π‘οΈ OMICRON uncovers widespread OT vulnerabilities in substations and power plants.
Most issues surfaced within 30 minutes, showing systemic visibility and governance failures.
Detection at network level is now baseline, not optional.
Full details: https://thehackernews.com/2026/01/survey-of-100-energy-systems-reveals.html
Most issues surfaced within 30 minutes, showing systemic visibility and governance failures.
Detection at network level is now baseline, not optional.
Full details: https://thehackernews.com/2026/01/survey-of-100-energy-systems-reveals.html
π7
β οΈ Researchers map 175K publicly exposed Ollama LLM servers worldwide.
Tool-calling turns exposed AI into a highest-severity execution risk.
Full details: https://thehackernews.com/2026/01/researchers-find-175000-publicly.html
Tool-calling turns exposed AI into a highest-severity execution risk.
Full details: https://thehackernews.com/2026/01/researchers-find-175000-publicly.html
π₯13β‘2
π WARNING: Ivanti fixes exploited EPMM zero-days with CVSS 9.8 severity.
Exploits enable code execution, persistence, and access to sensitive device data.
Federal agencies face KEV deadlines; temporary patches donβt persist across upgrades.
Read β https://thehackernews.com/2026/01/two-ivanti-epmm-zero-day-rce-flaws.html
Exploits enable code execution, persistence, and access to sensitive device data.
Federal agencies face KEV deadlines; temporary patches donβt persist across upgrades.
Read β https://thehackernews.com/2026/01/two-ivanti-epmm-zero-day-rce-flaws.html
π8β‘4
β οΈ SmarterMail fixed a critical unauthenticated RCE in its email server software.
The flaw, CVE-2026-24423 (CVSS 9.3), lets attackers execute OS commands via a crafted remote server. It affects builds before 9511.
π Fixed builds and attack mechanics β https://thehackernews.com/2026/01/smartermail-fixes-critical.html
The flaw, CVE-2026-24423 (CVSS 9.3), lets attackers execute OS commands via a crafted remote server. It affects builds before 9511.
π Fixed builds and attack mechanics β https://thehackernews.com/2026/01/smartermail-fixes-critical.html
π5β‘1
A U.S. jury convicted a former Google engineer of stealing AI trade secrets for China.
Prosecutors said 2,000+ internal documents were taken to help build a China-based startup while he was still employed.
The case shows how AI infrastructure is now treated as a national security issue.
π Details β https://thehackernews.com/2026/01/ex-google-engineer-convicted-for.html
Prosecutors said 2,000+ internal documents were taken to help build a China-based startup while he was still employed.
The case shows how AI infrastructure is now treated as a national security issue.
π Details β https://thehackernews.com/2026/01/ex-google-engineer-convicted-for.html
β‘8π₯8π6π€2
The FBI has seized the RAMP cybercrime forum, shutting down its Tor site and clearnet domain with DOJ coordination.
Threat actors are already migrating to other platforms, underscoring how fast the underground re-forms after takedowns.
π Read β https://thehackernews.com/2026/01/threatsday-bulletin-new-rces-darknet.html#major-cybercrime-forum-takedown
Threat actors are already migrating to other platforms, underscoring how fast the underground re-forms after takedowns.
π Read β https://thehackernews.com/2026/01/threatsday-bulletin-new-rces-darknet.html#major-cybercrime-forum-takedown
π14π±11π₯8β‘1
π Cybercrime enforcement follows clear patterns. A new analysis maps 418 confirmed actions worldwide from 2021β2025, showing where arrests, takedowns, and sanctions are focused.
The U.S. and Europe lead, with private companies playing a growing support role.
π How cybercrime is being targeted worldwide β https://thehackernews.com/2026/01/badges-bytes-and-blackmail.html
The U.S. and Europe lead, with private companies playing a growing support role.
π How cybercrime is being targeted worldwide β https://thehackernews.com/2026/01/badges-bytes-and-blackmail.html
π₯6π±3β‘1
China-linked UAT-8099 targets IIS servers in Asia using BadIIS SEO malware.
The group broke into vulnerable IIS servers, mainly in Thailand and Vietnam, using web shells and PowerShell. The aim remains SEO fraud, now tuned by region.
π Read β https://thehackernews.com/2026/01/china-linked-uat-8099-targets-iis.html
The group broke into vulnerable IIS servers, mainly in Thailand and Vietnam, using web shells and PowerShell. The aim remains SEO fraud, now tuned by region.
π Read β https://thehackernews.com/2026/01/china-linked-uat-8099-targets-iis.html
π₯11β‘3π±3π2π1π€―1
π Chrome extensions are being abused at scale.
Researchers uncovered tools that hijack affiliate links, scrape shopping data, steal ChatGPT login tokens, and even deliver phishing pagesβwhile passing official store reviews.
π Learn more about the affiliate fraud, AI token theft, and the browser as attack surface β https://thehackernews.com/2026/01/researchers-uncover-chrome-extensions.html
Researchers uncovered tools that hijack affiliate links, scrape shopping data, steal ChatGPT login tokens, and even deliver phishing pagesβwhile passing official store reviews.
π Learn more about the affiliate fraud, AI token theft, and the browser as attack surface β https://thehackernews.com/2026/01/researchers-uncover-chrome-extensions.html
π11π8π±6π₯3β‘1
β οΈ Poland confirms coordinated cyber attacks on 30+ renewable energy sites and a major CHP plant.
CERT Polska says the campaign was destructive, using wiper malware, but failed to disrupt power or heat supply. Access came via vulnerable Fortinet devices.
π Read β https://thehackernews.com/2026/01/poland-attributes-december-cyber.html
CERT Polska says the campaign was destructive, using wiper malware, but failed to disrupt power or heat supply. Access came via vulnerable Fortinet devices.
π Read β https://thehackernews.com/2026/01/poland-attributes-december-cyber.html
π€―12β‘9π6π₯1π1
π§βπ» Google Mandiant says ShinyHunters-linked crews are expanding extortion attacks by abusing vishing and fake login pages.
The goal is cloud SaaS access, not endpoints. Once inside, attackers steal data and escalate pressure with harassment.
π Read β https://thehackernews.com/2026/01/mandiant-finds-shinyhunters-using.html
The goal is cloud SaaS access, not endpoints. Once inside, attackers steal data and escalate pressure with harassment.
π Read β https://thehackernews.com/2026/01/mandiant-finds-shinyhunters-using.html
π9π3π±3β‘2π₯2
π A suspected Iran-aligned campaign targets NGOs and individuals documenting human rights abuses.
HarfangLab tracks the activity as RedKitten, using Excel files themed around deceased protesters to deliver malware.
The tooling relies on GitHub, Google Drive, and Telegram for configuration and control, with indicators suggesting parts of the code may be LLM-assisted.
π Read β https://thehackernews.com/2026/01/iran-linked-redkitten-cyber-campaign.html
HarfangLab tracks the activity as RedKitten, using Excel files themed around deceased protesters to deliver malware.
The tooling relies on GitHub, Google Drive, and Telegram for configuration and control, with indicators suggesting parts of the code may be LLM-assisted.
π Read β https://thehackernews.com/2026/01/iran-linked-redkitten-cyber-campaign.html
π₯18π€5π4β‘3π2
π± Apple is testing a new iOS setting that reduces how precisely cellular networks can π locate your device.
Limit Precise Location restricts location data to a broad area instead of an exact address.
π Learn how the setting works and where itβs available β https://thehackernews.com/2026/01/threatsday-bulletin-new-rces-darknet.html#cellular-location-precision-reduced
Limit Precise Location restricts location data to a broad area instead of an exact address.
π Learn how the setting works and where itβs available β https://thehackernews.com/2026/01/threatsday-bulletin-new-rces-darknet.html#cellular-location-precision-reduced
π36π15π€8β‘6π₯5
β οΈ WARNING: A supply chain attack spread malware via trusted VS Code extensions on Open VSX.
Attackers hijacked a real developer account and pushed GlassWorm through four existing tools.
22,000+ installs happened before removal.
π Read β https://thehackernews.com/2026/02/open-vsx-supply-chain-attack-used.html
Attackers hijacked a real developer account and pushed GlassWorm through four existing tools.
22,000+ installs happened before removal.
π Read β https://thehackernews.com/2026/02/open-vsx-supply-chain-attack-used.html
π8π4β‘3π€―3π±3
β οΈ ALERT β eScan antivirus delivered a malicious update after its update system was compromised.
During a two-hour window, attackers swapped a trusted file to stop updates and π οΈ cleanup. The malware hid by faking update status and downloading more payloads.
π Details β https://thehackernews.com/2026/02/escan-antivirus-update-servers.html
During a two-hour window, attackers swapped a trusted file to stop updates and π οΈ cleanup. The malware hid by faking update status and downloading more payloads.
π Details β https://thehackernews.com/2026/02/escan-antivirus-update-servers.html
π€―15π12
π WARNING - Notepad++ confirmed state-sponsored attackers hijacked its update traffic via a compromised hosting provider. Selected users were redirected to malicious update servers.
The activity ran for months.
π Learn more β https://thehackernews.com/2026/02/notepad-official-update-mechanism.html
The activity ran for months.
π Learn more β https://thehackernews.com/2026/02/notepad-official-update-mechanism.html
π€―22π±15π6π₯5π5β‘1
Experts at CTM360 report brand impersonation has become a scaled fraud operation.
Its findings show 30,000+ fake fashion stores across 80+ countries, using ads and real payment flows before disappearing.
π How the FraudWear network operates at scale β https://thehackernews.com/expert-insights/2026/02/ctm360-research-reveals-30000-fake.html
Its findings show 30,000+ fake fashion stores across 80+ countries, using ads and real payment flows before disappearing.
π How the FraudWear network operates at scale β https://thehackernews.com/expert-insights/2026/02/ctm360-research-reveals-30000-fake.html
π8
π‘οΈβοΈ Mid-market security fails when siloed tools drive up cost and alerts faster than teams can cope.
Endpoint, email, and firewall tools run in isolation, weakening protection. The shift is toward single platforms across the full threat lifecycle to cut risk without extra overhead.
π How lifecycle security works in practice β https://thehackernews.com/2026/02/securing-mid-market-across-complete.html
Endpoint, email, and firewall tools run in isolation, weakening protection. The shift is toward single platforms across the full threat lifecycle to cut risk without extra overhead.
π How lifecycle security works in practice β https://thehackernews.com/2026/02/securing-mid-market-across-complete.html
π5
Media is too big
VIEW IN TELEGRAM
What if the hardest vulnerability to patch⦠is self-doubt?
ICS environments are unforgiving. Responders canβt afford hesitationβbut they also can't ignore it. In ICS410, Justin Searle helps practitioners move from doubt to decisive action, grounded in technical precision and OT situational awareness.
Register for ICS410 at SANS Surge 2026 (Feb 23β28) and train live with Justin: https://thn.news/sans-surge-26
ICS environments are unforgiving. Responders canβt afford hesitationβbut they also can't ignore it. In ICS410, Justin Searle helps practitioners move from doubt to decisive action, grounded in technical precision and OT situational awareness.
Register for ICS410 at SANS Surge 2026 (Feb 23β28) and train live with Justin: https://thn.news/sans-surge-26
π€8
Latest edition of Cybersecurity recap worth reading:
π Proxy botnet disrupted
πͺ Office zero-day exploited
π€ AI endpoints hijacked
β‘ Power systems targeted
π§© Malware in dev tools
π§ AWS creds abused
ποΈ Databases extorted
π Enterprise flaws exploited
π Full RECAP β https://thehackernews.com/2026/02/weekly-recap-proxy-botnet-office-zero.html
π Proxy botnet disrupted
πͺ Office zero-day exploited
π€ AI endpoints hijacked
β‘ Power systems targeted
π§© Malware in dev tools
π§ AWS creds abused
ποΈ Databases extorted
π Enterprise flaws exploited
π Full RECAP β https://thehackernews.com/2026/02/weekly-recap-proxy-botnet-office-zero.html
π9β‘4
β‘ Microsoft will phase out NTLM in Windows through a three-step plan.
Deprecated in June 2024, NTLM remains widely used despite known security flaws. NTLM will be disabled by default in a future Windows release, with Kerberos becoming the standard.
π dtails β https://thehackernews.com/2026/02/microsoft-begins-ntlm-phase-out-with.html
Deprecated in June 2024, NTLM remains widely used despite known security flaws. NTLM will be disabled by default in a future Windows release, with Kerberos becoming the standard.
π dtails β https://thehackernews.com/2026/02/microsoft-begins-ntlm-phase-out-with.html
π₯9π€―3