Notepad++ supply chain attack: Researchers reveal details, IoCs, targets

Rapid7 researchers have attributed the recent hijacking of the Notepad++ update mechanism to Lotus Blossom (aka Billbug), a Chinese state-sponsored group known for targeting organizations in Southeast Asia for espionage purposes. On Wednesday, Kaspersk… Continue reading Notepad++ supply chain attack: Researchers reveal details, IoCs, targets

ShinyHunters flip the script on MFA in new data theft attacks

Multi-factor authentication (MFA) is supposed to defend against phishing attacks, but threat actors operating under the ShinyHunters banner are using it as a pretext in ongoing social engineering attacks aimed at bypassing it. Among those successfully … Continue reading ShinyHunters flip the script on MFA in new data theft attacks

How state-sponsored attackers hijacked Notepad++ updates

Suspected Chinese state-sponsored attackers hijacked the Notepad++ update mechanism by compromising the software project’s shared hosting server and intercepting and redirecting update traffic destined for notepad-plus-plus.org, the software&#821… Continue reading How state-sponsored attackers hijacked Notepad++ updates

Ivanti provides temporary patches for actively exploited EPMM zero-day (CVE-2026-1281)

Ivanti has released provisional patches that fix two critical code injection vulnerabilities in Endpoint Manager Mobile (EPMM), one of which (CVE-2026-1281) has been exploited in zero-day attacks and has been added to CISA’s Known Exploited Vulne… Continue reading Ivanti provides temporary patches for actively exploited EPMM zero-day (CVE-2026-1281)

Google disrupts proxy network used by 550+ threat groups

Google has disrupted Ipidea, a massive residential proxy network consisting of user devices that are being used as the last-mile link in cyberattack chains. “In a single seven day period in January 2026, GTIG observed over 550 individual threat g… Continue reading Google disrupts proxy network used by 550+ threat groups

eScan AV supply chain compromise: Users targeted with malicious updates

The update infrastructure for eScan antivirus, a product of Indian cybersecurity company MicroWorld Technologies, has been compromised by unknown attackers to deliver a persistent downloader to enterprise and consumer endpoints. The supply chain compro… Continue reading eScan AV supply chain compromise: Users targeted with malicious updates

SolarWinds fixes critical Web Help Desk RCE vulnerabilities, upgrade ASAP!

SolarWinds has fixed six critical and high-severity vulnerabilities in its popular Web Help Desk (WHD) support ticketing and asset management solution, and is urging customers to upgrade to v2026.1 as soon as possible. The vulnerabilities The WHD vulne… Continue reading SolarWinds fixes critical Web Help Desk RCE vulnerabilities, upgrade ASAP!

WinRAR vulnerability still a go-to tool for hackers, Mandiant warns

State-sponsored hackers and financially motivated attackers continue leveraging a critical WinRAR vulnerability (CVE-2025-8088) that’s been fixed over half a year ago. CVE-2025-8088 is a path traversal vulnerability that can be exploited via mali… Continue reading WinRAR vulnerability still a go-to tool for hackers, Mandiant warns

Fortinet starts patching exploited FortiCloud SSO zero-day (CVE-2026-24858)

Fortinet has begun releasing FortiOS versions that fix CVE-2026-24858, a critical zero-day vulnerability that allowed attackers to log into targeted organizations’ FortiGate firewalls. “This vulnerability was found being exploited in the wi… Continue reading Fortinet starts patching exploited FortiCloud SSO zero-day (CVE-2026-24858)

Attackers use Windows App-V scripts to slip infostealer past enterprise defenses

A malware delivery campaign detailed by Blackpoint researchers employs an impressive array of tricks to deliver an infostealer to employees without triggering enterprise defenses or close examination by security researchers. The attackers aim to get th… Continue reading Attackers use Windows App-V scripts to slip infostealer past enterprise defenses