Researchers disclosed multiple critical flaws in Coolify that let authenticated users run commands as root, enabling full server compromise.
The issues span 11 CVEs rated up to 10.0 and impact 52,890 internet-exposed hosts.
๐ Details here โ https://thehackernews.com/2026/01/coolify-discloses-11-critical-flaws.html
The issues span 11 CVEs rated up to 10.0 and impact 52,890 internet-exposed hosts.
๐ Details here โ https://thehackernews.com/2026/01/coolify-discloses-11-critical-flaws.html
๐4๐ฅ4๐1
๐จ Three npm pkgs posing as bitcoinjs tools found spreading NodeCordRAT.
Postinstall scripts chained a 2nd pkg to drop the payload, steal Chrome creds, API tokens, and crypto wallet seed phrases, and run commands via Discord C2 on Win/Linux/macOS.
๐ Details โ https://thehackernews.com/2026/01/researchers-uncover-nodecordrat-hidden.html
Postinstall scripts chained a 2nd pkg to drop the payload, steal Chrome creds, API tokens, and crypto wallet seed phrases, and run commands via Discord C2 on Win/Linux/macOS.
๐ Details โ https://thehackernews.com/2026/01/researchers-uncover-nodecordrat-hidden.html
๐7๐4โก1
๐ Cisco released patches for CVE-2026-20029 in Identity Services Engine and ISE-PIC.
The XML parsing flaw allows an authenticated admin to upload a malicious file and read restricted OS files.
A public PoC exists. Patch Now.
๐ Read โ https://thehackernews.com/2026/01/cisco-patches-ise-security.html
The XML parsing flaw allows an authenticated admin to upload a malicious file and read restricted OS files.
A public PoC exists. Patch Now.
๐ Read โ https://thehackernews.com/2026/01/cisco-patches-ise-security.html
๐8๐ฅ6
[๐ฅ] ThreatsDay Bulletin is live!
โ๏ธ OpenAI โ Court orders 20M ChatGPT logs.
๐จ๐ณ ChinaโTaiwan โ Cyberattacks surge tenfold.
๐ Microsoft โ Exchange limit scrapped.
๐ต๏ธ pcTattletale โ Spyware maker guilty.
๐ RustFS โ Hardcoded token flaw fixed.
๐ญ pkr_mtsi โ Loader spreads malware.
๐ฅ Open WebUI โ RCE via CVE-2025-64496.
๐ฎ๐ท MuddyWater โ New backdoors active.
โ๏ธ ownCloud โ MFA urged after breaches.
๐ GravityRAT โ Cross-platform RAT exposed.
๐ Read the full edition โ https://thehackernews.com/2026/01/threatsday-bulletin-rustfs-flaw-iranian.html
โ๏ธ OpenAI โ Court orders 20M ChatGPT logs.
๐จ๐ณ ChinaโTaiwan โ Cyberattacks surge tenfold.
๐ Microsoft โ Exchange limit scrapped.
๐ต๏ธ pcTattletale โ Spyware maker guilty.
๐ RustFS โ Hardcoded token flaw fixed.
๐ญ pkr_mtsi โ Loader spreads malware.
๐ฅ Open WebUI โ RCE via CVE-2025-64496.
๐ฎ๐ท MuddyWater โ New backdoors active.
โ๏ธ ownCloud โ MFA urged after breaches.
๐ GravityRAT โ Cross-platform RAT exposed.
๐ Read the full edition โ https://thehackernews.com/2026/01/threatsday-bulletin-rustfs-flaw-iranian.html
๐12
Most production risk sits outside the top 20 images.
Chainguard data shows 98% of CVEs were remediated in the longtail, where about half of workloads run. Thatโs where security focus needs to move.
๐ See where real supply-chain risk accumulates โ https://thehackernews.com/2026/01/the-state-of-trusted-open-source.html
Chainguard data shows 98% of CVEs were remediated in the longtail, where about half of workloads run. Thatโs where security focus needs to move.
๐ See where real supply-chain risk accumulates โ https://thehackernews.com/2026/01/the-state-of-trusted-open-source.html
๐6
๐จ๐ณ China-linked UAT-7290 targets telecoms in South Asia, now expanding into Southeastern Europe.
Cisco Talos links the group to deep recon, edge device exploits, SSH brute force, ๐ง Linux malware, and shared ORB relay infrastructure.
๐ Read โ https://thehackernews.com/2026/01/china-linked-uat-7290-targets-telecoms.html
Cisco Talos links the group to deep recon, edge device exploits, SSH brute force, ๐ง Linux malware, and shared ORB relay infrastructure.
๐ Read โ https://thehackernews.com/2026/01/china-linked-uat-7290-targets-telecoms.html
๐10๐ฅ5
The future of AI is exciting, but securing it is essential. Risks like Shadow AI, vulnerabilities, and data exposure are growing.
Weโre excited to join Zscalerโs virtual event with CEO Jay Chaudhry to learn how to secure AI systemsโhope youโll join too!
๐ Identify AI risks
โ๏ธ Automate remediation
๐ก๏ธ Protect AI systems
โ Ensure compliance
Register โ https://thn.news/ai-zero-trust
Weโre excited to join Zscalerโs virtual event with CEO Jay Chaudhry to learn how to secure AI systemsโhope youโll join too!
๐ Identify AI risks
โ๏ธ Automate remediation
๐ก๏ธ Protect AI systems
โ Ensure compliance
Register โ https://thn.news/ai-zero-trust
๐6
โ ๏ธ Astaroth banking malware is now using WhatsApp as its main delivery channel in Brazil.
Researchers report a new Python-based module that steals a victimโs contact list and auto-sends malicious ZIP files, spreading the infection chat to chat.
๐ How the campaign works and spreads โ https://thehackernews.com/2026/01/whatsapp-worm-spreads-astaroth-banking.html
Researchers report a new Python-based module that steals a victimโs contact list and auto-sends malicious ZIP files, spreading the infection chat to chat.
๐ How the campaign works and spreads โ https://thehackernews.com/2026/01/whatsapp-worm-spreads-astaroth-banking.html
๐ฅ11๐คฏ7๐6
๐ก๏ธ The FBI warns North Koreaโlinked Kimsuky is using QR codes in spear-phishing emails.
The โquishingโ tactic pushes victims onto unmanaged phones ๐ฑ, enabling session token theft, MFA bypass, and cloud takeover.
๐ Read โ https://thehackernews.com/2026/01/fbi-warns-north-korean-hackers-using.html
The โquishingโ tactic pushes victims onto unmanaged phones ๐ฑ, enabling session token theft, MFA bypass, and cloud takeover.
๐ Read โ https://thehackernews.com/2026/01/fbi-warns-north-korean-hackers-using.html
๐ฅ17๐4๐ค4โก2
โ ๏ธ CISA closed 10 Emergency Directives issued between 2019โ2024.
The required security actions for risks such as SolarWinds, Microsoft Exchange, and VMware were completed or are now enforced under Binding Operational Directive 22-01.
๐ Read โ https://thehackernews.com/2026/01/cisa-retires-10-emergency-cybersecurity.html
The required security actions for risks such as SolarWinds, Microsoft Exchange, and VMware were completed or are now enforced under Binding Operational Directive 22-01.
๐ Read โ https://thehackernews.com/2026/01/cisa-retires-10-emergency-cybersecurity.html
๐ฑ8๐ฅ4
๐จ Trend Micro patched a critical flaw in on-prem Apex Central for Windows that can lead to SYSTEM-level code execution.
CVE-2025-69258 (CVSS 9.8) allows a remote, unauthenticated attacker with endpoint access to load a malicious DLL via MsgReceiver.exe.
On-prem builds below 7190 are affected.
๐ Details โ https://thehackernews.com/2026/01/trend-micro-apex-central-rce-flaw.html
CVE-2025-69258 (CVSS 9.8) allows a remote, unauthenticated attacker with endpoint access to load a malicious DLL via MsgReceiver.exe.
On-prem builds below 7190 are affected.
๐ Details โ https://thehackernews.com/2026/01/trend-micro-apex-central-rce-flaw.html
๐9๐ฅ6๐คฏ1
๐ท๐บ Russian state-linked APT28 targeted Turkish energy and nuclear staff, a European think tank, and organizations in North Macedonia and Uzbekistan.
๐ฃ Fake Microsoft, Google, and VPN login pages harvested credentials, then redirected victims to real sites to stay hidden.
๐ Details โ https://thehackernews.com/2026/01/russian-apt28-runs-credential-stealing.html
๐ฃ Fake Microsoft, Google, and VPN login pages harvested credentials, then redirected victims to real sites to stay hidden.
๐ Details โ https://thehackernews.com/2026/01/russian-apt28-runs-credential-stealing.html
๐ฅ11๐คฏ5๐3๐ค1
๐ Most 2026 cyber predictions are noise.
The real threats are already active:
๐ฏ ransomware shifting to targeted disruption
๐ค uncontrolled AI creating internal security gaps
๐ง big claims about AI attacks running ahead of reality
Bitdefender cuts through the hype with data, not forecasts.
๐ Evidence-based risks shaping 2026 โ https://thehackernews.com/2026/01/cybersecurity-predictions-2026-hype-we.html
The real threats are already active:
๐ฏ ransomware shifting to targeted disruption
๐ค uncontrolled AI creating internal security gaps
๐ง big claims about AI attacks running ahead of reality
Bitdefender cuts through the hype with data, not forecasts.
๐ Evidence-based risks shaping 2026 โ https://thehackernews.com/2026/01/cybersecurity-predictions-2026-hype-we.html
๐6๐4๐ค1๐ฑ1
๐ Chinese-speaking attackers hijacked a SonicWall VPN to escape VMware ESXi guest VMs.
Huntress stopped it before ransomware, but the chain abused 3 VMware zero-days now on CISAโs KEV list.
๐ Read โ https://thehackernews.com/2026/01/chinese-linked-hackers-exploit-vmware.html
Huntress stopped it before ransomware, but the chain abused 3 VMware zero-days now on CISAโs KEV list.
๐ Read โ https://thehackernews.com/2026/01/chinese-linked-hackers-exploit-vmware.html
๐14๐ฅ8๐4๐คฏ3๐ฑ2
Europol says Spanish police arrested 34 suspects linked to Black Axe, a Nigeria-origin crime syndicate.
The ๐ต๏ธโโ๏ธ group is tied to cyber fraud, trafficking, and violent crime worldwide. Investigators estimate โฌ5.93M in fraud losses, with cash and bank funds seized in Spain.
๐ Read โ https://thehackernews.com/2026/01/europol-arrests-34-black-axe-members-in.html
The ๐ต๏ธโโ๏ธ group is tied to cyber fraud, trafficking, and violent crime worldwide. Investigators estimate โฌ5.93M in fraud losses, with cash and bank funds seized in Spain.
๐ Read โ https://thehackernews.com/2026/01/europol-arrests-34-black-axe-members-in.html
๐ฅ31๐ฑ7๐6๐คฏ6๐5
โ ๏ธ Chinese crime groups are running ๐ท pig-butchering scams like a startup.
Researchers found $2,500 turnkey kits with fake trading sites, apps, hosting, and launderingโbuilt to scale fast, no skills needed.
๐ Read details here โ https://thehackernews.com/2026/01/researchers-uncover-service-providers.html
Researchers found $2,500 turnkey kits with fake trading sites, apps, hosting, and launderingโbuilt to scale fast, no skills needed.
๐ Read details here โ https://thehackernews.com/2026/01/researchers-uncover-service-providers.html
๐15
๐ฅ๐ค Anthropic just rolled out Claude for Healthcare.
U.S. users can connect lab results and health records, get plain-English explanations, spot patterns, and prep for doctor visits.
Data sharing is opt-in and not used for training
๐ Read โ https://thehackernews.com/2026/01/anthropic-launches-claude-ai-for.html
U.S. users can connect lab results and health records, get plain-English explanations, spot patterns, and prep for doctor visits.
Data sharing is opt-in and not used for training
๐ Read โ https://thehackernews.com/2026/01/anthropic-launches-claude-ai-for.html
๐12๐ฑ10๐ค7๐คฏ6
๐จ New GoBruteforcer wave is hijacking crypto and blockchain databases to expand a password-brute-forcing botnet.
Researchers link the spike to AI-generated setup guides and reused defaults in legacy stacks like XAMPP. These servers are easy to take over, stay online 24/7, and scale attacks fast.
๐ Read โ https://thehackernews.com/2026/01/gobruteforcer-botnet-targets-crypto.html
Researchers link the spike to AI-generated setup guides and reused defaults in legacy stacks like XAMPP. These servers are easy to take over, stay online 24/7, and scale attacks fast.
๐ Read โ https://thehackernews.com/2026/01/gobruteforcer-botnet-targets-crypto.html
๐ฅ17โก5๐2๐1
โก๏ธ๐ Pentesting in 2026 isnโt failing at testing. Itโs failing at what happens after.
In a new analysis, Dan DeCloss explains why static reports slow real progressโand why teams that actually reduce risk treat findings as living inputs to daily work, not PDFs that get forgotten.
Why execution, not output, now defines pentest success โ https://thehackernews.com/expert-insights/2026/01/the-2026-state-of-pentesting-how-modern.html
In a new analysis, Dan DeCloss explains why static reports slow real progressโand why teams that actually reduce risk treat findings as living inputs to daily work, not PDFs that get forgotten.
Why execution, not output, now defines pentest success โ https://thehackernews.com/expert-insights/2026/01/the-2026-state-of-pentesting-how-modern.html
๐ค4๐3๐คฏ3
๐จ This weekโs cyber risk moved fast and wide.
โ๏ธ Automation abused
๐ฑ Mobile botnets scaled
๐ก Telecoms mapped
๐ธ Crypto crime surged
๐งช Exploits outpaced patches
๐๏ธ Crime forums leaked
๐งฉ AI chats stolen
๐ Bugs weaponized
๐ฎ๐ณ Policy pushback
๐ฉ Political inboxes hit
One pattern. Many fronts.
Hereโs the full recap of what mattered most โ https://thehackernews.com/2026/01/weekly-recap-ai-automation-exploits.html
โ๏ธ Automation abused
๐ฑ Mobile botnets scaled
๐ก Telecoms mapped
๐ธ Crypto crime surged
๐งช Exploits outpaced patches
๐๏ธ Crime forums leaked
๐งฉ AI chats stolen
๐ Bugs weaponized
๐ฎ๐ณ Policy pushback
๐ฉ Political inboxes hit
One pattern. Many fronts.
Hereโs the full recap of what mattered most โ https://thehackernews.com/2026/01/weekly-recap-ai-automation-exploits.html
๐6โก5๐ค3๐2
๐จ Attackers uploaded fake n8n community nodes to npm to steal OAuth tokens from live workflows.
The packages mimicked real integrations, ran with full n8n access, decrypted credentials during execution, and exfiltrated them.
Eight were removed, but activity appears ongoing.
๐ Read about it here โ https://thehackernews.com/2026/01/n8n-supply-chain-attack-abuses.html
The packages mimicked real integrations, ran with full n8n access, decrypted credentials during execution, and exfiltrated them.
Eight were removed, but activity appears ongoing.
๐ Read about it here โ https://thehackernews.com/2026/01/n8n-supply-chain-attack-abuses.html
๐18๐ฅ11๐คฏ9