Cybersecurity researchers have discovered malicious Google Chrome extensions that come with capabilities to hijack affiliate links, steal data, and collect OpenAI ChatGPT authentication tokens.
One of …
AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities From an Anthropic blog post :
In a recent evaluation of AI models’ cyber capabilities, current Claude models can now succeed …
Cybersecurity researchers have discovered a new campaign attributed to a China-linked threat actor known as UAT-8099 that took place between late 2025 and early 2026.
The activity, discovered by Cisco …
Behind the scenes of law enforcement in cyber: what do we know about caught cybercriminals? What brought them in, where do they come from and what was their function in the crimescape?
Introduction: …
**
Ravie Lakshmanan **
Jan 30, 2026
Vulnerability / Enterprise Security
Ivanti has rolled out security updates to address two security flaws impacting Ivanti Endpoint Manager Mobile (EPMM) that have …
**
Ravie Lakshmanan **
Jan 30, 2026
Vulnerability / Email Security
SmarterTools has addressed two more security flaws in SmarterMail email software, including one critical security flaw that could …
**
Ravie Lakshmanan **
Jan 30, 2026
Artificial Intelligence / Economic Espionage
A former Google engineer accused of stealing thousands of the company’s confidential documents to build a startup …
A new joint investigation by SentinelOne SentinelLABS, and Censys has revealed that the open-source artificial intelligence (AI) deployment has created a vast “unmanaged, publicly accessible …
**
Ravie Lakshmanan **
Jan 29, 2026
Cybersecurity / Hacking News
This week’s updates show how small changes can create real problems. Not loud incidents, but quiet shifts that are easy to miss …
A study by OMICRON has revealed widespread cybersecurity gaps in the operational technology (OT) networks of substations, power plants, and control centers worldwide. Drawing on data from more than …
**
The Hacker News **
Jan 29, 2026
Threat Intelligence / Incident Response
Beyond the direct impact of cyberattacks, enterprises suffer from a secondary but potentially even more costly risk: …
**
Ravie Lakshmanan **
Jan 29, 2026
Vulnerability / Software Security
SolarWinds has released security updates to address multiple security vulnerabilities impacting SolarWinds Web Help Desk, …
Google on Wednesday announced that it worked together with other partners to disrupt IPIDEA, which it described as one of the largest residential proxy networks in the world.
To that end, the company …
**
Ravie Lakshmanan **
Jan 28, 2026
Critical Infrastructure / Threat Intelligence
The “coordinated” cyber attack targeting multiple sites across the Polish power grid has been attributed …
Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS Code) extension for Moltbot (formerly Clawdbot) on the official Extension Marketplace that claims to be a free …
I was looking for possible exploitation of CVE-2026-21962, a recently patched WebLogic vulnerability. While looking for related exploit attempts in our data, I came across the following request:
`GET …
**
Ravie Lakshmanan **
Jan 28, 2026
Vulnerability / Open Source
A critical sandbox escape vulnerability has been disclosed in the popular vm2 Node.js library that, if successfully exploited, could …
**
Ravie Lakshmanan **
Jan 28, 2026
Vulnerability / Workflow Automation
Cybersecurity researchers have disclosed two new security flaws in the n8n workflow automation platform, including a crucial …
Threat actors with ties to China have been observed using an updated version of a backdoor called COOLCLIENT in cyber espionage attacks in 2025 to facilitate comprehensive data theft from infected …
If you work in security operations, the concept of the AI SOC agent is likely familiar. Early narratives promised total autonomy. Vendors seized on the idea of the “Autonomous SOC” and …
**
Ravie Lakshmanan **
Jan 28, 2026
Supply Chain Security / Malware
Cybersecurity researchers have discovered two malicious packages in the Python Package Index (PyPI) repository that masquerade as …
When security teams discuss credential-related risk, the focus typically falls on threats such as phishing, malware, or ransomware. These attack methods continue to evolve and rightly command …
**
Ravie Lakshmanan **
Jan 28, 2026
Vulnerability / Threat Intelligence
Google on Tuesday revealed that multiple threat actors, including nation-state adversaries and financially motivated groups, are …