AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks | Cybersecurity
A critical misconfiguration in Amazon Web Services (AWS) CodeBuild could have allowed complete takeover of the cloud service provider’s own GitHub repositories, including its AWS JavaScript SDK, putting every AWS…
Read moreCritical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access | Cybersecurity
Jan 15, 2026Ravie LakshmananWeb Security /Vulnerability A maximum-severity security flaw in a WordPress plugin called Modular DS has come under active exploitation in the wild, according to Patchstack. The vulnerability,…
Read more“Reprompt” attack lets attackers steal data from Microsoft Copilot | Malware
Researchers found a method to steal data which bypasses Microsoft Copilot’s built-in safety mechanisms. The attack flow, called Reprompt, abuses how Microsoft Copilot handled URL parameters in order to…
Read moreModel Security Is the Wrong Frame – The Real Risk Is Workflow Security | Cybersecurity
Jan 15, 2026The Hacker NewsData Security / Artificial Intelligence As AI copilots and assistants become embedded in daily work, security teams are still focused on protecting the models themselves. But…
Read morePalo Alto Fixes GlobalProtect DoS Flaw That Can Crash Firewalls Without Login | Cybersecurity
Jan 15, 2026Ravie LakshmananNetwork Security / Vulnerability Palo Alto Networks has released security updates for a high-severity security flaw impacting GlobalProtect Gateway and Portal, for which it said there exists…
Read moreHow real software downloads can hide remote backdoors | Malware
It starts with a simple search. You need to set up remote access to a colleague’s computer. You do a Google search for “RustDesk download,” click one of the top…
Read moreResearchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers | Cybersecurity
The Black Lotus Labs team at Lumen Technologies said it null-routed traffic to more than 550 command-and-control (C2) nodes associated with the AISURU/Kimwolf botnet since early October 2025. AISURU and…
Read morePhishing scammers are posting fake “account restricted” comments on LinkedIn | Malware
Recently, fake LinkedIn profiles have started posting comment replies claiming that a user has “engaged in activities that are not in compliance” with LinkedIn’s policies and that their account has…
Read moreAI Agents Are Becoming Privilege Escalation Paths | Cybersecurity
AI agents have quickly moved from experimental tools to core components of daily workflows across security, engineering, IT, and operations. What began as individual productivity aids, like personal code assistants,…
Read moreFortinet Fixes Critical FortiSIEM Flaw Allowing Unauthenticated Remote Code Execution | Cybersecurity
Jan 14, 2026Ravie LakshmananVulnerability / Patch Management Fortinet has released updates to fix a critical security flaw impacting FortiSIEM that could allow an unauthenticated attacker to achieve code execution on…
Read moreOnline shoppers at risk as Magecart skimming hits major payment networks | Malware
Researchers have been tracking a Magecart campaign that targets several major payment providers, including American Express, Diners Club, Discover, and Mastercard. Magecart is an umbrella term for criminal groups that…
Read moreCritical Node.js Vulnerability Can Cause Server Crashes via async_hooks Stack Overflow | Cybersecurity
Jan 14, 2026Ravie LakshmananApplication Security / Vulnerability Node.js has released updates to fix what it described as a critical security issue impacting “virtually every production Node.js app” that, if successfully…
Read moreData broker fined after selling Alzheimer’s patient info and millions of sensitive profiles | Malware
California’s privacy regulator has fined a Texas data broker $45,000 and banned it from selling Californians’ personal information after it sold Alzheimer patients’ data. Texan company Rickenbacher Data LLC, which…
Read moreLong-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages | Cybersecurity
Jan 13, 2026Ravie Lakshmanan Web Security / Data Theft Cybersecurity researchers have discovered a major web skimming campaign that has been active since January 2022, targeting several major payment networks…
Read moreFrom MCPs and Tool Access to Shadow API Key Sprawl | Cybersecurity
Jan 13, 2026The Hacker NewsArtificial Intelligence / Automation Security AI agents are no longer just writing code. They are executing it. Tools like Copilot, Claude Code, and Codex can now…
Read moreWhy iPhone users should update and restart their devices now | Malware
If you were still questioning whether iOS 26+ is for you, now is the time to make that call. Why? On December 12, 2025, Apple patched two WebKit zero‑day vulnerabilities…
Read moreWhat Should We Learn From How Attackers Leveraged AI in 2025? | Cybersecurity
Jan 13, 2026The Hacker NewsThreat Intelligence / Identity Security Old Playbook, New Scale: While defenders are chasing trends, attackers are optimizing the basics The security industry loves talking about “new”…
Read moreCelebrating reviews and recognitions for Malwarebytes in 2025 | Malware
Independent recognition matters in cybersecurity, and it matters a lot to us. It shows how security products perform when they’re tested against in-the-wild threats, using lab environments designed to reflect what…
Read moreReceived an Instagram password reset email? Here’s what you need to know | Malware
Last week, many Instagram users began receiving unsolicited emails from the platform that warned about a password reset request. The message said: “Hi {username},We got a request to reset your…
Read moren8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens | Cybersecurity
Jan 12, 2026Ravie LakshmananVulnerability / Workflow Automation Threat actors have been observed uploading a set of eight packages on the npm registry that masqueraded as integrations targeting the n8n workflow…
Read moreRegulators around the world are scrutinizing Grok over sexual deepfakes | Malware
Grok’s failure to block sexualized images of minors has turned a single “isolated lapse” into a global regulatory stress test for xAI’s ambitions. The response from lawmakers and regulators suggests…
Read moreAI Automation Exploits, Telecom Espionage, Prompt Poaching & More | Cybersecurity
Jan 12, 2026Ravie LakshmananHacking News / Cybersecurity This week made one thing clear: small oversights can spiral fast. Tools meant to save time and reduce friction turned into easy entry…
Read moreEnshittification is ruining everything online (Lock and Code S07E01) | Malware
This week on the Lock and Code podcast… There’s a bizarre thing happening online right now where everything is getting worse. Your Google results have become so bad that you’ve…
Read moreGoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials | Cybersecurity
A new wave of GoBruteforcer attacks has targeted databases of cryptocurrency and blockchain projects to co-opt them into a botnet that’s capable of brute-forcing user passwords for services such as…
Read moreMuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors | Cybersecurity
Jan 10, 2026Ravie LakshmananCyber Espionage / Malware The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting diplomatic, maritime, financial, and telecom entities in the…
Read moreEuropol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime | Cybersecurity
Jan 10, 2026Ravie LakshmananCybercrime / Financial Crime Europol on Friday announced the arrest of 34 individuals in Spain who are alleged to be part of an international criminal organization called…
Read moreChina-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines | Cybersecurity
Jan 09, 2026Ravie LakshmananVirtualization / Vulnerability Chinese-speaking threat actors are suspected to have leveraged a compromised SonicWall VPN appliance as an initial access vector to deploy a VMware ESXi exploit…
Read morepcTattletale founder pleads guilty as US cracks down on stalkerware | Malware
Reportedly, pcTattletale founder Bryan Fleming has pleaded guilty in US federal court to computer hacking, unlawfully selling and advertising spyware, and conspiracy. This is good news not just because we…
Read moreRussian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations | Cybersecurity
Jan 09, 2026Ravie LakshmananEmail Security / Threat Intelligence Russian state-sponsored threat actors have been linked to a fresh set of credential harvesting attacks targeting individuals associated with a Turkish energy…
Read moreThe Hype We Can Ignore (And the Risks We Can’t) | Cybersecurity
Jan 09, 2026The Hacker NewsArtificial Intelligence / Enterprise Security As organizations plan for 2026, cybersecurity predictions are everywhere. Yet many strategies are still shaped by headlines and speculation rather than…
Read more