• APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks

    APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks

    The Russia-linked state-sponsored threat actor known as APT28 (aka UAC-0001) has been attributed to attacks exploiting a newly disclosed security flaw in Microsoft Office as part of a campaign codenamed Operation Neusploit. Zscaler ThreatLabz said it observed the hacking group weaponizing the shortcoming on January 29, 2026, in attacks targeting users in Ukraine, Slovakia, and…

    Read More

  • Mozilla Adds One-Click Option to Disable Generative AI Features in Firefox

    Mozilla Adds One-Click Option to Disable Generative AI Features in Firefox

    Mozilla on Monday announced a new controls section in its Firefox desktop browser settings that allows users to completely turn off generative artificial intelligence (GenAI) features. “It provides a single place to block current and future generative AI features in Firefox,” Ajit Varma, head of Firefox, said. “You can also review and manage individual AI…

    Read More

  • Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group

    Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group

    A China-linked threat actor known as Lotus Blossom has been attributed with medium confidence to the recently discovered compromise of the infrastructure hosting Notepad++. The attack enabled the state-sponsored hacking group to deliver a previously undocumented backdoor codenamed Chrysalis to users of the open-source editor, according to new findings from Rapid7. The development comes shortly

    Read More

  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users

    Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users

    A security audit of 2,857 skills on ClawHub has found 341 malicious skills across multiple campaigns, according to new findings from Koi Security, exposing users to new supply chain risks. ClawHub is a marketplace designed to make it easy for OpenClaw users to find and install third-party skills. It’s an extension to the OpenClaw project,…

    Read More

  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

    OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

    A high-severity security flaw has been disclosed in OpenClaw (formerly referred to as Clawdbot and Moltbot) that could allow remote code execution (RCE) through a crafted malicious link. The issue, which is tracked as CVE-2026-25253 (CVSS score: 8.8), has been addressed in version 2026.1.29 released on January 30, 2026. It has been described as a…

    Read More

  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

    Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

    Microsoft has announced a three-phase approach to phase out New Technology LAN Manager (NTLM) as part of its efforts to shift Windows environments toward stronger, Kerberos-based options. The development comes more than two years after the tech giant revealed its plans to deprecate the legacy technology, citing its susceptibility to weaknesses that could facilitate relay…

    Read More

  • ⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats

    ⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats

    Every week brings new discoveries, attacks, and defenses that shape the state of cybersecurity. Some threats are stopped quickly, while others go unseen until they cause real damage. Sometimes a single update, exploit, or mistake changes how we think about risk and protection. Every incident shows how defenders adapt — and how fast attackers try…

    Read More

  • Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

    Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

    The maintainer of Notepad++ has revealed that state-sponsored attackers hijacked the utility’s update mechanism to redirect update traffic to malicious servers instead. “The attack involved [an] infrastructure-level compromise that allowed malicious actors to intercept and redirect update traffic destined for notepad-plus-plus.org,” developer Don Ho said. “The compromise occurred at the hosting

    Read More

  • eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

    eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

    The update infrastructure for eScan antivirus, a security solution developed by Indian cybersecurity company MicroWorld Technologies, has been compromised by unknown attackers to deliver a persistent downloader to enterprise and consumer systems. “Malicious updates were distributed through eScan’s legitimate update infrastructure, resulting in the deployment of multi-stage malware to enterprise

    Read More

  • Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

    Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

    Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat actors compromised a legitimate developer’s resources to push malicious updates to downstream users. “On January 30, 2026, four established Open VSX extensions published by the oorzc author had malicious versions published to Open VSX that embed…

    Read More