Jan 13, 2026Ravie LakshmananWeb Security / Online Fraud Cybersecurity researchers have disclosed details of a malicious…
Technology
From MCPs and Tool Access to Shadow API Key Sprawl
Jan 13, 2026The Hacker NewsArtificial Intelligence / Automation Security AI agents are no longer just writing…
New Advanced Linux VoidLink Malware Targets Cloud and container Environments
Jan 13, 2026Ravie LakshmananThreat Intelligence / Cyber Espionage Cybersecurity researchers have disclosed details of a previously…
New Malware Campaign Delivers Remcos RAT Through Multi-Stage Windows Attack
Jan 13, 2026Ravie LakshmananMalware / Endpoint Security Cybersecurity researchers have disclosed details of a new campaign…
CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution
Jan 13, 2026Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has…
n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens
Jan 12, 2026Ravie LakshmananVulnerability / Workflow Automation Threat actors have been observed uploading a set of…
AI Automation Exploits, Telecom Espionage, Prompt Poaching & More
Jan 12, 2026Ravie LakshmananHacking News / Cybersecurity This week made one thing clear: small oversights can…
GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials
A new wave of GoBruteforcer attacks has targeted databases of cryptocurrency and blockchain projects to co-opt…
Anthropic Launches Claude AI for Healthcare with Secure Health Record Access
Jan 12, 2026Ravie LakshmananArtificial Intelligence / Healthcare Anthropic has become the latest Artificial intelligence (AI) company…
Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraud
Cybersecurity researchers have shed light on two service providers that supply online criminal networks with the…