Firewall Flaws, AI-Built Malware, Browser Traps, Critical CVEs & More


Ravie LakshmananJan 26, 2026Hacking News / Cybersecurity

Security failures rarely arrive loudly. They slip in through trusted tools, half-fixed problems, and habits people stop questioning. This week’s recap shows that pattern clearly.

Attackers are moving faster than defenses, mixing old tricks with new paths. “Patched” no longer means safe, and every day, software keeps becoming the entry point.

What follows is a set of small but telling signals. Short updates that, together, show how quickly risk is shifting and why details can’t be ignored.

⚡ Threat of the Week

Improperly Patched Flaw Exploited Again in Fortinet Firewalls — Fortinet confirmed that it’s working to completely plug a FortiCloud SSO authentication bypass vulnerability following reports of fresh exploitation activity on fully-patched firewalls. “We have identified a number of cases where the exploit was to a device that had been fully upgraded to the latest release at the time of the attack, which suggested a new attack path,” the company said. The activity has been found to exploit an incomplete patch for CVE-2025-59718 and CVE-2025-59719, which could allow unauthenticated bypass of SSO login authentication via crafted SAML messages if the FortiCloud SSO feature is enabled on affected devices. In the absence of a fix, users are advised to restrict administrative access of edge network devices and turn off FortiCloud SSO logins by disabling the “admin-forticloud-sso-login” setting.

🔔 Top News

‎️‍🔥 Trending CVEs

Hackers act fast. They can use new bugs within hours. One missed update can cause a big breach. Here are this week’s most serious security flaws. Check them, fix what matters first, and stay protected.

This week’s list includes — CVE-2026-24061 (GNU InetUtils telnetd), CVE-2026-23760 (SmarterMail), CVE-2026-20045 (Cisco Unified Communications and Webex Calling Dedicated Instance), CVE-2026-22218, CVE-2026-22219 (Chainlit), CVE-2026-1245 (binary-parser), CVE-2025-68143, CVE-2025-68144, CVE-2025-68145 (Anthropic mcp-server-git), CVE-2026-22844 (Zoom), CVE-2025-13927, CVE-2025-13928, CVE-2026-0723 (GitLab CE/EE), CVE-2026-0629 (TP-Link), CVE-2025-49758 (Microsoft SQL Server), CVE-2025-47179 (Microsoft Configuration Manager), CVE-2025-60021 (Apache bRPC), CVE-2025-61937, CVE-2025-64691, CVE-2025-61943, CVE-2025-65118 (AVEVA Process Optimization), CVE-2025-14369 (dr_flac), CVE-2026-0828 (Safetica ProcessMonitorDriver.sys), CVE-2026-0685 (Genshi template engine), CVE-2025-68675 (Apache Airflow), CVE-2025-14533 (Advanced Custom Fields: Extended plugin), CVE-2025-13151 (GNU libtasn1), CVE-2026-0622 (Open5GS WebUI component), CVE-2025-65586 (libheif), CVE-2025-33206 (NVIDIA NSIGHT Graphics for Linux), CVE-2026-1220 (Google Chrome), CVE-2025-66516, CVE-2026-21962, CVE-2025-66516, CVE-2025-54988, CVE-2025-4949, CVE-2025-54874, CVE-2025-49796, CVE-2025-23048 (Oracle), CVE-2026-23744 (@mcpjam/inspector), CVE-2025-13878 (ISC BIND 9), CVE-2025-12383 (Atlassian Bamboo Data Center and Server), CVE-2025-66516 (Atlassian Confluence Data Center and Server), CVE-2026-22755 (Vivotek legacy camera models), CVE-2026-22794 (AppSmith), CVE-2025-67968 (RealHomes CRM plugin), CVE-2026-23594 (HPE Alletra 6000, Alletra 5000 and Nimble Storage), CVE-2026-0920 (LA-Studio Element Kit for Elementor plugin), and CVE-2026-22200 (osTicket).

📰 Around the Cyber World

🎥 Cybersecurity Webinars

  • Cloud Forensics Is Broken. This Is What Works Now → Cloud attacks move fast and often leave little evidence behind. This webinar explains how modern cloud forensics uses host-level data and AI to help security teams understand what happened, how it happened, and respond faster in today’s cloud environments.
  • How to Build a Smarter SOC Without Adding More Tools → Security teams are stretched thin, with too many tools and too little clarity. This webinar breaks down how modern SOCs really work, focusing on practical choices around what to build, buy, and automate—without hype. It’s for teams looking to make smarter decisions with the tools and resources they already have.
  • When Today’s Encryption Won’t Be Enough Tomorrow → Quantum computing is moving from theory to reality, and it will change how data security works. Information that is encrypted today may be broken in the future using more powerful systems. This webinar helps security leaders understand what that risk means in practical terms and how to start preparing now, using clear, real-world approaches that protect data without disrupting existing systems.

🔧 Cybersecurity Tools

  • NetAlertX – It is a simple tool that helps you see what devices are connected to your network. It keeps a live list of computers, phones, servers, and other hardware, and shows when something new appears or changes. This makes it useful for spotting unknown devices, tracking assets, and staying aware of what’s happening across your network without using heavy or complex security tools.
  • RzWeb – It is a simple way to look inside software files without installing any tools. It runs fully in your web browser, so you can open a file and start examining how it works right away. Everything happens on your own machine, which makes it useful for quick checks, learning, or analysis when you don’t want to set up a full reverse-engineering environment.

Disclaimer: These tools are for learning and research only and have not been fully security-tested. Review the code carefully, use it only in safe environments, and follow all applicable rules and laws.

Conclusion

This edition makes one thing clear: risk now sits in everyday tools and normal choices. Small gaps are all it takes.

None of these stories stands alone. They point to a wider pattern where speed matters and delays cost real damage. Treat this list as a snapshot. The details will change. The pressure will not.





Source link