SolyxImmortal represents a notable advancement in information-stealing malware targeting Windows systems. This Python-based threat combines multiple data theft capabilities into a single, persistent implant designed for long-term surveillance rather than destructive activity. The malware operates silently in the background, collecting…
Category: EN
Attackers Abuse Discord to Deliver Clipboard Hijacker That Steals Wallet Addresses on Paste
A new clipboard hijacker is quietly draining cryptocurrency from gamers and streamers by abusing trust inside Discord communities. The campaign centers on a malicious Windows program shared as a supposed streaming or security tool. Once installed, it silently watches the…
Scam Marketplace Tudou Guarantee Shutters Telegram Ops
A notorious marketplace for fraud, Tudou Guarantee, appears to have closed its public Telegram groups This article has been indexed from www.infosecurity-magazine.com Read the original article: Scam Marketplace Tudou Guarantee Shutters Telegram Ops
OpenAI Brings Adverts To ChatGPT
OpenAI to begin testing tailored adverts in ChatGPT for free and low-cost users, as it seeks to fund expensive AI data centres This article has been indexed from Silicon UK Read the original article: OpenAI Brings Adverts To ChatGPT
Critical WordPress Plugin Vulnerability Exposes 100,000+ Websites to Privilege Escalation Attacks
A critical privilege escalation vulnerability discovered in the Advanced Custom Fields: Extended WordPress plugin threatens over 100,000 active installations. The vulnerability, identified as CVE-2025-14533 with a CVSS score of 9.8, allows unauthenticated attackers to elevate their privileges to administrative by…
VoidLink Signals the Start of a New Era in AI-Generated Malware
Check Point Research has identified VoidLink, one of the first known examples of advanced malware largely generated using artificial intelligence. Unlike earlier AI-assisted malware, which was typically low-quality or derivative, VoidLink demonstrates a high level of sophistication and rapid evolution.…
UK NCSC warns of Russia-linked hacktivists DDoS attacks
The UK government warns Russia-linked hacktivists are still carrying out DDoS attacks on critical infrastructure and local government systems The UK government warns that Russia-linked hacktivists are continuing DDoS attacks against critical infrastructure and local government systems. “Today, 19th January…
One Identity Unveils Major Upgrade to Identity Manager, Strengthening Enterprise Identity Security
Alisa Viejo, United States, 20th January 2026, CyberNewsWire One Identity Unveils Major Upgrade to Identity Manager, Strengthening Enterprise Identity Security on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses. This article has been indexed from…
Google Appeals Landmark Antitrust Ruling
Google files appeal to 2024 decision finding it holds illegal monopoly in online search, seeks suspension of remedies This article has been indexed from Silicon UK Read the original article: Google Appeals Landmark Antitrust Ruling
VoidLink Debuts AI-Assisted, Server-Side Kernel Compilation Rootkit Technique
On January 13, 2026, Check Point Research published its analysis of VoidLink, a Chinese-developed Linux malware framework designed to target cloud environments. Following this disclosure, the Sysdig Threat Research Team (TRT) examined VoidLink’s binaries to understand its loader chain, rootkit…
Labour MPs Call For PM To Back Social Media Ban
More than 60 Labour MPs call on Sir Keir Starmer to back social media restrictions for under-16s, following Australia’s lead This article has been indexed from Silicon UK Read the original article: Labour MPs Call For PM To Back Social…
TP-Link Router Flaw Enables Authentication Bypass Through Password Recovery Mechanism
TP-Link has disclosed a high-severity authentication bypass vulnerability affecting its VIGI security camera lineup, allowing attackers on local networks to reset administrator passwords without verification. The flaw lies in the password recovery feature of the local web interface, which is exploited via client-side state…
Threat Actors Leverage Google Ads to Weaponize PDF Editor with TamperedChef
A malvertising campaign identified in September 2025 has brought a significant threat to Windows users worldwide. Attackers created fake PDF editing applications and promoted them through Google Ads to distribute a dangerous information-stealing malware called TamperedChef. The malware targets users…
WhisperPair Attack Allows Hijacking of Laptops, Earbuds Without User Consent – Millions Affected
A critical vulnerability in Google’s Fast Pair protocol that allows attackers to hijack Bluetooth audio accessories and track users without their knowledge or consent.​ Security researchers from KU Leuven have uncovered a vulnerability, tracked as CVE-2025-36911 and dubbed WhisperPair, that…
Critical AVEVA Software Vulnerabilities Enables Remote Code Execution Under System Privileges
Seven vulnerabilities were disclosed in Process Optimization (formerly ROMeo) 2024.1 and earlier on January 13, 2026, including a critical flaw enabling unauthenticated SYSTEM-level remote code execution. The most severe vulnerability enables unauthenticated attackers to achieve remote code execution under system…
Tudou Guarantee Marketplace Halts Telegram Transactions After Processing Over $12 Billion
A Telegram-based guarantee marketplace known for advertising a broad range of illicit services appears to be winding down its operations, according to new findings from Elliptic. The blockchain intelligence company said Tudou Guarantee has effectively ceased transactions through its public…
Gemini prompt injection flaw exposes calendar info, hacker admits to Supreme Court data leak, researchers uncover PDFSIDER malware
Gemini prompt injection flaw exposes calendar info Hacker admits to leaking stolen Supreme Court data Researchers uncover PDFSIDER malware Huge thanks to our sponsor, Dropzone AI It’s 2 AM. An alert fires. Possible data exfiltration. Your on-call analyst is three…
Hundreds In Cornwall Still Without Internet After Storm Goretti
Openreach acknowledges that while power, water have been restored in Cornwall, some 900 are still without broadband internet This article has been indexed from Silicon UK Read the original article: Hundreds In Cornwall Still Without Internet After Storm Goretti
Discord Exploited to Spread Clipboard Hijacker Stealing Cryptocurrency Funds
CloudSEK’s STRIKE team has uncovered a sophisticated cryptocurrency theft operation orchestrated by the threat actor “RedLineCyber,” who deliberately impersonates the notorious RedLine Solutions to establish credibility within underground communities. Rather than collecting comprehensive system data, the malware employs a highly…
Pulsar RAT Using Memory-Only Execution & HVNC to Gain Invisible Remote Access
Pulsar RAT has emerged as a sophisticated derivative of the open-source Quasar RAT, introducing dangerous enhancements that enable attackers to maintain invisible remote access through advanced evasion techniques. This modular Windows-focused remote administration tool represents a significant evolution in threat…