Breaking News – Cyber Threats (last 6h)
Generated: 2026-01-12 12:00 PST
- 'Bad actor' hijacks Apex Legends characters in live matches
BleepingComputer • 2026-01-12 11:51 • www.bleepingcomputer.com
Apex Legends players over the weekend experienced disruptions during live matches as threat actors hijacked their characters, disconnected them, and changed their nicknames. […]
https://www.bleepingcomputer.com/news/security/bad-actor-hijacks-apex-legends-characters-in-live-matches/ - University of Hawaii Cancer Center hit by ransomware attack
BleepingComputer • 2026-01-12 10:48 • www.bleepingcomputer.com
University of Hawaii says a ransomware gang breached its Cancer Center in August 2025, stealing data of study participants, including documents from the 1990s containing Social Security numbers. […]
https://www.bleepingcomputer.com/news/security/university-of-hawaii-cancer-center-hit-by-ransomware-attack/ - Target's dev server offline after hackers claim to steal source code
BleepingComputer • 2026-01-12 09:52 • www.bleepingcomputer.com
Hackers are claiming to be selling internal source code belonging to Target Corporation, after publishing what appears to be a sample of stolen code repositories on a public software development platform. After BleepingComputer notified Target, the files were taken offline and the retailer’s developer Git server was inaccessible. […]
https://www.bleepingcomputer.com/news/security/targets-dev-server-offline-after-hackers-claim-to-steal-source-code/ - Apple confirms Google Gemini will power Siri, says privacy remains a priority
BleepingComputer • 2026-01-12 08:43 • www.bleepingcomputer.com
Apple and Google have confirmed that the next version of Siri will use Gemini and Google Cloud in a multi-year collaboration between the two tech giants. […]
https://www.bleepingcomputer.com/news/apple/apple-confirms-google-gemini-will-power-siri-says-privacy-remains-a-priority/ - n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens
The Hacker News • 2026-01-12 08:39 • thehackernews.com
Threat actors have been observed uploading a set of eight packages on the npm registry that masqueraded as integrations targeting the n8n workflow automation platform to steal developers’ OAuth credentials.
One such package, named “n8n-nodes-hfgjf-irtuinvcm-lasdqewriit,” mimics a Google Ads integration, and prompts users to link their advertising account in a seemingly legitimate form and then
https://thehackernews.com/2026/01/n8n-supply-chain-attack-abuses.html - Hidden Telegram proxy links can reveal your IP address in one click
BleepingComputer • 2026-01-12 08:20 • www.bleepingcomputer.com
A single click on what may appear to be a Telegram username or harmless link is all it takes to expose your real IP address to attackers due to how proxy links are handled. Telegram says it will add warnings to proxy links after researchers demonstrated that such one-click interactions could reveal a Telegram user’s real IP address. […]
https://www.bleepingcomputer.com/news/security/hidden-telegram-proxy-links-can-reveal-your-ip-address-in-one-click/ - Spanish energy giant Endesa discloses data breach affecting customers
BleepingComputer • 2026-01-12 07:57 • www.bleepingcomputer.com
Spanish energy provider Endesa and its Energía XXI operator are notifying customers that hackers accessed the company’s systems and accessed contract-related information, which includes personal details. […]
https://www.bleepingcomputer.com/news/security/spanish-energy-giant-endesa-discloses-data-breach-affecting-customers/ - Microsoft is retiring the Lens scanner app for iOS, Android
BleepingComputer • 2026-01-12 07:48 • www.bleepingcomputer.com
Microsoft has started retiring the Microsoft Lens PDF scanner app for Android and iOS devices on Friday, January 9th, with plans to remove it from app stores next month. […]
https://www.bleepingcomputer.com/news/microsoft/microsoft-is-retiring-the-lens-scanner-app-for-ios-android/ - Prevent cloud data leaks with Microsoft 365 access reviews
BleepingComputer • 2026-01-12 06:45 • www.bleepingcomputer.com
Microsoft 365 has made file sharing effortless, but that convenience often leaves organizations with little visibility into who can access sensitive data. Tenfold explains how access reviews for shared cloud content can help organizations regain visibility, reduce unnecessary permissions, and prevent data leaks in Microsoft 365. […]
https://www.bleepingcomputer.com/news/security/prevent-cloud-data-leaks-with-microsoft-365-access-reviews/ - Max severity Ni8mare flaw impacts nearly 60,000 n8n instances
BleepingComputer • 2026-01-12 06:05 • www.bleepingcomputer.com
Nearly 60,000 n8n instances exposed online remain unpatched against a maximum-severity vulnerability dubbed “Ni8mare.” […]
https://www.bleepingcomputer.com/news/security/max-severity-ni8mare-flaw-impacts-nearly-60-000-n8n-instances/
Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.
