/cyber25dWiper malware targeted Poland energy grid, but failed to knock out electricity - Ars TechnicaSecurity firm ESET reports that Poland's energy grid was targeted by wiper malware, likely from Russian state hackers, on the 10th anniversary of Russia's attack on Ukraine's grid. The attack, which occurred in December, aimed to disrupt communications between renewable installations and power distribution operators but failed. The malware, dubbed DynoWiper, is attributed to the Russian government hacker group Sandworm, known for similar destructive attacks. Despite the attack, there was no successful disruption of electricity delivery.
/cyber25dMulti-Stage Phishing Campaign Targets Russia with Amnesia RAT and RansomwareThis article discusses a multi-stage phishing campaign targeting Russia, using Amnesia RAT and ransomware. The campaign employs social engineering tactics, abuses GitHub and Dropbox, and disables Microsoft Defender to deploy its payloads.
/cyber29dTesla hacked, 37 zero-days demoed at Pwn2Own Automotive 2026Security researchers hacked the Tesla Infotainment System and earned $516,500 at Pwn2Own Automotive 2026 by exploiting 37 zero-days. The Synacktiv Team earned $35,000 for a USB-based attack on Tesla and an additional $20,000 for hacking the Sony XAV-9500ES. Team Fuzzware.io earned $118,000 for hacking various devices, while PetoWorks earned $50,000 for hacking a Phoenix Contact charger. The competition focuses on automotive technologies and takes place in Tokyo, Japan.
/cyberJan 19thBlack Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red NoticeUkrainian and German law enforcement authorities have identified two Ukrainians suspected of working for the Russia-linked ransomware-as-a-service (RaaS) group Black Basta. The group's alleged leader, Oleg Evgenievich Nefedov, has been added to the European Union's Most Wanted and INTERPOL's Red Notice lists. The suspects specialized in technical hacking of protected systems and were involved in preparing cyberattacks using ransomware. Black Basta has targeted over 500 companies across North America, Europe, and Australia, earning hundreds of millions of dollars in cryptocurrency.
/cyberJan 17thGootLoader Malware Uses 500–1,000 Concatenated ZIP Archives to Evade DetectionGootLoader malware employs a sophisticated technique using 500-1,000 concatenated ZIP archives to evade detection, targeting victims through SEO poisoning and malvertising. The malware exploits the default Windows unarchiver, delivering JavaScript payloads that can lead to ransomware. Recent campaigns have introduced further obfuscation, such as custom WOFF2 fonts and exploiting WordPress endpoints.
/cyberJan 16thPrivacy in 2026: Will AI further supercharge surveillance?Do we believe that surveillance is becoming impossible to avoid and rendering privacy unobtainable?
/cyberJan 16thChina-Linked APT Exploits Sitecore Zero-Day in Attacks on American Critical InfrastructureCisco Talos has identified a China-linked APT group, UAT-8837, targeting North American critical infrastructure using a Sitecore zero-day vulnerability. The group exploits this vulnerability to gain initial access and deploys various tools to harvest sensitive information, including credentials and Active Directory details. Once inside, they disable security features, conduct reconnaissance, and potentially exfiltrate sensitive data, raising concerns about supply chain security.
/cyberJan 15thEnough is enough—I dumped Google’s worsening search for Kagi?Is anyone else using Kagi? What is your experience using Kagi?
/cyberJan 15thRussian Cyberattacks Nearly Plunged Poland Into a Nationwide Blackout — UNITED24 MediaPoland faced a severe cyberattack on its energy infrastructure by Russia in December 2025, nearly causing a nationwide blackout, according to Polish officials. The attacks, described as the most serious to date, aimed to cut off electricity to citizens. Despite the threat, Poland's digital security systems remained robust and prepared for future threats.
/cyberJan 15thKaiser Permanente to pay $46 million in privacy data breach settlement. Here's how to file a claim. - CBS San FranciscoKaiser Permanente has settled a class-action lawsuit over patient data breaches, agreeing to pay $46 million to eligible members. The settlement involves alleged breaches from November 2017 to May 2024, where confidential personal and health information was transmitted without consent to companies such as Google, Microsoft, Meta, and Twitter/X. Eligible members in California, Colorado, Georgia, Hawaii, Maryland, Oregon, Virginia, Washington, and the District of Columbia can file a claim for a pro rata share of the settlement, expected to be $20 to $40 per member. The final court approval is scheduled for May 7, with payments to be distributed after any appeals are resolved.
/cyberJan 15thSouth Korean giant Kyowon confirms data theft in ransomware attackSouth Korean conglomerate Kyowon has confirmed a ransomware attack that disrupted its operations and potentially exposed customer data. The attack occurred in January, with the company working to restore services and investigating the extent of the data breach.
/cyberJan 15th64% of third-party applications now access sensitive data without business justificationhttps://thehackernews.com/2026/01/new-research-64-of-3rd-party.html?m=1