We all know very well that getting or gathering any information by using various tools becomes really easy. In this article, we have discussed various OSINT tools, as if we search over the internet, then there will be many different…
Tag: Cyber Security News
Microsoft Desktop Window Manager 0-Day Vulnerability Exploited in the wild
Microsoft patched a critical zero-day information disclosure flaw in its Desktop Window Manager (DWM) on January 13, 2026, in the Patch Tuesday update after detecting active exploitation in the wild. Tracked as CVE-2026-20805, the vulnerability allows low-privilege local attackers to…
Microsoft Patch Tuesday January 2026 – 114 Vulnerabilities Fixed Including 3 Zero-days
Microsoft’s January 2026 updates fix 114 vulnerabilities, with several remote code execution bugs rated critical across Office applications and Windows services such as LSASS. This Patch Tuesday addresses critical remote code execution flaws and numerous elevation of privilege issues that…
FortiOS and FortiSwitchManager Vulnerability Let Remote Attackers Execute Arbitrary Code
Fortinet has disclosed a critical heap-based buffer overflow vulnerability (CWE-122) in the cw_acd daemon of FortiOS and FortiSwitchManager. This flaw enables a remote, unauthenticated attacker to execute arbitrary code or commands by sending specially crafted requests over the network. Organizations…
Node.js Security Release Patches 7 Vulnerabilities Across All Release Lines
Node.js issued critical security updates across its active release lines on January 13, 2026, patching vulnerabilities that could lead to memory leaks, denial-of-service attacks, and permission bypasses. These releases address three high-severity flaws, among others, urging immediate upgrades for affected…
FortiSandbox SSRF Vulnerability Allow Attacker to proxy Internal Traffic via Crafted HTTP Requests
Fortinet disclosed a Server-Side Request Forgery (SSRF) vulnerability in its FortiSandbox appliance on January 13, 2026, urging users to update amid risks of internal network proxied requests. Tracked as CVE-2025-67685 (FG-IR-25-783), the flaw resides in the GUI component and stems…
HoneyTrap – A New LLM Defense Framework to Counter Jailbreak Attacks
Large language models have become essential tools across industries, from healthcare to creative services, revolutionizing how humans interact with artificial intelligence. However, this rapid expansion has exposed significant security vulnerabilities. Jailbreak attacks—sophisticated techniques designed to bypass safety mechanisms—pose an escalating…
Multi-Stage Windows Malware Invokes PowerShell Downloader Using Text-based Payloads Using Remote Host
Security researchers have identified a sophisticated multi-stage Windows malware campaign called SHADOW#REACTOR that represents a significant evolution in delivery mechanisms for remote access tools. The campaign demonstrates how threat actors combine traditional scripting techniques with modern obfuscation methods to bypass…
8000+ SmarterMail Hosts Vulnerable to RCE Attack – PoC Exploit Released
Over 8,000 internet-exposed SmarterMail servers remain vulnerable to a critical remote code execution flaw tracked as CVE-2025-52691, according to scans conducted on January 12, 2026. Security researchers identified 8,001 unique IP addresses likely affected out of 18,783 exposed instances, with…
Android Banking Malware deVixor Actively Targeting Users with Ransomware Capabilities
A sophisticated Android banking threat has emerged in the threat landscape, posing serious risks to mobile users across certain regions. The malware, known as deVixor, represents a significant evolution in Android-based attacks, combining financial data theft, device control, and extortion…
Critical OpenSSH Vulnerability Exposes Moxa Ethernet Switches to Remote Code Execution
Moxa has issued a critical security advisory regarding CVE-2023-38408, a severe vulnerability in OpenSSH affecting multiple Ethernet switch models. The flaw, with a CVSS 3.1 score of 9.8, allows unauthenticated remote attackers to execute arbitrary code on vulnerable devices without…
Anthropic Unveils “Claude for Healthcare” to Help Users Understand Medical Records
Anthropic has launched Claude for Healthcare, a new set of tools designed to help doctors, insurance companies, and patients use artificial intelligence for medical purposes while meeting strict privacy regulations. The announcement represents a significant expansion of Claude’s capabilities in…
Threat Actors Leveraging RMM Tools to Attack Users via Weaponized PDF Files
A new wave of cyberattacks has surfaced where threat actors are using weaponized PDF files to trick users into installing remote monitoring and management tools on their systems. These attacks exploit the trusted nature of RMM software like Syncro, SuperOps,…
5 SOC Challenges You Can Eliminate with a Single Improvement
Overcoming these five challenges commonly faced by SOC teams means taking a quantum leap in performance. The catalyst for this shift is simple: high quality threat intelligence, an essential component for modern security experts. With accurate, real time data on malicious indicators, organization can match, or even surpass results reported by ANY.RUN’s clients who adopted TI solutions: High-quality threat intelligence drives such…
Hackers Hijacked Apex Legends Game to Control the Inputs of Another Player Remotely
A significant security incident has emerged in Apex Legends, where attackers gained the ability to remotely control player inputs during active gameplay. The incident came to light when Respawn Entertainment disclosed the vulnerability through their official social media channels on…
Top 10 Best Insider Risk Management Platforms – 2026
Introduction : Insider Risk refers to the potential harm or negative impact that can arise from any illicit or unauthorized activity carried out by an individual within an organization who has legitimate access to sensitive data, systems, or resources, can…
Top 10 Best SaaS Security Tools – 2026
Introduction : Security management across multiple Software-as-a-Service (SaaS) clouds can present challenges, primarily stemming from the heightened prevalence of malware and ransomware attacks. In the present landscape, organizations encounter many challenges with Software-as-a-Service (SaaS). One of the main challenges businesses…
10 Best DevOps Tools to Shift Your Security in 2026
DevOps refers to a collection of processes and technologies used in software development and IT operations that reduce the system development life cycle and enable continuous delivery. However, when time and resources are limited, security measures tend to be minimized.…
Top 20 Most Exploited Vulnerabilities: Microsoft Products Draw Hackers
In today’s escalating threat landscape, spotting and patching open vulnerabilities ranks as a top priority for security teams. Pinpointing weaponized, high-risk CVEs exploited by threat actors and ransomware amid thousands of disclosures proves essential. Qualys researchers recently highlighted the top…
Top 10 Best Practices for Cybersecurity Professionals to Secure Your Database
In today’s digital world, databases act as fortified storehouses for an organization’s crown jewels its critical data. Yet these vaults face nonstop assaults from cyber threats. As a cybersecurity defender, you stand as the ever-watchful guardian, shielding these assets from…