China-Linked Mustang Panda Deploys Updated COOLCLIENT Backdoor Against Governments
APT group targets government entities across Southeast Asia with enhanced malware featuring clipboard monitoring, browser credential theft, and kernel-mode rootkit capabilities.
Critical Kubernetes Vulnerability Allows Container Escape and Full Cluster Takeover
CVE-2026-1483 rated CVSS 9.8 enables attackers with pod creation privileges to escape containers and seize control of entire clusters. CISA added to KEV catalog; exploitation observed within 48 hours of disclosure.
WhatsApp Zero-Click Exploit Spreads Malware Through Group Chats
A WhatsApp vulnerability allows attackers to compromise devices by sending malicious PDF files to group chats without user interaction. Paragon Solutions' spyware exploited the flaw against 90+ targets including journalists and civil society members.
CISA Adds Five Vulnerabilities to KEV Catalog Including Microsoft Office Zero-Day
New additions include CVE-2026-21509 actively exploited by APT28, a Linux kernel flaw from 2018, and SmarterMail vulnerabilities. Federal agencies face February 16 remediation deadline.
Data Privacy Week 2026 Launches with 'Take Control of Your Data' Theme
The National Cybersecurity Alliance kicks off Data Privacy Week from January 26-30, focusing on empowering individuals and organizations to manage personal information amid growing AI and privacy law concerns.
Microsoft Patches Actively Exploited Office Zero-Day Used by APT28
CVE-2026-21509 bypasses OLE security mitigations in Microsoft Office. Russia-linked APT28 is exploiting it against targets in Ukraine and the EU. Emergency patches available.
Crunchbase Confirms Breach After ShinyHunters Publishes 2M+ Records
ShinyHunters breached Crunchbase via Okta voice phishing, exfiltrating over 2 million records. The attack was part of a broader campaign targeting approximately 100 organizations using real-time SSO phishing kits.
WorldLeaks Publishes 1.4TB of Nike Internal Data
The WorldLeaks extortion group published 1.4TB of Nike intellectual property including product designs, tech packs, and manufacturing documents spanning 2020-2026 after the company didn't pay.
8.73 Billion Chinese Records Exposed in Largest Known Single-Source Data Leak
Cybernews researchers discovered a massive Elasticsearch cluster containing national IDs, passwords, and personal data of hundreds of millions of Chinese citizens, hosted on bulletproof infrastructure and accessible for three weeks.
NIST Releases Post-Quantum Cryptography Migration Guidance for Federal Agencies and Enterprises
New NIST and CISA guidance establishes timelines for transitioning to quantum-resistant algorithms, with federal agencies required to inventory cryptographic assets by 2027 and complete migration by 2035.
Signal Protocol Adoption Expands as Enterprise Platforms Embrace End-to-End Encryption
The MLS standard (RFC 9420) drives enterprise E2EE adoption as Cisco, Google, and Apple integrate the protocol. EU DMA mandates force interoperability while organizations balance encryption with compliance requirements.
LockBit 5.0 Analysis: Upgraded Encryption, Stealbit Integration, and Enhanced Evasion
Security researchers detail LockBit 5.0's capabilities including ChaCha20-Poly1305 encryption, X25519 key exchange, modular two-stage deployment, and advanced anti-analysis techniques.