Category: CyberSecurityNews

NVIDIA NSIGHT Graphics for Linux Vulnerability Allows Code Execution Attacks
21
Jan
2026

NVIDIA NSIGHT Graphics for Linux Vulnerability Allows Code Execution Attacks

An urgent security update addressing a critical vulnerability in NSIGHT Graphics for Linux that could allow attackers to execute arbitrary…

AI Phishing Is Your Company’s Biggest Security Risk in 2026
21
Jan
2026

AI Phishing Is Your Company’s Biggest Security Risk in 2026

Phishing used to be easy to spot. Bad grammar, strange links, obvious scams. That version is gone.  In 2026, phishing is…

Critical Zoom Command Injection Vulnerability Enables Remote Code Execution
21
Jan
2026

Critical Zoom Command Injection Vulnerability Enables Remote Code Execution

A critical command injection vulnerability in Node Multimedia Routers (MMRs) could allow meeting participants to execute arbitrary code on affected…

Multiple Vulnerabilities in Anthropic Git MCP server Enables Code Execution
21
Jan
2026

Multiple Vulnerabilities in Anthropic Git MCP server Enables Code Execution

Three zero-day vulnerabilities in mcp-server-git, the reference implementation of Git integration for the Model Context Protocol (MCP). The flaws stem…

Attackers Leverages LinkedIn to Deliver Remote Access Trojan Targeting Corporate Environments
21
Jan
2026

Attackers Leverages LinkedIn to Deliver Remote Access Trojan Targeting Corporate Environments

A sophisticated phishing campaign is actively exploiting LinkedIn’s trusted social media platform to distribute a dangerous remote access trojan to…

Beware of Weaponized Shipping Documents that Deliver Remcos RAT with a Wide Range of Capabilities
21
Jan
2026

Beware of Weaponized Shipping Documents that Deliver Remcos RAT with a Wide Range of Capabilities

Threat actors are leveraging a dangerous new campaign that weaponizes ordinary-looking shipping documents to distribute Remcos, a powerful remote access…

Microsoft Teams External Domain Anomalies Allow Defenders to Detect Attackers at Earliest
21
Jan
2026

Microsoft Teams External Domain Anomalies Allow Defenders to Detect Attackers at Earliest

Microsoft is rolling out a new security feature called the External Domains Anomalies Report for Teams, designed to help IT…

Hackers Extensively Abuses Visual Studio Code to Execute Malicious Payloads on Victim System
21
Jan
2026

Hackers Extensively Abuses Visual Studio Code to Execute Malicious Payloads on Victim System

Threat actors linked to North Korea have continued to expand their attack capabilities by weaponizing Microsoft Visual Studio Code, one…

Critical GNU InetUtils Vulnerability Allows Unauthenticated Root Access Via "-f root"
21
Jan
2026

Critical GNU InetUtils Vulnerability Allows Unauthenticated Root Access Via “-f root”

A critical remote authentication bypass vulnerability has been disclosed in GNU InetUtils affecting the telnetd server component. The flaw, reported…

Google Chrome 144 Update Patches High-Severity V8 Vulnerability
21
Jan
2026

Google Chrome 144 Update Patches High-Severity V8 Vulnerability

A new Stable-channel release of Chrome version 144 addresses a high-severity vulnerability in the V8 JavaScript engine. The update, version…

Azure Private Endpoint Deployments Exposes Azure Resources to DoS Attack
21
Jan
2026

Azure Private Endpoint Deployments Exposes Azure Resources to DoS Attack

A critical architectural flaw in Microsoft Azure’s Private Endpoint implementation that enables denial-of-service (DoS) attacks against production Azure resources. The…

Critical Oracle WebLogic Server Proxy Vulnerability Lets Attackers Compromise the Server
21
Jan
2026

Critical Oracle WebLogic Server Proxy Vulnerability Lets Attackers Compromise the Server

Oracle has disclosed a severe security vulnerability affecting its Fusion Middleware suite, specifically targeting the Oracle HTTP Server and the…