Gemini MCP Tool 0-Day Vulnerability Exposes Systems to Remote Code Execution
28
Jan
2026

Gemini MCP Tool 0-Day Vulnerability Exposes Systems to Remote Code Execution

A critical zero-day vulnerability has been disclosed in the Gemini MCP Tool, enabling unauthenticated remote attackers to execute arbitrary code…

Hackers Using WinRAR Vulnerability CVE-2025-8088 to Hijack PCs Globally
28
Jan
2026

Hackers Still Using Patched WinRAR Flaw for Malware Drops, Warns Google – Hackread – Cybersecurity News, Data Breaches, AI, and More

The Google Threat Intelligence Group (GTIG) warns that nation-state actors and financially motivated threat actors are exploiting a flaw in…

SolarWinds
28
Jan
2026

SolarWinds warns of critical Web Help Desk RCE, auth bypass flaws

SolarWinds has released security updates to patch critical authentication bypass and remote command execution vulnerabilities in its Web Help Desk…

ZAP JavaScript Engine Memory Leak Issue Impacts Active Scan Usage
28
Jan
2026

ZAP JavaScript Engine Memory Leak Issue Impacts Active Scan Usage

The ZAP (Zed Attack Proxy) project, a widely used open-source web application security scanner, has disclosed a critical memory leak…

eSkimming Attacks Surge with Evolving Tactics and Ongoing Recovery Challenges
28
Jan
2026

eSkimming Attacks Surge with Evolving Tactics and Ongoing Recovery Challenges

A new longitudinal study of Magecart-style eSkimming attacks overturns the assumption that discovery equals recovery. Instead of being a one-time…

WinRAR vulnerability still a go-to tool for hackers, Mandiant warns
28
Jan
2026

WinRAR vulnerability still a go-to tool for hackers, Mandiant warns

State-sponsored hackers and financially motivated attackers continue leveraging a critical WinRAR vulnerability (CVE-2025-8088) that’s been fixed over half a year…

data thief
28
Jan
2026

Malicious Chrome extensions can spy on your ChatGPT chats

Researchers discovered 16 malicious browser extensions for Google Chrome and Microsoft Edge that steal ChatGPT session tokens, giving attackers access…

Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks
28
Jan
2026

Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks

Threat actors with ties to China have been observed using an updated version of a backdoor called COOLCLIENT in cyber…

Falcon and beyond: Abu Dhabi’s blueprint for national AI governance
28
Jan
2026

ENEC, TII and Aspire test autonomous aerial systems for critical infrastructure security

The Emirates Nuclear Energy Company (ENEC), the Technology Innovation Institute (TII) and Aspire have launched a joint proof-of-concept (PoC) project…

Robot reading compliance manuals
28
Jan
2026

AI Is Rewriting Compliance Controls and CISOs Must Take Notice

By Itamar Apelblat, CEO & Co-Founder, Token Security For decades, compliance frameworks were built on an assumption that now feels…

Check Point Harmony SASE Windows Client Vulnerability Enables Privilege Escalation
28
Jan
2026

Check Point Harmony SASE Windows Client Vulnerability Enables Privilege Escalation

A critical privilege-escalation vulnerability has been discovered in Check Point’s Harmony SASE (Secure Access Service Edge) Windows client software, affecting versions prior…

Cal.com Broken Access Controls Lead to Account Takeover and Data Exposure
28
Jan
2026

Cal.com Broken Access Controls Lead to Account Takeover and Data Exposure

Cal.com, an open-source scheduling platform and developer-friendly alternative to Calendly, recently patched a set of critical vulnerabilities that exposed user…