The botnet’s propagation is fueled by the AI-generated server deployments that use weak credentials, and legacy web stacks. The post GoBruteforcer Botnet Targeting Crypto, Blockchain Projects appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool
Cybersecurity researchers have disclosed details of a malicious Google Chrome extension that’s capable of stealing API keys associated with MEXC, a centralized cryptocurrency exchange (CEX) available in over 170 countries, while masquerading as a tool to automate trading on the…
Flowable 2025.2 Brings Governed Multi-Agent AI Orchestration to Enterprises
Flowable has launched version 2025.2 of its enterprise work orchestration platform, adding support for governed multi-agent AI, impact… This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the original article: Flowable 2025.2 Brings…
AI and automation could erase 10.4 million US roles by 2030
Forrester models slow, structural shift rather than sudden employment collapse AI-pocalypse AI and automation could wipe out 6.1 percent of jobs in the US by 2030 – equating to 10.4 million fewer positions that are held by humans today.… This…
Dozens of ICE Vehicles in Minnesota Lack ‘Necessary’ Lights and Sirens
A contract justification published in a federal register on Tuesday says that 31 ICE vehicles operating in the Twin Cities area “lack the necessary emergency lights and sirens” to be “compliant.” This article has been indexed from Security Latest Read…
Rockwell Automation 432ES-IG3 Series A
View CSAF Summary Successful exploitation of this vulnerability could result in a denial-of-service condition. The following versions of Rockwell Automation 432ES-IG3 Series A are affected: 432ES-IG3 Series A (CVE-2025-9368) CVSS Vendor Equipment Vulnerabilities v3 7.5 Rockwell Automation Rockwell Automation 432ES-IG3…
Rockwell Automation FactoryTalk DataMosaix Private Cloud
View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to perform unauthorized sensitive database operations. The following versions of Rockwell Automation FactoryTalk DataMosaix Private Cloud are affected: FactoryTalk DataMosaix Private Cloud (CVE-2025-12807) FactoryTalk DataMosaix Private Cloud (CVE-2025-12807)…
YoSmart YoLink Smart Hub
View CSAF Summary Successful exploitation of these vulnerabilities could allow an attacker to remotely control other users’ smart home devices, intercept sensitive data, and hijack sessions. The following versions of YoSmart YoLink Smart Hub are affected: YoSmart server (CVE-2025-59449, CVE-2025-59451)…
HoneyTrap – A New LLM Defense Framework to Counter Jailbreak Attacks
Large language models have become essential tools across industries, from healthcare to creative services, revolutionizing how humans interact with artificial intelligence. However, this rapid expansion has exposed significant security vulnerabilities. Jailbreak attacks—sophisticated techniques designed to bypass safety mechanisms—pose an escalating…
Multi-Stage Windows Malware Invokes PowerShell Downloader Using Text-based Payloads Using Remote Host
Security researchers have identified a sophisticated multi-stage Windows malware campaign called SHADOW#REACTOR that represents a significant evolution in delivery mechanisms for remote access tools. The campaign demonstrates how threat actors combine traditional scripting techniques with modern obfuscation methods to bypass…
8000+ SmarterMail Hosts Vulnerable to RCE Attack – PoC Exploit Released
Over 8,000 internet-exposed SmarterMail servers remain vulnerable to a critical remote code execution flaw tracked as CVE-2025-52691, according to scans conducted on January 12, 2026. Security researchers identified 8,001 unique IP addresses likely affected out of 18,783 exposed instances, with…
Cyber Insights 2026: External Attack Surface Management
AI will assist companies in finding their external attack surface, but it will also assist bad actors in locating and attacking the weak points. The post Cyber Insights 2026: External Attack Surface Management appeared first on SecurityWeek. This article has…
Man Sentenced to Seven Years for Hacking Port IT Systems to Enable Drug Imports
A Dutch appeals court has sentenced a 44-year-old man to seven years in prison for his involvement in cyber intrusions targeting major European ports and for using those breaches to support drug trafficking operations. The ruling was issued by…
n8n Supply Chain Attack Exploits Community Nodes In Google Ads Integration to Steal Tokens
Hackers were found uploading a set of eight packages on the npm registry that pretended as integrations attacking the n8n workflow automation platform to steal developers’ OAuth credentials. About the exploit The package is called “n8n-nodes-hfgjf-irtuinvcm-lasdqewriit”, it copies Google Ads…
FBI Flags Kimsuky’s Role in Sophisticated Quishing Attacks
A new warning from the US Federal Bureau of Investigation indicates that spearphishing tactics are being advanced by a cyber espionage group linked to North Korea known as Kimsuky, also known as APT43, in recent months. As the threat…
Anthropic Launches “Claude for Healthcare” to Help Users Better Understand Medical Records
Anthropic has joined the growing list of artificial intelligence companies expanding into digital health, announcing a new set of tools that enable users of its Claude platform to make sense of their personal health data. The initiative, titled Claude…
CISA Flags Actively Exploited Gogs Vulnerability With No Patch
A high-severity security flaw in the Gogs Git service is being actively exploited, leading to remote code execution This article has been indexed from www.infosecurity-magazine.com Read the original article: CISA Flags Actively Exploited Gogs Vulnerability With No Patch
IT Security News Hourly Summary 2026-01-13 18h : 5 posts
5 posts were published in the last hour 16:33 : Dutch court convicts hacker who exploited port networks for drug trafficking 16:33 : BreachForums Data Leak Raises Fresh Questions Over Credibility 16:32 : Data broker fined after selling Alzheimer’s patient…
Dutch court convicts hacker who exploited port networks for drug trafficking
Dutch appeals court jails a 44-year-old hacker for 7 years for hacking port systems to help smuggle cocaine through European logistics hubs. A Dutch appeals court sentenced a 44-year-old hacker to seven years in prison for hacking port systems to…
BreachForums Data Leak Raises Fresh Questions Over Credibility
BreachForums, one of the most well-known English-language cybercrime forums, has reportedly suffered a data breach, exposing user information after the site was taken offline once again. As reported by The Register, a database linked to the forum was leaked online,…
Data broker fined after selling Alzheimer’s patient info and millions of sensitive profiles
A data broker was fined by California regulators for selling sensitive data on Alzheimer’s patients and millions of others. This article has been indexed from Malwarebytes Read the original article: Data broker fined after selling Alzheimer’s patient info and millions…
Healthcare sector breaches double as shadow AI, vendor risks proliferate
A new report paints a picture of a sector with limited confidence in its defensive capabilities. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Healthcare sector breaches double as shadow AI, vendor risks…
Majority of hedge funds boosted cybersecurity spending in 2025
About half of firms suffered a breach, and a large percentage cited third-party risks. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: Majority of hedge funds boosted cybersecurity spending in 2025
Red-Teaming BrowseSafe Exposes AI Browser Guardrail Gaps
Red-team testing shows encoded prompt injections can bypass BrowseSafe guardrails. The post Red-Teaming BrowseSafe Exposes AI Browser Guardrail Gaps appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Red-Teaming BrowseSafe Exposes AI…