Beware of Weaponized Shipping Documents that Deliver Remcos RAT with a Wide Range of Capabilities
21
Jan
2026

Beware of Weaponized Shipping Documents that Deliver Remcos RAT with a Wide Range of Capabilities

Threat actors are leveraging a dangerous new campaign that weaponizes ordinary-looking shipping documents to distribute Remcos, a powerful remote access…

Pro-Russian hacktivist campaigns continue against UK organizations
21
Jan
2026

Pro-Russian hacktivist campaigns continue against UK organizations

The UK’s National Cyber Security Centre reports ongoing cyber operations by Russian-aligned hacktivist groups targeting organizations in the UK and…

VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code
21
Jan
2026

VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code

The recently discovered sophisticated Linux malware framework known as VoidLink is assessed to have been developed by a single person…

Microsoft Teams External Domain Anomalies Allow Defenders to Detect Attackers at Earliest
21
Jan
2026

Microsoft Teams External Domain Anomalies Allow Defenders to Detect Attackers at Earliest

Microsoft is rolling out a new security feature called the External Domains Anomalies Report for Teams, designed to help IT…

Linux users targeted by crypto thieves via hijacked apps on Snap Store
21
Jan
2026

Linux users targeted by crypto thieves via hijacked apps on Snap Store

Cryptocurrency thieves have found a new way to turn trusted software packages for Linux on the Snap Store into crypto-stealing…

Chainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs
21
Jan
2026

Chainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs

Ravie LakshmananJan 21, 2026Vulnerability / Artificial Intelligence Security vulnerabilities were uncovered in the popular open-source artificial intelligence (AI) framework Chainlit…

Hackers Extensively Abuses Visual Studio Code to Execute Malicious Payloads on Victim System
21
Jan
2026

Hackers Extensively Abuses Visual Studio Code to Execute Malicious Payloads on Victim System

Threat actors linked to North Korea have continued to expand their attack capabilities by weaponizing Microsoft Visual Studio Code, one…

cside targets hidden website privacy violations with Privacy Watch
21
Jan
2026

cside targets hidden website privacy violations with Privacy Watch

cside announced the launch of Privacy Watch. The platform prevents website privacy violations on the client-side, a risk surface that…

VoidLink shows how one developer used AI to build a powerful Linux malware
21
Jan
2026

VoidLink shows how one developer used AI to build a powerful Linux malware

VoidLink shows how one developer used AI to build a powerful Linux malware Pierluigi Paganini January 21, 2026 VoidLink is…

Critical GNU InetUtils Vulnerability Allows Unauthenticated Root Access Via "-f root"
21
Jan
2026

Critical GNU InetUtils Vulnerability Allows Unauthenticated Root Access Via “-f root”

A critical remote authentication bypass vulnerability has been disclosed in GNU InetUtils affecting the telnetd server component. The flaw, reported…

Threat Actors Exploit LinkedIn for RAT Delivery in Enterprise Networks
21
Jan
2026

Threat Actors Exploit LinkedIn for RAT Delivery in Enterprise Networks

A sophisticated phishing campaign exploiting LinkedIn private messages has been identified, delivering remote access trojans (RATs) through a combination of…

Google Chrome 144 Update Patches High-Severity V8 Vulnerability
21
Jan
2026

Google Chrome 144 Update Patches High-Severity V8 Vulnerability

A new Stable-channel release of Chrome version 144 addresses a high-severity vulnerability in the V8 JavaScript engine. The update, version…