News da fonti internazionali (DARK Reading, The Hacker News, Threatpost)
- Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Toolby info@thehackernews.com (The Hacker News) (The Hacker News) on 13 Gennaio 2026 at 5:22 pm
Cybersecurity researchers have disclosed details of a malicious Google Chrome extension that’s capable of stealing API keys associated with MEXC, a centralized cryptocurrency exchange (CEX) available in over 170 countries, while masquerading as a tool to automate trading on the platform. The extension, named MEXC API Automator (ID: pppdfgkfdemgfknfnhpkibbkabhghhfh), has 29 downloads and is still
- [Webinar] Securing Agentic AI: From MCPs and Tool Access to Shadow API Key Sprawlby info@thehackernews.com (The Hacker News) (The Hacker News) on 13 Gennaio 2026 at 1:44 pm
AI agents are no longer just writing code. They are executing it. Tools like Copilot, Claude Code, and Codex can now build, test, and deploy software end-to-end in minutes. That speed is reshaping engineering—but it’s also creating a security gap most teams don’t see until something breaks. Behind every agentic workflow sits a layer few organizations are actively securing: Machine Control
- New Advanced Linux VoidLink Malware Targets Cloud and container Environmentsby info@thehackernews.com (The Hacker News) (The Hacker News) on 13 Gennaio 2026 at 11:57 am
Cybersecurity researchers have disclosed details of a previously undocumented and feature-rich malware framework codenamed VoidLink that’s specifically designed for long-term, stealthy access to Linux-based cloud environments According to a new report from Check Point Research, the cloud-native Linux malware framework comprises an array of custom loaders, implants, rootkits, and modular
- What Should We Learn From How Attackers Leveraged AI in 2025?by info@thehackernews.com (The Hacker News) (The Hacker News) on 13 Gennaio 2026 at 11:55 am
Old Playbook, New Scale: While defenders are chasing trends, attackers are optimizing the basics The security industry loves talking about “new” threats. AI-powered attacks. Quantum-resistant encryption. Zero-trust architectures. But looking around, it seems like the most effective attacks in 2025 are pretty much the same as they were in 2015. Attackers are exploiting the same entry points that
- ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonationby info@thehackernews.com (The Hacker News) (The Hacker News) on 13 Gennaio 2026 at 11:47 am
ServiceNow has disclosed details of a now-patched critical security flaw impacting its ServiceNow artificial intelligence (AI) Platform that could enable an unauthenticated user to impersonate another user and perform arbitrary actions as that user. The vulnerability, tracked as CVE-2025-12420, carries a CVSS score of 9.3 out of 10.0. It has been codenamed BodySnatcher by AppOmni. “This issue [.
- New Malware Campaign Delivers Remcos RAT Through Multi-Stage Windows Attackby info@thehackernews.com (The Hacker News) (The Hacker News) on 13 Gennaio 2026 at 9:08 am
Cybersecurity researchers have disclosed details of a new campaign dubbed SHADOW#REACTOR that employs an evasive multi-stage attack chain to deliver a commercially available remote administration tool called Remcos RAT and establish persistent, covert remote access. “The infection chain follows a tightly orchestrated execution path: an obfuscated VBS launcher executed via wscript.exe invokes a
- CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Executionby info@thehackernews.com (The Hacker News) (The Hacker News) on 13 Gennaio 2026 at 7:15 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned of active exploitation of a high-severity security flaw impacting Gogs by adding it to its Known Exploited Vulnerabilities (KEV) catalog. The vulnerability, tracked as CVE-2025-8110 (CVSS score: 8.7), relates to a case of path traversal in the repository file editor that could result in code execution. “Gogs Path
- n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokensby info@thehackernews.com (The Hacker News) (The Hacker News) on 12 Gennaio 2026 at 4:39 pm
Threat actors have been observed uploading a set of eight packages on the npm registry that masqueraded as integrations targeting the n8n workflow automation platform to steal developers’ OAuth credentials. One such package, named “n8n-nodes-hfgjf-irtuinvcm-lasdqewriit,” mimics a Google Ads integration, and prompts users to link their advertising account in a seemingly legitimate form and then
- ⚡ Weekly Recap: AI Automation Exploits, Telecom Espionage, Prompt Poaching & Moreby info@thehackernews.com (The Hacker News) (The Hacker News) on 12 Gennaio 2026 at 1:41 pm
This week made one thing clear: small oversights can spiral fast. Tools meant to save time and reduce friction turned into easy entry points once basic safeguards were ignored. Attackers didn’t need novel tricks. They used what was already exposed and moved in without resistance. Scale amplified the damage. A single weak configuration rippled out to millions. A repeatable flaw worked again and
- GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentialsby info@thehackernews.com (The Hacker News) (The Hacker News) on 12 Gennaio 2026 at 10:48 am
A new wave of GoBruteforcer attacks has targeted databases of cryptocurrency and blockchain projects to co-opt them into a botnet that’s capable of brute-forcing user passwords for services such as FTP, MySQL, PostgreSQL, and phpMyAdmin on Linux servers. “The current wave of campaigns is driven by two factors: the mass reuse of AI-generated server deployment examples that propagate common
- Anthropic Launches Claude AI for Healthcare with Secure Health Record Accessby info@thehackernews.com (The Hacker News) (The Hacker News) on 12 Gennaio 2026 at 8:37 am
Anthropic has become the latest Artificial intelligence (AI) company to announce a new suite of features that allows users of its Claude platform to better understand their health information. Under an initiative called Claude for Healthcare, the company said U.S. subscribers of Claude Pro and Max plans can opt to give Claude secure access to their lab results and health records by connecting to
- Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraudby info@thehackernews.com (The Hacker News) (The Hacker News) on 12 Gennaio 2026 at 7:34 am
Cybersecurity researchers have shed light on two service providers that supply online criminal networks with the necessary tools and infrastructure to fuel the pig butchering-as-a-service (PBaaS) economy. At least since 2016, Chinese-speaking criminal groups have erected industrial-scale scam centers across Southeast Asia, creating special economic zones that are devoted to fraudulent investment
- MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectorsby info@thehackernews.com (The Hacker News) (The Hacker News) on 10 Gennaio 2026 at 10:35 am
The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting diplomatic, maritime, financial, and telecom entities in the Middle East with a Rust-based implant codenamed RustyWater. “The campaign uses icon spoofing and malicious Word documents to deliver Rust based implants capable of asynchronous C2, anti-analysis, registry persistence, and modular
- Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crimeby info@thehackernews.com (The Hacker News) (The Hacker News) on 10 Gennaio 2026 at 8:59 am
Europol on Friday announced the arrest of 34 individuals in Spain who are alleged to be part of an international criminal organization called Black Axe. As part of an operation conducted by the Spanish National Police, in coordination with the Bavarian State Criminal Police Office and Europol, 28 arrests were made in Seville, along with three others in Madrid, two in Málaga, and one in Barcelona
- China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machinesby info@thehackernews.com (The Hacker News) (The Hacker News) on 9 Gennaio 2026 at 5:43 pm
Chinese-speaking threat actors are suspected to have leveraged a compromised SonicWall VPN appliance as an initial access vector to deploy a VMware ESXi exploit that may have been developed as far back as February 2024. Cybersecurity firm Huntress, which observed the activity in December 2025 and stopped it before it could progress to the final stage, said it may have resulted in a ransomware
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizationsby info@thehackernews.com (The Hacker News) (The Hacker News) on 9 Gennaio 2026 at 3:28 pm
Russian state-sponsored threat actors have been linked to a fresh set of credential harvesting attacks targeting individuals associated with a Turkish energy and nuclear research agency, as well as staff affiliated with a European think tank and organizations in North Macedonia and Uzbekistan. The activity has been attributed to APT28 (aka BlueDelta), which was tied to a “sustained”
- Cybersecurity Predictions 2026: The Hype We Can Ignore (And the Risks We Can’t)by info@thehackernews.com (The Hacker News) (The Hacker News) on 9 Gennaio 2026 at 11:09 am
As organizations plan for 2026, cybersecurity predictions are everywhere. Yet many strategies are still shaped by headlines and speculation rather than evidence. The real challenge isn’t a lack of forecasts—it’s identifying which predictions reflect real, emerging risks and which can safely be ignored. An upcoming webinar hosted by Bitdefender aims to cut through the noise with a data-driven
- Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versionsby info@thehackernews.com (The Hacker News) (The Hacker News) on 9 Gennaio 2026 at 10:01 am
Trend Micro has released security updates to address multiple security vulnerabilities impacting on-premise versions of Apex Central for Windows, including a critical bug that could result in arbitrary code execution. The vulnerability, tracked as CVE-2025-69258, carries a CVSS score of 9.8 out of a maximum of 10.0. The vulnerability has been described as a case of remote code execution
- CISA Retires 10 Emergency Cybersecurity Directives Issued Between 2019 and 2024by info@thehackernews.com (The Hacker News) (The Hacker News) on 9 Gennaio 2026 at 9:11 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday said it’s retiring 10 emergency directives (Eds) that were issued between 2019 and 2024. The list of the directives now considered closed is as follows – ED 19-01: Mitigate DNS Infrastructure Tampering ED 20-02: Mitigate Windows Vulnerabilities from January 2020 Patch Tuesday ED 20-03: Mitigate Windows DNS Server
- FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishingby info@thehackernews.com (The Hacker News) (The Hacker News) on 9 Gennaio 2026 at 5:46 am
The U.S. Federal Bureau of Investigation (FBI) on Thursday released an advisory warning of North Korean state-sponsored threat actors leveraging malicious QR codes in spear-phishing campaigns targeting entities in the country. “As of 2025, Kimsuky actors have targeted think tanks, academic institutions, and both U.S. and foreign government entities with embedded malicious Quick Response (QR)
- WhatsApp Worm Spreads Astaroth Banking Trojan Across Brazil via Contact Auto-Messagingby info@thehackernews.com (The Hacker News) (The Hacker News) on 8 Gennaio 2026 at 5:10 pm
Cybersecurity researchers have disclosed details of a new campaign that uses WhatsApp as a distribution vector for a Windows banking trojan called Astaroth in attacks targeting Brazil. The campaign has been codenamed Boto Cor-de-Rosa by Acronis Threat Research Unit. “The malware retrieves the victim’s WhatsApp contact list and automatically sends malicious messages to each contact to further
- China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodesby info@thehackernews.com (The Hacker News) (The Hacker News) on 8 Gennaio 2026 at 2:54 pm
A China-nexus threat actor known as UAT-7290 has been attributed to espionage-focused intrusions against entities in South Asia and Southeastern Europe. The activity cluster, which has been active since at least 2022, primarily focuses on extensive technical reconnaissance of target organizations before initiating attacks, ultimately leading to the deployment of malware families such as RushDrop
- ThreatsDay Bulletin: RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Storiesby info@thehackernews.com (The Hacker News) (The Hacker News) on 8 Gennaio 2026 at 12:49 pm
The internet never stays quiet. Every week, new hacks, scams, and security problems show up somewhere. This week’s stories show how fast attackers change their tricks, how small mistakes turn into big risks, and how the same old tools keep finding new ways to break in. Read on to catch up before the next wave hits. Honeypot Traps Hackers Hackers Fall for
- The State of Trusted Open Sourceby info@thehackernews.com (The Hacker News) (The Hacker News) on 8 Gennaio 2026 at 11:50 am
Chainguard, the trusted source for open source, has a unique view into how modern organizations actually consume open source software and where they run into risk and operational burdens. Across a growing customer base and an extensive catalog of over 1800 container image projects, 148,000 versions, 290,000 images, and 100,000 language libraries, and almost half a billion builds, they can see
- Cisco Patches ISE Security Vulnerability After Public PoC Exploit Releaseby info@thehackernews.com (The Hacker News) (The Hacker News) on 8 Gennaio 2026 at 10:44 am
Cisco has released updates to address a medium-severity security flaw in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) with a public proof-of-concept (PoC) exploit. The vulnerability, tracked as CVE-2026-20029 (CVSS score: 4.9), resides in the licensing feature and could allow an authenticated, remote attacker with administrative privileges to gain access to
- Researchers Uncover NodeCordRAT Hidden in npm Bitcoin-Themed Packagesby info@thehackernews.com (The Hacker News) (The Hacker News) on 8 Gennaio 2026 at 10:31 am
Cybersecurity researchers have discovered three malicious npm packages that are designed to deliver a previously undocumented malware called NodeCordRAT. The names of the packages, all of which were taken down as of November 2025, are listed below. They were uploaded by a user named “wenmoonx.” bitcoin-main-lib (2,300 Downloads) bitcoin-lib-js (193 Downloads) bip40 (970 Downloads) “The
- Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instancesby info@thehackernews.com (The Hacker News) (The Hacker News) on 8 Gennaio 2026 at 9:53 am
Cybersecurity researchers have disclosed details of multiple critical-severity security flaws affecting Coolify, an open-source, self-hosting platform, that could result in authentication bypass and remote code execution. The list of vulnerabilities is as follows – CVE-2025-66209 (CVSS score: 10.0) – A command injection vulnerability in the database backup functionality allows any authenticated
- OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controlsby info@thehackernews.com (The Hacker News) (The Hacker News) on 8 Gennaio 2026 at 6:57 am
Artificial intelligence (AI) company OpenAI on Wednesday announced the launch of ChatGPT Health, a dedicated space that allows users to have conversations with the chatbot about their health. To that end, the sandboxed experience offers users the optional ability to securely connect medical records and wellness apps, including Apple Health, Function, MyFitnessPal, Weight Watchers, AllTrails,
- CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploitedby info@thehackernews.com (The Hacker News) (The Hacker News) on 8 Gennaio 2026 at 4:52 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting Microsoft Office and Hewlett Packard Enterprise (HPE) OneView to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities are listed below – CVE-2009-0556 (CVSS score: 8.8) – A code injection vulnerability in Microsoft Office
- Webinar: Learn How AI-Powered Zero Trust Detects Attacks with No Files or Indicatorsby info@thehackernews.com (The Hacker News) (The Hacker News) on 7 Gennaio 2026 at 5:19 pm
Security teams are still catching malware. The problem is what they’re not catching. More attacks today don’t arrive as files. They don’t drop binaries. They don’t trigger classic alerts. Instead, they run quietly through tools that already exist inside the environment — scripts, remote access, browsers, and developer workflows. That shift is creating a blind spot. Join us for a deep-dive

![[Webinar] Securing Agentic AI: From MCPs and Tool Access to Shadow API Key Sprawl](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2N9qZuwkcslheNUOsWaTDrMYeXiBUfw1y-hItTvuGo71srarOm7AWzq3o7ro9E0x_CnC7XmJGXKl1tfkc6gTMK288y6M_zN6Yg1FATduXSQmMlp_jnHESxVYZDuJnNozO_Ff-r-lWIyG5AikC8AwrOckeYVYcCQv2RjeLof2bxV_TrcbvRvZqrTIcjD0/s1600/ai-agent.jpg)



























