Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware

28/01/2026 0 Comments 0 tags

Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS Code) extension for Moltbot (formerly Clawdbot) on the official Extension Marketplace that claims to be a free artificial

Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid

28/01/2026 0 Comments 0 tags

The “coordinated” cyber attack targeting multiple sites across the Polish power grid has been attributed with medium confidence to a Russian state-sponsored hacking crew known as ELECTRUM. Operational technology (OT)

Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution

28/01/2026 0 Comments 0 tags

A critical sandbox escape vulnerability has been disclosed in the popular vm2 Node.js library that, if successfully exploited, could allow attackers to run arbitrary code on the underlying operating system.

Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

28/01/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed two new security flaws in the n8n workflow automation platform, including a crucial vulnerability that could result in remote code execution. The weaknesses, discovered by the

From Triage to Threat Hunts: How AI Accelerates SecOps

28/01/2026 0 Comments 0 tags

If you work in security operations, the concept of the AI SOC agent is likely familiar. Early narratives promised total autonomy. Vendors seized on the idea of the “Autonomous SOC”

Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks

28/01/2026 0 Comments 0 tags

Threat actors with ties to China have been observed using an updated version of a backdoor called COOLCLIENT in cyber espionage attacks in 2025 to facilitate comprehensive data theft from

Password Reuse in Disguise: An Often-Missed Risky Workaround

28/01/2026 0 Comments 0 tags

When security teams discuss credential-related risk, the focus typically falls on threats such as phishing, malware, or ransomware. These attack methods continue to evolve and rightly command attention. However, one

Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088

28/01/2026 0 Comments 0 tags

Google on Tuesday revealed that multiple threat actors, including nation-state adversaries and financially motivated groups, are exploiting a now-patched critical security flaw in RARLAB WinRAR to establish initial access and

Fake Python Spellchecker Packages on PyPI Delivered Hidden Remote Access Trojan

28/01/2026 0 Comments 0 tags

Cybersecurity researchers have discovered two malicious packages in the Python Package Index (PyPI) repository that masquerade as spellcheckers but contain functionality to deliver a remote access trojan (RAT). The packages,

Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected

28/01/2026 0 Comments 0 tags

Fortinet has begun releasing security updates to address a critical flaw impacting FortiOS that has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2026-24858 (CVSS