Authors, Creators & Presenters: Zhuo Chen (Zhejiang University), Yufeng Hu (Zhejiang University), Bowen He (Zhejiang University), Dong Luo (Zhejiang University), Lei Wu (Zhejiang University), Yajin Zhou (Zhejiang University) PAPER Dissecting Payload-Based Transaction Phishing On Ethereum In recent years, a more…
Category: EN
20,000 WordPress Sites Affected by Backdoor Vulnerability in LA-Studio Element Kit for Elementor WordPress Plugin
On January 12th, 2026, we received a submission for a Backdoor vulnerability in the LA-Studio Element Kit for Elementor, a WordPress plugin with more than 20,000+ active installations. This vulnerability makes it possible for an unauthenticated attacker to create malicious…
Surveillance and ICE Are Driving Patients Away From Medical Care, Report Warns
A new EPIC report says data brokers, ad-tech surveillance, and ICE enforcement are among the factors leading to a “health privacy crisis” that is eroding trust and deterring people from seeking care. This article has been indexed from Security Latest…
Don’t click on the LastPass ‘create backup’ link – it’s a scam
Phishing campaign tries to reel in master passwords Password managers make great targets for attackers because they can hold many of the keys to your kingdom. Now, LastPass has warned customers about phishing emails claiming that action is required ahead…
What Happens When Spyware Hits a Phone and How to Stay Safe
Although advanced spyware attacks do not affect most smartphone users, cybersecurity researchers stress that awareness is essential as these tools continue to spread globally. Even individuals who are not public figures are advised to remain cautious. In December, hundreds…
RCE flaw in Cisco enterprise communications products probed by attackers (CVE-2026-20045)
Cisco has fixed a critical remote code execution vulnerability (CVE-2026-20045) in some of its unified communications solutions that’s being targeted by attackers in the wild, the company announced on Wednesday via a security advisory. About CVE-2026-20045 CVE-2026-20045 is a code…
GNU InetUtils Telnetd Flaw Lets Attackers Log In as Root
A GNU InetUtils telnetd flaw lets attackers log in as root without a password. The post GNU InetUtils Telnetd Flaw Lets Attackers Log In as Root appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…
Microsoft Investigating Issue Impacting Exchange Online, Teams, and M365 Suite
Microsoft has confirmed it is actively investigating a new service incident affecting multiple core services within the Microsoft 365 ecosystem. The company acknowledged the disruption on Wednesday evening, following reports of connectivity issues and service degradation for users relying on…
New AI Malware Era Begins as Advanced VoidLink Malware Emerges as the First Fully AI-Driven Threat Framework
The cybersecurity landscape has entered a dangerous new chapter with the discovery of VoidLink, the first documented advanced malware framework built almost entirely by artificial intelligence. Unlike earlier attempts where inexperienced hackers used AI to create basic malicious tools, VoidLink…
North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews
As many as 3,136 individual IP addresses linked to likely targets of the Contagious Interview activity have been identified, with the campaign claiming 20 potential victim organizations spanning artificial intelligence (AI), cryptocurrency, financial services, IT services, marketing, and software development…
Can you use too many LOLBins to drop some RATs?
An attempt to drop two RATs on a system used an uncanny assortment of legitimate Windows tools. This article has been indexed from Malwarebytes Read the original article: Can you use too many LOLBins to drop some RATs?
Oracle WebLogic Proxy Bug Enables Unauthenticated Remote Compromise
CVE-2026-21962 lets unauthenticated attackers remotely compromise Oracle WebLogic proxies. The post Oracle WebLogic Proxy Bug Enables Unauthenticated Remote Compromise appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Oracle WebLogic Proxy Bug…
Researchers Uncovered LockBit’s 5.0 Latest Affiliate Panel and Encryption Variants
LockBit, one of the most dangerous ransomware groups in the world, has released its newest version despite facing serious law enforcement actions. The group’s operations continue moving forward, displaying fresh variants that target different computer systems and platforms. Recently, leaked…
ACME flaw in Cloudflare allowed attackers to reach origin servers
Cloudflare fixed a flaw in its ACME validation logic that could let attackers bypass security checks and access protected origin servers. Cloudflare fixed a flaw in its ACME HTTP-01 validation logic that could let attackers bypass security checks and reach…
CyberNut Closes $5M Growth Capital for K-12 Security Awareness Training
CyberNut emerged from stealth in May 2024 with $800k in pre-seed funding for its cybersecurity platform. The post CyberNut Closes $5M Growth Capital for K-12 Security Awareness Training appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Grok AI Faces Global Backlash Over Nonconsensual Image Manipulation on X
A dispute over X’s internal AI assistant, Grok, is gaining attention – questions now swirl around permission, safety measures online, yet also how synthetic media tools can be twisted. This tension surfaced when Julie Yukari, a musician aged thirty-one…
Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws
Zoom and GitLab have released security updates to resolve a number of security vulnerabilities that could result in denial-of-service (DoS) and remote code execution. The most severe of the lot is a critical security flaw impacting Zoom Node Multimedia Routers…
Phishing and Spoofed Sites Remain Primary Entry Points For Olympics
Cyber risks for the Milano-Cortina 2026 Winter Games include phishing and spoofed websites as key threat vectors This article has been indexed from www.infosecurity-magazine.com Read the original article: Phishing and Spoofed Sites Remain Primary Entry Points For Olympics
Everest ransomware gang said to be sitting on mountain of Under Armour data
Have I Been Pwned reckons 72.7M customer accounts affected, sportswear firm remains silent Have I Been Pwned (HIBP) says 72.7 million accounts registered with Under Armour were affected by an alleged ransomware attack in November.… This article has been indexed…
LinkedIn Phishing Abuses DLL Sideloading for Persistent Access
A LinkedIn phishing campaign uses DLL sideloading to gain stealthy, persistent access. The post LinkedIn Phishing Abuses DLL Sideloading for Persistent Access appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: LinkedIn…