Sedgwick has confirmed a cybersecurity incident at its government-focused subsidiary after the TridentLocker ransomware gang claimed responsibility for stealing 3.4 gigabytes of data. The breach highlights ongoing risks to federal contractors handling sensitive U.S. agency data. Claims administration giant Sedgwick…
Tag: Cyber Security News
Critical Dolby Codec Vulnerability Exposes Android Devices to Code Execution Attacks
Google has issued its January 2026 Android Security Bulletin, urging users to update to the 2026-01-05 patch level or later to mitigate a critical vulnerability in Dolby components. The standout issue, CVE-2025-54957, targets the Dolby Digital Plus (DD+) codec and…
Critical AdonisJS Vulnerability Allow Remote Attacker to Write Files On Server
A critical path traversal vulnerability in AdonisJS has been discovered that could allow remote attackers to write arbitrary files to server filesystems, potentially leading to complete system compromise. The vulnerability, tracked as CVE-2026-21440, affects the bodyparser module of the popular TypeScript-first…
Judge Demands OpenAI to Release 20 Million Anonymized ChatGPT Chats in AI Copyright Dispute
A federal judge in New York has ordered OpenAI to provide 20 million anonymized user logs from ChatGPT to the plaintiffs in a major copyright lawsuit involving AI. The judge made this decision despite OpenAI’s privacy concerns, upholding an earlier…
How Threat Intelligence Will Change Cybersecurity in 2026
As we head into 2026, the cybersecurity landscape is evolving in ways that actually favor the defenders. The threat trends we’re seeing aren’t just challenges. They are catalysts pushing SOCs to become smarter, more efficient, and more aligned with business goals than ever before. Forward-thinking leaders are already embracing advanced…
New Tool to Remove Copilot, Recall and Other AI Tools From Windows 11
Microsoft’s aggressive push to integrate artificial intelligence features into Windows 11 has prompted developers to create the RemoveWindowsAI project. An open-source tool designed to remove or disable unwanted AI components from the operating system. RemoveWindowsAI is a community-driven utility available…
NordVPN Denies Data Breach Following Threat Actor Claim on Dark Web
NordVPN has firmly rejected claims of a data breach after a threat actor surfaced alleged stolen data on a dark web breach forum, purporting to expose the VPN provider’s Salesforce development server. The incident, first spotted on January 4, underscores…
CloudEyE MaaS Downloader and Cryptor Infects 100,000+ Users Worldwide
A dangerous malware campaign has emerged across Central and Eastern Europe, causing widespread concern among cybersecurity professionals and organizations. CloudEyE, a Malware-as-a-Service downloader and cryptor, has rapidly gained traction among threat actors seeking to distribute other harmful malware payloads. In…
Christmas Phishing Surge Chains Docusign Spoofing with Identity Theft Questionnaires
The holiday season has brought with it a surge in sophisticated phishing attacks that combine two dangerous tactics: credential harvesting through spoofed Docusign notifications and identity theft through fake loan application forms. These coordinated campaigns exploit the seasonal chaos of…
Threat Actors Leverage Commodity Loader to Attack Organizations in Targeted Email Campaigns
Cybersecurity threat researchers have uncovered a highly sophisticated malware campaign leveraging a commodity loader being shared across multiple threat actor groups. The operation targets manufacturing and government organizations across Italy, Finland, and Saudi Arabia with precision-engineered attacks designed to extract…
Fake WordPress Domain Renewal Email Targeting Admins to Steal Credit Card Data
A deceptive phishing campaign is actively targeting WordPress administrators with convincing fake domain renewal notices designed to steal credit card information and two-factor authentication codes. The emails, masquerading as legitimate WordPress.com renewal reminders, redirect unsuspecting victims to a fraudulent payment…
New macOS TCC Bypass Vulnerability Allow Attackers to Access Sensitive User Data
A critical security vulnerability in macOS has been discovered that enables attackers to completely bypass Transparency, Consent, and Control (TCC) protections. Apple’s primary defense mechanism for preventing unauthorized access to sensitive user data is the use of the microphone, camera,…
New Critical n8n Vulnerability Allow Attackers to Execute Arbitrary Commands
A critical vulnerability has been discovered in n8n, the popular open-source workflow automation platform, enabling authenticated attackers to execute arbitrary commands on host systems. The vulnerability, tracked as CVE-2025-68668, has been assigned a severe CVSS score of 9.9 out of…
CISA Expands KEV Catalog with 1,484 New Vulnerabilities as Active Exploitation Surges 20% in 2025
The United States Cybersecurity and Infrastructure Security Agency (CISA) has significantly expanded its Known Exploited Vulnerabilities (KEV) Catalog to 1,484 vulnerabilities as of December 2025, marking a critical milestone in the federal government’s efforts to combat actively exploited security flaws.…
New ClickFix Attack Uses Fake Windows BSOD Screens to Trick Users into Executing Malicious Code
A sophisticated malware campaign called PHALTBLYX has emerged, combining social engineering deception with advanced evasion techniques to compromise hospitality sector organizations. The attack chain begins with phishing emails impersonating Booking.com, featuring urgent reservation cancellation alerts with large financial charges displayed…
Top 20 Best Endpoint Management Tools – 2026
Endpoint management has become essential for modern IT, securing and optimizing devices across hybrid and remote environments. With distributed workforces expanding, demand for robust endpoint management tools reaches new heights in 2026. This guide ranks the top 20 endpoint management…
Threat Actors Allegedly Promoting New ‘Brutus’ Brute-Force Tool Targeting Fortinet Services
A threat actor operating under the moniker “RedTeam” has begun advertising a new brute-force attack tool, “Brutus,” designed to target Fortinet services, according to recent dark web intelligence. The tool is priced at $1,500, signaling growing interest in automated credential-stuffing…
New Sophisticated Phishing Attack Mimic as Google Support to Steal Logins
Cybersecurity researchers have uncovered a dangerous new phishing campaign that tricks users into surrendering their credentials by impersonating legitimate Google support and notifications. The attack combines vishing (voice phishing), spoofed domains, and Google’s own trusted infrastructure to achieve exceptional success…
Scattered Lapsus$ Hunters Resurface with New RaaS Platform ‘ShinySp1d3r’ and Aggressive Insider Recruitment
The notorious Scattered Lapsus$ Hunters threat group has returned to active operations after a period of silence following their high-profile supply chain attack targeting Salesforce third-party integrations, including Gainsight and Salesloft. Recent activity observed across underground Telegram channels and credential-trading…
Stealthy Tuoni C2 Malware Targets Major U.S. Real Estate Firm with AI-Enhanced Tactics
Cybercriminals have shifted their approach to infiltration. Rather than launching quick attacks, they now work silently within networks, stealing important information, and waiting weeks or months before striking. This is exactly what happened in a recent attack discovered by Morphisec…