Category: TheHackerNews

Five Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts
16
Jan
2026

Five Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts

Cybersecurity researchers have discovered five new malicious Google Chrome web browser extensions that masquerade as human resources (HR) and enterprise…

LOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishing
16
Jan
2026

LOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishing

Jan 16, 2026Ravie LakshmananMalware / Cyber Espionage Security experts have disclosed details of a new campaign that has targeted U.S….

Your Digital Footprint Can Lead Right to Your Front Door
16
Jan
2026

Your Digital Footprint Can Lead Right to Your Front Door

Jan 16, 2026The Hacker NewsPrivacy / Data Protection You lock your doors at night. You avoid sketchy phone calls. You’re…

China-Linked APT Exploits Sitecore Zero-Day in Attacks on American Critical Infrastructure
16
Jan
2026

China-Linked APT Exploits Sitecore Zero-Day in Attacks on American Critical Infrastructure

Jan 16, 2026Ravie LakshmananZero-Day / Cyber Espionage A threat actor likely aligned with China has been observed targeting critical infrastructure…

Cisco Patches Zero-Day RCE
16
Jan
2026

Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways

Jan 16, 2026Ravie LakshmananVulnerability / Web Security Cisco on Thursday released security updates for a maximum-severity security flaw impacting Cisco…

AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks
15
Jan
2026

AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks

A critical misconfiguration in Amazon Web Services (AWS) CodeBuild could have allowed complete takeover of the cloud service provider’s own…

Researchers Reveal Reprompt Attack Allowing Single-Click Data Exfiltration From Microsoft Copilot
15
Jan
2026

Researchers Reveal Reprompt Attack Allowing Single-Click Data Exfiltration From Microsoft Copilot

Jan 15, 2026Ravie LakshmananPrompt Injection / Enterprise Security Cybersecurity researchers have disclosed details of a new attack method dubbed Reprompt…

Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access
15
Jan
2026

Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access

Jan 15, 2026Ravie LakshmananWeb Security /Vulnerability A maximum-severity security flaw in a WordPress plugin called Modular DS has come under…

Model Security Is the Wrong Frame – The Real Risk Is Workflow Security
15
Jan
2026

Model Security Is the Wrong Frame – The Real Risk Is Workflow Security

Jan 15, 2026The Hacker NewsData Security / Artificial Intelligence As AI copilots and assistants become embedded in daily work, security…

4 Outdated Habits Destroying Your SOC's MTTR in 2026
15
Jan
2026

4 Outdated Habits Destroying Your SOC’s MTTR in 2026

It’s 2026, yet many SOCs are still operating the way they did years ago, using tools and processes designed for…

Palo Alto Fixes GlobalProtect DoS Flaw That Can Crash Firewalls Without Login
15
Jan
2026

Palo Alto Fixes GlobalProtect DoS Flaw That Can Crash Firewalls Without Login

Jan 15, 2026Ravie LakshmananNetwork Security / Vulnerability Palo Alto Networks has released security updates for a high-severity security flaw impacting…

RedVDS Cybercrime Infrastructure
15
Jan
2026

Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud

Microsoft on Wednesday announced that it has taken a “coordinated legal action” in the U.S. and the U.K. to disrupt…