eScan Supply Chain Attack: What We Know About the Compromised Update Server

Monkeys sit on a wall overlooking a city with modern buildings and mountains.

On 20 January 2026, antivirus vendor MicroWorld Technologies, the developer of eScan, reported a classic software supply chain attack. Threat actors compromised one of the product’s regional update servers and used it to distribute a malicious update to a subset of customers whose systems happened to pull updates from that specific cluster during the attack … Read more

Record 31.4 Tbps DDoS Attack: Aisuru (Kimwolf) Botnet Hits Telecoms and Cloudflare

Team in a futuristic command center neutralizing cyber threats with advanced technology.

A massive distributed denial‑of‑service (DDoS) campaign in December 2025, attributed to the Aisuru (also known as Kimwolf) botnet, has set a new benchmark for attack scale and sophistication. The botnet reportedly generated peak traffic of 31.4 Tbps and up to 200 million HTTP requests per second (RPS), targeting major telecommunications providers as well as Cloudflare’s … Read more

Google Takes Down IPIDEA: Residential Proxy Network Turned Global Cybercrime Infrastructure

Close-up of electronic devices with a magnifying glass revealing "spyware."

Google’s Threat Intelligence Group (GTIG), working with multiple industry partners, has disrupted IPIDEA, one of the world’s largest residential proxy services. The operation disabled key command-and-control domains, disrupted traffic routing through infected devices, and exposed the malicious SDKs used to silently conscript user devices into a vast proxy botnet. Residential proxy networks: from legitimate tool … Read more

ShinyHunters Target Okta, Microsoft Entra and Google SSO in Advanced Phishing Campaign

Cybersecurity scene featuring a hacker and an analyst with tech screens and logos.

Compromising a single corporate single sign-on (SSO) account today can unlock access to dozens of critical SaaS platforms and internal systems at once. That is exactly the strategy attributed to the cybercriminal group ShinyHunters, which is running a large‑scale phishing campaign against SSO implementations from Okta, Microsoft Entra ID and Google. ShinyHunters’ SSO Phishing Campaign … Read more

CISA ChatGPT Incident Highlights Risks of Generative AI in U.S. Government

Person using a laptop to upload sensitive files with official documents nearby.

Acting Director of the U.S. Cybersecurity and Infrastructure Security Agency (CISA) Madhu Gottumukkala is reportedly under investigation after uploading internal agency documents to the public ChatGPT service. The case, disclosed by Politico citing sources in the Department of Homeland Security (DHS), underscores how generative AI tools can become a new vector for data exposure even … Read more

Moltbot Security Risks: Why High-Privilege AI Agents Attract Attackers

Man in distress at a computer surrounded by hackers in a dimly lit room.

Moltbot (formerly Clawdbot) has rapidly become one of the most visible open-source AI projects of 2026, gaining more than 93,000 GitHub stars in just a few weeks. Created by Austrian engineer Peter Steinberger, the self-hosted AI assistant integrates with WhatsApp, Telegram, Slack, Discord, email and local resources, branding itself as a “personal AI running on … Read more

FBI Seizes RAMP Ransomware Forum, Disrupting a Major Cybercrime Marketplace

Central scene features law enforcement engaging in action amidst chaos and fire.

At the end of January 2026, law enforcement agencies carried out one of the most significant recent strikes against ransomware infrastructure: the RAMP ransomware forum was seized and taken offline. Both the clear‑web site at ramp4u[.]io and its Tor hidden service now display a seizure notice referencing several units of the U.S. Department of Justice … Read more

Nike Data Breach: World Leaks Claims Massive Theft of Internal Files

Two people in Nike attire focused on a laptop in a busy office setting.

Nike is conducting an internal investigation following claims by the cybercriminal group World Leaks that it has compromised the company’s IT infrastructure and exfiltrated a large volume of sensitive data. According to the attackers, they allegedly accessed Nike’s systems on 22 January and stole 188,347 files totaling around 1.4 TB of data. Nike investigates alleged … Read more

Microsoft Office CVE-2026-21509: What You Need to Know About the New Critical Vulnerability

Hooded figures hacking buildings with a cityscape and mountains in the background.

Microsoft has issued an out-of-band security update to address CVE-2026-21509, a critical Microsoft Office vulnerability that is already being exploited in real-world attacks. The flaw affects almost the entire modern Office line, including Office 2016, Office 2019, Office 2021 and Microsoft 365 Apps for Enterprise, making it relevant for both home users and large enterprises. … Read more

CVE-2026-24061: Critical GNU InetUtils Telnetd Vulnerability Under Active Attack

Hooded figure manipulating a glowing lock with a skull in a dystopian scene.

The critical vulnerability CVE-2026-24061 in the GNU InetUtils telnetd server component is already being exploited in real-world attacks. Rated 9.8 on the CVSS scale, the flaw enables remote, unauthenticated compromise and is particularly dangerous because Telnet remains widely exposed on legacy Linux and IoT systems. Shadowserver telemetry shows almost 800,000 IP addresses with open Telnet … Read more