Your Digital Footprint Can Lead Right to Your Front Door
The Hacker NewsJan 16, 2026Privacy / Data Protection You lock your doors…
Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
Ravie LakshmananJan 17, 2026Law Enforcement / Cybercrime Ukrainian and German law enforcement…
GootLoader Malware Uses 500–1,000 Concatenated ZIP Archives to Evade Detection
Jan 16, 2026Ravie LakshmananMalvertising / Threat Intelligence The JavaScript (aka JScript) malware…
Five Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts
Cybersecurity researchers have discovered five new malicious Google Chrome web browser extensions…
AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks
A critical misconfiguration in Amazon Web Services (AWS) CodeBuild could have allowed…
Model Security Is the Wrong Frame – The Real Risk Is Workflow Security
Jan 15, 2026The Hacker NewsData Security / Artificial Intelligence As AI copilots…
AI Agents Are Becoming Privilege Escalation Paths
AI agents have quickly moved from experimental tools to core components of…
Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
The Black Lotus Labs team at Lumen Technologies said it null-routed traffic…
Critical Node.js Vulnerability Can Cause Server Crashes via async_hooks Stack Overflow
Jan 14, 2026Ravie LakshmananApplication Security / Vulnerability Node.js has released updates to…


