AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks | Cybersecurity

A critical misconfiguration in Amazon Web Services (AWS) CodeBuild could have allowed complete takeover of the cloud service provider’s own GitHub repositories, including its AWS JavaScript SDK, putting every AWS…

Read more

Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access | Cybersecurity

Jan 15, 2026Ravie LakshmananWeb Security /Vulnerability A maximum-severity security flaw in a WordPress plugin called Modular DS has come under active exploitation in the wild, according to Patchstack. The vulnerability,…

Read more

“Reprompt” attack lets attackers steal data from Microsoft Copilot | Malware

Researchers found a method to steal data which bypasses Microsoft Copilot’s built-in safety mechanisms.   The attack flow, called Reprompt, abuses how Microsoft Copilot handled URL parameters in order to…

Read more

Model Security Is the Wrong Frame – The Real Risk Is Workflow Security | Cybersecurity

Jan 15, 2026The Hacker NewsData Security / Artificial Intelligence As AI copilots and assistants become embedded in daily work, security teams are still focused on protecting the models themselves. But…

Read more

Palo Alto Fixes GlobalProtect DoS Flaw That Can Crash Firewalls Without Login | Cybersecurity

Jan 15, 2026Ravie LakshmananNetwork Security / Vulnerability Palo Alto Networks has released security updates for a high-severity security flaw impacting GlobalProtect Gateway and Portal, for which it said there exists…

Read more

How real software downloads can hide remote backdoors | Malware

It starts with a simple search. You need to set up remote access to a colleague’s computer. You do a Google search for “RustDesk download,” click one of the top…

Read more

Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers | Cybersecurity

The Black Lotus Labs team at Lumen Technologies said it null-routed traffic to more than 550 command-and-control (C2) nodes associated with the AISURU/Kimwolf botnet since early October 2025. AISURU and…

Read more

Phishing scammers are posting fake “account restricted” comments on LinkedIn | Malware

Recently, fake LinkedIn profiles have started posting comment replies claiming that a user has “engaged in activities that are not in compliance” with LinkedIn’s policies and that their account has…

Read more

AI Agents Are Becoming Privilege Escalation Paths | Cybersecurity

AI agents have quickly moved from experimental tools to core components of daily workflows across security, engineering, IT, and operations. What began as individual productivity aids, like personal code assistants,…

Read more

Fortinet Fixes Critical FortiSIEM Flaw Allowing Unauthenticated Remote Code Execution | Cybersecurity

Jan 14, 2026Ravie LakshmananVulnerability / Patch Management Fortinet has released updates to fix a critical security flaw impacting FortiSIEM that could allow an unauthenticated attacker to achieve code execution on…

Read more

Online shoppers at risk as Magecart skimming hits major payment networks | Malware

Researchers have been tracking a Magecart campaign that targets several major payment providers, including American Express, Diners Club, Discover, and Mastercard. Magecart is an umbrella term for criminal groups that…

Read more

Critical Node.js Vulnerability Can Cause Server Crashes via async_hooks Stack Overflow | Cybersecurity

Jan 14, 2026Ravie LakshmananApplication Security / Vulnerability Node.js has released updates to fix what it described as a critical security issue impacting “virtually every production Node.js app” that, if successfully…

Read more

Data broker fined after selling Alzheimer’s patient info and millions of sensitive profiles | Malware

California’s privacy regulator has fined a Texas data broker $45,000 and banned it from selling Californians’ personal information after it sold Alzheimer patients’ data. Texan company Rickenbacher Data LLC, which…

Read more

Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages | Cybersecurity

Jan 13, 2026Ravie Lakshmanan Web Security / Data Theft Cybersecurity researchers have discovered a major web skimming campaign that has been active since January 2022, targeting several major payment networks…

Read more

From MCPs and Tool Access to Shadow API Key Sprawl | Cybersecurity

Jan 13, 2026The Hacker NewsArtificial Intelligence / Automation Security AI agents are no longer just writing code. They are executing it. Tools like Copilot, Claude Code, and Codex can now…

Read more

Why iPhone users should update and restart their devices now | Malware

If you were still questioning whether iOS 26+ is for you, now is the time to make that call. Why? On December 12, 2025, Apple patched two WebKit zero‑day vulnerabilities…

Read more

What Should We Learn From How Attackers Leveraged AI in 2025? | Cybersecurity

Jan 13, 2026The Hacker NewsThreat Intelligence / Identity Security Old Playbook, New Scale: While defenders are chasing trends, attackers are optimizing the basics The security industry loves talking about “new”…

Read more

Celebrating reviews and recognitions for Malwarebytes in 2025 | Malware

Independent recognition matters in cybersecurity, and it matters a lot to us. It shows how security products perform when they’re tested against in-the-wild threats, using lab environments designed to reflect what…

Read more

Received an Instagram password reset email? Here’s what you need to know | Malware

Last week, many Instagram users began receiving unsolicited emails from the platform that warned about a password reset request. The message said: “Hi {username},We got a request to reset your…

Read more

n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens | Cybersecurity

Jan 12, 2026Ravie LakshmananVulnerability / Workflow Automation Threat actors have been observed uploading a set of eight packages on the npm registry that masqueraded as integrations targeting the n8n workflow…

Read more

Regulators around the world are scrutinizing Grok over sexual deepfakes | Malware

Grok’s failure to block sexualized images of minors has turned a single “isolated lapse” into a global regulatory stress test for xAI’s ambitions. The response from lawmakers and regulators suggests…

Read more

AI Automation Exploits, Telecom Espionage, Prompt Poaching & More | Cybersecurity

Jan 12, 2026Ravie LakshmananHacking News / Cybersecurity This week made one thing clear: small oversights can spiral fast. Tools meant to save time and reduce friction turned into easy entry…

Read more

Enshittification is ruining everything online (Lock and Code S07E01) | Malware

This week on the Lock and Code podcast… There’s a bizarre thing happening online right now where everything is getting worse. Your Google results have become so bad that you’ve…

Read more

GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials | Cybersecurity

A new wave of GoBruteforcer attacks has targeted databases of cryptocurrency and blockchain projects to co-opt them into a botnet that’s capable of brute-forcing user passwords for services such as…

Read more

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors | Cybersecurity

Jan 10, 2026Ravie LakshmananCyber Espionage / Malware The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting diplomatic, maritime, financial, and telecom entities in the…

Read more

Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime | Cybersecurity

Jan 10, 2026Ravie LakshmananCybercrime / Financial Crime Europol on Friday announced the arrest of 34 individuals in Spain who are alleged to be part of an international criminal organization called…

Read more

China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines | Cybersecurity

Jan 09, 2026Ravie LakshmananVirtualization / Vulnerability Chinese-speaking threat actors are suspected to have leveraged a compromised SonicWall VPN appliance as an initial access vector to deploy a VMware ESXi exploit…

Read more

pcTattletale founder pleads guilty as US cracks down on stalkerware | Malware

Reportedly, pcTattletale founder Bryan Fleming has pleaded guilty in US federal court to computer hacking, unlawfully selling and advertising spyware, and conspiracy. This is good news not just because we…

Read more

Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations | Cybersecurity

Jan 09, 2026Ravie LakshmananEmail Security / Threat Intelligence Russian state-sponsored threat actors have been linked to a fresh set of credential harvesting attacks targeting individuals associated with a Turkish energy…

Read more

The Hype We Can Ignore (And the Risks We Can’t) | Cybersecurity

Jan 09, 2026The Hacker NewsArtificial Intelligence / Enterprise Security As organizations plan for 2026, cybersecurity predictions are everywhere. Yet many strategies are still shaped by headlines and speculation rather than…

Read more
Update cookies preferences