Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool

Jan 13, 2026Ravie LakshmananWeb Security / Online Fraud Cybersecurity researchers have disclosed details of a malicious…

From MCPs and Tool Access to Shadow API Key Sprawl

Jan 13, 2026The Hacker NewsArtificial Intelligence / Automation Security AI agents are no longer just writing…

New Advanced Linux VoidLink Malware Targets Cloud and container Environments

Jan 13, 2026Ravie LakshmananThreat Intelligence / Cyber Espionage Cybersecurity researchers have disclosed details of a previously…

New Malware Campaign Delivers Remcos RAT Through Multi-Stage Windows Attack

Jan 13, 2026Ravie LakshmananMalware / Endpoint Security Cybersecurity researchers have disclosed details of a new campaign…

CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution

Jan 13, 2026Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has…

n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens

Jan 12, 2026Ravie LakshmananVulnerability / Workflow Automation Threat actors have been observed uploading a set of…

AI Automation Exploits, Telecom Espionage, Prompt Poaching & More

Jan 12, 2026Ravie LakshmananHacking News / Cybersecurity This week made one thing clear: small oversights can…

GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials

A new wave of GoBruteforcer attacks has targeted databases of cryptocurrency and blockchain projects to co-opt…

Anthropic Launches Claude AI for Healthcare with Secure Health Record Access

Jan 12, 2026Ravie LakshmananArtificial Intelligence / Healthcare Anthropic has become the latest Artificial intelligence (AI) company…

Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraud

Cybersecurity researchers have shed light on two service providers that supply online criminal networks with the…