Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

New Linux Malware Framework Revealed: The Threat Landscape for Cloud-First Operations


In a recent discovery, researchers from Checkpoint have uncovered a never-before-seen Linux malware framework that provides attackers with advanced capabilities to compromise and control infected systems. Dubbed "VoidLink," this framework boasts an impressive array of functionalities, including cloud detection, plugin development APIs, adaptive stealth, rootkit functions, command and control implemented through legitimate network connections, anti-analysis techniques, and credential harvesting tools. As organizations increasingly move their workloads to cloud-based environments, the emergence of such advanced malware frameworks like VoidLink poses significant threats to security.

Published: Tue Jan 13 16:29:23 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Charity-Themed Malware Campaign Targets Ukrainian Army



Ukraine's army was recently targeted in a charity-themed malware campaign that delivered backdoor malware called PluggyApe. The attackers likely came from the Russian threat group known as 'Void Blizzard' and 'Laundry Bear', although there is medium confidence in attribution. This incident highlights the ongoing efforts by Russian threat groups to disrupt Ukraine's military capabilities, using advanced techniques and tools to target high-value targets.



Published: Tue Jan 13 17:14:44 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Browser Security Check: A Crucial Measure to Protect Online Identity

Browser security checks are an essential tool in protecting our online identity from cyber threats, ensuring a safer browsing experience and safeguarding our sensitive information.

Published: Wed Jan 14 00:46:38 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Patching Paradox: Unpacking the Windows 0-Day Bug and its Implications for Cybersecurity

A new zero-day bug in Windows has been discovered, allowing an authorized attacker to leak a memory address from a remote ALPC port. The US Cybersecurity and Infrastructure Security Agency (CISA) has flagged the vulnerability as a "frequent attack vector for malicious cyber actors," and Microsoft has pushed a patch to address the issue. However, concerns remain about whether other components may be involved in an exploit chain, highlighting the importance of rapid patching and staying informed about newly disclosed vulnerabilities.

Published: Wed Jan 14 00:55:23 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

AZ Monica Hospital's Digital Healthcare Disruption: A Cautionary Tale of Cybersecurity



AZ Monica Hospital's Digital Healthcare Disruption: A Cautionary Tale of Cybersecurity

A devastating cyberattack has left a prominent Belgian general hospital network's digital systems severely compromised. The attack resulted in the hospital's decision to shut down servers, cancel scheduled procedures, and transfer critical patients. This incident highlights the importance of robust cybersecurity measures in healthcare institutions and underscores the need for cooperation between hospitals, law enforcement agencies, and cybersecurity experts.



Published: Wed Jan 14 01:07:05 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

PLUGGYAPE Malware: A Sophisticated Threat Leveraging Signal, WhatsApp, and Obfuscation Techniques to Target Ukrainian Defense Forces

PLUGGYAPE Malware: A Sophisticated Threat Leveraging Signal, WhatsApp, and Obfuscation Techniques to Target Ukrainian Defense Forces. Learn more about this new strain of malware and its implications for organizations.

Published: Wed Jan 14 01:16:16 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Monroe University's 2024 Data Breach Exposes Sensitive Information of Over 320,000 Individuals


A recent data breach at Monroe University has exposed personal, financial, and health-related information of over 320,000 individuals. The university has taken steps to address its security posture and prevent similar incidents in the future. Stay informed about the latest cybersecurity developments with our regular updates on breaches and security best practices.

Published: Wed Jan 14 03:05:54 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Patch Tuesday January 2026: A Critical Update to Mitigate Exploited Zero-Day Vulnerabilities


Microsoft Patch Tuesday January 2026 addressed a total of 112 CVEs across various products, including Windows and Office. The update includes eight critical vulnerabilities, which can help attackers bypass security protections and make more serious exploits work. This release highlights the need for companies to prioritize cybersecurity and maintain their software on a regular basis to minimize potential risks.

Published: Wed Jan 14 03:12:42 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Data Breach Rocks Spanish Energy Giant Endesa: A Cautionary Tale of Cybersecurity Failures


Spanish energy giant Endesa has found itself at the center of a high-profile data breach scandal after hackers claimed to have stolen sensitive information from millions of customers. The incident highlights the importance of robust cybersecurity measures and data protection protocols in the face of increasingly sophisticated cyber threats.

Published: Wed Jan 14 04:24:50 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Addresses 114 Windows Vulnerabilities in January 2026 Patch, One Actively Exploited


Microsoft has addressed 114 Windows vulnerabilities in its first security update for 2026, including one actively exploited flaw that allows attackers to disclose sensitive information. The update includes patches for multiple privilege escalation and remote code execution flaws, as well as a security feature bypass impacting Secure Boot Certificate Expiration. Prompt patching is essential to maintain trust in Windows security boundaries.

Published: Wed Jan 14 05:18:00 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Australia's Education System Under Siege: Victoria's Department of Education Hit by High-Profile Data Breach

A high-profile data breach at the Victorian Department of Education has left students and parents shaken, with hackers gaining access to personal information and email addresses of current and former students.

Published: Wed Jan 14 05:49:42 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

U.S. CISA Adds Microsoft Windows Flaw to Known Exploited Vulnerabilities Catalog: A Growing Concern for Cybersecurity

U.S. CISA adds a new vulnerability in Microsoft Windows to its Known Exploited Vulnerabilities catalog, highlighting the ongoing threat of sophisticated cyberattacks against individuals and organizations worldwide. Learn more about this critical flaw and how to protect your systems from potential attacks.

Published: Wed Jan 14 06:09:22 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fortinet Addresses Critical FortiSIEM Vulnerability Allowing Unauthenticated Remote Code Execution



Fortinet has released patches for two critical security vulnerabilities in its FortiSIEM and FortiFone systems, addressing issues allowing unauthenticated remote code execution and device configuration access. Users are urged to update their systems to the latest versions for optimal protection.



Published: Wed Jan 14 06:22:27 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The UK's Digital ID U-Turn: A Web of Complexity and Uncertainty


The UK government has dropped its plan to make digital ID mandatory for proof of right to work in the country, sparking concerns about the cost and purpose of the scheme. The revised approach prioritizes access to public services across the population, but critics argue that taxpayers should not foot a £1.8 billion bill for an unnecessary system. This article explores the complexities surrounding the digital ID requirement and its potential implications for the United Kingdom's immigration policies, public services, and data protection laws.

Published: Wed Jan 14 06:36:14 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Eurail Data Breach: A Devastating Blow to European Travelers' Personal Data

Eurail has confirmed that its customers' personal data was compromised in a recent breach, exposing sensitive information including passports and bank details. The company has assured customers that it takes their security seriously and is taking steps to secure affected systems. However, the potential consequences for customers are significant, with possible outcomes including phishing attempts, unauthorized access, and identity theft.

Published: Wed Jan 14 06:53:23 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cyberattack on Belgian Hospitals: A Looming Crisis in the Health Sector

Belgian hospital network AZ Monica faces a major crisis after a cyberattack crippled its services, forcing the cancellation of surgeries and the transfer of critical patients. The attack's impact is still being assessed, but it's clear that the healthcare sector in Belgium is facing significant challenges.

Published: Wed Jan 14 07:07:02 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Awareness of Microsoft Copilot Vulnerabilities: The Reprompt Attack Method and its Implications

Microsoft Copilot has recently faced a critical vulnerability known as the Reprompt attack method, which allows hackers to hijack sessions and issue commands to exfiltrate sensitive data. By applying the latest Windows update, users can protect themselves against this new threat.

Published: Wed Jan 14 08:07:10 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Era of Ransomware: The Rise of Blockchain-Based Anti-Detection Methods

In a significant shift in the tactics employed by cybercriminals, DeadLock ransomware has been identified as one of the first groups to utilize blockchain-based anti-detection methods. This marks a new era in the cat-and-mouse game between cybercriminals and defenders.

Published: Wed Jan 14 08:32:32 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Exploit Vulnerability in c-ares Library to Bypass Security Measures and Deploy Malware


Hackers have successfully exploited a vulnerability in the open-source c-ares library to bypass security controls and deliver a wide range of malware. The attack aims to establish persistent remote access and data theft. Facebook phishing scams employing the Browser-in-the-Browser (BitB) technique are also being used to deceive unsuspecting users into entering their credentials.

Published: Wed Jan 14 08:41:46 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of ConsentFix: A Novel OAuth Phishing Technique and Its Implications for Cybersecurity

Discover how elite SOCs use NDR to protect their networks and learn more about ConsentFix, a novel OAuth phishing technique that's making waves in the cybersecurity world. Read our latest article for an in-depth analysis of this threat and its implications for organizations and individuals.

Published: Wed Jan 14 09:17:05 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The €42 Million Fine: A Cautionary Tale of Telecom Companies' Failure to Prioritize Customer Data Security


France has fined two major telecom companies, Free and Free Mobile, €42 million for their roles in a data breach that compromised the personal data of over 24 million individuals, including financial information such as IBANs. The fine was issued by France's data protection regulator, CNIL, due to the companies' failure to properly secure personal data, inadequate communication of the breach to those affected, and non-compliance with data retention laws.

Published: Wed Jan 14 09:30:24 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fortinet Addresses Two Critical Vulnerabilities in FortiFone and FortiSIEM

Fortinet has addressed two critical flaws in its FortiFone and FortiSIEM products, including a vulnerability that could allow attackers to execute unauthorized code without authentication. The company released patches for affected versions and provided recommendations for mitigating the impact of the vulnerabilities.

Published: Wed Jan 14 10:09:40 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Decoding Tren de Aragua: Unpacking the Mysterious Venezuelan Gang Designated as a Foreign Terrorist Organization


U.S. Law Enforcement Agencies Scramble to Understand Venezuelan Gang's True Intentions
The designation of a Venezuelan gang as a "foreign terrorist organization" has sparked confusion and controversy within U.S. law enforcement agencies, with some officials struggling to understand the group's true intentions and capabilities.


Published: Wed Jan 14 10:22:07 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

AI Agents: The New Privilege Escalation Path - Threatening Organizational Security

AI agents have quickly moved from experimental tools to core components of daily workflows across security, engineering, IT, and operations. This has introduced a new threat - privilege escalation - as these agents become access intermediaries that bypass traditional permission boundaries. To mitigate this risk, organizations must reevaluate their approach to security in light of this emerging threat.

Published: Wed Jan 14 10:34:56 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Micrsoft's WinSqlite3.dll Update Resolves False Positive Security Scans

Microsoft has resolved a known issue that triggered false positive security alerts caused by the Windows DLL WinSqlite3.dll. The update, released January 13, 2026, and later, fixes the detection of a vulnerable memory corruption vulnerability (CVE-2025-6965) in this component. It is recommended to install the latest update for your device as it contains important improvements and issue resolution.

Published: Wed Jan 14 10:49:24 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Microsoft Copilot: A New Threat Emerge in Reprompt Attack


A new attack method dubbed "Reprompt" has emerged, exploiting vulnerabilities in Microsoft Copilot's execution of injected prompts via the 'q' parameter in URLs. The attack allows attackers to infiltrate user Copilot sessions and exfiltrate sensitive data without the victim's knowledge, highlighting the importance of staying vigilant against AI-powered attacks.

Published: Wed Jan 14 11:11:48 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Fortinet Vulnerability: The PhMonitor Service and Its Devastating Consequences



A new security flaw has been discovered in FortiSIEM, allowing remote attackers to execute commands or code. The vulnerability impacts versions from 6.7 to 7.5 and has been addressed by Fortinet with a patch. Organizations utilizing the service are advised to take proactive measures to secure their configurations.


Published: Wed Jan 14 12:59:19 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A National Mobile Crisis: The Verizon Outage Raises Questions About the Resilience of the US Telecommunications System


A nationwide mobile crisis has struck the United States, leaving millions of customers without access to mobile data and voice services. The Verizon outage has raised questions about the resilience of the US telecommunications system and highlights the importance of having a robust backup plan in place. With experts warning that similar incidents can have far-reaching consequences, it's essential for consumers to take steps to protect themselves from potential vulnerabilities in their mobile devices and networks.

Published: Wed Jan 14 13:06:57 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

France Imposes €42 Million Fine on Free Mobile for Inadequate Data Protection Following 2024 Breach


In a significant move, France has imposed a cumulative fine of €42 million on Free Mobile for its inadequate handling of a 2024 data breach incident that exposed customer information. The French data protection authority found that the company failed to implement adequate security measures and properly inform affected individuals of the breach, in violation of GDPR regulations. As the country continues to navigate the complexities of data protection, this fine serves as an important reminder for ISPs of their responsibility to prioritize the safety of sensitive customer information.

Published: Wed Jan 14 13:56:30 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

AISURU/Kimwolf Botnet: A Looming Threat to Global Cybersecurity

AISURU/Kimwolf Botnet: A Looming Threat to Global Cybersecurity - The recent discovery of this notorious botnet has sent shockwaves throughout the cybersecurity community, highlighting the increasingly sophisticated and pervasive nature of modern cyber threats. With over 2 million Android devices compromised and a sophisticated proxy network containing 832 compromised KeeneticOS routers operating across Russian ISPs, this botnet presents a significant threat to global cybersecurity.

Published: Wed Jan 14 14:12:23 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

CERT-UA Reports PLUGGYAPE Cyberattacks on Ukrainian Defense Forces

Ukraine's defense forces have been targeted by a series of sophisticated cyberattacks using PLUGGYAPE malware linked to Russia's Void Blizzard group. The attacks demonstrate the evolving nature of modern cyber threats and highlight the need for robust cybersecurity measures.

Published: Wed Jan 14 14:23:51 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Linux Malware Spotted: VoidLink Targets Cloud Infrastructure with Advanced Stealth Capabilities


New Linux malware dubbed "VoidLink" has emerged with advanced stealth capabilities and a range of illicit activities. Targeting cloud infrastructure, this highly sophisticated threat highlights the evolving nature of cybersecurity challenges, emphasizing the need for sustained vigilance among organizations to safeguard against emerging threats.

Published: Wed Jan 14 14:50:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Global Impact of Cybersecurity Threats: The Kyowon Data Breach and its Broader Consequences


The Kyowon Group, a prominent South Korean conglomerate, has confirmed that its systems were targeted in a suspected ransomware attack on January 14. With over 9.6 million accounts registered and an estimated 5.5 million individuals potentially affected, the breach raises concerns about customer data exposure and the broader implications for cybersecurity.



Published: Wed Jan 14 15:57:05 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Exposing the Shadows: The RedVDS Cybercrime Empire

Microsoft's Digital Crimes Unit has disrupted RedVDS, a massive cybercrime platform linked to at least $40 million in reported losses in the United States alone since March 2025. The disruption marks a significant victory in the ongoing struggle against cybercrime and serves as a reminder of the need for robust cybersecurity measures and international cooperation.

Published: Thu Jan 15 01:21:00 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great Firewall of Cybersecurity: China's Crackdown on U.S. and Israeli Cybersecurity Software

China has issued a directive instructing domestic firms to cease using cybersecurity software from over 12 U.S. and Israeli companies, citing national security concerns as the reason for their ban. The move reflects growing tensions between China and the West over issues of tech supremacy and espionage.

Published: Thu Jan 15 02:07:11 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Palo Alto Networks Warns of Critical Vulnerability Allowing Hackers to Disable Firewalls in Denial-of-Service Attacks


Palo Alto Networks has warned of a critical vulnerability that could allow hackers to disable firewall protections in denial-of-service (DoS) attacks. With thousands of firewalls exposed online, this raises significant concerns about the potential for widespread exploitation and compromise. The company has released security updates and advised administrators to upgrade to the latest release to secure their systems.

Published: Thu Jan 15 03:07:21 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

AWS Flips Switch on Euro Cloud as Digital Sovereignty Fears Mount

AWS has made its European Sovereign Cloud generally available today, offering European customers greater control over their data and applications amidst growing concerns about digital sovereignty. The launch comes at a time when trade and geopolitical tensions between Europe and the US are high.

Published: Thu Jan 15 03:40:09 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Takes Down RedVDS: A Sophisticated Cybercrime Infrastructure Disrupted


Microsoft has taken down RedVDS, a sophisticated cybercrime infrastructure used for online fraud. The tech giant's coordinated legal action disrupted the illicit service, which provided access to disposable virtual computers that made fraud cheap, scalable, and difficult to trace. Since its disruption, threat actors have lost access to their malicious infrastructure and are no longer able to carry out complex attacks quickly and at scale. RedVDS was a prime example of how crimeware-as-a-service (CaaS) offerings have become increasingly lucrative, transforming cybercrime into an underground economy where even inexperienced threat actors can carry out sophisticated attacks.

Published: Thu Jan 15 03:53:35 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Vulnerability Warnings: Palo Alto Fixes GlobalProtect Flaw, n8n Warns of Critical RCE Threat

Two critical vulnerability warnings have been issued recently by Palo Alto Networks and n8n, highlighting the importance of timely patching and adherence to best practices in protecting against sophisticated cyber threats.

Published: Thu Jan 15 04:03:51 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unseen Threat: How Organizational AI Agents are Eroding Traditional Access Control Models


The Rise of Organizational AI Agents: How Advanced AI Systems are Bypassing Traditional Access Controls


Published: Thu Jan 15 04:13:32 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Lumen Successfully Takes Down Notorious AISURU and Kimwolf Botnet Network


Lumen Successfully Takes Down Notorious AISURU and Kimwolf Botnet Network

In January 2026, Lumen's Black Lotus Labs disrupted a sophisticated botnet network known as AISURU/Kimwolf, blocking over 550 command-and-control servers used for DDoS attacks and proxy abuse. The operation marked a significant victory in the ongoing battle against cyber threats.



Published: Thu Jan 15 04:24:19 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Takes Down Global Cybercrime Host RedVDS: A New Front in the War on Phishing and Fraud


Microsoft takes down global cybercrime host RedVDS, a virtual desktop service used by phishing and fraud attackers, as part of a wider cross-border operation involving Europol and German law enforcement. The takedown marks an important milestone in Microsoft's efforts to disrupt and dismantle cybercrime infrastructure, highlighting the company's commitment to protecting customers and preventing further harm from these types of attacks.

Published: Thu Jan 15 05:51:12 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Cybersecurity: Modernizing Threat Detection and Response



The Evolution of Cybersecurity: Modernizing Threat Detection and Response

In this article, we explore the shift in the threat landscape and how top-performing SOCs are adapting their strategies to keep pace with evolving threats. Learn how cloud-based malware analysis services, AI-powered tools, and platforms like ANYRUN can help organizations reduce risk exposure, improve productivity, and accelerate incident response.

Summary:
The threat landscape has undergone significant changes, necessitating the adoption of modern cybersecurity solutions that prioritize automation, dynamic analysis, and enterprise-grade integration. Top-performing SOCs are leveraging cutting-edge technologies to streamline workflows, eliminate friction, and enhance threat detection capabilities. By embracing platforms like ANYRUN, organizations can improve their security posture and stay ahead of emerging threats.



Published: Thu Jan 15 06:01:09 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Palo Alto Networks Addresses GlobalProtect Flaw: A Threat to Enterprise Security


Palo Alto Networks has addressed a critical flaw in its GlobalProtect product line, which could allow attackers to disrupt network traffic and firewall protection. The vulnerability has been patched for affected versions of PAN-OS and Prisma Access software, but organizations should still take steps to prevent exploitation and implement additional security measures.

Published: Thu Jan 15 06:13:33 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Whispering Shadows of Vulnerability: A Looming Threat to Bluetooth Security


A recent discovery by researchers has uncovered a complex web of vulnerabilities in the implementation of Fast Pair, a feature used to pair Bluetooth devices with smartphones and computers. The WhisperPair attack allows hackers to silently pair with already paired target devices, track users across distances without their knowledge or consent, and gain access to sensitive location data through Google's Find Hub feature. Device manufacturers have acknowledged the vulnerability and released software updates, but inconsistencies in patch implementations persist, underscoring the need for vigilance among users.

Published: Thu Jan 15 06:28:48 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Inflection Point: Former CISA Director Jen Easterly Takes the Helm of RSA Conference


The Former CISA Director Jen Easterly Will Lead RSA Conference, a Position She Hails as an "Inflection Point" for Cybersecurity
As the cybersecurity industry continues to navigate the complexities of emerging technologies and shifting global landscapes, a new leader has emerged to guide one of the most prominent organizations in the field. Former CISA Director Jen Easterly has been appointed CEO of RSA Conference, a position she describes as an "inflection point" for tech and the world beyond. This article delves into the context surrounding Easterly's appointment, exploring the intricacies of her background, the challenges facing the cybersecurity industry, and the significance of RSA Conference in the broader landscape.


Published: Thu Jan 15 07:10:12 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The AI Workflow Conundrum: A New Perspective on Model Security



The rise of artificial intelligence has brought about numerous benefits, but it also poses new security challenges. The traditional distinction between trusted code and untrusted input no longer applies to AI models. As AI becomes increasingly ubiquitous, securing the workflows that surround those models is becoming a pressing concern. Learn how a new perspective on model security can help you stay ahead of the curve in this rapidly evolving landscape.

Published: Thu Jan 15 07:19:52 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Data Breach Scandal Rocks a UK GP Surgery: A Glimpse into the Dark World of Cybercrime

A recent development in the West Midlands, UK has shed light on a data breach at a local general practitioner's (GP) surgery, highlighting the vulnerabilities in healthcare systems and the ongoing threat of cybercrime. A 29-year-old woman is accused of theft and assisting police officers with their inquiries following an alleged data breach.

Published: Thu Jan 15 07:33:36 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Surveillance State of Connected Cars: How General Motors' Smart Driver Program Exposed Drivers to a Hostile World of Data Brokers



US Regulator Tells General Motors to Hit the Brakes on Customer Tracking: A Deep Dive into GM's Smart Driver Program and its Consequences for Consumer Privacy

Published: Thu Jan 15 07:47:55 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft's Windows App Update Fails to Secure Remote Desktop Connections

Microsoft's latest Windows App security update has failed to provide the promised secure connection and authentication for Remote Desktop users, with credential prompt failures now affecting Azure Virtual Desktop and Windows 365.

Published: Thu Jan 15 08:19:26 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shift in Leadership: How Jen Easterly's Appointment as RSAC CEO Signals a New Era for Cybersecurity


The former head of CISA, Jen Easterly, has taken over as CEO of RSAC Conference, a prominent annual gathering of cybersecurity experts, vendors, and researchers. In this article, we will delve into the context surrounding her appointment and explore the current state of the cybersecurity industry, including the challenges posed by AI tools, government policies, and global collaboration.



Published: Thu Jan 15 08:28:14 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Rise of Modern Cyber Threats: AI Vulnerabilities, Voice Cloning Exploits, and Evading Detection

Recent AI vulnerabilities, voice cloning exploits, and evasion tactics have emerged as significant threats to our digital safety. Learn more about the rise of modern cyber threats in this comprehensive article.

Published: Thu Jan 15 08:57:33 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Simple CodeBuild Flaw Exposed: The Global Vulnerability That Put AWS at Risk

A recent discovery by Wiz security researchers has revealed a critical misconfiguration in AWS's CodeBuild service that put every AWS environment at risk. This vulnerability could have had far-reaching consequences if not for the swift action taken by AWS after it was disclosed. The incident highlights the need for companies to continually monitor their services and address potential vulnerabilities before they can be exploited by malicious actors.

Published: Thu Jan 15 09:09:58 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Vulnerability in a Popular WordPress Plugin Exposes Websites to Elevated Privileges and Potential Data Breaches


A popular WordPress plugin has been found vulnerable to privilege escalation, exposing websites to elevated privileges and potential data breaches. The Modular DS plugin, which boasts over 40,000 active installations, was found to have a critical flaw due to its routing mechanism. According to recent reports, the vulnerability (CVE-2026-23550) has already been actively exploited in the wild, with multiple IP addresses tracked attempting to exploit it. This highlights the importance of keeping software up-to-date and being cautious when dealing with third-party plugins.

Published: Thu Jan 15 10:08:50 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Vulnerability Found in Microsoft Copilot: "Reprompt" Attack Allows Single-Click Data Exfiltration



A new vulnerability has been discovered in Microsoft Copilot that allows bad actors to exfiltrate sensitive data from the chatbot in a single click, bypassing enterprise security controls entirely. Dubbed "Reprompt," this attack method exploits design limitations of AI systems and highlights the need for organizations to prioritize layered defenses and robust monitoring.

Published: Thu Jan 15 10:17:14 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Central Maine Healthcare Data Breach: A Wake-Up Call for Healthcare Organizations


Central Maine Healthcare data breach impacted over 145,000 patients, exposing sensitive personal, medical, and insurance information, and highlighting the ongoing threat of cyberattacks to healthcare organizations worldwide.

Published: Thu Jan 15 10:26:22 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Vulnerability in Google's Fast Pair Protocol: Hijacking Bluetooth Audio Accessories and Eavesdropping on Conversations


Google's Fast Pair protocol has been found to be vulnerable to exploitation by hackers, who can hijack Bluetooth audio devices and eavesdrop on conversations. The critical flaw, dubbed WhisperPair, allows attackers to track users' location using Google's Find Hub network. While a security patch is available, it may not yet be available for all affected devices. Users are advised to stay informed about potential vulnerabilities and regularly update their device firmware.

Published: Thu Jan 15 10:39:45 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cosmic Counterweights: The Ocean's Price for Climate Engineering


A new study by a team of researchers examines the risks of climate engineering on marine ecosystems. While some strategies carry fewer risks than others, none are free of consequences. The ocean's health is at stake, and the world needs to prioritize transparency and caution in its pursuit of solutions to this global crisis.

Published: Thu Jan 15 10:49:30 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unchecked Reign of Immunity: How ICE Agents Have Shot and Killed Over 25 People Without Facing Consequences

The case of Renee Nicole Good highlights a disturbing trend of ICE agents being shielded from accountability for their actions. With not a single agent facing criminal charges despite killing over 25 people, questions arise about the selective enforcement of policies within the agency.

Published: Thu Jan 15 13:09:23 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Cowork Conundrum: Anthropic's Files API Exfiltration Risk Resurfaces

Anthropic’s Files API exfiltration risk resurfaces in Cowork, a productivity AI designed to automate office work. The company's response to the issue has been criticized for being lukewarm and dismissive of user responsibility, highlighting the need for greater transparency and accountability in AI development.

Published: Thu Jan 15 13:25:50 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Grok Conundrum: An Exploration of AI-Generated Nudity and the Limits of Regulation


In a shocking turn of events, Elon Musk's X platform has been found to be capable of generating thousands of non-consensual images of women in revealing clothing. Despite attempts by the platform's creators to restrict its ability to produce such content, it appears that some safety measures still fail to fully address the issue. This raises important questions about the limits of regulation in the age of AI and the need for greater accountability and oversight in the development of these technologies.

Published: Thu Jan 15 13:43:37 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Arsenal of Weaknesses: The AWS CodeBuild Misconfiguration Vulnerability Exposed to Potential Supply Chain Attacks

A critical misconfiguration in Amazon Web Services (AWS) CodeBuild has exposed its own GitHub repositories, including its AWS JavaScript SDK, to potential supply chain attacks. This vulnerability has been dubbed "CodeBreach" and was fixed by AWS in September 2025 following responsible disclosure on August 25, 2025. The issue highlights the importance of maintaining secure continuous integration (CI) pipelines and underscores the potential risks of exploiting unauthenticated attackers' access to cloud services.

Published: Thu Jan 15 14:44:08 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Latch onto Vulnerability in Popular WordPress Plugin, Modular DS

Recent reports have highlighted a critical vulnerability in the popular WordPress plugin Modular DS that has been exploited by hackers for unauthorized access to vulnerable sites. To avoid falling prey to such attacks, users are urged to upgrade to the latest version of the plugin as soon as possible. The impact of this security breach serves as a stark reminder of the need for timely patching and regular monitoring in the face of rapidly evolving cyber threats.

Published: Thu Jan 15 14:56:15 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Flawing Foundations: The AMD SEV-SNP Vulnerability Exposes Secrets to Malicious Insiders

AMD's Secure Encrypted Virtualization (SEV-SNP) system has been identified as vulnerable to exploitation by malicious insiders, exposing sensitive data through a previously undocumented control bit. The CVE-2025-29943 designation highlights the severity of the issue and the need for immediate action from cloud providers and organizations relying on SEV-SNP.

Published: Thu Jan 15 15:23:14 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Temporary Respite: The Great Server Conundrum Comes to an End

Despite a temporary server outage affecting [system/site name], administrators have been notified and are working diligently to rectify the issue. The public is advised to refresh their pages periodically in anticipation of the site's swift return to operation.

Published: Thu Jan 15 15:42:50 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Devastating Cyberattack on South Korea's Kyowon Conglomerate: Unraveling the Mystery Behind the Ransomware Attack


A recent ransomware attack has disrupted operations at South Korea's prominent conglomerate, Kyowon, affecting several core subsidiaries and potentially exposing customer data. The attack highlights the growing threat of cyber breaches and underscores the importance of robust cybersecurity controls and collaboration among stakeholders. This article provides a detailed analysis of the incident, its impact on the company, and its implications for the global cybersecurity landscape.

Published: Thu Jan 15 16:09:24 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Chinese Spies Use Maduro's Capture as Lure to Phish US Agencies

Chinese spies used a recent phishing campaign targeting US government agencies and policy-related organizations after the capture of Venezuelan President Nicolás Maduro. The attackers were attributed to a Beijing-backed espionage crew known as Mustang Panda, and exploited vulnerabilities in SiteCore products and Windows flaws to gain access to victims' environments. While it's unclear whether the attackers successfully compromised any targeted computers, the campaign highlights the ongoing threat posed by Chinese cyberespionage and the need for vigilance and cooperation to counter this threat.

Published: Thu Jan 15 16:21:06 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cisco Fixes Critical AsyncOS Bug Under Attack for Weeks


Cisco has finally fixed a critical bug in their AsyncOS software that was under attack for at least a month. The bug, tracked as CVE-2025-20393, affects some Secure Email Gateway (SEG) and Secure Email and Web Manager (SEWM) appliances, allowing attackers to execute arbitrary commands with root privileges. Cisco has released software updates to address the issue, recommending affected customers upgrade to an appropriate fixed software release.

Published: Thu Jan 15 17:42:24 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cisco Patches Critical Zero-Day Vulnerability in Secure Email Gateways Exploited by China-Linked APT


Cisco Systems has released security updates to address a critical zero-day vulnerability in its Secure Email Gateways that was exploited by a China-linked APT actor. The vulnerability allows attackers to execute arbitrary commands with root privileges, making it crucial for organizations to patch these vulnerabilities and implement robust security measures.

Published: Fri Jan 16 00:33:29 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical Vulnerability in Google's Fast Pair Protocol Allows Hackers to Hijack Bluetooth Audio Accessories, Track Users, and Eavesdrop on Conversations

Google's Fast Pair protocol has been identified with a critical vulnerability that can allow hackers to hijack Bluetooth audio accessories, track users, and eavesdrop on conversations. Here's what you need to know about the WhisperPair flaw.

Published: Fri Jan 16 01:00:02 2026 by llama3.2 3B Q4_K_M










© Ethical Hacking News . All rights reserved.

Privacy | Terms of Use | Contact Us