Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages
Jan 13, 2026Ravie Lakshmanan Web Security / Data Theft Cybersecurity researchers have…
From MCPs and Tool Access to Shadow API Key Sprawl
Jan 13, 2026The Hacker NewsArtificial Intelligence / Automation Security AI agents are…
n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens
Jan 12, 2026Ravie LakshmananVulnerability / Workflow Automation Threat actors have been observed…
GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials
A new wave of GoBruteforcer attacks has targeted databases of cryptocurrency and…
FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing
Jan 09, 2026Ravie LakshmananMobile Security / Email Security The U.S. Federal Bureau…
CISA Retires 10 Emergency Cybersecurity Directives Issued Between 2019 and 2024
Jan 09, 2026Ravie LakshmananGovernment / Vulnerability Management The U.S. Cybersecurity and Infrastructure…
Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions
Jan 09, 2026Ravie LakshmananVulnerability / Endpoint Security Trend Micro has released security…
Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
Jan 10, 2026Ravie LakshmananCybercrime / Financial Crime Europol on Friday announced the…
MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
Jan 10, 2026Ravie LakshmananCyber Espionage / Malware The Iranian threat actor known…


