This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Malware-Traffic-Analysis.net – Blog Entries Read the original article: 2026-01-14: Lumma Stealer infection with follow-up malware
2026-01-15: XLoader (Formbook) infection
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Malware-Traffic-Analysis.net – Blog Entries Read the original article: 2026-01-15: XLoader (Formbook) infection
2026-01-19: Six days of scans and probes and web traffic hitting my web server
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Malware-Traffic-Analysis.net – Blog Entries Read the original article: 2026-01-19: Six days of scans and probes and web…
Google Gemini Privacy Controls Bypassed to Access Private Meeting Data Using Calendar Invite
A significant vulnerability within the Google ecosystem allowed attackers to bypass Google Calendar’s privacy controls using a standard calendar invitation. The discovery highlights a growing class of threats known as “Indirect Prompt Injection,” where malicious instructions are hidden within legitimate…
IT Security News Hourly Summary 2026-01-20 03h : 2 posts
2 posts were published in the last hour 2:2 : ISC Stormcast For Tuesday, January 20th, 2026 https://isc.sans.edu/podcastdetail/9772, (Tue, Jan 20th) 1:34 : Department of Know: Easterly helms RSAC, Third party apps report, Self-poisoning AI
ISC Stormcast For Tuesday, January 20th, 2026 https://isc.sans.edu/podcastdetail/9772, (Tue, Jan 20th)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ISC Stormcast For Tuesday, January 20th, 2026…
Department of Know: Easterly helms RSAC, Third party apps report, Self-poisoning AI
Link to episode page This week’s Department of Know is hosted by Sarah Lane with guests Dmitriy Sokolovskiy, senior vice president, information security, Semrush, and Nick Espinosa, host, The Deep Dive Radio Show Thanks to our show sponsor, Dropzone AI…
Granular Policy Enforcement for Decentralized Model Context Resources
Secure your Model Context Protocol (MCP) deployments with granular policy enforcement and post-quantum cryptography. Prevent tool poisoning and puppet attacks. The post Granular Policy Enforcement for Decentralized Model Context Resources appeared first on Security Boulevard. This article has been indexed…
Flare Research: Phishing Kits Now Operate Like SaaS Platforms
Flare’s research shows phishing kits now run like SaaS, built to bypass MFA. The post Flare Research: Phishing Kits Now Operate Like SaaS Platforms appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original…
Remcos RAT Masquerade as VeraCrypt Installers Steals Users Login Credentials
A sophisticated malware campaign targeting South Korean users has emerged, distributing the Remcos remote access trojan (RAT) through deceptive installers disguised as legitimate VeraCrypt encryption software. This ongoing attack campaign primarily focuses on individuals connected to illegal online gambling platforms,…
AI-Powered Phishing Makes Human Risk Management Critical
AI-driven phishing is accelerating, making Human Risk Management critical. The post AI-Powered Phishing Makes Human Risk Management Critical appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: AI-Powered Phishing Makes Human Risk…
IT Security News Hourly Summary 2026-01-20 00h : 1 posts
1 posts were published in the last hour 22:55 : IT Security News Daily Summary 2026-01-19
IT Security News Daily Summary 2026-01-19
139 posts were published in the last hour 21:32 : 100,000 WordPress Sites Affected by Privilege Escalation Vulnerability in Advanced Custom Fields: Extended WordPress Plugin 21:32 : Inside the Leaks that Exposed the Hidden Infrastructure Behind a Ransomware Operation 21:32…
100,000 WordPress Sites Affected by Privilege Escalation Vulnerability in Advanced Custom Fields: Extended WordPress Plugin
On December 10th, 2025, we received a submission for a Privilege Escalation vulnerability in Advanced Custom Fields: Extended, a WordPress plugin with more than 100,000+ active installations. This vulnerability makes it possible for an unauthenticated attacker to grant themselves administrative…
Inside the Leaks that Exposed the Hidden Infrastructure Behind a Ransomware Operation
The cybercrime world operates in shadows, but when insiders turn against each other, those shadows shrink. In February 2025, an individual using the alias ExploitWhispers surfaced on Telegram and released internal communications from the BlackBasta ransomware group. The leak contained…
Threat Actors Weaponizing Visual Studio Code to Deploy a Multistage Malware
Threat actors are turning Visual Studio Code into an attack platform, using its rich extension ecosystem to slip multistage malware into developer workstations. The latest campaign, dubbed Evelyn Stealer, hides behind a malicious extension that delivers a stealthy information stealing…
Attackers are Using WSL2 as a Stealthy Hideout Inside Windows Systems
Windows Subsystem for Linux 2 (WSL2) is meant to give developers a fast Linux environment on Windows. Now attackers are turning that benefit into a hiding place. By running tools and payloads inside the WSL2 virtual machine, they can operate…
Threat Actors Impersonate as MalwareBytes to Attack Users and Steal Logins
A new malware campaign has emerged that tricks people into downloading fake Malwarebytes software, putting their login credentials and cryptocurrency wallets at serious risk. Security researchers discovered this operation actively spreading between January 11 and January 15, 2026, using specially…
Randall Munroe’s XKCD ‘Funny Numbers’
via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Funny Numbers’ appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Randall Munroe’s…
NDSS 2025 – ASGARD
Session 9B: DNN Attack Surfaces Authors, Creators & Presenters: Myungsuk Moon (Yonsei University), Minhee Kim (Yonsei University), Joonkyo Jung (Yonsei University), Dokyung Song (Yonsei University) PAPER ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environments On-device deep learning,…
Jordanian Man Pleads Guilty to Selling Stolen Logins for 50 Companies
Jordanian man pleads guilty to selling stolen corporate logins in FBI sting after extradition from Georgia; tied to access of 50+ company networks. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the…
IT Security News Hourly Summary 2026-01-19 21h : 2 posts
2 posts were published in the last hour 19:36 : Ransomware attack on Ingram Micro impacts 42,000 individuals 19:36 : Raaga – 10,225,145 breached accounts
Ransomware attack on Ingram Micro impacts 42,000 individuals
Ingram Micro says a ransomware attack exposed personal data of about 42,000 people, including names, birth dates, SSNs, and job-related details. Ingram Micro is a global technology distributor and supply-chain services company. It acts as a middleman between IT vendors…
Raaga – 10,225,145 breached accounts
In December 2025, data allegedly breached from the Indian streaming music service “Raaga” was posted for sale to a popular hacking forum. The data contained 10M unique email addresses along with names, genders, ages (in some cases, full date of…