Breaking News – Cyber Threats (last 6h)
Generated: 2026-01-26 07:00 PST
- Hackers can bypass npm’s Shai-Hulud defenses via Git dependencies
BleepingComputer • 2026-01-26 06:02 • www.bleepingcomputer.com
The defense mechanisms that NPM introduced after the ‘Shai-Hulud’ supply-chain attacks have weaknesses that allow threat actors to bypass them via Git dependencies. […]
https://www.bleepingcomputer.com/news/security/hackers-can-bypass-npms-shai-hulud-defenses-via-git-dependencies/ - Ireland Proposes Giving Police New Digital Surveillance Powers
Schneier on Security • 2026-01-26 04:04 • www.schneier.comThis is coming:
The Irish government is planning to bolster its police’s ability to intercept communications, including encrypted messages, and provide a legal basis for spyware use.
- ⚡ Weekly Recap: Firewall Flaws, AI-Built Malware, Browser Traps, Critical CVEs & More
The Hacker News • 2026-01-26 03:55 • thehackernews.com
Security failures rarely arrive loudly. They slip in through trusted tools, half-fixed problems, and habits people stop questioning. This week’s recap shows that pattern clearly.
Attackers are moving faster than defenses, mixing old tricks with new paths. “Patched” no longer means safe, and every day, software keeps becoming the entry point.
What follows is a set of small but telling signals.
https://thehackernews.com/2026/01/weekly-recap-firewall-flaws-ai-built.html - CISA says critical VMware RCE flaw now actively exploited
BleepingComputer • 2026-01-26 03:49 • www.bleepingcomputer.com
CISA has flagged a critical VMware vCenter Server vulnerability as actively exploited and ordered U.S. federal agencies to secure their servers within three weeks. […]
https://www.bleepingcomputer.com/news/security/cisa-says-critical-vmware-rce-flaw-now-actively-exploited/ - Winning Against AI-Based Attacks Requires a Combined Defensive Approach
The Hacker News • 2026-01-26 03:30 • thehackernews.com
If there’s a constant in cybersecurity, it’s that adversaries are always innovating. The rise of offensive AI is transforming attack strategies and making them harder to detect. Google’s Threat Intelligence Group, recently reported on adversaries using Large Language Models (LLMs) to both conceal code and generate malicious scripts on the fly, letting malware shape-shift in real-time to evade
https://thehackernews.com/2026/01/winning-against-ai-based-attacks.html
Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.
