Category: news

  • Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

    Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

    The Hacker NewsCybersecurity researchers have disclosed two new security flaws in the n8n workflow automation platform, including a crucial vulnerability that could result in remote code execution.
    The weaknesses, discovered by the JFrog Security Research team, are listed below –

    CVE-2026-1470 (CVSS score: 9.9) – An eval injection vulnerability that could allow an authenticated user to bypass the Expression​Read More

  • Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected

    Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected

    The Hacker NewsFortinet has begun releasing security updates to address a critical flaw impacting FortiOS that has come under active exploitation in the wild.
    The vulnerability, assigned the CVE identifier CVE-2026-24858 (CVSS score: 9.4), has been described as an authentication bypass related to FortiOS single sign-on (SSO). The flaw also affects FortiManager and FortiAnalyzer. The company said it’s​Read More

  • The First 90 Seconds: How Early Decisions Shape Incident Response Investigations

    The First 90 Seconds: How Early Decisions Shape Incident Response Investigations

    The Hacker NewsMany incident response failures do not come from a lack of tools, intelligence, or technical skills. They come from what happens immediately after detection, when pressure is high, and information is incomplete.
    I have seen IR teams recover from sophisticated intrusions with limited telemetry. I have also seen teams lose control of investigations they should have been able to handle. The​Read More

  • Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers

    Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers

    The Hacker NewsMicrosoft has warned that information-stealing attacks are “rapidly expanding” beyond Windows to target Apple macOS environments by leveraging cross-platform languages like Python and abusing trusted platforms for distribution at scale.
    The tech giant’s Defender Security Research Team said it observed macOS-targeted infostealer campaigns using social engineering techniques such as ClickFix since​Read More

  • Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

    Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

    The Hacker NewsThe Eclipse Foundation, which maintains the Open VSX Registry, has announced plans to enforce security checks before Microsoft Visual Studio Code (VS Code) extensions are published to the open-source repository to combat supply chain threats.
    The move marks a shift from a reactive to a proactive approach to ensure that malicious extensions don’t end up getting published on the Open VSX Registry.​Read More

  • ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

    ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

    The Hacker NewsThis week didn’t produce one big headline. It produced many small signals — the kind that quietly shape what attacks will look like next.
    Researchers tracked intrusions that start in ordinary places: developer workflows, remote tools, cloud access, identity paths, and even routine user actions. Nothing looked dramatic on the surface. That’s the point. Entry is becoming less​Read More

  • The Buyer’s Guide to AI Usage Control

    The Buyer’s Guide to AI Usage Control

    The Hacker NewsToday’s “AI everywhere” reality is woven into everyday workflows across the enterprise, embedded in SaaS platforms, browsers, copilots, extensions, and a rapidly expanding universe of shadow tools that appear faster than security teams can track. Yet most organizations still rely on legacy controls that operate far away from where AI interactions actually occur. The result is a widening​Read More

  • Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

    Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

    The Hacker NewsThe elusive Iranian threat group known as Infy (aka Prince of Persia) has evolved its tactics as part of efforts to hide its tracks, even as it readied new command-and-control (C2) infrastructure coinciding with the end of the widespread internet blackout the regime imposed at the start of January 2026.
    “The threat actor stopped maintaining its C2 servers on January 8 for the first time since we​Read More

  • Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

    Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

    The Hacker NewsA new, critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could result in the execution of arbitrary system commands.
    The flaw, tracked as CVE-2026-25049 (CVSS score: 9.4), is the result of inadequate sanitization that bypasses safeguards put in place to address CVE-2025-68613 (CVSS score: 9.9), another critical defect that​Read More

  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

    OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

    The Hacker NewsA high-severity security flaw has been disclosed in OpenClaw (formerly referred to as Clawdbot and Moltbot) that could allow remote code execution (RCE) through a crafted malicious link.
    The issue, which is tracked as CVE-2026-25253 (CVSS score: 8.8), has been addressed in version 2026.1.29 released on January 30, 2026. It has been described as a token exfiltration vulnerability that leads to​Read More