North Korea-Linked Hackers Target Developers via Malicious VS Code Projects

20/01/2026 0 Comments 0 tags

The North Korean threat actors associated with the long-running Contagious Interview campaign have been observed using malicious Microsoft Visual Studio Code (VS Code) projects as lures to deliver a backdoor

Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto

20/01/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a malware campaign that’s targeting software developers with a new information stealer called Evelyn Stealer by weaponizing the Microsoft Visual Studio Code (VS Code)

The Hidden Risk of Orphan Accounts

20/01/2026 0 Comments 0 tags

The Problem: The Identities Left Behind As organizations grow and evolve, employees, contractors, services, and systems come and go – but their accounts often remain. These abandoned or “orphan” accounts

Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading

20/01/2026 0 Comments 0 tags

Cybersecurity researchers have uncovered a new phishing campaign that exploits social media private messages to propagate malicious payloads, likely with the intent to deploy a remote access trojan (RAT). The

Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution

20/01/2026 0 Comments 0 tags

A set of three security vulnerabilities has been disclosed in mcp-server-git, the official Git Model Context Protocol (MCP) server maintained by Anthropic, that could be exploited to read or delete

Why Secrets in JavaScript Bundles are Still Being Missed

20/01/2026 0 Comments 0 tags

Leaked API keys are no longer unusual, nor are the breaches that follow. So why are sensitive tokens still being so easily exposed? To find out, Intruder’s research team looked

Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers

20/01/2026 0 Comments 0 tags

Cloudflare has addressed a security vulnerability impacting its Automatic Certificate Management Environment (ACME) validation logic that made it possible to bypass security controls and access origin servers.  “The vulnerability was

Tudou Guarantee Marketplace Halts Telegram Transactions After Processing Over $12 Billion

20/01/2026 0 Comments 0 tags

A Telegram-based guarantee marketplace known for advertising a broad range of illicit services appears to be winding down its operations, according to new findings from Elliptic. The blockchain intelligence company

Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites

19/01/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a security flaw that leverages indirect prompt injection targeting Google Gemini as a way to bypass authorization guardrails and use Google Calendar as a

⚡ Weekly Recap: Fortinet Exploits, RedLine Clipjack, NTLM Crack, Copilot Attack & More

19/01/2026 0 Comments 0 tags

In cybersecurity, the line between a normal update and a serious incident keeps getting thinner. Systems that once felt reliable are now under pressure from constant change. New AI tools,