
I go through about 25 cybersecurity news portals and blogs every week and pull out the most interesting stories. Then I turn them into this short, digestible summary, so you can stay up to date without trying to follow 25 different sources yourself. 😱
My aim is to create a summary that gives you the gist without needing to open up the source article. But if you do want to dig deeper, all the sources covering the event are linked below each story.
If you enjoy these, come back next Monday
scroll to the bottom to subscribe to the e-mail newsletter.
A joint SentinelOne SentinelLABS and Censys study found 175,000 Ollama AI instances open to the internet across 130 countries, many with tool-calling enabled and no authentication or monitoring. Nearly half support code execution and external API access, raising the stakes for LLMjacking, prompt injection, and unmetered resource abuse.
Key Details
Next Steps
Read more at The Hacker News, SecurityWeek, Cybersecurity News
A fake Visual Studio Code extension masquerading as the AI assistant Clawdbot/Moltbot automatically executes at IDE startup to install a pre-configured ScreenConnect client, giving attackers persistent remote access.
Key Details
config.json from clawdbot DOT getintwopc DOT site, ran Code.exe to deploy ConnectWise ScreenConnect.DWrite.dll sideloaded from Dropbox and alternate batch-script domains.Next Steps
Read more at Cybersecurity News, The Hacker News
Mandiant warns that the ShinyHunters extortion group and affiliates are calling employees with vishing pretexts to harvest SSO credentials and MFA codes via company-branded phishing sites in real time.Once inside Okta, Microsoft Entra, or Google SSO dashboards, attackers enroll their own MFA devices and pivot to SaaS apps—Salesforce, M365, SharePoint, Slack, and more—to conduct large-scale data exfiltration and extortion.
Key Details
Next Steps
Read more at The Hacker News, Google Cloud Blog, Google Cloud Blog, BleepingComputer, BleepingComputer
On December 29, 2025, coordinated destructive cyber attacks struck over 30 wind and solar farms, a combined heat and power (CHP) plant, and a manufacturing firm in Poland, deploying custom wiper malware to damage controllers and delete system files.CERT Polska attributes the campaign to the FSB-backed Static Tundra cluster, while OT-security firm Dragos links a parallel strike on distributed energy resources to Russia-aligned ELECTRUM, highlighting conflicting attributions.The adversaries exploited exposed FortiGate devices and static credentials to move laterally, underscoring risks in perimeter security and OT-IT segmentation.
Key Details
Next Steps
Read more at The Hacker News, CERT Polska, The Hacker News (Dragos Electrum), The Hacker News, Dragos Intelligence Brief, SecurityWeek
The campaign starts with users being shown convincing but fraudulent security warnings, suggesting their phones are infected and require immediate action. These messages pressure people into installing a bogus antivirus-style app called TrustBastion, which at first seems legitimate.Bitdefender researchers identified that when users click to update the TrustBastion, the app connects to a server that redirects them to a Hugging Face repository hosting the actual malicious Android application. Attackers regenerate new versions of the malware approximately every fifteen minutes through server-side polymorphism, making detection even more difficult.
Key Details
Next Steps
Read more at Cybersecurity News, SecurityWeek, BleepingComputer
A serious WinRAR flaw patched in July 2025 is still being actively used in attacks, largely because many systems remain unpatched. The vulnerability (CVE-2025-8088) allows malicious RAR files to exploit a path-traversal weakness — meaning WinRAR can be tricked into extracting files into dangerous locations on a Windows machine, not just the folder the user selected.
In practice, attackers use this to drop malware into places like the Windows Startup folder, where it will run automatically the next time the user logs in.
Key Details
Next Steps
Read more at Dark Reading, The Hacker News, SecurityWeek, CyberScoop
Researchers have identified two new flaws in the n8n low-code AI workflow platform that let authenticated users bypass JavaScript and Python sandboxes to execute arbitrary code on the host.Because n8n holds credentials and orchestrates integrations for CRM, cloud, databases, LLMs and other critical platforms, unpatched instances expose organizations to full platform takeover and lateral movement.
Key Details
Next Steps
Read more at JFrog, Dark Reading, The Hacker News, SecurityWeek, CSO Online
Subscribe to receive this weekly cybersecurity news summary to your inbox every Monday.