β±οΈ π Many SOCs in 2026 still rely on manual malware review, which slows investigations as alert volumes rise.
Automation-first workflows reduce tool switching and manual correlation, shifting analyst time toward response. In enterprise SOCs using automated sandboxing, MTTR dropped by ~21 minutes per incident.
π Learn how automation reduces response friction β https://thehackernews.com/2026/01/4-outdated-habits-destroying-your-socs.html
Automation-first workflows reduce tool switching and manual correlation, shifting analyst time toward response. In enterprise SOCs using automated sandboxing, MTTR dropped by ~21 minutes per incident.
π Learn how automation reduces response friction β https://thehackernews.com/2026/01/4-outdated-habits-destroying-your-socs.html
π€―7π3
π Microsoft says it disrupted RedVDS, a crimeware-as-a-service platform tied to phishing and financial fraud.
For $24/month, criminals rented disposable, no-log Windows RDP servers to run scams at scale. Microsoft links RedVDS activity to ~$40M in reported U.S. fraud losses since March 2025.
π Details here β https://thehackernews.com/2026/01/microsoft-legal-action-disrupts-redvds.html
For $24/month, criminals rented disposable, no-log Windows RDP servers to run scams at scale. Microsoft links RedVDS activity to ~$40M in reported U.S. fraud losses since March 2025.
π Details here β https://thehackernews.com/2026/01/microsoft-legal-action-disrupts-redvds.html
π9π₯1
π Palo Alto Networks patched a high-severity DoS flaw in GlobalProtect.
CVE-2026-0227 (CVSS 7.7) lets unauthenticated attackers repeatedly crash firewalls into maintenance mode.
π‘οΈ PoC exists; no active exploitation seen.
π Read β https://thehackernews.com/2026/01/palo-alto-fixes-globalprotect-dos-flaw.html
CVE-2026-0227 (CVSS 7.7) lets unauthenticated attackers repeatedly crash firewalls into maintenance mode.
π‘οΈ PoC exists; no active exploitation seen.
π Read β https://thehackernews.com/2026/01/palo-alto-fixes-globalprotect-dos-flaw.html
π₯9π4
π¨ 50 CISOs surveyed. 1 clear AI priority for 2026.
As AI agents access source code, cloud infrastructure & customer data, security leaders are making tough budget decisions.
New survey data reveals:
β The #1 AI risk driving 2026 budgets
β Where current AI security falls short
β Which controls get funded first
β Budget allocation figures
Beyond Identity is sharing the complete findings in their next webinar:
π Tuesday, Jan 27 | 12pm ET
πRegister here: https://thn.news/ciso-ai-insights
As AI agents access source code, cloud infrastructure & customer data, security leaders are making tough budget decisions.
New survey data reveals:
β The #1 AI risk driving 2026 budgets
β Where current AI security falls short
β Which controls get funded first
β Budget allocation figures
Beyond Identity is sharing the complete findings in their next webinar:
π Tuesday, Jan 27 | 12pm ET
πRegister here: https://thn.news/ciso-ai-insights
π4
π¨ This weekβs ThreatsDay Bulletin!
Hackers are hiding in everyday systems β cloning voices, faking invoices, breaking controllers, and stealing $26M in crypto.
Each story shows how attacks now look normal until itβs too late.
π Full report: https://thehackernews.com/2026/01/threatsday-bulletin-ai-voice-cloning.html
Hackers are hiding in everyday systems β cloning voices, faking invoices, breaking controllers, and stealing $26M in crypto.
Each story shows how attacks now look normal until itβs too late.
π Full report: https://thehackernews.com/2026/01/threatsday-bulletin-ai-voice-cloning.html
π6π1
β οΈ Researchers disclosed a one-click Copilot attack that enables silent data exfiltration.
A legitimate Copilot URL injects hidden instructions, bypasses safeguards, and can keep exfiltrating data even after the chat is closed.
π Learn more β https://thehackernews.com/2026/01/researchers-reveal-reprompt-attack.html
A legitimate Copilot URL injects hidden instructions, bypasses safeguards, and can keep exfiltrating data even after the chat is closed.
π Learn more β https://thehackernews.com/2026/01/researchers-reveal-reprompt-attack.html
π7
π¨ A WordPress plugin with 40,000+ active installs is being actively exploited.
CVE-2026-23550 (CVSS 10.0) in Modular DS allows unauthenticated attackers to gain admin access by bypassing authentication through a flawed routing mechanism.
π Details β https://thehackernews.com/2026/01/critical-wordpress-modular-ds-plugin.html
CVE-2026-23550 (CVSS 10.0) in Modular DS allows unauthenticated attackers to gain admin access by bypassing authentication through a flawed routing mechanism.
π Details β https://thehackernews.com/2026/01/critical-wordpress-modular-ds-plugin.html
π₯16
π§ π AI security isnβt a model problem. Itβs a workflow problem.
As AI connects apps, data, and actions, attackers target contextβinputs, outputs, extensions, and permissionsβnot algorithms
π Why AI workflow control now defines real security β https://thehackernews.com/2026/01/model-security-is-wrong-frame-real-risk.html
As AI connects apps, data, and actions, attackers target contextβinputs, outputs, extensions, and permissionsβnot algorithms
π Why AI workflow control now defines real security β https://thehackernews.com/2026/01/model-security-is-wrong-frame-real-risk.html
π₯7π3π2
πβοΈ AWS fixed a CI misconfiguration in some AWS-managed GitHub repos, including the AWS JavaScript SDK.
The flaw, CodeBreach, involved broken webhook regex filters that could let untrusted users trigger privileged builds and expose admin tokens.
π Read here β https://thehackernews.com/2026/01/aws-codebuild-misconfiguration-exposed.html
The flaw, CodeBreach, involved broken webhook regex filters that could let untrusted users trigger privileged builds and expose admin tokens.
π Read here β https://thehackernews.com/2026/01/aws-codebuild-misconfiguration-exposed.html
π7π€―5π€2
π¨ Cisco fixed a CVSS 10.0 RCE in AsyncOS after it was exploited as a zero-day by the China-nexus APT UAT-9686.
The flaw enables root-level command execution through the Spam Quarantine feature when it is exposed to the internet.
π Read details β https://thehackernews.com/2026/01/cisco-patches-zero-day-rce-exploited-by.html
The flaw enables root-level command execution through the Spam Quarantine feature when it is exposed to the internet.
π Read details β https://thehackernews.com/2026/01/cisco-patches-zero-day-rce-exploited-by.html
π₯7π3
π¨π³ A China-linked threat actor has targeted North American critical infrastructure.
Tracked as UAT-8837, the group seeks initial access to high-value networks, then maps Active Directory and steals credentials using mostly open-source tools.
Talos says a Sitecore zero-day was recently exploited to gain entry.
π Read β https://thehackernews.com/2026/01/china-linked-apt-exploits-sitecore-zero.html
Tracked as UAT-8837, the group seeks initial access to high-value networks, then maps Active Directory and steals credentials using mostly open-source tools.
Talos says a Sitecore zero-day was recently exploited to gain entry.
π Read β https://thehackernews.com/2026/01/china-linked-apt-exploits-sitecore-zero.html
π₯12π5π5
π¨ A China-linked group targeted U.S. government and policy entities using Venezuela-themed phishing lures.
The campaign delivered the LOTUSLITE backdoor via DLL side-loading. No confirmed compromises.
π Details β https://thehackernews.com/2026/01/lotuslite-backdoor-targets-us-policy.html
The campaign delivered the LOTUSLITE backdoor via DLL side-loading. No confirmed compromises.
π Details β https://thehackernews.com/2026/01/lotuslite-backdoor-targets-us-policy.html
π₯10π€2π±2π€―1
β οΈ Update: Check Point says CVE-2025-37164 is being mass-exploited to spread the RondoDox botnet, with 40,000+ attacks on Jan 7.
The activity targeted government, finance, and industrial sectors, prompting same-day KEV inclusion.
π Read β https://thehackernews.com/2026/01/cisa-flags-microsoft-office-and-hpe.html
The activity targeted government, finance, and industrial sectors, prompting same-day KEV inclusion.
π Read β https://thehackernews.com/2026/01/cisa-flags-microsoft-office-and-hpe.html
π₯9π7
Most people lock down passwords but forget whatβs already public.
π§Ύ Home addresses and phone numbers are listed on data broker sites anyone can search. That visibility increases the risk of doxxing, scams, and real-world harassment.
π How public data turns into a safety risk β https://thehackernews.com/2026/01/your-digital-footprint-can-lead-right.html
π§Ύ Home addresses and phone numbers are listed on data broker sites anyone can search. That visibility increases the risk of doxxing, scams, and real-world harassment.
π How public data turns into a safety risk β https://thehackernews.com/2026/01/your-digital-footprint-can-lead-right.html
π7
π¨ Researchers uncovered 5 malicious Chrome extensions masquerading as HR/ERP tools like Workday and NetSuite.
They exfiltrate auth cookies and suppress access to security and admin pages via DOM manipulation.
π Details here β https://thehackernews.com/2026/01/five-malicious-chrome-extensions.html
They exfiltrate auth cookies and suppress access to security and admin pages via DOM manipulation.
π Details here β https://thehackernews.com/2026/01/five-malicious-chrome-extensions.html
π11π4
β οΈ GootLoader now uses 500β1,000 ZIP files glued together!
The broken ZIP wonβt open in WinRAR or 7-Zip, but Windows Explorer still opens it and runs the JavaScript malware. Each download is different, so file hashes donβt match.
π Learn how this ZIP trick bypasses defenses β https://thehackernews.com/2026/01/gootloader-malware-uses-5001000.html
The broken ZIP wonβt open in WinRAR or 7-Zip, but Windows Explorer still opens it and runs the JavaScript malware. Each download is different, so file hashes donβt match.
π Learn how this ZIP trick bypasses defenses β https://thehackernews.com/2026/01/gootloader-malware-uses-5001000.html
π₯11π3π€―1
OpenAI will start showing ads in ChatGPT for logged-in adult U.S. users on Free and Go plans.
π’ Ads are clearly labeled, appear only at the bottom of chats, and do not influence responses. OpenAI says conversations arenβt sold to advertisers, and ad personalization can be turned off.
π Read β https://thehackernews.com/2026/01/openai-to-show-ads-in-chatgpt-for.html
π’ Ads are clearly labeled, appear only at the bottom of chats, and do not influence responses. OpenAI says conversations arenβt sold to advertisers, and ad personalization can be turned off.
π Read β https://thehackernews.com/2026/01/openai-to-show-ads-in-chatgpt-for.html
π€―16π15π5π±5π€3β‘1
π¨ Authorities added Black Bastaβs alleged leader, Oleg Nefedov, to the EU Most Wanted list and issued an INTERPOL Red Notice.
Police say he directed targeting, recruitment, and ransom handling for a ransomware group that pulled in hundreds of millions in crypto.
Leaked internal chats later exposed the operation.
π Inside Black Basta β https://thehackernews.com/2026/01/black-basta-ransomware-hacker-leader.html
Police say he directed targeting, recruitment, and ransom handling for a ransomware group that pulled in hundreds of millions in crypto.
Leaked internal chats later exposed the operation.
π Inside Black Basta β https://thehackernews.com/2026/01/black-basta-ransomware-hacker-leader.html
π13π±9π€―5π€3π₯2
β οΈ Researchers exploited an XSS flaw in the StealC malware control panel and exposed its operators.
They extracted system fingerprints, live sessions, and cookies from infrastructure built to steal dataβshowing how fragile MaaS setups can be.
π Read β https://thehackernews.com/2026/01/security-bug-in-stealc-malware-panel.html
They extracted system fingerprints, live sessions, and cookies from infrastructure built to steal dataβshowing how fragile MaaS setups can be.
π Read β https://thehackernews.com/2026/01/security-bug-in-stealc-malware-panel.html
π₯7π4
π¨ A fake Chrome ad blocker crashes the browser on purpose, then tricks users into running attacker commands.
Huntress calls it CrashFix, an evolved ClickFix tactic linked to the KongTuke traffic distribution system for reuse in follow-on attacks.
π Learn how the crash-and-fix loop works β https://thehackernews.com/2026/01/crashfix-chrome-extension-delivers.html
Huntress calls it CrashFix, an evolved ClickFix tactic linked to the KongTuke traffic distribution system for reuse in follow-on attacks.
π Learn how the crash-and-fix loop works β https://thehackernews.com/2026/01/crashfix-chrome-extension-delivers.html
π₯10π4
π¨ AMD StackWarp flaw weakens SEV-SNP VM isolation.
A hardware bug in Zen 1β5 CPUs lets a privileged host misuse a control bit (via hyperthreading) to corrupt a confidential VMβs stack, enabling key recovery and auth bypass.
π Details & fixes β https://thehackernews.com/2026/01/new-stackwarp-hardware-flaw-breaks-amd.html
A hardware bug in Zen 1β5 CPUs lets a privileged host misuse a control bit (via hyperthreading) to corrupt a confidential VMβs stack, enabling key recovery and auth bypass.
π Details & fixes β https://thehackernews.com/2026/01/new-stackwarp-hardware-flaw-breaks-amd.html
π₯2