Category: TheHackerNews

Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
14
Jan
2026

Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers

The Black Lotus Labs team at Lumen Technologies said it null-routed traffic to more than 550 command-and-control (C2) nodes associated…

AI Agents Are Becoming Privilege Escalation Paths
14
Jan
2026

AI Agents Are Becoming Privilege Escalation Paths

AI agents have quickly moved from experimental tools to core components of daily workflows across security, engineering, IT, and operations….

Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware
14
Jan
2026

Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware

Security experts have disclosed details of an active malware campaign that’s exploiting a DLL side-loading vulnerability in a legitimate binary…

Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited
14
Jan
2026

Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited

Microsoft on Tuesday rolled out its first security update for 2026, addressing 114 security flaws, including one vulnerability that it…

Fortinet Fixes Critical FortiSIEM Flaw Allowing Unauthenticated Remote Code Execution
14
Jan
2026

Fortinet Fixes Critical FortiSIEM Flaw Allowing Unauthenticated Remote Code Execution

Jan 14, 2026Ravie LakshmananVulnerability / Patch Management Fortinet has released updates to fix a critical security flaw impacting FortiSIEM that…

64% of 3rd-Party Applications Access Sensitive Data Without Justification
14
Jan
2026

64% of 3rd-Party Applications Access Sensitive Data Without Justification

Research analyzing 4,700 leading websites reveals that 64% of third-party applications now access sensitive data without business justification, up from…

Critical Node.js Vulnerability
14
Jan
2026

Critical Node.js Vulnerability Can Cause Server Crashes via async_hooks Stack Overflow

Jan 14, 2026Ravie LakshmananApplication Security / Vulnerability Node.js has released updates to fix what it described as a critical security…

PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces
14
Jan
2026

PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces

Jan 14, 2026Ravie LakshmananCyber Espionage / Threat Intelligence The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of…

Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages
13
Jan
2026

Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages

Jan 13, 2026Ravie Lakshmanan Web Security / Data Theft Cybersecurity researchers have discovered a major web skimming campaign that has…

Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool
13
Jan
2026

Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool

Jan 13, 2026Ravie LakshmananWeb Security / Online Fraud Cybersecurity researchers have disclosed details of a malicious Google Chrome extension that’s…

From MCPs and Tool Access to Shadow API Key Sprawl
13
Jan
2026

From MCPs and Tool Access to Shadow API Key Sprawl

Jan 13, 2026The Hacker NewsArtificial Intelligence / Automation Security AI agents are no longer just writing code. They are executing…

New Advanced Linux VoidLink Malware Targets Cloud and container Environments
13
Jan
2026

New Advanced Linux VoidLink Malware Targets Cloud and container Environments

Jan 13, 2026Ravie LakshmananThreat Intelligence / Cyber Espionage Cybersecurity researchers have disclosed details of a previously undocumented and feature-rich malware…