<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>how to hack &#8211; Cyberwire Daily</title>
	<atom:link href="https://cyberwiredaily.com/tag/how-to-hack/feed/" rel="self" type="application/rss+xml" />
	<link>https://cyberwiredaily.com</link>
	<description></description>
	<lastBuildDate>Thu, 29 Jan 2026 10:15:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://cyberwiredaily.com/wp-content/uploads/2025/09/icon-150x150.png</url>
	<title>how to hack &#8211; Cyberwire Daily</title>
	<link>https://cyberwiredaily.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Filling the Most Common Gaps in Google Workspace Security</title>
		<link>https://cyberwiredaily.com/filling-the-most-common-gaps-in-google-workspace-security/</link>
					<comments>https://cyberwiredaily.com/filling-the-most-common-gaps-in-google-workspace-security/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Thu, 29 Jan 2026 10:15:14 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[cyber news]]></category>
		<category><![CDATA[cyber security news]]></category>
		<category><![CDATA[cyber security news today]]></category>
		<category><![CDATA[cyber security updates]]></category>
		<category><![CDATA[cyber updates]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hacker news]]></category>
		<category><![CDATA[hacking news]]></category>
		<category><![CDATA[how to hack]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[ransomware malware]]></category>
		<category><![CDATA[software vulnerability]]></category>
		<category><![CDATA[the hacker news]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/filling-the-most-common-gaps-in-google-workspace-security/</guid>

					<description><![CDATA[Security teams at agile, fast-growing companies often have the same mandate: secure the business without slowing it down. Most teams inherit a tech stack optimized for breakneck growth, not resilience. In these environments, the security team is the helpdesk, the compliance expert, and the incident response team all rolled into one. Securing the cloud office [...]]]></description>
										<content:encoded><![CDATA[<p> <br />
</p>
<div id="articlebody">
<div class="separator" style="clear: both;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjppNAJYCOHh4mqdL3GuJ4elABk4wn-ciw9V6oYuZ8Sdb0LllyS_YRl6YXX-I_eaMDcVG8Zt9X42HbFVlmEb0umu4D4nelT-qOpG7ZtYSz0t-wbngKFalwdDHW4VHUlNXfMUswtSCx4WptHTAoKHJo94vWXVjSq4cGRP4FyN1P35n8dc8_dl-2yi3jFePU/s1700-e365/main.png" style="display: block;  text-align: center; clear: left; float: left;"></a></div>
<p>Security teams at agile, fast-growing companies often have the same mandate: secure the business without slowing it down. Most teams inherit a tech stack optimized for breakneck growth, not resilience. In these environments, the security team is the helpdesk, the compliance expert, and the incident response team all rolled into one.</p>
<p>Securing the cloud office in this scenario is all about finding leverage: identifying the strategic control points that drive the most resilience without adding operational overhead.</p>
<p>Google Workspace provides an excellent security foundation, but its native tooling has inherent limitations, and relying on the default configurations can cause headaches. To build a truly resilient program, there are some common-sense first steps teams can take to secure Workspace natively, before intelligently augmenting the platform where its capabilities fall short.</p>
<h2>Secure email, the primary attack vector and largest archive</h2>
<p>Email remains the most reliable target for attackers, as an initial attack method, as a vector to other connected apps and systems, and as a target for sensitive data. While Gmail&#8217;s default security is solid at catching some threats, it often struggles with targeted threats and sophisticated social engineering and payload-less attacks.</p>
<h3>The gaps in native protection</h3>
<ul>
<li><strong>BEC and Targeted spear phishing:</strong> business email compromise (BEC) attacks often contain no malicious links or attachments, instead relying on social engineering that bypasses traditional defenses.</li>
<li><strong>Environmental context</strong>: Google doesn&#8217;t know who your VIPs are, which partners you work with, or how frequently you receive invoices from vendors, making it difficult to flag subtle anomalies worth scrutinizing.</li>
<li><strong>Data archive at rest: </strong>for most companies, email is the largest repository of sensitive data. If an account is compromised, the attacker has access to years of confidential conversations, attachments, contracts, and more.</li>
</ul>
<h3>How to improve Gmail&#8217;s security today</h3>
<p>While Google can&#8217;t provide all the capabilities of a modern email security platform, there are steps you can take to ensure your core Gmail configurations are as secure as possible.</p>
<ul>
<li><strong>Turn on advanced scanning: </strong>enable Google&#8217;s enhanced pre-delivery message scanning and malware protection to ensure you&#8217;re making the most of Google&#8217;s capabilities. </li>
<li><strong>Implement basic email hygiene: </strong>configure SPF, DKIM, and DMARC. These protocols prove your emails are actually from you, and are critical for preventing domain spoofing.</li>
<li><strong>Automate future settings:</strong> ensure the &#8220;Apply future recommended settings automatically&#8221; option is checked to stay current as Google rolls out more security updates. </li>
</ul>
<h2>Move beyond authentication to manage access</h2>
<p>Multi-factor authentication (MFA) is the single most important control you can implement today, but it&#8217;s not a magic bullet. Your access control can&#8217;t stop at the login page.</p>
<h3>Too many windows and side doors</h3>
<ul>
<li><strong>Malicious OAuth access: </strong>compromised tokens, illicit consent grants, man-in-the-middle attacks, or simple misconfigurations can allow attackers access that appears perfectly legitimate to security tooling. </li>
<li><strong>Legacy access:</strong> protocols like IMAP and POP don&#8217;t natively support MFA, and App Passwords can be circumvented. </li>
<li><strong>Detection gaps:</strong> Google can alert on suspicious sign-ins, but connecting that signal to other suspicious activity across the environment is a manual, time-consuming process.</li>
</ul>
<h3>Harden your access control immediately</h3>
<ul>
<li><strong>Enforce strong MFA: </strong>not all MFA is created equal. At the very least, disable SMS or phone calls as MFA authentication methods. Ideally, adopt phishing-resistant methods like physical security keys or Yubikeys.</li>
<li><strong>Disable legacy protocols: </strong>turn off POP and IMAP access for all users within the Gmail settings.</li>
<li><strong>Deny by default for OAuth:</strong> require users to request access to unconfigured third-party apps rather than granting access by default.</li>
</ul>
<p><a name="more"/></p>
<h2>The next steps to proactive, modern security</h2>
<p>A properly-configured Google Workspace offers a solid foundation for securing a fast-growing company. But as your company grows, your attack surface grows with it. For lean security teams who need to maximize their efficiency and their effectiveness, the end goal isn&#8217;t just to have the right settings; it&#8217;s to have visibility across all of Google Workspace, with detection and response capabilities to detect subtle signs of compromise if an account is breached.</p>
<p>Material Security builds on Google&#8217;s foundation, providing visibility and context that Workspace lacks natively across the emails, files, and accounts within your environment. </p>
<h3>Advanced email protection</h3>
<p><a href="https://material.security/product/email?utm_source=third-party&amp;utm_medium=blog&amp;utm_campaign=20260122-the-hacker-news" rel="noopener" target="_blank">Material&#8217;s inbound protection</a> combines threat research with AI, user report automation, and custom detection rules to provide multi-layered coverage to catch and remediate sophisticated threats. Granular automated remediations protect the entire organization from the first detection or user report, and automatically triage and respond to user-reported phishing. </p>
<p>Material is also the only platform on the market that protects sensitive email content, automatically detecting, classifying, and securing sensitive emails and attachments behind an MFA prompt, protecting critical information even in a breach.</p>
<h3>Context-aware account security</h3>
<p>A richer set of signals across the entire cloud office enables Material to detect and <a href="https://material.security/product/accounts?utm_source=third-party&amp;utm_medium=blog&amp;utm_campaign=20260122-the-hacker-news" rel="noopener" target="_blank">stop account takeovers </a>early. Material monitors all activity across the cloud office, including suspicious logins, unusual data retrieval patterns and file-sharing behavior, password resets, out-of-policy forwarding rules, and much more. This enables organizations to understand their risks and threats holistically and take action faster than with native tools alone. </p>
<h3>Data discovery and protection</h3>
<p>Material fills in the gaps in Google&#8217;s native data protection capabilities. Material automatically <a href="https://material.security/product/files?utm_source=third-party&amp;utm_medium=blog&amp;utm_campaign=20260122-the-hacker-news" rel="noopener" target="_blank">detects and classifies sensitive and confidential data</a> in Google Drive, and enforces file-sharing and data access policies without slowing down collaboration. Risky sharing of sensitive files is flagged, and the system works with each user to self-heal or justify potentially risky sharing before revoking risky access and, when needed, updating labels.</p>
<div class="separator" style="clear: both;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsbYRELqV8yOy7BuymNjsuCayynSuTyRB8R-mNVCrJHNFNVvW3ciWkfddpvbTr4mnK5PgzczQahWohP0jQ7zLUe9wQWCj7V0cDb8IaQCF34IhYtfs0lEkMEuvKUsoXTY_yeg15QgZXgboi0Op5IYYyjuvr7qrjc76GQVuewSWoOd8rwRyy35B2lc7IRrI/s1700-e365/3.png" style="display: block;  text-align: center; clear: left; float: left;"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsbYRELqV8yOy7BuymNjsuCayynSuTyRB8R-mNVCrJHNFNVvW3ciWkfddpvbTr4mnK5PgzczQahWohP0jQ7zLUe9wQWCj7V0cDb8IaQCF34IhYtfs0lEkMEuvKUsoXTY_yeg15QgZXgboi0Op5IYYyjuvr7qrjc76GQVuewSWoOd8rwRyy35B2lc7IRrI/s1700-e365/3.png" alt="" border="0" data-original-height="699" data-original-width="819"/></a></div>
<h2>How secure is your Workspace?</h2>
<p>Google Workspace security spans so many domains that it can be difficult to maintain a complete picture of your posture, and this only gets harder as your organization scales and your Workspace evolves. That&#8217;s why Material built our free Google Workspace Security Scorecard.</p>
<p>Whether you&#8217;re a security engineer on a small security team scrambling to manage the day-to-day security of your organization, a CISO looking to better understand and report on your posture, or an IT leader responsible for Workspace administration, our quick, 5-minute assessment will not only provide a solid baseline but also actionable recommendations to improve your posture.</p>
<blockquote><p><a href="https://material.security/workspace-security-scorecard?utm_source=third-party&amp;utm_medium=blog&amp;utm_campaign=20260122-the-hacker-news" rel="noopener" target="_blank"><b>Check out the Google Workspace self-assessment now to find out where your gaps are.</b></a></p></blockquote>
<div class="cf note-b">Found this article interesting? <span class="">This article is a contributed piece from one of our valued partners.</span> Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</div>
</div>
<p><script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script><br />
<br /><br />
<br /><a href="https://thehackernews.com/2026/01/filling-most-common-gaps-in-google.html" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/filling-the-most-common-gaps-in-google-workspace-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Malicious PyPI Package Impersonates SymPy, Deploys XMRig Miner on Linux Hosts</title>
		<link>https://cyberwiredaily.com/malicious-pypi-package-impersonates-sympy-deploys-xmrig-miner-on-linux-hosts/</link>
					<comments>https://cyberwiredaily.com/malicious-pypi-package-impersonates-sympy-deploys-xmrig-miner-on-linux-hosts/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Thu, 29 Jan 2026 06:03:22 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[cyber news]]></category>
		<category><![CDATA[cyber security news]]></category>
		<category><![CDATA[cyber security news today]]></category>
		<category><![CDATA[cyber security updates]]></category>
		<category><![CDATA[cyber updates]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hacker news]]></category>
		<category><![CDATA[hacking news]]></category>
		<category><![CDATA[how to hack]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[ransomware malware]]></category>
		<category><![CDATA[software vulnerability]]></category>
		<category><![CDATA[the hacker news]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/malicious-pypi-package-impersonates-sympy-deploys-xmrig-miner-on-linux-hosts/</guid>

					<description><![CDATA[A new malicious package discovered in the Python Package Index (PyPI) has been found to impersonate a popular library for symbolic mathematics to deploy malicious payloads, including a cryptocurrency miner, on Linux hosts. The package, named sympy-dev, mimics SymPy, replicating the latter&#8217;s project description verbatim in an attempt to deceive unsuspecting users into thinking that [...]]]></description>
										<content:encoded><![CDATA[<p> <br />
</p>
<div id="articlebody">
<div class="separator" style="clear: both;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWCefYaSp9ssGTQkdK58gL2QbQurY3rXLBGBTEC2hXq1qGh88LxThrqrtejW9sVCnoXsrwoAZQwlbdrwOl-O0fEz509vXrbK235fZ0tl9iPWgiKBJt49PqTRB6uu_ZDyeaMl6F6zqfVmJFw8PU4e8-0MgYh-qxJpn1xRcLN9NfnQQ_X47nJxdz3N47s3z8/s1700-e365/pypi-cryptocurrency-malware.jpg" style="clear: left; display: block; float: left;  text-align: center;"></a></div>
<p>A new malicious package discovered in the Python Package Index (PyPI) has been found to impersonate a popular library for symbolic mathematics to deploy malicious payloads, including a cryptocurrency miner, on Linux hosts.</p>
<p>The package, named <strong><a href="https://pypi.org/project/sympy-dev/" rel="noopener" target="_blank">sympy-dev</a></strong>, mimics <a href="https://www.sympy.org/en/index.html" rel="noopener" target="_blank">SymPy</a>, replicating the latter&#8217;s project description verbatim in an attempt to deceive unsuspecting users into thinking that they are downloading a &#8220;development version&#8221; of the library. It has been downloaded over 1,100 times since it was first published on January 17, 2026.</p>
<p>Although the download count is not a reliable yardstick for measuring the number of infections, the figure likely suggests some developers may have fallen victim to the malicious campaign. The package remains available for download as of writing.</p>
<p>According to <a href="https://socket.dev/blog/pypi-package-impersonates-sympy-to-deliver-cryptomining-malware" rel="noopener" target="_blank">Socket</a>, the original library has been modified to act as a downloader for an XMRig cryptocurrency miner on compromised systems. The malicious behavior is designed to trigger only when specific polynomial routines are called so as to fly under the radar.</p>
<p>&#8220;When invoked, the backdoored functions retrieve a remote JSON configuration, download a threat actor-controlled ELF payload, then execute it from an anonymous memory-backed file descriptor using Linux memfd_create and /proc/self/fd, which reduces on-disk artifacts,&#8221; security researcher Kirill Boychenko said in a Wednesday analysis.</p>
<p>The altered functions are used to execute a downloader, which fetches a remote JSON configuration and an ELF payload from &#8220;63.250.56[.]54,&#8221; and then launches the ELF binary along with the configuration as input directly in memory to avoid leaving artifacts on disk. This memory-resident technique has been previously observed in cryptojacking campaigns orchestrated by FritzFrog and Mimo.</p>
<p>The end goal of the attack is to download two Linux ELF binaries that are designed to mine cryptocurrency using XMRig on Linux hosts.</p>
<p>&#8220;Both retrieved configurations use an XMRig compatible schema that enables CPU mining, disables GPU backends, and directs the miner to Stratum over TLS endpoints on port 3333 hosted on the same threat actor-controlled IP addresses,&#8221; Socket said.</p>
<p>&#8220;Although we observed cryptomining in this campaign, the Python implant functions as a general purpose loader that can fetch and execute arbitrary second stage code under the privileges of the Python process.&#8221;</p>
<h3>Update</h3>
<p>The Python package is no longer available for download from PyPI as of January 24, 2026.</p>
</div>
<p><br />
<br /><a href="https://thehackernews.com/2026/01/malicious-pypi-package-impersonates.html" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/malicious-pypi-package-impersonates-sympy-deploys-xmrig-miner-on-linux-hosts/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SmarterMail Auth Bypass Exploited in the Wild Two Days After Patch Release</title>
		<link>https://cyberwiredaily.com/smartermail-auth-bypass-exploited-in-the-wild-two-days-after-patch-release/</link>
					<comments>https://cyberwiredaily.com/smartermail-auth-bypass-exploited-in-the-wild-two-days-after-patch-release/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Wed, 28 Jan 2026 22:39:28 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[cyber news]]></category>
		<category><![CDATA[cyber security news]]></category>
		<category><![CDATA[cyber security news today]]></category>
		<category><![CDATA[cyber security updates]]></category>
		<category><![CDATA[cyber updates]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hacker news]]></category>
		<category><![CDATA[hacking news]]></category>
		<category><![CDATA[how to hack]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[ransomware malware]]></category>
		<category><![CDATA[software vulnerability]]></category>
		<category><![CDATA[the hacker news]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/smartermail-auth-bypass-exploited-in-the-wild-two-days-after-patch-release/</guid>

					<description><![CDATA[A new security flaw in SmarterTools SmarterMail email software has come under active exploitation in the wild, two days after the release of a patch. The vulnerability, which currently does not have a CVE identifier, is tracked by watchTowr Labs as WT-2026-0001. It was patched by SmarterTools on January 15, 2026, with Build 9511, following [...]]]></description>
										<content:encoded><![CDATA[<p> <br />
</p>
<div id="articlebody">
<div class="separator" style="clear: both;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfzCM1c0lJOZ7pXEcdXTXGEeNzq845Kr3uoQe6p2pY1l062KKPqAvTiQmrHDY-3IVIsFlQHtm1YYOWCAEPeuDJeY2N7qYX3C02Qh4dfd56mUj20ChkMEAGb_nl9vymqoCGmUriGCMHCZAT4fO0MzL4mi0vKxc9rSz4ythSpJOJlEBEXXNU35Ziz-M-Oa0k/s1700-e365/SmarterTools-exploit.jpg" style="clear: left; display: block; float: left;  text-align: center;"></a></div>
<p>A new security flaw in SmarterTools SmarterMail email software has come under active exploitation in the wild, two days after the release of a patch.</p>
<p>The vulnerability, which currently does not have a CVE identifier, is tracked by watchTowr Labs as <a href="https://labs.watchtowr.com/attackers-with-decompilers-strike-again-smartertools-smartermail-wt-2026-0001-auth-bypass/" rel="noopener" target="_blank">WT-2026-0001</a>. It was patched by SmarterTools on January 15, 2026, with <a href="https://www.smartertools.com/smartermail/release-notes/current#:~:text=Build%209511%20%28Jan%2015%2C%202026" rel="noopener" target="_blank">Build 9511</a>, following responsible disclosure by the exposure management platform on January 8, 2026.</p>
<p>It has been described as an authentication bypass flaw that could allow any user to reset the SmarterMail system administrator password by means of a specially crafted HTTP request to the &#8220;/api/v1/auth/force-reset-password&#8221; endpoint.</p>
<p>&#8220;The kicker of course being that said user is able to use RCE-as-a-feature functions to directly execute OS [operating system] commands,&#8221; watchTowr Labs researchers Piotr Bazydlo and Sina Kheirkhah said.</p>
<p>The problem is rooted in the function &#8220;SmarterMail.Web.Api.AuthenticationController.ForceResetPassword,&#8221; which not only allows the endpoint to be reached without authentication, but also leverages the fact that the reset request is accompanied by a boolean flag named &#8220;IsSysAdmin&#8221; to handle the incoming request depending on whether the user is a system administrator or not.</p>
<p>In case the flag is set to &#8220;true&#8221; (i.e., indicating that the user is an administrator), the underlying logic performs the following sequence of actions &#8211;</p>
<ul>
<li>Obtain the configuration corresponding to the username passed as input in the HTTP request</li>
<li>Create a new system administrator item with the new password</li>
<li>Update the administrator account with the new password</li>
</ul>
<p>In other words, the privileged path is configured such that it can trivially update an administrator user&#8217;s password by sending an HTTP request with the username of an administrator account and a password of their choice. This complete lack of security control could be abused by an attacker to obtain elevated access, provided they have knowledge of an existing administrator username.</p>
<p>It doesn&#8217;t end there, for the authentication bypass provides a direct path to remote code execution through a built-in functionality that allows a system administrator to execute operating system commands on the underlying operating system and obtain a SYSTEM-level shell.</p>
<p>This can be accomplished by navigating to the Settings page, <a href="https://help.smartertools.com/smartermail/current/topics/systemadmin/settings/volumemounts#:~:text=Adding%20New%20Volume%20Mounts" rel="noopener" target="_blank">creating a new volume</a>, and supplying an arbitrary command in the Volume Mount Command field that gets subsequently executed by the host&#8217;s operating system.</p>
<p>The cybersecurity company said it chose to make the finding public following a post on the SmarterTools Community Portal, where a user <a href="https://portal.smartertools.com/community/a97681/new-user-on-google_abc_com.aspx" rel="noopener" target="_blank">claimed</a> that they lost access to their admin account, with the logs indicating the use of the same &#8220;force-reset-password&#8221; endpoint to change the password on January 17, 2026, two days after the release of the patch.</p>
<p>This likely indicates that the attackers managed to reverse engineer the patches and reconstruct the flaw. To make matters worse, it doesn&#8217;t help that SmarterMail&#8217;s release notes are vague and do not explicitly mention what issues were addressed. One item in the bulleted list for Build 9511 simply mentions &#8220;IMPORTANT: Critical security fixes.&#8221;</p>
<p>In response, SmarterTools CEO Tim Uzzanti hinted that this is done so to avoid giving threat actors more ammunition, but noted they plan to send an email every time a new CVE is discovered and again when a build has been released to resolve the issue.</p>
<p>&#8220;In our 23+ years, we have had only a few CVEs, which were primarily communicated through release notes and critical fix references,&#8221; Uzzanti <a href="https://portal.smartertools.com/community/a97650/cve.aspx" rel="noopener" target="_blank">said</a> in response to transparency concerns raised by its customers. &#8220;We appreciate the feedback that encouraged this change in policy moving forward.&#8221;</p>
<p>When reached for comment, SmarterTools told The Hacker News that it released a fix for the vulnerability on January 15, 2026, adding it sent out notifications to all customers, asking them to update to the latest version.</p>
<p>&#8220;At the time of that release, we did notify all SmarterMail customers that a new version was released that fixed a critical security issue, and we strongly urged them to upgrade,&#8221; Derek Curtis, chief operating officer at SmarterTools, said. &#8220;As we don&#8217;t manage installations ourselves – our SmarterMail software is on-premises – we have to rely on customers to read our notifications, then upgrade as soon as they feel it&#8217;s prudent to do so.&#8221;</p>
<p>The development comes less than a month after the Cyber Security Agency of Singapore (CSA) disclosed details of a maximum-severity security flaw in SmarterMail (CVE-2025-52691, CVSS score: 10.0) that could be exploited to achieve remote code execution.</p>
<h3>Update</h3>
<p>The vulnerability has been assigned the CVE identifier CVE-2026-23760 (CVSS score: 9.3), with Huntress noting that it has observed in-the-wild exploitation of the privileged account takeover vulnerability that could result in remote code execution.</p>
<p>The cybersecurity company also said CVE-2025-52691 has come under mass exploitation, making it essential that users of SmarterMail update to the latest version as soon as possible.</p>
<p>Jai Minton, senior manager of detection engineering and threat hunting at Huntress, told The Hacker News that CVE-2025-52691 is being exploited to deliver low sophistication web shells and &#8220;suspected loaders of malware written to Startup directories in order to achieve persistence and execution when the system is restarted.&#8221;</p>
<p>Minton also stated that all the IP addresses attempting to exploit CVE-2026-23760 are tied to virtual infrastructure in the U.S., and that the exact origin of the attacks is unknown. As for attribution, there is no evidence to suggest either vulnerabilities being exploited are tied to any particular threat actor.</p>
<p>&#8220;Given the severity of this vulnerability, active exploitation, and exploitation of the additional CVE-2025-52691 being observed in the wild, businesses should prioritize the deployment of SmarterMail updates and review any outdated systems for signs of infection,&#8221; it <a href="https://www.huntress.com/blog/smartermail-account-takeover-leading-to-rce" rel="noopener" target="_blank">added</a>.</p>
<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has since <a href="https://www.cisa.gov/news-events/alerts/2026/01/26/cisa-adds-five-known-exploited-vulnerabilities-catalog">added</a> both the SmarterMail flaws to its Known Exploited Vulnerabilities (<a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">KEV</a>) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the patches by February 16, 2026.</p>
<p><em>(The story was updated after publication on January 27, 2026, to reflect the latest developments.)</em></p>
</div>
<p><br />
<br /><a href="https://thehackernews.com/2026/01/smartermail-auth-bypass-exploited-in.html" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/smartermail-auth-bypass-exploited-in-the-wild-two-days-after-patch-release/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations</title>
		<link>https://cyberwiredaily.com/automated-fortigate-attacks-exploit-forticloud-sso-to-alter-firewall-configurations/</link>
					<comments>https://cyberwiredaily.com/automated-fortigate-attacks-exploit-forticloud-sso-to-alter-firewall-configurations/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Wed, 28 Jan 2026 18:33:11 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[cyber news]]></category>
		<category><![CDATA[cyber security news]]></category>
		<category><![CDATA[cyber security news today]]></category>
		<category><![CDATA[cyber security updates]]></category>
		<category><![CDATA[cyber updates]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hacker news]]></category>
		<category><![CDATA[hacking news]]></category>
		<category><![CDATA[how to hack]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[ransomware malware]]></category>
		<category><![CDATA[software vulnerability]]></category>
		<category><![CDATA[the hacker news]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/automated-fortigate-attacks-exploit-forticloud-sso-to-alter-firewall-configurations/</guid>

					<description><![CDATA[Cybersecurity company Arctic Wolf has warned of a &#8220;new cluster of automated malicious activity&#8221; that involves unauthorized firewall configuration changes on Fortinet FortiGate devices. The activity, it said, commenced on January 15, 2026, adding it shares similarities with a December 2025 campaign in which malicious SSO logins on FortiGate appliances were recorded against the admin [...]]]></description>
										<content:encoded><![CDATA[<p> <br />
</p>
<div id="articlebody">
<div class="separator" style="clear: both;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6O_1FUjFHFlfeetaainBwBLAivJlaoFZZYZ-M9gJCGGmmNW1QE_mHtFOlYhtYbuM5fXV8-ySVyNrPVocMA2GBV_1TQdqLS3yZkU5ThvGuQ6AfuN20gtMsBa-7C3_A8oOjPPyP2SP_W8bX6zCcGgPpu9MQuX490PT2d2OMZYgL1Ra30gHM8ZmfAdM9MfTf/s1700-e365/fortinet.jpg" style="display: block;  text-align: center; clear: left; float: left;"></a></div>
<p>Cybersecurity company Arctic Wolf has <a href="https://arcticwolf.com/resources/blog/arctic-wolf-observes-malicious-configuration-changes-fortinet-fortigate-devices-via-sso-accounts/" rel="noopener" target="_blank">warned</a> of a &#8220;new cluster of automated malicious activity&#8221; that involves unauthorized firewall configuration changes on Fortinet FortiGate devices.</p>
<p>The activity, it said, commenced on January 15, 2026, adding it shares similarities with a December 2025 campaign in which malicious SSO logins on FortiGate appliances were recorded against the admin account from different hosting providers by exploiting CVE-2025-59718 and CVE-2025-59719.</p>
<p>Both vulnerabilities allow for unauthenticated bypass of SSO login authentication via crafted SAML messages when the FortiCloud single sign-on (SSO) feature is enabled on affected Devices. The shortcomings impact FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager.</p>
<p>&#8220;This activity involved the creation of generic accounts intended for persistence, configuration changes granting VPN access to those accounts, as well as exfiltration of firewall configurations,&#8221; Arctic Wolf said of the developing threat cluster.</p>
<p>Specifically, this entails carrying out malicious SSO logins against a malicious account &#8220;cloud-init@mail.io&#8221; from four different IP addresses, following which the firewall configuration files are exported to the same IP addresses via the GUI interface. The list of source IP addresses is below &#8211;</p>
<ul>
<li>104.28.244[.]115</li>
<li>104.28.212[.]114</li>
<li>217.119.139[.]50</li>
<li>37.1.209[.]19</li>
</ul>
<p>In addition, the threat actors have been observed creating secondary accounts, such as &#8220;secadmin,&#8221; &#8220;itadmin,&#8221; &#8220;support,&#8221; &#8220;backup,&#8221; &#8220;remoteadmin,&#8221; and &#8220;audit,&#8221; for persistence.</p>
<p>&#8220;All of the above events took place within seconds of each other, indicating the possibility of automated activity,&#8221; Arctic Wolf added.</p>
<p>The disclosure coincides with a <a href="https://www.reddit.com/r/fortinet/comments/1qibdcb/possible_new_sso_exploit_cve202559718_on_749/" rel="noopener" target="_blank">post on Reddit</a> in which multiple users reported seeing malicious SSO logins on fully-patched FortiOS devices, with one user stating the &#8220;Fortinet developer team has confirmed the vulnerability persists or is not fixed in version 7.4.10.&#8221;</p>
<p>The Hacker News has reached out to Fortinet for comment, and we will update the story if we hear back. In the interim, it&#8217;s advised to disable the &#8220;admin-forticloud-sso-login&#8221; setting.</p>
</div>
<p><br />
<br /><a href="https://thehackernews.com/2026/01/automated-fortigate-attacks-exploit.html" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/automated-fortigate-attacks-exploit-forticloud-sso-to-alter-firewall-configurations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex</title>
		<link>https://cyberwiredaily.com/cisco-fixes-actively-exploited-zero-day-cve-2026-20045-in-unified-cm-and-webex/</link>
					<comments>https://cyberwiredaily.com/cisco-fixes-actively-exploited-zero-day-cve-2026-20045-in-unified-cm-and-webex/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Wed, 28 Jan 2026 14:31:58 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[cyber news]]></category>
		<category><![CDATA[cyber security news]]></category>
		<category><![CDATA[cyber security news today]]></category>
		<category><![CDATA[cyber security updates]]></category>
		<category><![CDATA[cyber updates]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hacker news]]></category>
		<category><![CDATA[hacking news]]></category>
		<category><![CDATA[how to hack]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[ransomware malware]]></category>
		<category><![CDATA[software vulnerability]]></category>
		<category><![CDATA[the hacker news]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/cisco-fixes-actively-exploited-zero-day-cve-2026-20045-in-unified-cm-and-webex/</guid>

					<description><![CDATA[Cisco has released fresh patches to address what it described as a &#8220;critical&#8221; security vulnerability impacting multiple Unified Communications (CM) products and Webex Calling Dedicated Instance that it has been actively exploited as a zero-day in the wild. The vulnerability, CVE-2026-20045 (CVSS score: 8.2), could permit an unauthenticated remote attacker to execute arbitrary commands on [...]]]></description>
										<content:encoded><![CDATA[<p> <br />
</p>
<div id="articlebody">
<div class="separator" style="clear: both;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHOCMXq3WVtmcL9apl3XWrlOoAeRxJ2kZf_37YNtvg2oaO5wVX4zD-vOckg8TzcAeNUDKe0CpwaIvMz_9RQ0Lx-2sD5Jdz4rF7TxN74zZdq6lWOzfF3PdsYvmUy9CDqB9MxFV1leIxvXTuYYajixMcaQJLFGLGsLyfX7wdp9hkENDvdJqW6Y_hRlT6PnBk/s1700-e365/cisco-patch.jpg" style="display: block;  text-align: center; clear: left; float: left;"></a></div>
<p>Cisco has released fresh patches to address what it described as a &#8220;critical&#8221; security vulnerability impacting multiple Unified Communications (CM) products and Webex Calling Dedicated Instance that it has been actively exploited as a zero-day in the wild.</p>
<p>The vulnerability, CVE-2026-20045 (CVSS score: 8.2), could permit an unauthenticated remote attacker to execute arbitrary commands on the underlying operating system of a susceptible device.</p>
<p>&#8220;This vulnerability is due to improper validation of user-supplied input in HTTP requests,&#8221; Cisco <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b" rel="noopener" target="_blank">said</a> in an advisory. &#8220;An attacker could exploit this vulnerability by sending a sequence of crafted HTTP requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root.&#8221;</p>
<p>The critical rating for the flaw is due to the fact that its exploitation could allow for privilege escalation to root, it added. The vulnerability impacts the following products &#8211;</p>
<ul>
<li>Unified CM</li>
<li>Unified CM Session Management Edition (SME)</li>
<li>Unified CM IM &amp; Presence Service (IM&amp;P)</li>
<li>Unity Connection</li>
<li>Webex Calling Dedicated Instance</li>
</ul>
<p>It has been addressed in the following versions &#8211;</p>
<p>Cisco Unified CM, CM SME, CM IM&amp;P, and Webex Calling Dedicated Instance &#8211;</p>
<ul>
<li>Release 12.5 &#8211; Migrate to a fixed release</li>
<li>Release 14 &#8211; 14SU5 or apply patch file: ciscocm.V14SU4a_CSCwr21851_remote_code_v1.cop.sha512</li>
<li>Release 15 &#8211; 15SU4 (Mar 2026) or apply patch file: ciscocm.V15SU2_CSCwr21851_remote_code_v1.cop.sha512 or ciscocm.V15SU3_CSCwr21851_remote_code_v1.cop.sha512</li>
</ul>
<p>Cisco Unity Connection </p>
<ul>
<li>Release 12.5 &#8211; Migrate to a fixed release</li>
<li>Release 14 &#8211; 14SU5 or apply patch file: ciscocm.cuc.CSCwr29208_C0266-1.cop.sha512</li>
<li>Release 15 &#8211; 15SU4 (Mar 2026) or apply patch file: ciscocm.cuc.CSCwr29208_C0266-1.cop.sha512</li>
</ul>
<p>The networking equipment major also said it&#8217;s &#8220;aware of attempted exploitation of this vulnerability in the wild,&#8221; urging customers to upgrade to a fixed software release to address the issue. There are currently no workarounds. An anonymous external researcher has been credited with discovering and reporting the bug.</p>
<p>The development has prompted the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to <a href="https://www.cisa.gov/news-events/alerts/2026/01/21/cisa-adds-one-known-exploited-vulnerability-catalog" rel="noopener" target="_blank">add</a> CVE-2026-20045 to its Known Exploited Vulnerabilities (<a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener" target="_blank">KEV</a>) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the fixes by February 11, 2026.</p>
<p>The discovery of CVE-2026-20045 comes less than a week after Cisco released updates for another actively exploited critical security vulnerability affecting AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager (CVE-2025-20393, CVSS score: 10.0) that could permit an attacker to execute arbitrary commands with root privileges.</p>
</div>
<p><br />
<br /><a href="https://thehackernews.com/2026/01/cisco-fixes-actively-exploited-zero-day.html" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/cisco-fixes-actively-exploited-zero-day-cve-2026-20045-in-unified-cm-and-webex/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews</title>
		<link>https://cyberwiredaily.com/north-korean-purplebravo-campaign-targeted-3136-ip-addresses-via-fake-job-interviews/</link>
					<comments>https://cyberwiredaily.com/north-korean-purplebravo-campaign-targeted-3136-ip-addresses-via-fake-job-interviews/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Wed, 28 Jan 2026 10:21:38 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[cyber news]]></category>
		<category><![CDATA[cyber security news]]></category>
		<category><![CDATA[cyber security news today]]></category>
		<category><![CDATA[cyber security updates]]></category>
		<category><![CDATA[cyber updates]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hacker news]]></category>
		<category><![CDATA[hacking news]]></category>
		<category><![CDATA[how to hack]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[ransomware malware]]></category>
		<category><![CDATA[software vulnerability]]></category>
		<category><![CDATA[the hacker news]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/north-korean-purplebravo-campaign-targeted-3136-ip-addresses-via-fake-job-interviews/</guid>

					<description><![CDATA[As many as 3,136 individual IP addresses linked to likely targets of the Contagious Interview activity have been identified, with the campaign claiming 20 potential victim organizations spanning artificial intelligence (AI), cryptocurrency, financial services, IT services, marketing, and software development sectors in Europe, South Asia, the Middle East, and Central America. The new findings come [...]]]></description>
										<content:encoded><![CDATA[<p> <br />
</p>
<div id="articlebody">
<div class="separator" style="clear: both;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrrIdMGRCKi6umFOuh-RXZ-VygDIwLtr18W0bnicPF1AYj5jLZVM3x76V96YjaTJm_FlzW1RftmJvZoWxBBcGkcN4DzIfSCw7XQO5Omyf8st-ezm8mYdzyG4vx9VhQOTjZcTT4K6JnU11fQkq201EwBq9Lj6OHxIIGRu52eBIHFCacZuaei3DnnphunRg5/s1700-e365/hackers.jpg" style="display: block;  text-align: center; clear: left; float: left;"></a></div>
<p>As many as 3,136 individual IP addresses linked to likely targets of the Contagious Interview activity have been identified, with the campaign claiming 20 potential victim organizations spanning artificial intelligence (AI), cryptocurrency, financial services, IT services, marketing, and software development sectors in Europe, South Asia, the Middle East, and Central America.</p>
<p>The <a href="https://www.recordedfuture.com/research/purplebravos-targeting-it-software-supply-chain" rel="noopener" target="_blank">new findings</a> come from Recorded Future&#8217;s Insikt Group, which is tracking the North Korean threat activity cluster under the moniker <strong>PurpleBravo</strong>. First documented in late 2023, the campaign is also known as CL-STA-0240, DeceptiveDevelopment, DEV#POPPER, Famous Chollima, Gwisin Gang, Tenacious Pungsan, UNC5342, Void Dokkaebi, and WaterPlum.</p>
<p>The 3,136 individual IP addresses, primarily concentrated around South Asia and North America, are assessed to have been targeted by the adversary from August 2024 to September 2025. The 20 victim companies are said to be based in Belgium, Bulgaria, Costa Rica, India, Italy, the Netherlands, Pakistan, Romania, the United Arab Emirates (U.A.E.), and Vietnam.</p>
<p>&#8220;In several cases, it is likely that job-seeking candidates executed malicious code on corporate devices, creating organizational exposure beyond the individual target,&#8221; the threat intelligence firm said in a new report shared with The Hacker News.</p>
<p>The disclosure comes a day after Jamf Threat Labs <a href="https://thehackernews.com/2026/01/north-korea-linked-hackers-target.html" rel="noopener" target="_blank">detailed a significant iteration of the Contagious Interview campaign wherein the attackers abuse malicious Microsoft Visual Studio Code (VS Code) projects as an attack vector to distribute a backdoor, underscoring continued exploitation of trusted developer workflows to achieve their twin goals of cyber espionage and financial theft.</p>
<p>The Mastercard-owned company said it detected four LinkedIn personas potentially associated with PurpleBravo that masqueraded as developers and recruiters and claimed to be from the Ukrainian city of Odesa, along with several malicious GitHub repositories that are designed to deliver known malware families like BeaverTail.</p>
<p>PurpleBravo has also been observed managing two distinct sets of command-and-control (C2) servers for BeaverTail, a JavaScript infostealer and loader, and a Go-based backdoor known as GolangGhost (aka FlexibleFerret or WeaselStore) that is based on the HackBrowserData open-source tool.</p>
<p>The C2 servers, hosted across 17 different providers, are administered via Astrill VPN and from IP ranges in China. North Korean threat actors&#8217; <a href="https://spur.us/astrill-vpn-and-remote-worker-fraud/" rel="noopener" target="_blank">use of Astrill VPN</a> in cyber attacks has been <a href="https://www.silentpush.com/blog/astrill-vpn/" rel="noopener" target="_blank">well-documented</a> over the years.</p>
<p>It&#8217;s worth pointing out that Contagious Interview complements a second, separate campaign referred to as Wagemole (aka PurpleDelta), where IT workers from the Hermit Kingdom actors seek unauthorized employment under fraudulent or stolen identities with organizations based in the U.S. and other parts of the world for both financial gain and espionage.</p>
<div class="dog_two clear">
<div class="cf"><a href="https:///attack-surface-insight-d" rel="nofollow noopener sponsored" target="_blank"><img fetchpriority="high" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgj01_-EPEkxaROaED9e8h2OIIeT0oXXmcnWEAb3xbOAumwdFU9z8fpwY4vjL11Reywiz9PTesXqQ86D2Eb6FQI46Rcq3mfmaqzr4RxV8S18OBZ7YrmcPIm3T-5ki1ME8gNTIwhKiysr2545hOD7b_O4k9GLx5L4XWdPyaRHJggufYNeAFej_TqWhlmNWxL/s728-e100/Sprocket-d.jpg" width="729" height="91"/></a></div>
</div>
<p>While the two clusters are treated as disparate sets of activities, there are significant tactical and infrastructure overlaps between them despite the fact that the IT worker threat has been ongoing since 2017.</p>
<p>&#8220;This includes a likely PurpleBravo operator displaying activity consistent with North Korean IT worker behavior, IP addresses in Russia linked to North Korean IT workers communicating with PurpleBravo C2 servers, and administration traffic from the same Astrill VPN IP address associated with PurpleDelta activity,&#8221; Recorded Future said.</p>
<p>To make matters worse, candidates who are approached by PurpleBravo with fictitious job offers have been found to take the coding assessment on company-issued devices, effectively compromising their employers in the process. This highlights that the IT software supply chain is &#8220;just as vulnerable&#8221; to infiltration from North Korean adversaries other than the IT workers.</p>
<p>&#8220;Many of these [potential victim] organizations advertise large customer bases, presenting an acute supply-chain risk to companies outsourcing work in these regions,&#8221; the company noted. &#8220;While the North Korean IT worker employment threat has been widely publicized, the PurpleBravo supply-chain risk deserves equal attention so organizations can prepare, defend, and prevent sensitive data leakage to North Korean threat actors.&#8221;</p>
</div>
<p><br />
<br /><a href="https://thehackernews.com/2026/01/north-korean-purplebravo-campaign.html" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/north-korean-purplebravo-campaign-targeted-3136-ip-addresses-via-fake-job-interviews/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws</title>
		<link>https://cyberwiredaily.com/zoom-and-gitlab-release-security-updates-fixing-rce-dos-and-2fa-bypass-flaws/</link>
					<comments>https://cyberwiredaily.com/zoom-and-gitlab-release-security-updates-fixing-rce-dos-and-2fa-bypass-flaws/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Wed, 28 Jan 2026 06:21:06 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[cyber news]]></category>
		<category><![CDATA[cyber security news]]></category>
		<category><![CDATA[cyber security news today]]></category>
		<category><![CDATA[cyber security updates]]></category>
		<category><![CDATA[cyber updates]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hacker news]]></category>
		<category><![CDATA[hacking news]]></category>
		<category><![CDATA[how to hack]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[ransomware malware]]></category>
		<category><![CDATA[software vulnerability]]></category>
		<category><![CDATA[the hacker news]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/zoom-and-gitlab-release-security-updates-fixing-rce-dos-and-2fa-bypass-flaws/</guid>

					<description><![CDATA[Zoom and GitLab have released security updates to resolve a number of security vulnerabilities that could result in denial-of-service (DoS) and remote code execution. The most severe of the lot is a critical security flaw impacting Zoom Node Multimedia Routers (MMRs) that could permit a meeting participant to conduct remote code execution attacks. The vulnerability, [...]]]></description>
										<content:encoded><![CDATA[<p> <br />
</p>
<div id="articlebody">
<div class="separator" style="clear: both;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwPQt59QKpm9rpNLriqoUsKPzbWcBj9P-u1ZdIn5xhxR6hgRztxdSAXN5bgEnDvd4uEEBgW4Imr_g-__YN0NY3-vLa_vEuYIwRzlrnRF3s0Vz8wDb937XfoxDbpPFapWvz0wH5TO2rK-32zQ2WLv8_loqE9rZIn_x5RzgtTyxrOQcUN-POOgDziDZNngjf/s1700-e365/zoom-gitlab.jpg" style="display: block;  text-align: center; clear: left; float: left;"></a></div>
<p>Zoom and GitLab have released security updates to resolve a number of security vulnerabilities that could result in denial-of-service (DoS) and remote code execution.</p>
<p>The most severe of the lot is a critical security flaw impacting Zoom Node Multimedia Routers (MMRs) that could permit a meeting participant to conduct remote code execution attacks. The vulnerability, tracked as <strong>CVE-2026-22844</strong> and discovered internally by its Offensive Security team, carries a CVSS score of 9.9 out of 10.0.</p>
<p>&#8220;A command injection vulnerability in Zoom Node Multimedia Routers (MMRs) before version 5.2.1716.0 may allow a meeting participant to conduct remote code execution of the MMR via network access,&#8221; the company <a href="https://www.zoom.com/en/trust/security-bulletin/zsb-26001/" rel="noopener" target="_blank">noted</a> in a Tuesday alert.</p>
<p>Zoom is recommending that customers using Zoom Node Meetings, Hybrid, or Meeting Connector deployments update to the latest available MMR version to safeguard against any potential threat.</p>
<p>There is no evidence that the security flaw has been exploited in the wild. The vulnerability affects the following versions &#8211;</p>
<ul>
<li>Zoom Node Meetings Hybrid (ZMH) MMR module versions prior to 5.2.1716.0</li>
<li>Zoom Node Meeting Connector (MC) MMR module versions prior to 5.2.1716.0</li>
</ul>
<h3>GitLab Releases Patches for Severe Flaws</h3>
<p>The disclosure comes as GitLab <a href="https://about.gitlab.com/releases/2026/01/21/patch-release-gitlab-18-8-2-released/" rel="noopener" target="_blank">released</a> fixes for multiple high-severity flaws affecting its Community Edition (CE) and Enterprise Edition (EE) that could result in DoS and a bypass of two-factor authentication (2FA) protections. The shortcomings are listed below &#8211;</p>
<ul>
<li><strong>CVE-2025-13927</strong> (CVSS score: 7.5) &#8211; A vulnerability that could allow an unauthenticated user to create a DoS condition by sending crafted requests with malformed authentication data (Affects all versions from 11.9 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2)</li>
<li><strong>CVE-2025-13928</strong> (CVSS score: 7.5) &#8211; An incorrect authorization vulnerability in the Releases API that could allow an unauthenticated user to cause a DoS condition (Affects all versions from 17.7 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2)</li>
<li><strong>CVE-2026-0723</strong> (CVSS score: 7.4) &#8211; A vulnerability that could allow an individual with existing knowledge of a victim&#8217;s credential ID to bypass 2FA by submitting forged device responses (Affects all versions from 18.6 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 )</li>
</ul>
<p>Also remediated by GitLab are two other medium-severity bugs that could also trigger a DoS condition (CVE-2025-13335, CVSS score: 6.5, and CVE-2026-1102, CVSS score: 5.3) by configuring malformed Wiki documents that bypass cycle detection and sending repeated malformed SSH authentication requests, respectively.</p>
</div>
<p><br />
<br /><a href="https://thehackernews.com/2026/01/zoom-and-gitlab-release-security.html" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/zoom-and-gitlab-release-security-updates-fixing-rce-dos-and-2fa-bypass-flaws/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How Smart MSSPs Using AI to Boost Margins with Half the Staff</title>
		<link>https://cyberwiredaily.com/how-smart-mssps-using-ai-to-boost-margins-with-half-the-staff/</link>
					<comments>https://cyberwiredaily.com/how-smart-mssps-using-ai-to-boost-margins-with-half-the-staff/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Tue, 27 Jan 2026 22:30:33 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[cyber news]]></category>
		<category><![CDATA[cyber security news]]></category>
		<category><![CDATA[cyber security news today]]></category>
		<category><![CDATA[cyber security updates]]></category>
		<category><![CDATA[cyber updates]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hacker news]]></category>
		<category><![CDATA[hacking news]]></category>
		<category><![CDATA[how to hack]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[ransomware malware]]></category>
		<category><![CDATA[software vulnerability]]></category>
		<category><![CDATA[the hacker news]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/how-smart-mssps-using-ai-to-boost-margins-with-half-the-staff/</guid>

					<description><![CDATA[Every managed security provider is chasing the same problem in 2026 — too many alerts, too few analysts, and clients demanding &#8220;CISO-level protection&#8221; at SMB budgets. The truth? Most MSSPs are running harder, not smarter. And it&#8217;s breaking their margins. That&#8217;s where the quiet revolution is happening: AI isn&#8217;t just writing reports or surfacing risks [...]]]></description>
										<content:encoded><![CDATA[<p> <br />
</p>
<div id="articlebody">
<div class="separator" style="clear: both;"><a href="https://thehacker.news/ai-security-management?source=article" style="display: block;  text-align: center; clear: left; float: left;cursor: pointer; "></a></div>
<p>Every managed security provider is chasing the same problem in 2026 — too many alerts, too few analysts, and clients demanding &#8220;CISO-level protection&#8221; at SMB budgets.</p>
<p>The truth? Most MSSPs are running harder, not smarter. And it&#8217;s breaking their margins. That&#8217;s where the quiet revolution is happening: AI isn&#8217;t just writing reports or surfacing risks — it&#8217;s rebuilding how security services are <em>delivered</em>.</p>
<h3><strong>The Shift</strong></h3>
<p>Until now, MSSPs scaled by adding people. Each new client meant another analyst, another spreadsheet, another late-night ticket queue.</p>
<p>AI automation flips that model. It handles assessments, benchmarking, and reporting in minutes — freeing your team to focus on strategy, not data entry.</p>
<p>Early adopters are already seeing double-digit margin gains and faster onboarding cycles — without increasing headcount.</p>
<h3><strong>Real Proof — Not Theory</strong></h3>
<p>When <strong>Chad Robinson</strong>, CISO at Secure Cyber Defense, applied Cynomi&#8217;s AI platform, his team stopped drowning in manual checklists. He didn&#8217;t just automate reports; he turned junior analysts into &#8220;virtual CISOs,&#8221; expanding coverage and growing revenue from advisory services — all by standardizing delivery through AI.</p>
<p style="margin: 30px 0px; text-align: center;">
  <a href="https://thehacker.news/ai-security-management?source=article" style="background-color: transparent; border-radius: 4px; border: 2px solid rgb(44, 62, 80); color: #2c3e50; display: inline-block; font-size: 16px; font-weight: 700; padding: 10px 20px; text-decoration: none;">Secure your spot for the live session ➜</a>
</p>
<h3><strong>What You&#8217;ll Learn</strong></h3>
<p>In this session, <strong>Cynomi CEO David Primor</strong> and <strong>Chad Robinson</strong> unpack the real operating blueprint:</p>
<ul>
<li>How AI eliminates the grunt work that eats profit</li>
<li>How to tier and package cybersecurity services for steady MRR</li>
<li>What actually moved the needle for a growing MSSP — and how you can copy it</li>
<li>How AI enables consistent, CISO-grade service at scale</li>
</ul>
<p>If you&#8217;re still hiring your way out of the workload crisis, you&#8217;re already behind. The MSSPs winning 2026 aren&#8217;t bigger — they&#8217;re <em>smarter</em>.</p>
<p>Join the live session to see how AI can scale your security business without scaling your payroll.</p>
<p style="margin: 30px 0px; text-align: center;">
  <a href="https://thehacker.news/ai-security-management?source=article" style="background-color: transparent; border-radius: 4px; border: 2px solid rgb(44, 62, 80); color: #2c3e50; display: inline-block; font-size: 16px; font-weight: 700; padding: 10px 20px; text-decoration: none;">Register for the Webinar ➜</a>
</p>
<div class="cf note-b">Found this article interesting? <span class="">This article is a contributed piece from one of our valued partners.</span> Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</div>
</div>
<p><script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script><br />
<br /><br />
<br /><a href="https://thehackernews.com/2026/01/webinar-how-smart-mssps-using-ai-to.html" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/how-smart-mssps-using-ai-to-boost-margins-with-half-the-staff/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Exposure Assessment Platforms Signal a Shift in Focus</title>
		<link>https://cyberwiredaily.com/exposure-assessment-platforms-signal-a-shift-in-focus/</link>
					<comments>https://cyberwiredaily.com/exposure-assessment-platforms-signal-a-shift-in-focus/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Tue, 27 Jan 2026 18:22:52 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[cyber news]]></category>
		<category><![CDATA[cyber security news]]></category>
		<category><![CDATA[cyber security news today]]></category>
		<category><![CDATA[cyber security updates]]></category>
		<category><![CDATA[cyber updates]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hacker news]]></category>
		<category><![CDATA[hacking news]]></category>
		<category><![CDATA[how to hack]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[ransomware malware]]></category>
		<category><![CDATA[software vulnerability]]></category>
		<category><![CDATA[the hacker news]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/exposure-assessment-platforms-signal-a-shift-in-focus/</guid>

					<description><![CDATA[Gartner® doesn&#8217;t create new categories lightly. Generally speaking, a new acronym only emerges when the industry&#8217;s collective &#8220;to-do list&#8221; has become mathematically impossible to complete. And so it seems that the introduction of the Exposure Assessment Platforms (EAP) category is a formal admission that traditional Vulnerability Management (VM) is no longer a viable way to [...]]]></description>
										<content:encoded><![CDATA[<p> <br />
</p>
<div id="articlebody">
<div class="separator" style="clear: both;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQmSU5s0ahHNb_O6TnXm0i8cw93oK40sAl5By7cIbChjHl5xUqt4_24bcXtVXugQG4zcGbsmtbZz-QTvhOyWRhyxuYPB6nmaY65vANZFcuBHeqSuELPN7JbGTfHaAn5JlSFt_C00S_RMkS9I2UyDUQaCWr2lj6qDKe8ys1D2ZA3myEEZDEEcej12BJWvM/s1700-e365/xmcyber.jpg" style="clear: left; display: block; float: left;  text-align: center;"></a></div>
<p>Gartner® doesn&#8217;t create new categories lightly. Generally speaking, a new acronym only emerges when the industry&#8217;s collective &#8220;to-do list&#8221; has become mathematically impossible to complete. And so it seems that the introduction of the <a href="https://xmcyber.com/glossary/exposure-assessment-platforms/" rel="noopener" target="_blank">Exposure Assessment Platforms (EAP)</a> category is a formal admission that traditional Vulnerability Management (VM) is no longer a viable way to secure a modern enterprise.</p>
<p>The shift from the traditional <em>Market Guide for Vulnerability Assessment</em> to the new <em>Magic Quadrant for EAPs</em> represents a move away from the &#8220;vulnerability hose&#8221;, i.e., the endless stream of CVEs, and toward a model of <a href="https://xmcyber.com/ctem/" rel="noopener" target="_blank">Continuous Threat Exposure Management (CTEM)</a>. To us, this is more than just a change in terminology; it is an attempt to solve the &#8220;Dead End&#8221; paradox that has plagued security teams for a decade.</p>
<p>In the inaugural Magic Quadrant report of this category, Gartner evaluated 20 vendors for their ability to support continuous discovery, risk-informed prioritization, and integrated visibility across cloud, on-prem, and identity layers. In this article, we&#8217;ll take a deep dive into the key findings of the report, the drivers behind the new category, the features that define it, and what we see as the takeaways for security teams.</p>
<h2 style="text-align: left;"><strong>Why Exposure Assessment Is Gaining Ground</strong></h2>
<p>Security tools have always promised risk reduction, but they&#8217;ve mostly delivered noise. One product would reveal a misconfiguration. Another would log a privilege drift. A third would flag vulnerable external-facing assets. The result is a crisis of volume that has led to chronic alert fatigue in the SOC. Each tool provided a piece of the puzzle, yet none were able to put all the pieces together and explain how exposure forms&#8230;or what to fix first to avoid it. </p>
<p>The skepticism toward legacy VM tools is well-earned. Data from over 15,000 environments shows that 74% of identified exposures are &#8220;dead ends&#8221;, existing on assets that have no viable path to a critical system. In the old model, a security team might spend 90% of its remediation effort fixing these dead ends, yielding effectively zero reduction in risk to business processes.</p>
<p>This is what EAPs are designed to address. They pull all those pieces into a unified view that tracks how systems, identities, and vulnerabilities interact in real environments and show <em>how</em> an attacker could actually use it to move from a low-risk dev environment to critical assets.</p>
<p><a name="more"/></p>
<p>This model is gaining traction because it reflects how attackers operate. Threat actors don&#8217;t limit themselves to a single flaw. They have weak controls, misaligned privileges, and blind spots in detection. The EAP model tracks how exposures accumulate across environments and lead attackers to reachable assets. Platforms in this category are built to show where risk originates, how it spreads, and which conditions support attacker movement.</p>
<p>Gartner projects that organizations using this approach will <em>reduce unplanned downtime by 30% by 2027</em>. That kind of dramatic outcome is based on an equally dramatic change in how exposure is defined, modeled, and operationalized across environments. The shift touches every layer of the security workflow &#8211; from how signals are connected to how teams decide what to fix first.</p>
<h2 style="text-align: left;"><strong>Drill Down: From Static Lists to Exposure in Motion</strong></h2>
<p>That shift in workflow begins with how EAPs detect and connect the conditions that lead to risk. Exposure assessment platforms take a different approach than traditional vulnerability tools. They&#8217;re built around a distinct set of capabilities:</p>
<ul>
<li><strong>They consolidate discovery across environments.</strong> EAPs continuously scan internal networks, cloud workloads, and user-facing systems to identify both known and untracked assets, alongside unmanaged identities, misconfigured roles, and legacy systems that may not appear in standard inventories.</li>
<li><strong>They prioritize based on context, not just severity.</strong> Exposure is ranked using multiple parameters &#8211; asset importance, access paths, exploitability, and control coverage. This allows teams to see which issues are reachable, which are isolated, and which enable lateral movement.</li>
<li><strong>They integrate exposure data into operational workflows.</strong> EAP output is designed to support action. Platforms connect with IT and security tools so findings can be assigned, tracked, and resolved through existing systems &#8211; without waiting for a quarterly audit or manual review.</li>
<li><strong>They support lifecycle tracking.</strong> Once exposures are identified, EAPs monitor them across remediation steps, configuration changes, and policy updates. That visibility helps teams understand what&#8217;s been fixed, what remains, and how each adjustment affects risk posture.</li>
</ul>
<h2 style="text-align: left;"><strong>What the Quadrant Reveals About Market Maturity</strong></h2>
<p>The new Magic Quadrant highlights a split in the market. On one side, you have legacy incumbents attempting to &#8220;bolt on&#8221; exposure features to their existing scanning engines. On the other, you have native Exposure Management players who have been modeling attacker behavior for years.</p>
<p>The maturity of the category is evidenced by a shift in the &#8220;definition of done.&#8221; Success is no longer measured by how many vulnerabilities were patched, but by how many critical attack paths were eliminated. Platforms like XM Cyber, which were built on attack graph-based modeling, are now leading the way for this approach.</p>
<h2 style="text-align: left;"><strong>What Security Teams Should Be Watching</strong></h2>
<p>Exposure assessment now stands as its own category, with defined capabilities, evaluation criteria, and a growing role in enterprise workflows. The platforms in the Magic Quadrant are identifying connected exposures, mapping which assets can be reached, and guiding remediation based on attacker movement. </p>
<p>For the practitioner, the immediate value is efficiency. These platforms are making decisions about what to fix first, how to assign ownership, and where risk reduction will have the most impact. Exposure assessment is now positioned as a core layer in how environments are secured, maintained, and understood. If you can mathematically prove that 74% of your alerts can be safely ignored, you aren&#8217;t just &#8220;improving security&#8221; – you&#8217;re returning time and resources to a team that is likely already at its breaking point. The EAP category is finally aligning security metrics with business reality. The question is no longer &#8220;How many vulnerabilities do we have?&#8221; but &#8220;Are we safe from the attack paths that matter?&#8221;</p>
<p>To learn more about why XM Cyber was named a challenger in the 2025 Magic Quadrant for exposure assessment platforms, <a href="https://info.xmcyber.com/xm-cyber-challenger-in-the-first-ever-2025-gartner-magic-quadrant-for-exposure-assessment-platforms" target="_blank">grab your copy of the report here</a>.</p>
<p><strong>Note</strong>: <em>This article was expertly written and contributed by Maya Malevich, Head of Product Marketing at XM Cyber.</em></p>
<div class="cf note-b">Found this article interesting? <span class="">This article is a contributed piece from one of our valued partners.</span> Follow us on <a href="https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ" rel="noopener" target="_blank">Google News</a>, <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter</a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</div>
</div>
<p><script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script><br />
<br /><br />
<br /><a href="https://thehackernews.com/2026/01/exposure-assessment-platforms-signal.html" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/exposure-assessment-platforms-signal-a-shift-in-focus/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Chainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs</title>
		<link>https://cyberwiredaily.com/chainlit-ai-framework-flaws-enable-data-theft-via-file-read-and-ssrf-bugs/</link>
					<comments>https://cyberwiredaily.com/chainlit-ai-framework-flaws-enable-data-theft-via-file-read-and-ssrf-bugs/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Tue, 27 Jan 2026 14:18:44 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[cyber news]]></category>
		<category><![CDATA[cyber security news]]></category>
		<category><![CDATA[cyber security news today]]></category>
		<category><![CDATA[cyber security updates]]></category>
		<category><![CDATA[cyber updates]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hacker news]]></category>
		<category><![CDATA[hacking news]]></category>
		<category><![CDATA[how to hack]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[ransomware malware]]></category>
		<category><![CDATA[software vulnerability]]></category>
		<category><![CDATA[the hacker news]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/chainlit-ai-framework-flaws-enable-data-theft-via-file-read-and-ssrf-bugs/</guid>

					<description><![CDATA[Security vulnerabilities were uncovered in the popular open-source artificial intelligence (AI) framework Chainlit that could allow attackers to steal sensitive data, which may allow for lateral movement within a susceptible organization. Zafran Security said the high-severity flaws, collectively dubbed ChainLeak, could be abused to leak cloud environment API keys and steal sensitive files, or perform [...]]]></description>
										<content:encoded><![CDATA[<p> <br />
</p>
<div id="articlebody">
<div class="separator" style="clear: both;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOQfYQeWdwmviN0kYk0o1lwduXDGiv53wwizZeyajke-6SGNlGc1wdSk5yUWZ_Bt4-yQrihJrMohBqDcsqStLjmdJ_YfRZ2vM27oKy4LVviBgbJHP71E2MWRRf_d39VMy7BQ2WzIxl-s0ufscfKHo8AL9Dj0W77aRmVM_lNvGAeOwN1Xxf7IGoG7DwTbus/s1700-e365/exploit.jpg" style="display: block;  text-align: center; clear: left; float: left;"></a></div>
<p>Security vulnerabilities were uncovered in the popular open-source artificial intelligence (AI) framework <a href="https://pepy.tech/projects/chainlit" rel="noopener" target="_blank">Chainlit</a> that could allow attackers to steal sensitive data, which may allow for lateral movement within a susceptible organization.</p>
<p>Zafran Security <a href="https://www.zafran.io/resources/chainleak-critical-ai-framework-vulnerabilities-expose-data-enable-cloud-takeover" rel="noopener" target="_blank">said</a> the high-severity flaws, collectively dubbed <strong>ChainLeak</strong>, could be abused to leak cloud environment API keys and steal sensitive files, or perform server-side request forgery (SSRF) attacks against servers hosting AI applications.</p>
<p><a href="https://docs.chainlit.io/get-started/overview" rel="noopener" target="_blank">Chainlit</a> is a framework for creating conversational chatbots. According to statistics shared by the Python Software Foundation, the package has been downloaded over <a href="https://pypistats.org/packages/chainlit" rel="noopener" target="_blank">220,000 times</a> over the past week. It has attracted a total of 7.3 million downloads to date.</p>
<p>Details of the two vulnerabilities are as follows &#8211;</p>
<ul>
<li><strong><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22218" rel="noopener" target="_blank">CVE-2026-22218</a></strong> (CVSS score: 7.1) &#8211; An arbitrary file read vulnerability in the &#8220;/project/element&#8221; update flow that allows an authenticated attacker to access the contents of any file readable by the service into their own session due to a lack of validation of user-controller fields </li>
<li><strong><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22219" rel="noopener" target="_blank">CVE-2026-22219</a></strong> (CVSS score: 8.3) &#8211; An SSRF vulnerability in the &#8220;/project/element&#8221; update flow when configured with the SQLAlchemy data layer backend that allows an attacker to make arbitrary HTTP requests to internal network services or cloud metadata endpoints from the Chainlit server and store the retrieved responses</li>
</ul>
<p><a name="more"/></p>
<p>&#8220;The two Chainlit vulnerabilities can be combined in multiple ways to leak sensitive data, escalate privileges, and move laterally within the system,&#8221; Zafran researchers Gal Zaban and Ido Shani said. &#8220;Once an attacker gains arbitrary file read access on the server, the AI application&#8217;s security quickly begins to collapse. What initially appears to be a contained flaw becomes direct access to the system&#8217;s most sensitive secrets and internal state.&#8221;</p>
<p>For instance, an attacker can weaponize CVE-2026-22218 to read &#8220;/proc/self/environ,&#8221; allowing them to glean valuable information such as API keys, credentials, and internal file paths that could be used to burrow deeper into the compromised network and even gain access to the application source code. Alternatively, it can be used to leak database files if the setup uses SQLAlchemy with an SQLite backend as its data layer.</p>
<p>What&#8217;s more, if Chainlit is deployed on an Amazon Web Services (AWS) EC2 instance with IMDSv1 enabled, the SSRF vulnerability can be abused to access the link-local address (169.254.169[.]254) and retrieve role endpoints, enabling opportunities for lateral movement within the cloud environment.</p>
<p>Following responsible disclosure on November 23, 2025, both vulnerabilities were addressed by Chainlit in <a href="https://github.com/Chainlit/chainlit/releases/tag/2.9.4" rel="noopener" target="_blank">version 2.9.4</a> released on December 24, 2025.</p>
<p>&#8220;As organizations rapidly adopt AI frameworks and third-party components, long-standing classes of software vulnerabilities are being embedded directly into AI infrastructure,&#8221; Zafran said. &#8220;These frameworks introduce new and often poorly understood attack surfaces, where well-known vulnerability classes can directly compromise AI-powered systems.&#8221;</p>
<h3>Flaw in Microsoft MarkItDown MCP Server</h3>
<p>The disclosure comes as BlueRock disclosed a similar SSRF vulnerability in Microsoft&#8217;s MarkItDown Model Context Protocol (MCP) server dubbed MCP fURI that enables arbitrary calling of URI resources, exposing organizations to privilege escalation, SSRF, and data leakage attacks. The shortcoming affects the server when running in an Amazon Web Services (AWS) EC2 instance using IDMSv1. </p>
<div class="dog_two clear">
<div class="cf"><a href="https:///attack-surface-insight-d" rel="nofollow noopener sponsored" target="_blank"><img fetchpriority="high" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgj01_-EPEkxaROaED9e8h2OIIeT0oXXmcnWEAb3xbOAumwdFU9z8fpwY4vjL11Reywiz9PTesXqQ86D2Eb6FQI46Rcq3mfmaqzr4RxV8S18OBZ7YrmcPIm3T-5ki1ME8gNTIwhKiysr2545hOD7b_O4k9GLx5L4XWdPyaRHJggufYNeAFej_TqWhlmNWxL/s728-e100/Sprocket-d.jpg" width="729" height="91"/></a></div>
</div>
<p>&#8220;This vulnerability allows an attacker to execute the Markitdown MCP tool convert_to_markdown to call an arbitrary uniform resource identifier (URI),&#8221; BlueRock <a href="https://www.bluerock.io/post/mcp-furi-microsoft-markitdown-vulnerabilities" rel="noopener" target="_blank">said</a>. &#8220;The lack of any boundaries on the URI allows any user, agent, or attacker calling the tool to access any HTTP or file resource.&#8221;</p>
<p>&#8220;When providing a URI to the Markitdown MCP server, this can be used to query the instance metadata of the server. A user can then obtain credentials to the instance if there is a role associated, giving you access to the AWS account, including the access and secret keys.&#8221;</p>
<p>The agentic AI security company said its analysis of more than 7,000 MCP servers found that over 36.7% of them are likely exposed to similar SSRF vulnerabilities. To mitigate the risk posed by the issue, it&#8217;s advised to use IMDSv2 to secure against SSRF attacks, implement private IP blocking, restrict access to metadata services, and create an allowlist to prevent data exfiltration.</p>
</div>
<p><br />
<br /><a href="https://thehackernews.com/2026/01/chainlit-ai-framework-flaws-enable-data.html" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/chainlit-ai-framework-flaws-enable-data-theft-via-file-read-and-ssrf-bugs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
