#NetworkSecurity

2026-01-26

It's been a busy 24 hours in the cyber world with updates on nation-state activity, actively exploited vulnerabilities, new AI-powered malware, and a reminder about data privacy and regulatory efforts. Let's dive in:

Nike Data Theft & Poland Power Grid Attack 🚨

- Extortion group WorldLeaks, believed to be a rebrand of Hunters International, claims to have stolen 1.4TB of internal Nike data, including design and manufacturing workflows. Nike is investigating the potential breach.
- Russia's GRU-linked Sandworm unit is suspected to be behind a December wiper malware attack (DynoWiper) on Poland's power grid, which aimed to disrupt communications between renewable energy installations. The attack was thwarted but described as the strongest in years.
- These incidents highlight the ongoing threat of data exfiltration for extortion and nation-state targeting of critical infrastructure, even if the attacks are unsuccessful.

🕵🏼 The Register | go.theregister.com/feed/www.th
🕵🏼 The Register | go.theregister.com/feed/www.th
🗞️ The Record | therecord.media/russia-eset-sa

Even Cybercriminals Have Security Lapses 🤦

- Cybersecurity researcher Jeremiah Fowler discovered over 149 million unique login/password combinations from infostealer and keylogging malware exposed online.
- The 96GB dataset contained credentials for social media, dating apps, streaming services, financial services, banking, credit cards, and even government accounts.
- This serves as a stark reminder that even threat actors can fail at basic security, but more importantly, it's a critical prompt for everyone to regularly reset passwords, especially if you've been a victim of infostealer malware.

🕵🏼 The Register | go.theregister.com/feed/www.th

AI-Generated Malware and Malicious Extensions 🤖

- North Korean Konni hackers are using AI-generated PowerShell malware to target blockchain developers and engineering teams in Japan, Australia, and India, expanding their traditional scope.
- Two malicious Microsoft VS Code extensions, "ChatGPT - 中文版" (1.3M installs) and "ChatGPT - ChatMoss(CodeMoss)" (150K installs), were found exfiltrating every opened file and code modification to China-based servers.
- Separately, LayerX Research identified 16 malicious Chrome browser extensions for ChatGPT designed to steal account credentials and session tokens by monitoring outbound requests from chatgpt.com.

📰 The Hacker News | thehackernews.com/2026/01/konn
📰 The Hacker News | thehackernews.com/2026/01/mali
🤫 CyberScoop | cyberscoop.com/chatgpt-browser

Critical Vulnerabilities Under Active Exploitation ⚠️

- CISA has flagged a critical VMware vCenter Server RCE flaw (CVE-2024-37079) as actively exploited, stemming from a heap overflow in the DCERPC protocol. Federal agencies have three weeks to patch.
- Microsoft released emergency out-of-band updates for an actively exploited high-severity Office zero-day (CVE-2026-21509), a security feature bypass affecting multiple Office versions. Mitigations are available for unpatched versions.
- Nearly 800,000 Telnet servers are exposed globally, with active exploitation of a critical authentication bypass (CVE-2026-24061) in GNU InetUtils telnetd server, allowing root access without authentication. Patch immediately or disable Telnet.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🤖 Bleeping Computer | bleepingcomputer.com/news/micr
🤖 Bleeping Computer | bleepingcomputer.com/news/secu

Pwn2Own Automotive & npm Supply Chain Flaws 🛡️

- The Pwn2Own Automotive 2026 competition uncovered 76 unique zero-day vulnerabilities across Tesla infotainment, EV chargers, and Automotive Grade Linux, with over $1M paid out.
- Researchers found "PackageGate" vulnerabilities in JavaScript package managers (pnpm, vlt, Bun, npm) that bypass Shai-Hulud supply-chain defenses via Git dependencies, allowing script execution even with '--ignore-scripts'. NPM has not patched this, stating users are responsible for vetting packages.
- Google has patched a vulnerability in Gemini AI that could expose a user's calendar secrets through prompt injection in malicious calendar invitations, highlighting the need for new security considerations for LLMs.

🕵🏼 The Register | go.theregister.com/feed/www.th
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
📰 The Hacker News | thehackernews.com/2026/01/mali

Winning Against AI-Based Attacks Requires a Combined Defensive Approach 💡

- The rise of offensive AI is transforming attack strategies, making them more sophisticated and harder to detect, with LLMs used to conceal code and generate malicious scripts.
- Legacy defences like EDR alone are proving insufficient against AI-fueled attacks, which can operate at higher speeds and scale, and often combine threats across identity, endpoint, cloud, and on-premises infrastructure.
- A combined defensive approach, integrating Network Detection and Response (NDR) with EDR, is crucial for detecting novel attack types, identifying behavioural anomalies, and gaining deeper insights from network data to respond quickly.

📰 The Hacker News | thehackernews.com/2026/01/winn

Privacy Breaches and State-Sponsored Spyware 🔒

- French privacy regulators fined an unnamed company €3.5M for sharing customer loyalty data (email addresses, phone numbers) with a social network for targeted advertising without explicit consent, affecting over 10.5 million Europeans.
- A London judge awarded a British critic of the Saudi regime over £3M ($4.1M) in damages, finding "compelling basis" that his iPhones were hacked by Pegasus spyware directed or authorised by Saudi Arabia.
- These incidents underscore the critical importance of informed consent for data sharing and the severe consequences of state-sponsored surveillance and privacy violations.

🕵🏼 The Register | go.theregister.com/feed/www.th
🗞️ The Record | therecord.media/london-judge-s

Voluntary Rules for Commercial Hacking Tools ⚖️

- An international effort, the Pall Mall Process, is developing voluntary standards for the commercial cyber intrusion industry, focusing on responsible government use and procurement from ethical vendors.
- Key discussions include the scope of these rules (e.g., reconnaissance tools), incentives for vendor participation, and how to handle companies with a history of irresponsible behaviour.
- Bug bounty platform HackerOne has also published a new safe harbour document for AI security testing, aiming to provide clear, standardised authorisation for researchers and encourage good-faith AI vulnerability discovery.

🤫 CyberScoop | cyberscoop.com/industry-govern
🕵🏼 The Register | go.theregister.com/feed/www.th

Cloudflare BGP Route Leak 🌐

- Cloudflare experienced a 25-minute Border Gateway Protocol (BGP) route leak affecting IPv6 traffic, causing congestion, packet loss, and dropped traffic due to an accidental policy misconfiguration on a router.
- The incident, a mixture of Type 3 and Type 4 route leaks, occurred when an overly permissive export policy allowed internal IPv6 routes to be advertised externally from Miami.
- Cloudflare detected and reverted the configuration within 25 minutes and is implementing stricter community-based export safeguards, CI/CD checks, and promoting RPKI ASPA adoption to prevent future occurrences.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu

#CyberSecurity #ThreatIntelligence #APT #Ransomware #Malware #ZeroDay #Vulnerability #RCE #SupplyChainAttack #AI #DataPrivacy #IncidentResponse #NetworkSecurity #EndpointSecurity #BGP #InfoSec

Boost your skills with today’s cybersecurity playlist: exploits, defenses, and real-world lessons. 🔒 youtube.com/playlist?list=PLXq

#CyberAwareness #NetworkSecurity #ZeroTrust #ThreatIntelligence #Malware

2026-01-26

Did you know a cyberattack occurs every 39 seconds? 🚨 With attacks surging by 75% in 2024, even a small firewall misconfiguration can cause a massive data breach. Mastering leading firewall technologies like Fortinet, Palo Alto, Cisco ASA, and Firepower is no longer optional—it's essential. Dive into the complete training guide 👉 networkbulls.com/blog/the-ulti

2026-01-26

Network Security vs Cyber Security: Which Career Path Should You Choose?

Not sure whether to pursue Network Security or Cyber Security? 🔐💻 As technology becomes essential across healthcare, cloud computing, and data-driven businesses, the demand for skilled IT professionals is rising fast. 👉 networkbulls.com/blog/network-

Boost your skills with today’s cybersecurity playlist: exploits, defenses, and real-world lessons. 🔒 youtube.com/playlist?list=PLXq

#CyberAwareness #NetworkSecurity #ZeroTrust #ThreatIntelligence #Malware

2026-01-24

ExpressVPN’s winter pricing highlights a broader industry trend: aggressive discounts on multi-year VPN plans paired with security-first messaging.

From a technical standpoint, notable components include:
• Lightway protocol for fast session establishment
• AES-256 encryption
• TrustedServer (RAM-only, audited) architecture
• Private DNS and optional parental controls
• Identity monitoring features in specific regions

As always, pricing is only one variable - threat models, jurisdiction, and operational transparency remain key when assessing VPN services.

What do you personally prioritize most when assessing a commercial VPN?

Source: expressvpn.com/start/special-d

Join the discussion and follow @technadu for neutral security analysis.

#InfoSec #VPNArchitecture #NetworkSecurity #PrivacyEngineering #CyberSecurity #TechNadu

ExpressVPN Winter Deal:
2026-01-24

Tôi đã setup hệ thống NAS Ugreen với Docker, Dockge quản lý container, AdGuard Home làm DHCP và DNS, Nginx Proxy Manager xử lý reverse proxy với ACL hạn chế truy cập. Mọi dịch vụ chỉ mở qua Tailscale, mạng nội bộ được phân đoạn chặt chẽ để tăng tính bảo mật và hạn chế lateral movement. Cần feedback về thiết kế mạng này! #SelfHosted #NetworkSecurity #Docker #HomeLab #Sysadmin #BảoMậtMạng #MạngDocker #NAS #TinHọc

reddit.com/r/selfhosted/commen

2026-01-23

Fortinet is analyzing SSO abuse on FortiOS, with reports showing admin access via SAML even on fully patched releases.

The situation reinforces long-standing concerns around identity exposure on edge devices and the need for strict access controls alongside patching.

How are you handling SSO risk in firewall and gateway environments?

Source: fortinet.com/blog/psirt-blogs/

Comment, share insights, and follow @technadu for practitioner-focused security updates.

#InfoSec #Fortinet #SSO #NetworkSecurity #IAM #BlueTeam #CyberDefense

Analysis of Single Sign-On Abuse on FortiOS
Endpoint GuardianShi_P
2026-01-22

If your team is still using classic proxies for web security, it might be time to understand what Secure Web Gateways (SWGs) actually add.

Clearing up the difference: blog.scalefusion.com/secure-we

2026-01-21

VPNs aren’t just about encryption anymore.
We spoke with Yegor Sak, CEO & Co-Founder of Windscribe VPN, about AmneziaWG, RAM-only servers, multi-hop routing, and censorship-resistant infrastructure in 2026.

Full interview:
technadu.com/windscribe-talks-

#VPN #Privacy #AntiCensorship #NetworkSecurity

Windscribe on Privacy-First Innovation, AI-Resistant Security, and Expanding Censorship-Resistant Infrastructure
2026-01-21

If you're already using IPFire on-premise, you can now extend your network into the cloud with the same tools and workflows.
IPFire is available as an AMI in the AWS Marketplace, Exoscale, Hetzer and more... ipfire.org/downloads/cloud
#AWS #HybridCloud #OpenSource #NetworkSecurity

Stay ahead of cyber threats. Today’s playlist dives deep into network breaches and how to stop them. ⚡ youtube.com/playlist?list=PLXq
#NetworkSecurity #InfoSec #CyberDefense #Ransomware #OnlineSafety

The Zeek Network Security Monitorzeek@infosec.exchange
2026-01-20

Want to write custom Zeek detections? Evan's scripting tutorial covers the basics - types, events, functions, and building a working script from scratch.

youtu.be/nae8cdrUUKY

#Zeek #NetworkSecurity #OpenSource #InfoSec

Stay ahead of cyber threats. Today’s playlist dives deep into network breaches and how to stop them. ⚡ youtube.com/playlist?list=PLXq
#NetworkSecurity #InfoSec #CyberDefense #Ransomware #OnlineSafety

Stay ahead of cyber threats. Today’s playlist dives deep into network breaches and how to stop them. ⚡ youtube.com/playlist?list=PLXq
#NetworkSecurity #InfoSec #CyberDefense #Ransomware #OnlineSafety

Boost your skills with today’s cybersecurity playlist: exploits, defenses, and real-world lessons. 🔒 youtube.com/playlist?list=PLXq

#CyberAwareness #NetworkSecurity #ZeroTrust #ThreatIntelligence #Malware

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst