Breaking News – Cyber Threats (last 6h)
Generated: 2026-01-12 07:00 PST
- Prevent cloud data leaks with Microsoft 365 access reviews
BleepingComputer • 2026-01-12 06:45 • www.bleepingcomputer.com
Microsoft 365 has made file sharing effortless, but that convenience often leaves organizations with little visibility into who can access sensitive data. Tenfold explains how access reviews for shared cloud content can help organizations regain visibility, reduce unnecessary permissions, and prevent data leaks in Microsoft 365. […]
https://www.bleepingcomputer.com/news/security/prevent-cloud-data-leaks-with-microsoft-365-access-reviews/ - Max severity Ni8mare flaw impacts nearly 60,000 n8n instances
BleepingComputer • 2026-01-12 06:05 • www.bleepingcomputer.com
Nearly 60,000 n8n instances exposed online remain unpatched against a maximum-severity vulnerability dubbed “Ni8mare.” […]
https://www.bleepingcomputer.com/news/security/max-severity-ni8mare-flaw-impacts-nearly-60-000-n8n-instances/ - ⚡ Weekly Recap: AI Automation Exploits, Telecom Espionage, Prompt Poaching & More
The Hacker News • 2026-01-12 05:41 • thehackernews.com
This week made one thing clear: small oversights can spiral fast. Tools meant to save time and reduce friction turned into easy entry points once basic safeguards were ignored. Attackers didn’t need novel tricks. They used what was already exposed and moved in without resistance.
Scale amplified the damage. A single weak configuration rippled out to millions. A repeatable flaw worked again and
https://thehackernews.com/2026/01/weekly-recap-ai-automation-exploits.html - Corrupting LLMs Through Weird Generalizations
Schneier on Security • 2026-01-12 04:02 • www.schneier.comFascinating research:
Weird Generalization and Inductive Backdoors: New Ways to Corrupt LLMs.
AbstractLLMs are useful because they generalize so well. But can you have too much of a good thing? We show that a small amount of finetuning in narrow contexts can dramatically shift behavior outside those contexts. In one experiment, we finetune a model to output outdated names for species of birds. This causes it to behave as if it’s the 19th century in contexts unrelated to birds. For example, it cites the …
https://www.schneier.com/blog/archives/2026/01/corrupting-llms-through-weird-generalizations.html - GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials
The Hacker News • 2026-01-12 02:48 • thehackernews.com
A new wave of GoBruteforcer attacks has targeted databases of cryptocurrency and blockchain projects to co-opt them into a botnet that’s capable of brute-forcing user passwords for services such as FTP, MySQL, PostgreSQL, and phpMyAdmin on Linux servers.
“The current wave of campaigns is driven by two factors: the mass reuse of AI-generated server deployment examples that propagate common
https://thehackernews.com/2026/01/gobruteforcer-botnet-targets-crypto.html - Anthropic brings Claude to healthcare with HIPAA-ready Enterprise tools
BleepingComputer • 2026-01-12 01:01 • www.bleepingcomputer.com
Anthropic is bringing Claude for healthcare, following a similar move by OpenAI for ChatGPT. […]
https://www.bleepingcomputer.com/news/artificial-intelligence/anthropic-brings-claude-to-healthcare-with-hipaa-ready-enterprise-tools/
Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.
