VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code
21
Jan
2026

VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code

The recently discovered sophisticated Linux malware framework known as VoidLink is assessed to have been developed by a single person…

Microsoft Teams External Domain Anomalies Allow Defenders to Detect Attackers at Earliest
21
Jan
2026

Microsoft Teams External Domain Anomalies Allow Defenders to Detect Attackers at Earliest

Microsoft is rolling out a new security feature called the External Domains Anomalies Report for Teams, designed to help IT…

Linux users targeted by crypto thieves via hijacked apps on Snap Store
21
Jan
2026

Linux users targeted by crypto thieves via hijacked apps on Snap Store

Cryptocurrency thieves have found a new way to turn trusted software packages for Linux on the Snap Store into crypto-stealing…

Chainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs
21
Jan
2026

Chainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs

Ravie LakshmananJan 21, 2026Vulnerability / Artificial Intelligence Security vulnerabilities were uncovered in the popular open-source artificial intelligence (AI) framework Chainlit…

Hackers Extensively Abuses Visual Studio Code to Execute Malicious Payloads on Victim System
21
Jan
2026

Hackers Extensively Abuses Visual Studio Code to Execute Malicious Payloads on Victim System

Threat actors linked to North Korea have continued to expand their attack capabilities by weaponizing Microsoft Visual Studio Code, one…

cside targets hidden website privacy violations with Privacy Watch
21
Jan
2026

cside targets hidden website privacy violations with Privacy Watch

cside announced the launch of Privacy Watch. The platform prevents website privacy violations on the client-side, a risk surface that…

VoidLink shows how one developer used AI to build a powerful Linux malware
21
Jan
2026

VoidLink shows how one developer used AI to build a powerful Linux malware

VoidLink shows how one developer used AI to build a powerful Linux malware Pierluigi Paganini January 21, 2026 VoidLink is…

Critical GNU InetUtils Vulnerability Allows Unauthenticated Root Access Via "-f root"
21
Jan
2026

Critical GNU InetUtils Vulnerability Allows Unauthenticated Root Access Via “-f root”

A critical remote authentication bypass vulnerability has been disclosed in GNU InetUtils affecting the telnetd server component. The flaw, reported…

Threat Actors Exploit LinkedIn for RAT Delivery in Enterprise Networks
21
Jan
2026

Threat Actors Exploit LinkedIn for RAT Delivery in Enterprise Networks

A sophisticated phishing campaign exploiting LinkedIn private messages has been identified, delivering remote access trojans (RATs) through a combination of…

Google Chrome 144 Update Patches High-Severity V8 Vulnerability
21
Jan
2026

Google Chrome 144 Update Patches High-Severity V8 Vulnerability

A new Stable-channel release of Chrome version 144 addresses a high-severity vulnerability in the V8 JavaScript engine. The update, version…

Everest Ransomware Group Allegedly Claims Breach of McDonald’s India Systems
21
Jan
2026

Everest Ransomware Group Allegedly Claims Breach of McDonald’s India Systems

The Everest ransomware group has claimed responsibility for a major cyberattack targeting McDonald’s India, allegedly exfiltrating 861 GB of sensitive…

CERT/CC Warns binary-parser Bug Allows Node.js Privilege-Level Code Execution
21
Jan
2026

CERT/CC Warns binary-parser Bug Allows Node.js Privilege-Level Code Execution

Ravie LakshmananJan 21, 2026Open Source / Vulnerability A security vulnerability has been disclosed in the popular binary-parser npm library that,…