AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities From an Anthropic blog post : In a recent evaluation of AI models’ cyber capabilities, current Claude models can now succeed …
AI Security Roundup
Daily feed of AI security, malware, and defensive research updates.
Cybersecurity researchers have discovered a new campaign attributed to a China-linked threat actor known as UAT-8099 that took place between late 2025 and early 2026. The activity, discovered by Cisco …
Behind the scenes of law enforcement in cyber: what do we know about caught cybercriminals? What brought them in, where do they come from and what was their function in the crimescape? Introduction: …
** Ravie Lakshmanan ** Jan 30, 2026 Vulnerability / Enterprise Security Ivanti has rolled out security updates to address two security flaws impacting Ivanti Endpoint Manager Mobile (EPMM) that have …
** Ravie Lakshmanan ** Jan 30, 2026 Vulnerability / Email Security SmarterTools has addressed two more security flaws in SmarterMail email software, including one critical security flaw that could …
** Ravie Lakshmanan ** Jan 30, 2026 Artificial Intelligence / Economic Espionage A former Google engineer accused of stealing thousands of the company’s confidential documents to build a startup …
ISC Stormcast For Friday, January 30th, 2026 https://isc.sans.edu/podcastdetail/9788, (Fri, Jan 30th)
ISC Stormcast For Friday, January 30th, 2026 https://isc.sans.edu/podcastdetail/9788
A new joint investigation by SentinelOne SentinelLABS, and Censys has revealed that the open-source artificial intelligence (AI) deployment has created a vast “unmanaged, publicly accessible …
** Ravie Lakshmanan ** Jan 29, 2026 Cybersecurity / Hacking News This week’s updates show how small changes can create real problems. Not loud incidents, but quiet shifts that are easy to miss …
ISC Stormcast For Thursday, January 29th, 2026 https://isc.sans.edu/podcastdetail/9786, (Thu, Jan 29th)
ISC Stormcast For Thursday, January 29th, 2026 https://isc.sans.edu/podcastdetail/9786
A study by OMICRON has revealed widespread cybersecurity gaps in the operational technology (OT) networks of substations, power plants, and control centers worldwide. Drawing on data from more than …
** The Hacker News ** Jan 29, 2026 Threat Intelligence / Incident Response Beyond the direct impact of cyberattacks, enterprises suffer from a secondary but potentially even more costly risk: …
SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass
** Ravie Lakshmanan ** Jan 29, 2026 Vulnerability / Software Security SolarWinds has released security updates to address multiple security vulnerabilities impacting SolarWinds Web Help Desk, …
Google on Wednesday announced that it worked together with other partners to disrupt IPIDEA, which it described as one of the largest residential proxy networks in the world. To that end, the company …
** Ravie Lakshmanan ** Jan 28, 2026 Critical Infrastructure / Threat Intelligence The “coordinated” cyber attack targeting multiple sites across the Polish power grid has been attributed …
Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS Code) extension for Moltbot (formerly Clawdbot) on the official Extension Marketplace that claims to be a free …
Odd WebLogic Request. Possible CVE-2026-21962 Exploit Attempt or AI Slop?, (Wed, Jan 28th)
I was looking for possible exploitation of CVE-2026-21962, a recently patched WebLogic vulnerability. While looking for related exploit attempts in our data, I came across the following request: `GET …
** Ravie Lakshmanan ** Jan 28, 2026 Vulnerability / Open Source A critical sandbox escape vulnerability has been disclosed in the popular vm2 Node.js library that, if successfully exploited, could …
** Ravie Lakshmanan ** Jan 28, 2026 Vulnerability / Workflow Automation Cybersecurity researchers have disclosed two new security flaws in the n8n workflow automation platform, including a crucial …
Threat actors with ties to China have been observed using an updated version of a backdoor called COOLCLIENT in cyber espionage attacks in 2025 to facilitate comprehensive data theft from infected …
If you work in security operations, the concept of the AI SOC agent is likely familiar. Early narratives promised total autonomy. Vendors seized on the idea of the “Autonomous SOC” and …
** Ravie Lakshmanan ** Jan 28, 2026 Supply Chain Security / Malware Cybersecurity researchers have discovered two malicious packages in the Python Package Index (PyPI) repository that masquerade as …
When security teams discuss credential-related risk, the focus typically falls on threats such as phishing, malware, or ransomware. These attack methods continue to evolve and rightly command …
** Ravie Lakshmanan ** Jan 28, 2026 Vulnerability / Threat Intelligence Google on Tuesday revealed that multiple threat actors, including nation-state adversaries and financially motivated groups, are …
** Ravie Lakshmanan ** Jan 28, 2026 Network Security / Zero-Day Fortinet has begun releasing security updates to address a critical flaw impacting FortiOS that has come under active exploitation in …