to bypass MFA...

HoneyTrap: Outsmarting Jailbreak Attacks on Large Language Models
Researchers from Shanghai Jiao Tong University, UIUC and Zhejiang University introduced HoneyTrap, a deceptive‑defense framework that counters multi‑turn jailbreak attacks on large language models. The system employs four specialized defensive agents to mislead attackers, prolong interactions, and drain computational resources...
Armenia Probes Alleged Sale of 8 Million Government Records on Hacker Forum
Armenian authorities have launched a probe after a hacker identified as dk0m claimed to be selling eight million government records on a dark‑web forum. The data allegedly originates from a state notification system that distributes legal and administrative notices. Officials...
Massive Cyberattack on Polish Power System in December Failed, Minister Says
Poland’s power grid endured its biggest cyberattack in years during the last week of December, according to Energy Minister Milosz Motyka. The operation attempted to sever communication links between renewable energy installations and distribution operators, but was ultimately thwarted with...

Noction Adds Automatic Anomaly Detection to IRP v4.3 for Faster DDoS Mitigation
Noction launched Intelligent Routing Platform (IRP) v4.3, adding Automatic Anomaly Detection (AAD) that spots abnormal traffic and triggers edge‑level DDoS mitigation. The system can automatically apply BGP FlowSpec filters or blackhole traffic, with optional operator review. IRP v4.3 also upgrades Commit Control...

Android Banking Malware deVixor Actively Targeting Users with Ransomware Capabilities.
Android banking trojan deVixor, active since October 2025, is distributing through counterfeit automotive‑sale websites targeting Iranian users. The malware harvests SMS OTPs, banking credentials, and cryptocurrency exchange data, and can remotely lock devices with a ransomware command demanding 50 TRX. Its...
Q4 2025 Malware Trends: Telegram Backdoor, Banking Trojans Surge, Joker Returns to Google Play
Doctor Web’s Q4 2025 mobile‑malware report reveals a modified Telegram X app delivering the Android.Backdoor.Baohuo.1.origin backdoor, compromising roughly 58,000 Android devices across phones, tablets, smart TVs and in‑car systems. The same period saw a 65% surge in Android banking trojans and the re‑appearance...

ColorTokens Achieves FedRAMP® Moderate ATO for Xshield™
ColorTokens announced that its Xshield Enterprise Microsegmentation Platform has received a FedRAMP® Moderate Authority to Operate, confirming compliance with hundreds of NIST SP 800‑53 controls. The authorization, validated by an accredited third‑party assessment organization, allows the solution to handle Controlled Unclassified Information...

Minimal Ubuntu Pro Expands Canonical’s Cloud Security Offerings
Canonical has launched Minimal Ubuntu Pro images for public cloud platforms, delivering a leaner base OS with only essential components. The images retain Ubuntu Pro’s extended security maintenance, covering core packages and critical cloud functionality. They are now available through...

CyRC Advisory: Vulnerability in Broadcom Chipset Causes Network Disruption and Client Disconnection on Wireless Routers
The Black Duck Cybersecurity Research Center identified a high‑severity vulnerability in Broadcom’s wireless chipset used in ASUS RT‑BE86U routers. A single over‑the‑air frame can render the 5 GHz Wi‑Fi network unresponsive, forcing a manual router reset and potentially corrupting ongoing data...

Key Learnings From the Latest CyRC Wi-Fi Vulnerabilities
Black Duck Cybersecurity Research Center (CyRC) disclosed high‑risk Wi‑Fi vulnerabilities in ASUS and TP‑Link routers that allow network disruption with a single malformed frame. The flaws were identified through Defensics fuzz testing and bypass WPA2/WPA3 encryption, highlighting protocol‑level weaknesses. Vendors...

New Advanced Linux VoidLink Malware Targets Cloud and Container Environments
Check Point Research has uncovered VoidLink, a sophisticated, cloud‑native Linux malware framework designed for long‑term stealth in cloud and container environments. First seen in December 2025, the platform includes custom loaders, rootkits, and more than 30 plug‑in modules written in Zig,...

Parliament Asks Security Pros to Shape Cyber Security and Resilience Bill
The UK Parliament’s Public Bill Committee has opened a consultation for the Cyber Security and Resilience Bill (CSRB), the successor to the 2018 NIS Regulations and a NIS2‑style overhaul for critical infrastructure. After its second reading, the bill now enters...
For Application Security: SCA, SAST, DAST and MAST. What Next?
Application security is moving beyond isolated scanners toward a unified posture, provenance, and proof framework. Gartner and OWASP now emphasize Application Security Posture Management (ASPM) that aggregates SAST, DAST, SCA, MAST and IaC findings into a single, context‑aware view. Provenance...

Global Magecart Campaign Targets Six Card Networks
Security firm Silent Push uncovered a long‑running Magecart skimming operation that has been active since 2022. The campaign injects malicious JavaScript into e‑commerce sites, targeting six major payment networks – American Express, Diners Club, Discover, JCB, Mastercard and UnionPay. Victims see a...

Threat Actors Exploit RMM Tools Through Weaponized PDF Files
Threat actors are leveraging weaponized PDF attachments to install legitimate Remote Monitoring and Management (RMM) tools such as Syncro, SuperOps, NinjaOne, and ScreenConnect. The campaign, uncovered by ASEC, began with deceptive PDFs that display error messages or images, prompting users...
Your Personal Information Is on the Dark Web. What Happens Next?
A surge in data breaches and cyber‑crime tools has flooded the dark web with personal and financial information, with 1,732 incidents reported in the first half of 2025 alone. Threat actors leverage infostealer malware, AI‑generated phishing, and supply‑chain attacks to...

AI EdgeLabs Launches Compliance Center and Linux Audit for NIS2 and CRA Readiness
AI EdgeLabs unveiled its Compliance Center and Linux Audit suite, targeting organizations bound by the EU NIS2 directive and the Cyber Resilience Act. The platform replaces manual reporting with continuous, AI‑driven visibility, delivering a unified risk score and real‑time posture...
%20(1)%20(1).webp?ssl=1)
SAP January 2026 Security Patch Day Fixes Critical Injection and RCE Flaws
On January 13, 2026 SAP issued its monthly Security Patch Day, releasing 17 security notes that address 15 vulnerabilities across its product portfolio. Four critical‑severity flaws—CVE‑2026‑0501 (SQL injection in S/4HANA General Ledger), CVE‑2026‑0500 (remote code execution in Wily Introscope), and...

Parrot OS Shares Its 2026 Plans for Security Tools and Platform Support
Parrot OS, the Debian‑based cybersecurity distribution, released version 7.0 in late 2025 and outlined its 2026 roadmap. The plan adds new security and AI‑focused tools, enhances lightweight, container and cloud deployment support, and expands documentation for repeatable labs. Development will...

Email Is Not Legacy. It’s Infrastructure.
Email remains the backbone of modern business, not a relic, because it operates as an open protocol that connects vendors, customers, and internal teams. A recent survey shows 82 % of IT leaders consider it the most important channel for external...

Russia’s Crackdown on Probiv Data Leaks May Have Fed the Beast Instead
Russia’s crackdown on the illegal probiv data‑leak market, spurred by a personal fraud incident involving President Putin’s associate, led to the arrest of Solaris platform founders but may have unintentionally strengthened the underground ecosystem. The probiv market, originally a convenient...

DPRK Hackers Earn $600M Posing as Remote Workers
North Korean state‑sponsored hackers are masquerading as remote IT workers, generating up to $600 million annually for the regime. They infiltrate Western firms by securing legitimate remote positions or creating fake front‑company job postings, then use living‑off‑the‑land techniques to embed persistent...

Rakuten Viber CISO/CTO on Balancing Encryption, Abuse Prevention, and Platform Resilience
Rakuten Viber’s CISO/CTO Liad Shnell says the messenger is now critical infrastructure, so security priorities extend beyond confidentiality to availability, integrity and abuse resilience. The platform ships end‑to‑end encryption by default and relies on AI‑driven analysis of metadata, behavioral signals...
Top 10 Vendors for AI-Enabled Security — According to CISOs
The CSO 2025 Security Priorities Study reveals that senior security executives continue to favor established, name‑brand vendors for AI‑enabled security solutions despite a flood of AI‑only startups. Cisco and Microsoft lead the list, with reputation, breach history, and integration ease...

Turning Cyber Metrics Into Decisions Leaders Can Act On
In a Help Net Security video, Myriad360 Field CISO Bryan Sacks argues that cybersecurity metrics should inform executive decisions rather than serve merely as reporting tools. He emphasizes aligning security initiatives with business priorities set by CEOs and boards, using...

Top 5 Best Free VPN for 2026 to Protect Your Anonymity on the Internet
The article lists the top five free VPN services projected for 2026, emphasizing their ability to safeguard anonymity during activities like torrenting. It highlights common pitfalls of free VPNs, such as data leaks, bandwidth limits, and ad injection. Each recommended...

Top 5 Best Cyber Attack Prevention Methods for Small Businesses With Breach & Attack Simulation
Hackers now target small businesses, accounting for 43% of attacks, making cyber‑attack prevention a critical priority. Affordable cloud‑based antimalware and firewall services, along with Breach and Attack Simulation (BAS) platforms like Cymulate, give SMBs enterprise‑level protection. The article outlines five...

Teaching Cybersecurity by Letting Students Break Things
Airbus Cybersecurity and Dauphine University found that embedding structured hacking, social engineering, and capture‑the‑flag exercises into curricula dramatically increases student engagement and confidence. The study tracked participants as they assumed attacker, analyst, and insider roles, culminating in a mixed‑reality CTF...

Cybersecurity Jobs Available Right Now: January 13, 2026
The January 2026 cybersecurity job roundup lists more than 30 senior‑level openings across continents, from CISO roles at Australia’s CSIRO to GenAI security specialists in Israel. Positions span core disciplines such as threat hunting, vulnerability management, IAM governance, and OT network...

The Salary of a Chief Security Officer
The 2025 Foushée Security & Compliance Compensation Survey, now run by ScottMadden, reveals notable pay shifts across 90 security roles. Chief Security Officers saw a modest 6.9% rise in base salary to $364,826, while total cash compensation slipped 2.9% and...

Malicious Chrome Extension Steals Wallet Credentials, Enables Automated Trading Abuse
Socket’s Threat Research Team uncovered a malicious Chrome extension, MEXC API Automator, that silently creates MEXC exchange API keys with withdrawal permissions. The extension exfiltrates the keys to a hard‑coded Telegram bot, enabling attackers to programmatically trade and drain wallets....

Apache Struts External Entity (XXE) Injection Vulnerability S2-069 (CVE-2025-68493)
Apache Struts has been disclosed with a critical external entity injection flaw, S2‑069 (CVE‑2025‑68493), scoring 9.8 on the CVSS scale. The vulnerability resides in the XWork XML parser, enabling attackers to read files, perform SSRF, or launch DoS attacks. Affected...

Why the Start of the Year Is Prime Time for Insider Risk
At the start of each year, security teams face heightened insider risk due to workforce transitions such as departures, role changes, and reorganizations. These shifts often create blind spots in identity and access management, leaving dormant or over‑privileged accounts vulnerable...

Why DNS Resiliency Is Critical as Outages Surge
Service outages are rising, costing Global 2000 firms an estimated $400 billion annually, with DNS failures often at the core of prolonged downtime. The article argues that many organizations lack a true "Plan B" for DNS, relying on slow provider switches that...

CISA Orders Feds to Patch Gogs RCE Flaw Exploited in Zero-Day Attacks
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered all federal civilian agencies to patch a critical zero‑day vulnerability in the Gogs Git service, identified as CVE‑2025‑8110. The flaw allows authenticated attackers to exploit a path‑traversal weakness in the...

NDSS 2025 – LLMPirate: LLMs For Black-Box Hardware IP Piracy
Researchers from Texas A&M unveiled LLMPirate, a novel technique that leverages large language models to generate pirated variations of hardware circuit designs. The system successfully evaded detection by four state‑of‑the‑art IP piracy tools across all tested circuits, achieving 100% evasion....

'Bad Actor' Hijacks Apex Legends Characters in Live Matches
A weekend security incident in Apex Legends allowed a bad actor to hijack player characters, disconnect them, and rename teammates to “RSPN Admin.” Respawn clarified that the breach did not involve malware or remote code execution, suggesting the attacker used...
5 Best Secure Container Images for Modern Applications (2026)
Modern applications now treat secure container images as a prerequisite for rapid delivery, not a optional add‑on. By 2026, tools like Echo, Sysdig and Aqua Security automate CVE removal, risk prioritization, and policy enforcement across CI/CD pipelines. The article outlines...