Spear-Phishing Campaign Leverages Google Ads to Distribute EndRAT Malware
19
Jan
2026

Spear-Phishing Campaign Leverages Google Ads to Distribute EndRAT Malware

Genians Security Center has published an in-depth analysis of Operation Poseidon, a sophisticated APT campaign attributed to the Konni threat…

SitusAMC confirms data breach affecting customer information
19
Jan
2026

Ransomware attack on Ingram Micro impacts 42,000 individuals

Ransomware attack on Ingram Micro impacts 42,000 individuals Pierluigi Paganini January 19, 2026 Ingram Micro says a ransomware attack exposed…

Attackers are Using WSL2 as a Stealthy Hideout Inside Windows Systems
19
Jan
2026

Attackers are Using WSL2 as a Stealthy Hideout Inside Windows Systems

Windows Subsystem for Linux 2 (WSL2) is meant to give developers a fast Linux environment on Windows. Now attackers are…

Attackers Rerouted Employee Pay Without Breaching IT Systems
19
Jan
2026

Attackers Rerouted Employee Pay Without Breaching IT Systems

An unnamed organization recently discovered that several employees’ paychecks had silently vanished not because of a ransomware attack, data-wiping malware,…

Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites
19
Jan
2026

Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites

Cybersecurity researchers have disclosed details of a security flaw that leverages indirect prompt injection targeting Google Gemini as a way…

Cloudflare Zero-Day Vulnerability Enables Any Host Access Bypassing Protections
19
Jan
2026

Cloudflare Zero-Day Vulnerability Enables Any Host Access Bypassing Protections

A critical zero-day vulnerability in Cloudflare’s Web Application Firewall (WAF) allowed attackers to bypass security controls and directly access protected…

Attackers Abuse WSL2 to Operate Undetected on Windows Systems
19
Jan
2026

Attackers Abuse WSL2 to Operate Undetected on Windows Systems

Windows Subsystem for Linux (WSL) has transformed the developer experience on Windows. However, it has also quietly created a powerful…

UK govt. warns about ongoing Russian hacktivist group attacks
19
Jan
2026

UK govt. warns about ongoing Russian hacktivist group attacks

The U.K. government is warning of continued malicious activity from Russian-aligned hacktivist groups targeting critical infrastructure and local government organizations…

Attackers Redirected Employee Paychecks Without Breaching a Single System
19
Jan
2026

Attackers Redirected Employee Paychecks Without Breaching a Single System

A seemingly simple phone call became the gateway to a sophisticated attack that diverted employee paychecks without any malware or…

Cybercriminals Impersonate Malwarebytes to Steal User Credentials
19
Jan
2026

Cybercriminals Impersonate Malwarebytes to Steal User Credentials

As part of an ongoing effort to highlight active and technically interesting intrusions, a new “Flash Hunting Findings” investigation has…

New Spear-Phishing Attack Abusing Google Ads to Deliver EndRAT Malware
19
Jan
2026

New Spear-Phishing Attack Abusing Google Ads to Deliver EndRAT Malware

A new spear-phishing campaign known as Operation Poseidon has emerged, exploiting Google’s advertising infrastructure to distribute EndRAT malware while evading…

Windows SMB Client Vulnerability Exposes Organizations to Full Active Directory Compromise
19
Jan
2026

Windows SMB Client Vulnerability Exposes Organizations to Full Active Directory Compromise

A severe vulnerability in Windows Server Message Block (SMB) client authentication has emerged as a critical threat to Active Directory environments.  CVE-2025-33073,…