Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsThreatsDay Bulletin: RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories
ThreatsDay Bulletin: RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories
Cybersecurity

ThreatsDay Bulletin: RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories

•January 8, 2026
0
The Hacker News
The Hacker News•Jan 8, 2026

Companies Mentioned

Microsoft

Microsoft

MSFT

OpenAI

OpenAI

Cato Networks

Cato Networks

Apple

Apple

AAPL

Cisco

Cisco

CSCO

Fortinet

Fortinet

FTNT

Google

Google

GOOG

Cyble

Cyble

Nextcloud

Nextcloud

Ivanti

Ivanti

AVCT

Citrix

Citrix

CTXS

Oracle

Oracle

ORCL

SonicWall

SonicWall

SNWL

Why It Matters

The expanding vulnerability landscape forces enterprises to accelerate patching and zero‑trust controls, while legal pressures on AI firms signal rising regulatory scrutiny.

Key Takeaways

  • •CISA added 245 new KEV vulnerabilities in 2025
  • •RustFS token flaw scores 9.8 CVSS, now patched
  • •OpenAI must hand over 20M anonymized logs
  • •Taiwan’s energy sector faced tenfold Chinese cyber attacks
  • •Phishing‑as‑a‑service kits doubled, boosting attack volume

Pulse Analysis

The pace at which exploitable flaws are being catalogued is accelerating. CISA’s Known Exploited Vulnerabilities (KEV) list grew by 20 % in 2025, adding 245 high‑risk items that span Microsoft, Apple, Cisco and the Linux kernel. Enterprises that rely on legacy software now face a shrinking window to apply patches before attackers weaponize these weaknesses. A vivid example is the RustFS hard‑coded gRPC token, which earned a near‑critical 9.8 CVSS rating until a rapid patch was issued in December. Meanwhile, threat actors continue to abuse public‑facing services such as GeoServer to drop XMRig miners, showing that even known bugs remain lucrative entry points.

State‑sponsored activity is reshaping the threat landscape in Asia. Taiwan’s National Security Bureau disclosed a tenfold rise in Chinese‑linked intrusions against its energy grid and hospitals, with groups like APT41 and BlackTech probing industrial control systems. Over 960 million attempts in 2025 highlight the need for segmented networks, continuous monitoring, and robust incident‑response playbooks. As adversaries shift from opportunistic ransomware to strategic espionage, supply‑chain hygiene and secure firmware updates become essential defenses for utilities and critical‑infrastructure operators worldwide.

Legal and market pressures are converging on emerging technologies. A U.S. judge ordered OpenAI to produce 20 million anonymized ChatGPT logs, intensifying the debate over data ownership and fair‑use defenses for AI training. At the same time, phishing‑as‑a‑service ecosystems doubled, equipping low‑skill actors with MFA‑bypass modules and sophisticated obfuscation. Organizations must reinforce identity‑centric controls—mandatory multi‑factor authentication on cloud file‑sharing platforms like ownCloud—and invest in threat‑intel feeds that can flag emerging PhaaS toolkits before they reach victims.

ThreatsDay Bulletin: RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...