CSO Online
Dark Reading
Dark Web Informer
Europol
Krebs on Security
NSA
Reuters
Security Affairs
The Hacker News
Wired
ZDNET
U.S. CISA adds SolarWinds Web Help Desk, Sangoma FreePBX, and GitLab flaws to its Known Exploited Vulnerabilities catalog
Tue Feb 03 2026
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SolarWinds Web Help Desk, Sangoma FreePBX, and GitLab flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added SolarWinds Web Help Desk, Sangoma FreePBX, and GitLab flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the flaws added to the catalog: The first […]
Security Affairs

Die besten DAST- & SAST-Tools
Wed Feb 04 2026
Tools für Dynamic und Static Application Security Testing helfen Entwicklern, ihren Quellcode zu härten.
CSO Online

The Paramilitary ICE and CBP Units at the Center of Minnesota's Killings
Tue Feb 03 2026
Two agents involved in the shooting deaths of US citizens in Minneapolis are reportedly part of highly militarized DHS units whose extreme tactics are generally reserved for war zones.
Wired

Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata
Tue Feb 03 2026
Cybersecurity researchers have disclosed details of a now-patched security flaw impacting Ask Gordon, an artificial intelligence (AI) assistant built into Docker Desktop and the Docker Command-Line Interface (CLI), that could be exploited to execute code and exfiltrate sensitive data. The critical vulnerability has been codenamed DockerDash by cybersecurity company Noma Labs. It was addressed by...
The Hacker News
Hackers abused React Native CLI flaw to deploy Rust malware before public disclosure
Tue Feb 03 2026
Hackers exploit a critical React Native CLI flaw (CVE-2025-11953) to run remote commands and drop stealthy Rust malware, weeks before public disclosure. Attackers are actively exploiting a critical flaw in the React Native CLI Metro server, tracked as CVE-2025-11953. The React Native CLI’s Metro dev server binds to external interfaces by default and exposes a […]
Security Affairs
Cyberrisiko Ruhestand
Tue Feb 03 2026
Wenn OT-Fachkräfte in den Ruhestand gehen, droht ein massiver Wissensverlust.
CSO Online

From credentials to cloud admin in 8 minutes: AI supercharges AWS attack chain
Tue Feb 03 2026
Threat actors tore through an Amazon Web Services environment in under eight minutes, chaining together credential theft, privilege escalation, lateral movement, and GPU resource abuse with the help o
CSO Online

[Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate
Tue Feb 03 2026
Most security teams today are buried under tools. Too many dashboards. Too much noise. Not enough real progress. Every vendor promises “complete coverage” or “AI-powered automation,” but inside most SOCs, teams are still overwhelmed, stretched thin, and unsure which tools are truly pulling their weight. The result? Bloated stacks, missed signals, and mounting pressure to do more with less. This...
The Hacker News

Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package
Tue Feb 03 2026
Threat actors have been observed exploiting a critical security flaw impacting the Metro Development Server in the popular "@react-native-community/cli" npm package. Cybersecurity company VulnCheck said it first observed exploitation of CVE-2025-11953 (aka Metro4Shell) on December 21, 2025. With a CVSS score of 9.8, the vulnerability allows remote unauthenticated attackers to execute arbitrary...
The Hacker News
APT28 exploits Microsoft Office flaw in Operation Neusploit
Tue Feb 03 2026
Russia-linked APT28 is behind Operation Neusploit, exploiting a newly disclosed Microsoft Office vulnerability in targeted attacks. Russia-linked group APT28 (aka UAC-0001, aka Fancy Bear, Pawn Storm, Sofacy Group, Sednit, BlueDelta, and STRONTIUM) is behind Operation Neusploit, a campaign that exploits a newly disclosed Microsoft Office vulnerability. The APT28 group has been active since at least 2007 and it has targeted governments, militaries, and security organizations […]
Security Affairs

When Cloud Outages Ripple Across the Internet
Tue Feb 03 2026
Recent major cloud service outages have been hard to miss. High-profile incidents affecting providers such as AWS, Azure, and Cloudflare have disrupted large parts of the internet, taking down websites and services that many other systems depend on. The resulting ripple effects have halted applications and workflows that many organizations rely on every day. For consumers, these outages are...
The Hacker News

How Data Brokers Can Fuel Violence Against Public Servants
Tue Feb 03 2026
A new report from the Public Service Alliance finds state privacy laws offer public servants few ways to protect their private data, even as threats against them are on the rise.
Wired

Notepad++ infrastructure hijacked by Chinese APT in sophisticated supply chain attack
Tue Feb 03 2026
The popular open-source text editor Notepad++ was targeted in a sophisticated supply chain attack that allowed Chinese state-sponsored hackers to deliver malware through compromised software updates,
CSO Online
Notepad++ infrastructure hack likely tied to China-nexus APT Lotus Blossom
Tue Feb 03 2026
Rapid7 researchers say the Notepad++ hosting breach is likely linked to the China-nexus Lotus Blossom APT group. Recently, the Notepad++ maintainer revealed that nation-state hackers compromised the hosting provider’s infrastructure, redirecting update traffic to malicious servers. The attack did not exploit flaws in Notepad++ code but intercepted updates before they reached users. “According to the […]
Security Affairs

APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks
Tue Feb 03 2026
The Russia-linked state-sponsored threat actor known as APT28 (aka UAC-0001) has been attributed to attacks exploiting a newly disclosed security flaw in Microsoft Office as part of a campaign codenamed Operation Neusploit. Zscaler ThreatLabz said it observed the hacking group weaponizing the shortcoming on January 29, 2026, in attacks targeting users in Ukraine, Slovakia, and Romania, three...
The Hacker News

Think agentic AI is hard to secure today? Just wait a few months
Tue Feb 03 2026
Early experimentation with agentic AI has given CISOs a preview of the possible cybersecurity nightmares ahead.
CSO Online

Shai-Hulud & Co.: The software supply chain as Achilles’ heel
Tue Feb 03 2026
Today’s applications are based on numerous components, each of which, along with the development environments themselves, represents an attack surface.
CSO Online

Was tun, wenn die Erpresser kommen?
Tue Feb 03 2026
Ruhe bewahren und keine übereilten Sachen machen, empfiehlt Podcast-Gast Joanna Lang-Recht.
CSO Online

Mozilla Adds One-Click Option to Disable Generative AI Features in Firefox
Tue Feb 03 2026
Mozilla on Monday announced a new controls section in its Firefox desktop browser settings that allows users to completely turn off generative artificial intelligence (GenAI) features. "It provides a single place to block current and future generative AI features in Firefox," Ajit Varma, head of Firefox, said. "You can also review and manage individual AI features if you choose to use them. This...
The Hacker News

Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group
Tue Feb 03 2026
A China-linked threat actor known as Lotus Blossom has been attributed with medium confidence to the recently discovered compromise of the infrastructure hosting Notepad++. The attack enabled the state-sponsored hacking group to deliver a previously undocumented backdoor codenamed Chrysalis to users of the open-source editor, according to new findings from Rapid7. The development comes shortly...
The Hacker News
Microsoft disables NTLM in Windows
Mon Feb 02 2026
Microsoft has announced that the phase-out of NT LAN Manager (NTLM) is now transitioning to disabling the protocol by default, in an effort to increase security in Windows 11 and Windows Server.
CSO Online
MoltBot Skills exploited to distribute 400+ malware packages in days
Mon Feb 02 2026
Over 400 malicious OpenClaw packages were uploaded in days, using MoltBot skills to spread password-stealing malware. Researchers uncovered a large malware campaign abusing AI skills for Claude Code and Moltbot users. Between late January and early February 2026, more than 400 malicious skills were published on ClawHub and GitHub, posing as crypto trading tools. OpenClaw […]
Security Affairs
Panera Bread breach affected 5.1 Million accounts, HIBP Confirms
Mon Feb 02 2026
Have I Been Pwned says Panera Bread ’s breach affected 5.1 million accounts, far fewer than the 14 million customers first reported. Have I Been Pwned followed claims by the ShinyHunters gang, which said it stole data from over 14 million Panera Bread accounts. After Panera refused to pay, the group leaked a 760MB archive […]
Security Affairs

New phishing attack leverages PDFs and Dropbox
Tue Feb 03 2026
Even as they become ever more stealthy with AI-driven tools, threat actors are not giving up on simple, tried-and-true phishing — because it still works.
CSO Online

Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
Mon Feb 02 2026
A security audit of 2,857 skills on ClawHub has found 341 malicious skills across multiple campaigns, according to new findings from Koi Security, exposing users to new supply chain risks. ClawHub is a marketplace designed to make it easy for OpenClaw users to find and install third-party skills. It's an extension to the OpenClaw project, a self-hosted artificial intelligence (AI) assistant...
The Hacker News

OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
Mon Feb 02 2026
A high-severity security flaw has been disclosed in OpenClaw (formerly referred to as Clawdbot and Moltbot) that could allow remote code execution (RCE) through a crafted malicious link. The issue, which is tracked as CVE-2026-25253 (CVSS score: 8.8), has been addressed in version 2026.1.29 released on January 30, 2026. It has been described as a token exfiltration vulnerability that leads to...
The Hacker News
Please Don’t Feed the Scattered Lapsus ShinyHunters
Mon Feb 02 2026
A prolific data ransom gang that calls itself Scattered Lapsus ShinyHunters (SLSH) has a distinctive playbook when it seeks to extort payment from victim firms: Harassing, threatening and even swatting executives and their families, all while notifying journalists and regulators… <span class="read-more"><a href="https://krebsonsecurity.com/2026/02/please-dont-feed-the-scattered-lapsus-shiny-hunters/">Read More »</a></span>
Krebs on Security
Hackers exploit unsecured MongoDB instances to wipe data and demand ransom
Mon Feb 02 2026
Over 1,400 exposed MongoDB servers have been hijacked and wiped by hackers, who left ransom notes after exploiting weak or missing access controls. Cybersecurity firm Flare reports that unsecured MongoDB databases remain easy targets, with 1,416 of 3,100 exposed servers compromised. Hackers wiped data and left ransom notes, usually demanding $500 in Bitcoin, often using […]
Security Affairs
Human Risk Management: Das Paradoxon der Sicherheitsschulungen
Mon Feb 02 2026
Security Awareness Trainings sollten auf dem Human-Risk-Management-Ansatz basieren.
CSO Online

Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
Mon Feb 02 2026
Microsoft has announced a three-phase approach to phase out New Technology LAN Manager (NTLM) as part of its efforts to shift Windows environments toward stronger, Kerberos-based options. The development comes more than two years after the tech giant revealed its plans to deprecate the legacy technology, citing its susceptibility to weaknesses that could facilitate relay attacks and allow bad...
The Hacker News

How risk culture turns cyber teams predictive
Mon Feb 02 2026
The first time you’ll hear, “We’re always in incident mode,” it won’t be said with drama.
CSO Online

This stealthy Windows RAT holds live conversations with its operators
Mon Feb 02 2026
Security researchers at Point Wild have disclosed a new Windows malware campaign that uses a multi-stage infection chain to establish persistent, memory-resident access on compromised systems and stea
CSO Online
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 82
Mon Feb 02 2026
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter KONNI Adopts AI to Generate PowerShell Backdoors Who Operates the Badbox 2.0 Botnet? Weaponized in China, Deployed in India: The SyncFuture Espionage Targeted Campaign Android Trojan Campaign Uses Hugging Face Hosting for RAT Payload […]
Security Affairs

⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats
Mon Feb 02 2026
Every week brings new discoveries, attacks, and defenses that shape the state of cybersecurity. Some threats are stopped quickly, while others go unseen until they cause real damage. Sometimes a single update, exploit, or mistake changes how we think about risk and protection. Every incident shows how defenders adapt — and how fast attackers try to stay ahead. This week’s recap brings you the...
The Hacker News

Securing the Mid-Market Across the Complete Threat Lifecycle
Mon Feb 02 2026
For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential to protect an expanding attack surface. Combined with effective protection that blocks threats, they play a critical role in stopping cyberattacks before damage is done. The challenge is that many security tools add complexity and cost that most mid-market businesses...
The Hacker News
ICE and Qatari Security Forces at the Winter Olympics Put Italians on Edge
Mon Feb 02 2026
The influx of security personnel from around the world is sparking concern among Italians ahead of the Milano Cortina Olympic Games.
Wired
Nation-state hack exploited hosting infrastructure to hijack Notepad++ updates
Mon Feb 02 2026
Notepad++ maintainer says nation-state attackers hijacked the app’s update system by redirecting traffic at the hosting provider level. The Notepad++ maintainer revealed that nation-state hackers compromised the hosting provider’s infrastructure, redirecting update traffic to malicious servers. The attack did not exploit flaws in Notepad++ code but intercepted updates before they reached users. “According to the […]
Security Affairs
Security Affairs newsletter Round 561 by Pierluigi Paganini – INTERNATIONAL EDITION
Mon Feb 02 2026
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. DOJ releases details alleged talented hacker working for Jeffrey Epstein Cyberattacks Disrupt Communications at Wind, Solar, […]
Security Affairs

Why non-human identities are your biggest security blind spot in 2026
Mon Feb 02 2026
Last month, while running a routine access audit on our Azure environment, I came across a service account called svc-dataloader-poc.
CSO Online

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users
Mon Feb 02 2026
The maintainer of Notepad++ has revealed that state-sponsored attackers hijacked the utility's update mechanism to redirect update traffic to malicious servers instead. "The attack involved [an] infrastructure-level compromise that allowed malicious actors to intercept and redirect update traffic destined for notepad-plus-plus.org," developer Don Ho said. "The compromise occurred at the hosting...
The Hacker News

Deutschland und Israel trainieren Abwehr von Cyberangriff
Mon Feb 02 2026
Bundesinnenminister Alexander Dobrindt mit dem israelischen Ministerpräsidenten Benjamin Netanjahu bei der Pressekonferenz.
CSO Online

CSO Barry Hensley on staying a step ahead of the cyber threat landscape
Mon Feb 02 2026
IT security was a critical element of retired US Col.
CSO Online

When responsible disclosure becomes unpaid labor
Mon Feb 02 2026
Responsible disclosure is built on an assumption that “doing the right thing” will be met with timely action, fair treatment, and professional respect, if not a bounty award.
CSO Online

Im Fokus: Emerging Technologies
Mon Feb 02 2026
CSO Online

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware
Mon Feb 02 2026
The update infrastructure for eScan antivirus, a security solution developed by Indian cybersecurity company MicroWorld Technologies, has been compromised by unknown attackers to deliver a persistent downloader to enterprise and consumer systems. "Malicious updates were distributed through eScan's legitimate update infrastructure, resulting in the deployment of multi-stage malware to enterprise...
The Hacker News

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
Mon Feb 02 2026
Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat actors compromised a legitimate developer's resources to push malicious updates to downstream users. "On January 30, 2026, four established Open VSX extensions published by the oorzc author had malicious versions published to Open VSX that embed the GlassWorm...
The Hacker News

Das nächste große Security-Schlachtfeld
Mon Feb 02 2026
Wenn Quantum Computing und KI in der Praxis zusammenkommen, bricht ein neues Zeitalter an – auch und vor allem in Sachen Cybersecurity.
CSO Online
DOJ releases details alleged talented hacker working for Jeffrey Epstein
Sat Jan 31 2026
An FBI informant said in 2017 that Jeffrey Epstein had a “personal hacker,” according to a Justice Department document released Friday. An FBI informant said in 2017 that Jeffrey Epstein had a “personal hacker,” according to one of the documents released by the Department of Justice (DoJ) as part of the Epstein Files. The accuracy […]
Security Affairs

Enterprise Spotlight: Manufacturing Reimagined
Sun Feb 01 2026
CSO Online

Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
Sat Jan 31 2026
A Farsi-speaking threat actor aligned with Iranian state interests is suspected to be behind a new campaign targeting non-governmental organizations and individuals involved in documenting recent human rights abuses. The activity, observed by HarfangLab in January 2026, has been codenamed RedKitten. It's said to coincide with the nationwide unrest in Iran that began towards the end of 2025,...
The Hacker News

Jeffrey Epstein Had a ‘Personal Hacker,’ Informant Claims
Sat Jan 31 2026
Plus: AI agent OpenClaw gives cybersecurity experts the willies, China executes 11 scam compound bosses, a $40 million crypto theft has an unexpected alleged culprit, and more.
Wired
Cyberattacks Disrupt Communications at Wind, Solar, and Heat Facilities in Poland
Sat Jan 31 2026
CERT Polska said cyberattacks hit 30+ wind and solar farms, a manufacturer, and a major CHP plant supplying heat to nearly 500,000 people. On December 29, 2025, Poland faced coordinated cyberattacks targeting over 30 wind and solar farms, a manufacturing company, and a major heat and power plant serving nearly 500,000 people, CERT Polska reported. […]
Security Affairs

How to Film ICE
Sat Jan 31 2026
Filming federal agents in public is legal, but avoiding a dangerous—even deadly—confrontation isn’t guaranteed. Here’s how to record ICE and CBP agents as safely as possible and have an impact.
Wired

Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
Sat Jan 31 2026
Google-owned Mandiant on Friday said it identified an "expansion in threat activity" that uses tradecraft consistent with extortion-themed attacks orchestrated by a financially motivated hacking group known as ShinyHunters. The attacks leverage advanced voice phishing (aka vishing) and bogus credential harvesting sites mimicking targeted companies to gain unauthorized access to victim...
The Hacker News

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms
Sat Jan 31 2026
CERT Polska, the Polish computer emergency response team, revealed that coordinated cyber attacks targeted more than 30 wind and photovoltaic farms, a private company from the manufacturing sector, and a large combined heat and power plant (CHP) supplying heat to almost half a million customers in the country. The incident took place on December 29, 2025. The agency has attributed the attacks to...
The Hacker News
NIS2: Lieferketten als Risikofaktor
Fri Jan 30 2026
srcset="https://b2b-contenthub.
CSO Online

Ivanti patches two actively exploited critical vulnerabilities in EPMM
Fri Jan 30 2026
IT software company Ivanti released patches for its Endpoint Manager Mobile (EPMM) product to fix two new remote code execution vulnerabilities already under attack in the wild.
CSO Online

Startup Amutable plotting Linux security overhaul to counter hacking threats
Fri Jan 30 2026
If there’s one thing guaranteed to grab attention in the computer security world, it’s announcing yourself without fully explaining what it is you plan to do.
CSO Online

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access
Fri Jan 30 2026
Cybersecurity researchers have discovered malicious Google Chrome extensions that come with capabilities to hijack affiliate links, steal data, and collect OpenAI ChatGPT authentication tokens. One of the extensions in question is Amazon Ads Blocker (ID: pnpchphmplpdimbllknjoiopmfphellj), which claims to be a tool to browse Amazon without any sponsored content. It was uploaded to the Chrome...
The Hacker News
SmarterTools patches critical SmarterMail flaw allowing code execution
Fri Jan 30 2026
SmarterTools fixed two SmarterMail flaws, including a critical bug (CVE-2026-24423) that could allow arbitrary code execution. SmarterTools fixed two security bugs in its SmarterMail email software, including a critical vulnerability, tracked as CVE-2026-24423 (CVSS score of 9.3) that could let attackers run malicious code on affected systems. “SmarterTools SmarterMail versions prior to build 9511 contain […]
Security Affairs

Hugging Face infra abused to spread Android RAT in a large-scale malware campaign
Fri Jan 30 2026
An Android malware campaign is reportedly abusing Hugging Face’s public hosting infrastructure to distribute a remote access trojan (RAT).
CSO Online

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware
Fri Jan 30 2026
Cybersecurity researchers have discovered a new campaign attributed to a China-linked threat actor known as UAT-8099 that took place between late 2025 and early 2026. The activity, discovered by Cisco Talos, has targeted vulnerable Internet Information Services (IIS) servers located across Asia, but with a specific focus on targets in Thailand and Vietnam. The scale of the campaign is currently...
The Hacker News

Badges, Bytes and Blackmail
Fri Jan 30 2026
Behind the scenes of law enforcement in cyber: what do we know about caught cybercriminals? What brought them in, where do they come from and what was their function in the crimescape? Introduction: One view on the scattered fight against cybercrime The growing sophistication and diversification of cybercrime have compelled law enforcement agencies worldwide to respond through increasingly...
The Hacker News
U.S. CISA adds a flaw in Ivanti EPMM to its Known Exploited Vulnerabilities catalog
Fri Jan 30 2026
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in Ivanti EPMM to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an Ivanti EPMM vulnerability, tracked as CVE-2026-1281 (CVSS score of 9.8), to its Known Exploited Vulnerabilities (KEV) catalog. The vulnerability is a code injection that impacts Ivanti Endpoint Manager […]
Security Affairs
Empire Market co-founder faces 10 years to life after guilty plea
Fri Jan 30 2026
Empire Market co-founder Raheim Hamilton pleaded guilty to U.S. drug conspiracy charges in Chicago, facing a mandatory 10 years to life in prison. Raheim Hamilton (30) of Virginia, co-creator of the dark web marketplace Empire Market, pleaded guilty in Chicago to a federal drug conspiracy charge. Empire Market allowed users to anonymously buy and sell […]
Security Affairs

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup
Fri Jan 30 2026
A former Google engineer accused of stealing thousands of the company's confidential documents to build a startup in China has been convicted in the U.S., the Department of Justice (DoJ) announced Thursday. Linwei Ding (aka Leon Ding), 38, was convicted by a federal jury on seven counts of economic espionage and seven counts of theft of trade secrets for taking over 2,000 documents containing...
The Hacker News

The CSO guide to top security conferences
Fri Jan 30 2026
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have
CSO Online

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score
Fri Jan 30 2026
SmarterTools has addressed two more security flaws in SmarterMail email software, including one critical security flaw that could result in arbitrary code execution. The vulnerability, tracked as CVE-2026-24423, carries a CVSS score of 9.3 out of 10.0. "SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API...
The Hacker News

Human risk management: CISOs’ solution to the security awareness training paradox
Fri Jan 30 2026
Cybersecurity guru Bruce Scheier is often quoted as saying, “People are the weakest link in the security chain.
CSO Online

Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
Fri Jan 30 2026
Ivanti has rolled out security updates to address two security flaws impacting Ivanti Endpoint Manager Mobile (EPMM) that have been exploited in zero-day attacks, one of which has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog. The critical-severity vulnerabilities are listed below - CVE-2026-1281 (CVSS score:...
The Hacker News

Roughly half of employees are using unsanctioned AI tools, and enterprise leaders are major culprits
Fri Jan 30 2026
Shadow AI, the secret, unapproved use of AI by employees, isn’t going away.
CSO Online
SolarWinds addressed four critical Web Help Desk flaws
Thu Jan 29 2026
SolarWinds patched six Web Help Desk vulnerabilities, including four critical flaws exploitable without authentication for RCE or auth bypass. SolarWinds released security updates to address six Web Help Desk vulnerabilities, including four critical bugs that allow unauthenticated remote code execution or authentication bypass. The three critical flaws found by watchTowr, and specifically by researcher Piotr […]
Security Affairs

ShinyHunters ramp up new vishing campaign with 100s in crosshairs
Thu Jan 29 2026
Notorious extortion group ShinyHunters released tens of GB of files it claims to have stolen from dating apps Hinge, Match, OkCupid and Bumble.
CSO Online

Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries
Thu Jan 29 2026
A new joint investigation by SentinelOne SentinelLABS, and Censys has revealed that the open-source artificial intelligence (AI) deployment has created a vast "unmanaged, publicly accessible layer of AI compute infrastructure" that spans 175,000 unique Ollama hosts across 130 countries. These systems, which span both cloud and residential networks across the world, operate outside the...
The Hacker News

ICE Pretends It’s a Military Force. Its Tactics Would Get Real Soldiers Killed
Thu Jan 29 2026
WIRED asked an active military officer to break down immigration enforcement actions in Minneapolis and elsewhere.
Wired
Google targets IPIDEA in crackdown on global residential proxy networks
Thu Jan 29 2026
Google disrupted IPIDEA, a major residential proxy network that enrolled users’ devices via SDKs embedded in mobile and desktop apps. Google and partners disrupted the IPIDEA residential proxy network, used by many threat actors, via legal domain takedowns, intelligence sharing on malicious SDKs, and ecosystem-wide enforcement. Google Play Protect now removes and blocks apps with […]
Security Affairs
Identitäten im Fokus von Cyberkriminellen
Thu Jan 29 2026
Cyberkriminelle haben es inzwischen vermehrt auf digitale Identitäten abgesehen.
CSO Online

An AI Toy Exposed 50,000 Logs of Its Chats With Kids to Anyone With a Gmail Account
Thu Jan 29 2026
AI chat toy company Bondu left its web console almost entirely unprotected. Researchers who accessed it found nearly all the conversations children had with the company’s stuffed animals.
Wired

ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories
Thu Jan 29 2026
This week’s updates show how small changes can create real problems. Not loud incidents, but quiet shifts that are easy to miss until they add up. The kind that affects systems people rely on every day. Many of the stories point to the same trend: familiar tools being used in unexpected ways. Security controls are being worked on. Trusted platforms turning into weak spots. What looks routine on...
The Hacker News

Critical RCE bugs expose the n8n automation platform to host‑level compromise
Thu Jan 29 2026
Two critical sandbox escape flaws in the popular n8n workflow automation platform are allowing authenticated users to achieve remote code execution on affected instances.
CSO Online
Nation-state and criminal actors leverage WinRAR flaw in attacks
Thu Jan 29 2026
Multiple threat actors exploited a now-patched critical WinRAR flaw to gain initial access and deliver various malicious payloads. Google Threat Intelligence Group (GTIG) revealed that multiple threat actors, including APTs and financially motivated groups, are exploiting the CVE-2025-8088 flaw in RARLAB WinRAR to establish initial access and deploy a diverse array of payloads. The WinRAR […]
Security Affairs

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps
Thu Jan 29 2026
A study by OMICRON has revealed widespread cybersecurity gaps in the operational technology (OT) networks of substations, power plants, and control centers worldwide. Drawing on data from more than 100 installations, the analysis highlights recurring technical, organizational, and functional issues that leave critical energy infrastructure vulnerable to cyber threats. The findings are based on...
The Hacker News

CISA chief uploaded sensitive government files to public ChatGPT
Thu Jan 29 2026
The acting director of the US Cybersecurity and Infrastructure Security Agency uploaded sensitive government contracting documents to a public version of ChatGPT last summer, triggering automated secu
CSO Online

3 Decisions CISOs Need to Make to Prevent Downtime Risk in 2026
Thu Jan 29 2026
Beyond the direct impact of cyberattacks, enterprises suffer from a secondary but potentially even more costly risk: operational downtime, any amount of which translates into very real damage. That’s why for CISOs, it’s key to prioritize decisions that reduce dwell time and protect their company from risk. Three strategic steps you can take this year for better results: 1. Focus on today's...
The Hacker News
Kritik am Kritis-Dachgesetz: “Flickenteppich” befürchtet
Thu Jan 29 2026
srcset="https://b2b-contenthub.
CSO Online

Reports of GDPR violations have risen sharply
Thu Jan 29 2026
According to a recent report by law firm DLA Piper, organizations are increasingly being reported for violations of the General Data Protection Regulation (GDPR).
CSO Online

EU’s answer to CVE solves dependency issue, adds fragmentation risks
Thu Jan 29 2026
The security community has offered broad support for the creation of an EU-hosted vulnerability database as a means of reducing dependence on US databases.
CSO Online

SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass
Thu Jan 29 2026
SolarWinds has released security updates to address multiple security vulnerabilities impacting SolarWinds Web Help Desk, including four critical vulnerabilities that could result in authentication bypass and remote code execution (RCE). The list of vulnerabilities is as follows - CVE-2025-40536 (CVSS score: 8.1) - A security control bypass vulnerability that could allow an unauthenticated...
The Hacker News
OpenSSL issued security updates to fix 12 flaws, including Remote Code Execution
Thu Jan 29 2026
OpenSSL released security updates that address 12 flaws, including a high-severity remote code execution vulnerability. OpenSSL issued security updates fixing 12 vulnerabilities in the open-source cryptographic library, including a high-severity remote code execution flaw. Cybersecurity firm Aisle discovered the twelve vulnerabilities. The addressed issues are mainly tied to memory safety, parsing robustness, and resource handling. […]
Security Affairs

Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks
Thu Jan 29 2026
Google on Wednesday announced that it worked together with other partners to disrupt IPIDEA, which it described as one of the largest residential proxy networks in the world. To that end, the company said it took legal action to take down dozens of domains used to control devices and proxy traffic through them. As of writing, IPIDEA's website ("www.ipidea.io") is no longer accessible. It...
The Hacker News

NIST’s AI guidance pushes cybersecurity boundaries
Thu Jan 29 2026
For years, US cybersecurity guidance rested on a reassuring premise: New technologies introduce new wrinkles, but not fundamentally new problems.
CSO Online

10 Anzeichen für einen schlechten CSO
Thu Jan 29 2026
Sind IT-Mitarbeiter unzufrieden, kann das an schlechten Führungskräften oder an einer unzureichenden IT-Strategie liegen.
CSO Online

SolarWinds, again: Critical RCE bugs reopen old wounds for enterprise security teams
Thu Jan 29 2026
SolarWinds is yet again disclosing security vulnerabilities in one of its widely-used products.
CSO Online

Crooks are hijacking and reselling AI infrastructure: Report
Thu Jan 29 2026
For years, CSOs have worried about their IT infrastructure being used for unauthorized cryptomining.
CSO Online

ICE Is Using Palantir’s AI Tools to Sort Through Tips
Wed Jan 28 2026
ICE has been using an AI-powered Palantir system to summarize tips sent to its tip line since last spring, according to a newly released Homeland Security document.
Wired
U.S. CISA adds a flaw in multiple Fortinet products to its Known Exploited Vulnerabilities catalog
Wed Jan 28 2026
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in multiple Fortinet products to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Broadcom VMware vCenter Server vulnerability, tracked as CVE-2026-24858 (CVSS score of 9.4), to its Known Exploited Vulnerabilities (KEV) catalog. This week, Fortinet started rolling out patches for […]
Security Affairs

Here’s the Company That Sold DHS ICE’s Notorious Face Recognition App
Wed Jan 28 2026
Immigration agents have used Mobile Fortify to scan the faces of countless people in the US—including many citizens.
Wired

Critical bug in popular vm2 Node.js sandboxing library puts projects at risk
Wed Jan 28 2026
A critical vulnerability has been patched in vm2, a widely used library for the Node.
CSO Online

Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware
Wed Jan 28 2026
Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS Code) extension for Moltbot (formerly Clawdbot) on the official Extension Marketplace that claims to be a free artificial intelligence (AI) coding assistant, but stealthily drops a malicious payload on compromised hosts. The extension, named "ClawdBot Agent - AI Coding Assistant" ("clawdbot.clawdbot-agent")...
The Hacker News
