Cyber OSINT Overview, Jan 12 - Jan 18, 2026 #
This brief consolidates key updates from 80+ sources, including government organizations, cybersecurity vendors, threat intelligence teams, security research labs, and blogs from cybersecurity communities and professionals. It highlights the most significant threats, vulnerabilities, and developments from the past week to keep you informed.
Most Discussed Topics #
- Microsoft’s January 2026 Patch Tuesday addressed 112-114 vulnerabilities, notably including CVE-2026-20805, a Desktop Window Manager (DWM) information disclosure flaw actively exploited in the wild. Other critical patches covered Remote Code Execution (RCE) bugs in Microsoft Office and the removal of legacy third-party modem drivers like agrsm64.sys and agrsm.sys due to security risks. Organizations are urged to prioritize these updates to mitigate risks of privilege escalation and credential compromise.
- gov cyber.gc.ca: Microsoft security advisory – January 2026 monthly rollup (AV26-024)
- vendor tenable.com: Microsoft’s January 2026 Patch Tuesday Addresses 113 CVEs (CVE-2026-20805)
- vendor thezdi.com: The January 2026 Security Update Review
- Multiple high-severity vulnerabilities in Fortinet products are being actively discussed and targeted, specifically CVE-2025-64155 impacting FortiSIEM. This command injection flaw allows unauthenticated remote attackers to execute arbitrary code with root privileges on Super and Worker nodes. Additionally, CVE-2025-25249 was disclosed as an RCE vulnerability in the CAPWAP Wireless Aggregate Controller Daemon affecting FortiOS and FortiSwitchManager.
- gov cyber.gc.ca: Fortinet security advisory (AV26-023)
- vendor arcticwolf.com: CVE-2025-64155: FortiSIEM Remote Unauthenticated Command Injection Vulnerability
- vendor socradar.io: CVE-2025-64155: Critical FortiSIEM Flaw Allows Remote Root Access
- The security and ethics of generative AI and AI agents have come under intense scrutiny, particularly regarding X’s Grok. Lawmakers and regulators are investigating the platform for its ‘spicy mode’ allowing the creation of nonconsensual sexualized imagery of women and minors. Furthermore, security researchers are identifying critical vulnerabilities in AI agent frameworks like n8n, ServiceNow, and Google Vertex AI, highlighting the emerging attack surface of ‘Agentic AI’.
- news cyberscoop.com: California AG launches investigation into X’s sexualized deepfakes
- news thecyberexpress.com: Grok Image Abuse Prompts X to Roll Out New Safety Limits
- news darkreading.com: 'Most Severe AI Vulnerability to Date' Hits ServiceNow
Critical Vulnerabilities #
- CVE-2025-64155 is a critical OS command injection vulnerability in Fortinet FortiSIEM (CVSS 9.8) that allows unauthenticated root access via crafted TCP requests. Proof-of-concept exploit code has been released, and active exploitation has been observed on honeypot infrastructure. Administrators must upgrade affected instances to versions 7.4.1, 7.3.5, or 7.2.7 or higher immediately.
- gov cyber.gc.ca: Fortinet security advisory (AV26-023)
- vendor tenable.com: CVE-2025-64155: Exploit Code Released for Critical Fortinet FortiSIEM Command Injection Vulnerability
- n8n workflow automation software is affected by several high-severity flaws, including CVE-2026-21858 (CVSS 10.0), a Content-Type confusion vulnerability enabling unauthenticated RCE. Attackers can chain this with CVE-2025-68613 to extract sensitive secrets and achieve complete server takeover. Users are advised to upgrade to n8n version 1.121.0 or later.
- gov cyber.gc.ca: AL26-001 – Vulnerabilities affecting n8n – CVE-2026-21858, CVE-2026-21877 and CVE-2025-68613
- vendor fortiguard.com: n8n Unauthenticated Remote Code Execution
- CVE-2025-14847, known as ‘MongoBleed,’ is a critical unauthenticated memory disclosure vulnerability in MongoDB Server (CVSS 8.7). By exploiting a trust issue in zlib-compressed network messages, attackers can leak sensitive heap memory containing credentials and PII. CISA has added this flaw to the KEV Catalog following confirmed active exploitation in the wild.
- vendor asec.ahnlab.com: MongoBleed (CVE-2025-14847): A Critical MongoDB Memory Leak Vulnerability Hidden for 8 Years
- vendor paloaltonetworks.com: Threat Brief: MongoDB Vulnerability (CVE-2025-14847)
- A maximum-severity zero-day vulnerability (CVE-2025-20393, CVSS 10.0) was patched in Cisco Secure Email Gateway and Email and Web Manager appliances. The flaw in the Spam Quarantine feature allows unauthenticated root command execution via crafted HTTP requests. It was actively exploited by China-nexus threat actor UAT-9686 since November 2025 to deploy the ‘AquaShell’ backdoor.
- news cybersecuritynews.com: Cisco 0-Day RCE Secure Email Gateway Vulnerability Exploited in the Wild
- news securityaffairs.com: China-linked APT UAT-9686 abused now patched maximum severity AsyncOS bug
- Modular DS WordPress plugin versions 2.5.1 and earlier are vulnerable to critical privilege escalation (CVE-2026-23550, CVSS 10.0). Attackers can bypass authentication to automatically log in as an administrator by exploiting flawed ‘direct request’ routing. Active exploitation began in mid-January 2026, aimed at taking over sites and creating unauthorized admin users.
- news securityaffairs.com: Actively exploited critical flaw in Modular DS WordPress plugin enables admin takeover
- ServiceNow addressed CVE-2025-12420, a critical privilege escalation vulnerability in its Now Assist AI Platform. The flaw resided in the Now Assist AI Agents and Virtual Agent API, potentially allowing attackers to gain unauthorized access levels. Organizations using AI Agent versions prior to 5.1.18 or 5.2.19 are encouraged to apply security updates immediately.
- gov cyber.gc.ca: ServiceNow security advisory (AV26-022)
- news darkreading.com: 'Most Severe AI Vulnerability to Date' Hits ServiceNow
- Siemens released multiple advisories for Industrial Edge Devices, SCALANCE, SIMATIC, and SIPLUS products. Notable vulnerabilities include CVE-2025-40805, an authorization bypass allowing unauthenticated impersonation, and CVE-2025-40944, a denial-of-service vulnerability triggered by malformed S7 protocol disconnect requests. Users should restrict network access and apply the latest firmware updates.
- gov cyber.gc.ca: [Control systems] Siemens security advisory (AV26-020)
- gov cisa.gov: Siemens SIMATIC and SIPLUS products
Major Incidents #
- The Canadian Investment Regulatory Organization (CIRO) confirmed a major data breach impacting 750,000 investors following an August 2025 phishing attack. The investigation revealed that sensitive data including social insurance numbers, government IDs, and account statements were copied. While there is no current evidence of data misuse on the dark web, CIRO is providing two years of credit monitoring to victims.
- news securityaffairs.com: Data breach at Canada’s Investment Watchdog Canadian Investment Regulatory Organization impacts 750,000 people
- news therecord.media: Canadian investment regulator confirms hackers hit 750,000 investors
- Kyowon Group, a major South Korean conglomerate, suffered a ransomware attack that potentially compromised 9.6 million user accounts. The incident forced 600 of the company’s 800 servers offline and impacted numerous subsidiaries, including educational and travel services. The breach reportedly originated from an internet-exposed external server used to gain initial network access.
- news securityaffairs.com: A ransomware attack disrupted operations at South Korean conglomerate Kyowon
- Poland prevented a nationwide power blackout in late December following a severe cyberattack attributed to Russian sabotage. The attack targeted energy infrastructure during extreme winter weather to maximize destabilization. Polish officials stated they were ‘very close’ to a total outage before successfully stabilizing the network.
- news thecyberexpress.com: Cyberattack Hits Poland’s Power System, But Blackout Prevented
- Central Maine Healthcare reported a breach affecting over 145,000 patients after unauthorized access occurred between March and June 2025. Exposed data included names, birth dates, treatment information, and social security numbers. The nonprofit healthcare provider has since implemented enhanced monitoring software to protect its IT environment.
- news securityaffairs.com: Central Maine Healthcare data breach impacted over 145,000 patients
- The Anchorage Police Department (APD) took several servers offline as a precaution after its technology service provider, Whitebox Technologies, reported a cybersecurity incident. APD stated there is currently no evidence of compromised departmental data. The incident reflects the growing risk to local government agencies from third-party supply chain vulnerabilities.
- news thecyberexpress.com: APD Investigates Third-Party Cybersecurity Incident, Says No Evidence of Data Compromise
- news therecord.media: Anchorage police department takes servers offline after cyberattack on service provider
Emerging Threats #
- UAT-8837, a China-nexus threat actor, is conducting targeted campaigns against critical infrastructure in North America. The group uses compromised credentials and exploited zero-days, such as CVE-2025-53690 in Sitecore, to gain initial access. Their toolkit includes Earthworm for SOCKS tunneling and GoTokenTheft for hijacking process access tokens.
- news bleepingcomputer.com: China-linked hackers exploited Sitecore zero-day for initial access
- vendor fortiguard.com: UAT-8837 Critical Infrastructure Attack
- A cloud-native Linux malware framework named ‘VoidLink’ has been identified, originating from Chinese-affiliated developers. The modular framework features rootkit capabilities using LD_PRELOAD and eBPF, designed specifically for long-term access in Kubernetes and Docker environments. It can tailor its behavior based on detected security tools to maintain operational security.
- vendor checkpoint.com: Unveiling VoidLink – A Stealthy, Cloud-Native Linux Malware Framework
- Researchers demonstrated ‘WhisperPair’, a series of Bluetooth attacks that hijack audio accessories using the Google Fast Pair protocol. Affected brands include Sony, Google, and JBL. Attackers can trigger pairing even while devices are in use, allowing for location tracking via the Find Hub network or microphone eavesdropping without user interaction.
- vendor malwarebytes.com: WhisperPair exposes Bluetooth earbuds and headphones to tracking and eavesdropping
- PyStoreRAT is a new supply chain threat targeting developers by using weaponized GitHub repositories disguised as legitimate tools. The campaign uses lightweight Python/JS loader stubs and fileless HTA execution to deploy a modular RAT. It targets developer workflows, aiming to steal credentials and launch follow-on payloads like Rhadamanthys.
- vendor morphisec.com: A New Supply Chain Threat Targeting Developers: What You Need to Know About PyStoreRAT
- A malicious campaign using trojanized ‘RustDesk’ installers has been observed deploying the Winos4.0 backdoor. The installer at the fake domain rustdesk[.]work installs a functional version of the remote access software while quietly staging a hidden loader in memory. This technique evades traditional antivirus by hiding the primary malicious framework entirely within RAM.
- vendor malwarebytes.com: How real software downloads can hide remote backdoors
Regulatory and Policy Updates #
- The U.S. Senate unanimously passed the DEFIANCE Act, establishing federal civil liability for those who knowingly produce or distribute nonconsensual sexually explicit deepfakes. This legislative move aims to empower victims of AI-generated intimate imagery. The bill now proceeds to the House for final approval.
- news cyberscoop.com: California AG launches investigation into X’s sexualized deepfakes
- CISA and the UK National Cyber Security Centre (NCSC-UK) released ‘Secure Connectivity Principles for Operational Technology (OT)’. This guidance provides eight principles to help asset owners design and manage secure connectivity for critical OT environments. The framework aims to help operators of essential services address increasing business pressure for remote access to OT networks.
- gov substack.com: CTO at NCSC Summary: week ending January 18th
- gov cisa.gov: Secure Connectivity Principles for Operational Technology (OT)
- The Department of Homeland Security is finalizing ‘ANCHOR’ (Alliance of National Councils for Homeland Operational Resilience) to replace the disbanded Critical Infrastructure Partnership Advisory Council (CIPAC). ANCHOR will serve as a communication hub for government and industry to plan infrastructure security. Key remaining issues under review include liability protections for ‘one-to-many’ information sharing engagements.
- The NSA published new Zero Trust Implementation Guidelines, including a Primer and Discovery Phase document. These resources offer federal and private-sector entities practical steps for building zero-trust architectures. The guidance focuses on visibility into asset and user inventory as a foundational requirement.
- news gbhackers.com: NSA Publishes New Guidelines for Implementing a Zero Trust Security Model
Security Operations #
- Mandiant released a comprehensive dataset of Net-NTLMv1 rainbow tables to accelerate the deprecation of the insecure legacy protocol. The dataset allows security professionals to recover authentication keys in under 12 hours using consumer hardware. The release aims to demonstrate the practical ease of credential theft via NTLMv1 to encourage organizations to disable it and migrate to stronger protocols.
- news cybersecuritynews.com: Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
- vendor google.com: Closing the Door on Net-NTLMv1: Releasing Rainbow Tables to Accelerate Protocol Deprecation
- AuraInspector is a new open-source tool released by Mandiant for identifying access control misconfigurations in the Salesforce Aura framework. The tool automates the detection of gaps that allow unauthorized access to sensitive data, such as PII and health information. It specifically checks for exposures involving the ‘getConfigData’ method and undocumented GraphQL bypasses.
- vendor google.com: AuraInspector: Auditing Salesforce Aura for Data Exposure
- Let’s Encrypt reached General Availability for its 6-day IP-based and short-lived TLS certificates. These certificates last only 160 hours, significantly reducing the exposure window if private keys are compromised. They are designed for automated environments via ACME and close security gaps in hybrid networks where domain-based validation is not feasible.
- news cybersecuritynews.com: Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
- ConfigManBearPig is a new BloodHound OpenGraph collector designed to map attack paths in Microsoft Configuration Manager (SCCM). The PowerShell-based tool identifies over 30 unique attack techniques, including hierarchy takeover and privilege escalation. It allows defenders to visualize SCCM misconfigurations from an unprivileged domain context.
- vendor specterops.io: Introducing ConfigManBearPig, a BloodHound OpenGraph Collector for SCCM
- Pacific Northwest National Labs developed ‘ALOHA’, an AI-driven cybersecurity system that can reconstruct and test attacks in hours instead of weeks. The tool automates the recreation of complex attack patterns against organizational infrastructure to identify defensive gaps. This highlights the growing role of AI in red teaming and adversarial simulation at scale.
- news darkreading.com: AI System Reduces Attack Reconstruction Time From Weeks to Hours
Wins #
- Microsoft, working with international law enforcement, seized the infrastructure of RedVDS, a major cybercrime marketplace that sold disposable virtual machines for launching attacks. The service was responsible for at least $40 million in fraud losses and enabled over 191,000 Microsoft email account compromises. The operation shut down domains in the US, UK, and Germany, disrupting multiple active cybercrime groups.
- news cyberscoop.com: Microsoft seizes RedVDS infrastructure, disrupts fast-growing cybercrime marketplace
- news thecyberexpress.com: Microsoft Crushes Cybercrime Subscription Service Behind $40 Million Fraud Spree
- German and Ukrainian authorities identified Oleg Nefedov as the leader of the Black Basta ransomware gang and placed him on the Interpol ‘Red Notice’ list. Police conducted raids in Ukraine, arresting two ‘hash crackers’ suspected of facilitating initial access and ransomware deployment. Black Basta is linked to over 500 global victims and hundreds of millions in damages.
- news securityaffairs.com: Ukraine–Germany operation targets Black Basta, Russian leader wanted
- news bleepingcomputer.com: Black Basta boss makes it onto Interpol's 'Red Notice' list
- Feras Albashiti, a Jordanian national operating under the handle ‘r1z’, pleaded guilty to selling access to over 50 corporate networks and EDR-killing malware. An undercover FBI operation traced his IP address to a 2023 ransomware attack that caused $50 million in damage. He face up to 10 years in prison for trafficking unauthorized access credentials and malware.
- Dutch police arrested the alleged 33-year-old operator of AVCheck, a malware testing platform used by criminals to verify if their code could bypass antivirus signatures. The arrest at Schiphol Airport followed the seizure of AVCheck servers in 2025. This success is part of Operation Endgame, which continues to target the enabling services behind malware like Lumma Stealer and Rhadamanthys.
- news hackread.com: Operation Endgame: Dutch Police Arrest Alleged AVCheck Operator
- A critical supply chain vulnerability in AWS CodeBuild, named ‘CodeBreach,’ was remediated within 48 hours of discovery. The flaw could have allowed attackers to take over the AWS Console by exploiting an improperly anchored Regex in the JavaScript SDK. The swift response by Amazon prevented potential infrastructure-wide compromises comparable to the SolarWinds breach.
- news hackread.com: How 2 Missing Characters Nearly Compromised AWS
Disclaimer #
The summaries in this brief are generated autonomously by a LLM based on provided system and user prompts. While every effort is made to consolidate accurate and relevant insights, the model may occasionally misinterpret, misrepresent, or hallucinate information. Readers are strongly advised to verify all key points by consulting the original sources linked in the brief for complete context and accuracy.
The brief is created in collaboration with BlackStork and is based on a free template.
Reach out if you have questions or suggestions.