Breaking News – Cyber Threats (last 6h)
Generated: 2026-01-23 12:00 PST
- CISA confirms active exploitation of four enterprise software bugs
BleepingComputer • 2026-01-23 10:47 • www.bleepingcomputer.com
The Cybersecurity and Infrastructure Security Agency (CISA) in the U.S. warned of active exploitation of four vulnerabilities impacting enterprise software from Versa and Zimbra, the Vite frontend tooling framework, and the Prettier code formatter. […]
https://www.bleepingcomputer.com/news/security/cisa-confirms-active-exploitation-of-four-enterprise-software-bugs/ - US to deport Venezuelans who emptied bank ATMs using malware
BleepingComputer • 2026-01-23 08:38 • www.bleepingcomputer.com
South Carolina federal prosecutors announced that two Venezuelan nationals convicted of stealing hundreds of thousands of dollars from U.S. banks in an ATM jackpotting scheme will be deported after serving their sentences. […]
https://www.bleepingcomputer.com/news/security/us-to-deport-venezuelans-who-emptied-bank-atms-using-malware/ - Hackers exploit critical telnetd auth bypass flaw to get root
BleepingComputer • 2026-01-23 08:21 • www.bleepingcomputer.com
A coordinated campaign has been observed targeting a recently disclosed critical-severity vulnerability that has been present in the GNU InetUtils telnetd server for 11 years. […]
https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-telnetd-auth-bypass-flaw-to-get-root/ - CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
The Hacker News • 2026-01-23 07:24 • thehackernews.com
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.
The list of vulnerabilities is as follows –CVE-2025-68645 (CVSS score: 8.8) – A PHP remote file inclusion vulnerability in Synacor Zimbra Collaboration Suite (ZCS) that could allow a
https://thehackernews.com/2026/01/cisa-updates-kev-catalog-with-four.html - What an AI-Written Honeypot Taught Us About Trusting Machines
BleepingComputer • 2026-01-23 06:59 • www.bleepingcomputer.com
AI-generated code can introduce subtle security flaws when teams over-trust automated output. Intruder shows how an AI-written honeypot introduced hidden vulnerabilities that were exploited in attacks. […]
https://www.bleepingcomputer.com/news/security/what-an-ai-written-honeypot-taught-us-about-trusting-machines/
Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.
