Attackers Leveraging telnetd Exploit for Root Privileges After PoC Goes Public
24
Jan
2026

Attackers Leveraging telnetd Exploit for Root Privileges After PoC Goes Public

The threat actors have begun actively exploiting a critical authentication bypass vulnerability in GNU InetUtils telnetd immediately after proof-of-concept code…

CISA Warns of Critical VMware vCenter RCE Vulnerability Now Exploited in Attacks
24
Jan
2026

CISA Warns of Critical VMware vCenter RCE Vulnerability Now Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability affecting Broadcom’s VMware vCenter Server to its Known…

Researchers Uncover Multi-Stage AiTM Attack Using SharePoint to Bypass Security Controls
24
Jan
2026

Researchers Uncover Multi-Stage AiTM Attack Using SharePoint to Bypass Security Controls

Microsoft Defender researchers have exposed a sophisticated adversary-in-the-middle (AiTM) phishing campaign targeting energy sector organizations, leveraging SharePoint file-sharing services to…

Microsoft Shared BitLocker Recovery Keys with FBI to Unlock Encrypted Laptop Data
24
Jan
2026

Microsoft Shared BitLocker Recovery Keys with FBI to Unlock Encrypted Laptop Data

Microsoft has confirmed that it provided BitLocker encryption recovery keys to the FBI following a valid search warrant, marking the…

Konni hackers target blockchain engineers with AI-built malware
24
Jan
2026

Konni hackers target blockchain engineers with AI-built malware

The North Korean hacker group Konni (Opal Sleet, TA406) is using AI-generated PowerShell malware to target developers and engineers in…

Microsoft Open-Sources winapp, a New CLI Tool for Streamlined Windows App Development
24
Jan
2026

Microsoft Open-Sources winapp, a New CLI Tool for Streamlined Windows App Development

Microsoft has announced the public preview of the Windows App Development CLI (winapp), a new open-source command-line tool designed to…

Microsoft Teams to Begin Sharing Employee Location with Employers Based on Wi-Fi Networks
24
Jan
2026

Microsoft Teams to Begin Sharing Employee Location with Employers Based on Wi-Fi Networks

Microsoft has confirmed a controversial new feature coming to Teams that will automatically reveal employee work locations by detecting which…

Children and chatbots: What parents should know
24
Jan
2026

Children and chatbots: What parents should know

As children turn to AI chatbots for answers, advice, and companionship, questions emerge about their safety, privacy, and emotional development…

DOGE May Have Misused Social Security Data, DOJ Admits
24
Jan
2026

DOGE May Have Misused Social Security Data, DOJ Admits

Law enforcement authorities in the United States have for years circumvented the US Constitution’s Fourth Amendment by purchasing data on…

Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware
24
Jan
2026

Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware

A new multi-stage phishing campaign has been observed targeting users in Russia with ransomware and a remote access trojan called…

U.S. CISA adds Prettier eslint-config-prettier, Vite Vitejs, Versa Concerto SD-WAN orchestration platform and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog
24
Jan
2026

U.S. CISA adds a flaw in Broadcom VMware vCenter Server to its Known Exploited Vulnerabilities catalog

U.S. CISA adds a flaw in Broadcom VMware vCenter Server to its Known Exploited Vulnerabilities catalog Pierluigi Paganini January 24,…

Sandworm behind cyberattack on Poland’s power grid in late 2025
24
Jan
2026

Sandworm behind cyberattack on Poland’s power grid in late 2025

The attack involved data-wiping malware that ESET researchers have now analyzed and named DynoWiper 23 Jan 2026  •  , 1…