Hackers Using Malicious Extensions to Display Fake Browser Warnings
19
Jan
2026

Hackers Using Malicious Extensions to Display Fake Browser Warnings

Cybersecurity researchers have discovered a sophisticated malware campaign using an unusual but effective tactic: deliberately crashing users’ browsers. The threat,…

Mandiant Publishes Rainbow Tables That Crack NTLMv1 Admin Passwords
19
Jan
2026

Mandiant Publishes Rainbow Tables That Crack NTLMv1 Admin Passwords

Mandiant has publicly released comprehensive rainbow tables designed to crack Net-NTLMv1 authentication hashes, addressing a critical security gap that has persisted for…

Bytebase: Open-source database DevOps tool
19
Jan
2026

Bytebase: Open-source database DevOps tool

Bytebase is a DevOps platform for managing database schema and data changes through a structured workflow. It provides a central…

Ukrainian hacker pleads guilty to Nefilim Ransomware attacks in U.S.
19
Jan
2026

Hacker pleads guilty to hacking Supreme Court, AmeriCorps, and VA Systems

Hacker pleads guilty to hacking Supreme Court, AmeriCorps, and VA Systems Pierluigi Paganini January 19, 2026 An actor who goes…

Researchers Gained Access to Hacker Domain Server Using Name Server Delegation
19
Jan
2026

Researchers Gained Access to Hacker Domain Server Using Name Server Delegation

A recent investigation into a deceptive push-notification network shows how a simple DNS mistake can open a window into criminal…

The Tool Access 11 Chrome Web Store listing claims to "restrict access to special tools" and help "limit user
19
Jan
2026

Five Chrome Extensions Used to Hijack Enterprise HR and ERP Systems

Socket’s Threat Research Team has uncovered a coordinated Chrome extension campaign targeting enterprise HR and ERP platforms, including Workday, NetSuite,…

Rubrik introduces Security Cloud Sovereign for data sovereignty and regulatory compliance
19
Jan
2026

Rubrik introduces Security Cloud Sovereign for data sovereignty and regulatory compliance

Rubrik announced Rubrik Security Cloud Sovereign, an offering that gives global organizations control over their data to support national security…

19
Jan
2026

Threat Hunting In 2026: Why Proactive Defence Is The Only Way Forward

Threat hunting is no longer a reactive activity that focuses on pursuing signals after trouble has been done. The role…

Windows SMB Client Vulnerability Enables Attacker to Own Active Directory
19
Jan
2026

Windows SMB Client Vulnerability Enables Attacker to Own Active Directory

A critical vulnerability in Windows SMB client authentication that enables attackers to compromise Active Directory environments through NTLM reflection exploitation….

PDFSIDER Malware Actively Exploited to Evade Antivirus and EDR Defenses
19
Jan
2026

PDFSIDER Malware Actively Exploited to Evade Antivirus and EDR Defenses

Security researchers have identified a sophisticated backdoor malware variant, PDFSIDER, that leverages DLL side-loading to evade endpoint detection and response…

SEON Identity Verification combines KYC checks with real-time fraud intelligence
19
Jan
2026

SEON Identity Verification combines KYC checks with real-time fraud intelligence

SEON has unveiled the launch of its AI-powered Identity Verification solution, bringing ID verification, liveness detection and proof of address…

week in security
19
Jan
2026

A week in security (January 12 – January 18)

Last week on Malwarebytes Labs: Stay safe! We don’t just report on scams—we help detect them Cybersecurity risks should never…