Breaking News – Cyber Threats (last 6h)
Generated: 2026-01-06 12:00 PST
- New D-Link flaw in legacy DSL routers actively exploited in attacks
BleepingComputer • 2026-01-06 11:52 • www.bleepingcomputer.com
Threat actors are exploiting a recently discovered command injection vulnerability that affects multiple D-Link DSL gateway routers that went out of support years ago. […]
https://www.bleepingcomputer.com/news/security/new-d-link-flaw-in-legacy-dsl-routers-actively-exploited-in-attacks/ - Kimwolf Android botnet abuses residential proxies to infect internal devices
BleepingComputer • 2026-01-06 11:15 • www.bleepingcomputer.com
The Kimwolf botnet, an Android variant of the Aisuru malware, has grown to more than two million hosts, most of them infected by exploiting vulnerabilities in residential proxy networks to target devices on internal networks. […]
https://www.bleepingcomputer.com/news/security/kimwolf-android-botnet-abuses-residential-proxies-to-infect-internal-devices/ - Jaguar Land Rover wholesale volumes down 43% after cyberattack
BleepingComputer • 2026-01-06 10:27 • www.bleepingcomputer.com
Jaguar Land Rover (JLR) revealed this week that a September 2025 cyberattack led to a 43% decline in third-quarter wholesale volumes. […]
https://www.bleepingcomputer.com/news/security/jaguar-land-rover-wholesale-volumes-down-43-percent-after-cyberattack/ - Two Chrome Extensions Caught Stealing ChatGPT and DeepSeek Chats from 900,000 Users
The Hacker News • 2026-01-06 09:21 • thehackernews.com
Cybersecurity researchers have discovered two new malicious extensions on the Chrome Web Store that are designed to exfiltrate OpenAI ChatGPT and DeepSeek conversations alongside browsing data to servers under the attackers’ control.
The names of the extensions, which collectively have over 900,000 users, are below –Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI (ID:
https://thehackernews.com/2026/01/two-chrome-extensions-caught-stealing.html - A Cyberattack Was Part of the US Assault on Venezuela
Schneier on Security • 2026-01-06 08:08 • www.schneier.comWe don’t have many details:
President Donald Trump suggested Saturday that the U.S. used cyberattacks or other technical capabilities to cut power off in Caracas during strikes on the Venezuelan capital that led to the capture of Venezuelan President Nicolás Maduro.
If true, it would mark one of the most public uses of U.S. cyber power against another nation in recent memory. These operations are typically highly classified, and the U.S. is considered one…
https://www.schneier.com/blog/archives/2026/01/a-cyberattack-was-part-of-the-us-assault-on-venezuela.html - Unpatched Firmware Flaw Exposes TOTOLINK EX200 to Full Remote Device Takeover
The Hacker News • 2026-01-06 07:47 • thehackernews.com
The CERT Coordination Center (CERT/CC) has disclosed details of an unpatched security flaw impacting TOTOLINK EX200 wireless range extender that could allow a remote authenticated attacker to gain full control of the device.
The flaw, CVE-2025-65606 (CVSS score: N/A), has been characterized as a flaw in the firmware-upload error-handling logic, which could cause the device to inadvertently start
https://thehackernews.com/2026/01/unpatched-firmware-flaw-exposes.html - Sedgwick confirms breach at government contractor subsidiary
BleepingComputer • 2026-01-06 07:27 • www.bleepingcomputer.com
Claims administration and risk management company Sedgwick has confirmed that its federal contractor subsidiary, Sedgwick Government Solutions, was the victim of a security breach. […]
https://www.bleepingcomputer.com/news/security/sedgwick-confirms-breach-at-government-contractor-subsidiary/ - How generative AI accelerates identity attacks against Active Directory
BleepingComputer • 2026-01-06 06:46 • www.bleepingcomputer.com
Generative AI is accelerating password attacks against Active Directory, making credential abuse faster and more effective. Specops Software explains how AI-driven cracking techniques exploit weak and predictable AD passwords. […]
https://www.bleepingcomputer.com/news/security/how-generative-ai-accelerates-identity-attacks-against-active-directory/ - Tool Review: Tailsnitch, (Tue, Jan 6th)
SANS ISC Diary (full) • 2026-01-06 06:23 • isc.sans.eduIn yesterday's podcast, I mentioned “tailsnitch”, a new tool to audit Tailscale configurations. Tailscale is an easy-to-use overlay to Wireguard. It is probably best compared to STUN servers in VoIP in that it allows devices behind NAT to connect directly to each other. Tailscale just helps negotiate the setup, and once the connection is established, data will flow directly between the connected devices. I personally use it to provide remote assistance to family members, and it has worked great for this purpose. Tailscale uses a “Freemium” model. Fo…
https://isc.sans.edu/diary/rss/32602
Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.
