2026-01

January 01 - January 08, 2026

Subscribe
20
Total Articles
2
Topics
11
Sources
3 days
ago

This Week's Summary

The gap between compliance certifications and actual security has never been more visible. This week brought a parade of breaches and vulnerabilities affecting organizations with SOC 2, ISO 27001, and other frameworks supposedly in place—from Covenant Health's 478,000-record ransomware disaster to critical authentication bypasses in enterprise infrastructure. The pattern is consistent: organizations are checking boxes while missing the fundamentals. Cisco's ISE vulnerability shows admin credential management failures, the RondoDox botnet exploiting a CVSS 10.0 React vulnerability demonstrates patch management theater, and the fact that 90,000 vulnerable instances remain exposed months after disclosure tells you everything about how "vulnerability management programs" perform when tested. The real story isn't that these vulnerabilities exist—it's that organizations with compliance certifications are failing to operationalize the controls they claim to have implemented.

Surveillance capitalism is colliding head-on with privacy regulations, and the outcomes are going to be expensive. Flock's exposed AI surveillance cameras and Wegmans' apparent facial recognition deployment represent a fundamental misunderstanding of how biometric data laws work. The "deploy first, ask forgiveness later" approach that worked in Silicon Valley's early days dies fast when you're collecting biometric identifiers without explicit consent in Illinois, California, or anywhere GDPR applies. The compliance risk here isn't theoretical—it's class actions, regulatory investigations, and DPOs explaining to the board why "legitimate interest" won't survive first contact with a privacy regulator. If you're deploying anything that captures face geometry, gait analysis, or other biometric markers, your legal team should be having very uncomfortable conversations right now.

Supply chain security and social engineering continue to evolve faster than security awareness programs can adapt. The GlassWorm malware targeting developers through trojanized VS Code extensions and the Google Cloud email abuse campaign demonstrate how attackers are exploiting trust in legitimate platforms. Your developers aren't vetting marketplace extensions, your email security can't distinguish abuse of legitimate cloud services from actual legitimate traffic, and your users are copying malicious commands from fake CAPTCHAs because phishing doesn't look like the screenshots from your 2019 training deck anymore. The KMSAuto clipboard stealer that hit 2.8 million systems shows how pirated software becomes your incident response problem, and the Adobe ColdFusion campaign targeting Christmas weekend proves attackers understand your change management calendar better than you do. These aren't sophisticated nation-state attacks—they're basic reconnaissance and exploitation that succeeds because asset inventory, patch management, and user awareness are treated as compliance checkboxes rather than operational disciplines.

The week's IoT and infrastructure vulnerabilities underscore a harsh reality: the perimeter dissolved years ago, but most security programs haven't caught up. The Kimwolf botnet compromising 2 million IoT devices and the critical Bluetooth vulnerability in WHILL wheelchairs represent the same problem at different scales—we're connecting everything to everything without threat modeling what happens when those devices are compromised by default. If your network segmentation assumes IoT devices are trustworthy, if your IP KVM devices have default credentials and no monitoring, if you're not inventorying what's actually connected to your network, then your compliance documentation is fiction. The practitioners who'll survive the next audit cycle are the ones treating every connected device as pre-compromised and building controls accordingly, not the ones with impressive-sounding zero trust frameworks gathering dust in SharePoint.

security incident

18 articles

Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability

Jan 07, 2026 Cisco Security Advisories Score: 1.0

Cisco Identity Services Engine (ISE) and ISE-PIC contain an XML External Entity (XXE) processing vulnerability (CVE-2026-20029) that allows authenticated administrators to read arbitrary files and access sensitive information on the underlying operating system. The vulnerability has a CVSS score of 4.9 and requires valid administrative credentials to exploit. Cisco has released software updates to address this vulnerability with no available workarounds.

My Take

If you're running ISE, patch it—but the real lesson here is that "requires admin creds" doesn't mean low risk when those admin accounts often have weak MFA or get shared across your networking team. This is why credential management and least privilege actually matter, not just for compliance checkboxes.

SOC2 ISO27001 HIPAA PCI-DSS

Key Actions

  • • Immediately upgrade Cisco ISE and ISE-PIC to patched software releases
  • • Review administrative access logs for suspicious file access or uploads
  • • Audit current administrative user privileges and restrict to least-privilege access

Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities

Jan 07, 2026 Cisco Security Advisories Score: 1.0

Cisco has released a security advisory addressing multiple vulnerabilities in Snort 3 DCE/RPC processing that could allow unauthenticated remote attackers to leak sensitive information or cause denial of service. The vulnerabilities affect multiple Cisco products including Secure Firewall Threat Defense Software and IOS XE Software, with CVSS base score of 5.8. Software updates have been released to address these vulnerabilities.

My Take

If you're running Cisco's Snort 3 engine, patch this week—not next quarter when the change control board meets. A 5.8 might not sound scary, but remote info disclosure without authentication is exactly how reconnaissance turns into something worse.

SOC2 ISO27001 PCI-DSS

Key Actions

  • • Identify and inventory affected Cisco products running Snort 3 in production environments
  • • Apply released security patches and software updates immediately
  • • Verify Snort 3 configuration status on Cisco Secure FTD devices (especially those upgraded from 6.7.0 or earlier)

VVS Discord Stealer Using Pyarmor for Obfuscation and Detection Evasion

Jan 02, 2026 Unit 42 Threat Research Score: 0.9

This article analyzes VVS Discord Stealer, a Python-based malware that exfiltrates sensitive user credentials, tokens, and browser data from Discord users and web browsers. The malware uses Pyarmor obfuscation to evade detection and was actively marketed for sale on Telegram starting in April 2025. Organizations need to implement advanced threat detection and incident response measures to protect user credentials and personal data from this infostealer threat.

My Take

If you're storing Discord tokens or relying on browser-based auth for work apps, this is your reminder that infostealers don't care about your compliance certifications—they just work. The real test isn't whether you have "advanced threat detection" checked off somewhere, but whether you'd actually notice credential exfiltration before it shows up in your next breach notification.

SOC2 ISO27001 GDPR

Key Actions

  • • Deploy advanced malware detection tools (WildFire, Cortex XDR/XSIAM) to identify and prevent VVS stealer infections
  • • Implement credential monitoring and access controls for Discord and browser-stored credentials
  • • Conduct incident investigation if compromise is suspected; contact specialized incident response teams

Flock Exposes Its AI-Enabled Surveillance Cameras

Jan 02, 2026 Schneier on Security Score: 0.9

Flock's AI-enabled Condor surveillance cameras have been exposed for capturing and tracking individuals in public spaces with high-resolution facial recognition and behavioral monitoring capabilities. The incident reveals potential privacy violations through unauthorized collection of biometric and personal data without clear consent mechanisms. This exposure raises significant compliance concerns under GDPR and CCPA regarding personal data collection, tracking, and surveillance of individuals.

My Take

The "AI-enabled" framing is doing a lot of work here to distract from what this actually is: mass biometric surveillance without meaningful consent mechanisms. If you're deploying anything that captures biometric data in public-facing environments, your legal team should be having very uncomfortable conversations about BIPA, GDPR Article 9, and whether "legitimate interest" will hold up when the class actions start rolling in.

GDPR CCPA

Key Actions

  • • Review data collection practices and consent mechanisms for compliance with GDPR Article 6 and CCPA requirements
  • • Audit facial recognition and biometric data processing activities to ensure legal basis exists
  • • Implement privacy impact assessments (DPIA) for surveillance systems

The Kimwolf Botnet is Stalking Your Local Network

Jan 02, 2026 Krebs on Security Score: 0.9

The Kimwolf botnet has infected over 2 million devices globally, primarily Android TV boxes and digital photo frames, spreading through residential proxy networks and compromised e-commerce channels. The malware forces infected systems to participate in DDoS attacks, ad fraud, and account takeover attempts while bypassing firewall protections. Organizations need to assess their network security posture and implement controls to detect and prevent lateral movement from compromised IoT devices.

My Take

The real threat here isn't just the botnet—it's that someone's grandmother's digital photo frame is already inside your perimeter, and your firewall never saw it coming. If your network segmentation strategy doesn't assume IoT devices are compromised by default, you're playing security theater while the actual show happens on your internal network.

SOC2 ISO27001

Key Actions

  • • Conduct network segmentation audit to isolate IoT and less-trusted devices from critical systems
  • • Review and strengthen firewall rules and internal network access controls
  • • Implement enhanced monitoring for unusual outbound traffic patterns and DDoS participation indicators

Cryptocurrency Scam Emails and Web Pages As We Enter 2026, (Sun, Jan 4th)

Jan 04, 2026 SANS Internet Storm Center Score: 0.9

Article discusses cryptocurrency scam emails and web pages emerging at the start of 2026, representing a phishing and social engineering security threat. Organizations must implement email security controls and user awareness training to mitigate risks from fraudulent cryptocurrency schemes.

My Take

Crypto scams aren't a compliance issue—they're a user awareness litmus test. If your security training is still using generic phishing examples from 2019 instead of the actual lures hitting your users' inboxes right now, you're wasting everyone's time.

SOC2 ISO27001 GDPR

Key Actions

  • • Implement advanced email filtering and authentication mechanisms (SPF, DKIM, DMARC)
  • • Conduct security awareness training focused on phishing and cryptocurrency scams
  • • Monitor and document security incidents for audit trails and compliance reporting

Telegram Hosting World’s Largest Darknet Market

Jan 05, 2026 Schneier on Security Score: 0.9

Telegram hosts the world's largest darknet markets, with two major Chinese-language marketplaces (Tudou Guarantee and Xinbi Guarantee) facilitating approximately $2 billion monthly in illicit transactions including money laundering, stolen data sales, and scam tools. These platforms enable cybercrime operations including 'pig butchering' romance scams that generate an estimated $10 billion annually from US victims alone.

My Take

If you're a DPO tracking where stolen personal data ends up after a breach, this is your answer—and it's why breach notification is just step one. The real compliance failure here isn't Telegram's; it's every organization still treating data protection like a checkbox exercise while their exfiltrated customer records fuel a $2B monthly marketplace.

GDPR CCPA

Key Actions

  • • Monitor Telegram for illicit marketplace activity and report to law enforcement
  • • Review data breach exposure from stolen data sales on these platforms
  • • Implement enhanced fraud detection for cryptocurrency and romance scam transactions

Risks of OOB Access via IP KVM Devices, (Mon, Jan 5th)

Jan 05, 2026 SANS Internet Storm Center Score: 0.9

Out-of-band (OOB) access via IP KVM devices presents a significant security vulnerability that can bypass standard network controls and authentication mechanisms. This security incident highlights risks to infrastructure management and remote access controls, affecting organizations across multiple compliance frameworks. Organizations need to assess their IP KVM implementations and implement proper segmentation and monitoring.

My Take

IP KVMs are the skeleton key everyone forgets about—they sit outside your beautifully segmented network with direct hardware access and often get deployed with default credentials and zero monitoring. If your last pentest didn't specifically probe OOB management interfaces, you're not actually testing your attack surface.

SOC2 ISO27001 PCI-DSS

Key Actions

  • • Audit all IP KVM devices and out-of-band management interfaces for unauthorized access
  • • Implement network segmentation to isolate OOB management traffic
  • • Enable comprehensive logging and monitoring of OOB access attempts

A phishing campaign with QR codes rendered using an HTML table, (Wed, Jan 7th)

Jan 07, 2026 SANS Internet Storm Center Score: 0.9

A phishing campaign utilizing QR codes embedded in HTML tables has been identified, representing a novel delivery method for credential harvesting attacks. This type of social engineering threat impacts organizations across multiple compliance frameworks that require security incident detection and response capabilities.

My Take

QR codes bypass traditional email security filters because they're just geometric patterns—no malicious URLs to scan until someone points their phone at it. If your security awareness training still shows screenshots of sketchy links with misspellings, it's already obsolete.

SOC2 ISO27001 GDPR HIPAA PCI-DSS

Key Actions

  • • Alert security teams to monitor for QR code-based phishing emails
  • • Update email gateway filters to detect HTML table-based QR code obfuscation techniques
  • • Conduct user awareness training on QR code phishing risks

RondoDox Botnet Exploits Critical React2Shell Flaw to Hijack IoT Devices and Web Servers

Jan 01, 2026 The Hacker News Score: 0.9

The RondoDox botnet is actively exploiting a critical vulnerability (CVE-2025-55182) in React Server Components and Next.js with a CVSS score of 10.0 to hijack IoT devices and web servers for cryptocurrency mining and botnet deployment. With approximately 90,300 vulnerable instances remaining exposed as of December 2025, this represents a significant and ongoing security threat to organizations worldwide. The campaign demonstrates sophisticated multi-phase attack methodology including reconnaissance, vulnerability probing, and large-scale automated deployment.

My Take

If you're running Next.js in production and haven't patched this yet, your compliance certifications won't matter when you're explaining to auditors why your servers are mining crypto for someone else. This is exactly the scenario where "we have a vulnerability management program" gets tested—90,000 exposed instances means most organizations are failing that test.

SOC2 ISO27001 PCI-DSS

Key Actions

  • • Immediately patch Next.js to latest secure version
  • • Segment IoT devices into dedicated VLANs to contain lateral movement
  • • Deploy and configure Web Application Firewalls (WAFs) to detect exploitation attempts

Critical vulnerability in IBM API Connect could allow authentication bypass

Jan 01, 2026 CSO Online Score: 0.9

A critical vulnerability in IBM API Connect has been identified that could potentially allow attackers to bypass authentication mechanisms. This type of vulnerability impacts multiple compliance frameworks that require strong access controls and secure authentication practices. Organizations using IBM API Connect should prioritize patching and security assessment to maintain compliance status.

My Take

If you're running IBM API Connect, your auditor's going to ask about this one—patch status will show up in every access control testing section. The real compliance risk here isn't the CVE itself, it's how long you take to respond (because your incident response timeline is exactly what gets scrutinized when authentication controls fail).

SOC2 ISO27001 HIPAA PCI-DSS

Key Actions

  • • Apply IBM security patches immediately for API Connect
  • • Review access logs for potential unauthorized authentication attempts
  • • Conduct vulnerability assessment across API infrastructure

Infosecurity's Top 10 Cybersecurity Stories of 2025

Jan 01, 2026 Infosecurity Magazine Score: 0.9

This article is a roundup of major cybersecurity stories from 2025, highlighting multiple high-profile security incidents including IoT device infections, Fortinet firewall credential leaks, and vendor withdrawals from security evaluations. The incidents span supply chain threats, data breaches, and vulnerability management, affecting organizations across multiple compliance frameworks. Key developments include new NIST vulnerability metrics and ongoing challenges with unpatched legacy devices.

My Take

If your 2025 incident response plan doesn't account for supply chain compromise and legacy IoT devices, you're planning for last year's threats. The Fortinet credential leak is the headline, but the real pattern here is how quickly "secure by default" vendors become single points of failure.

SOC2 ISO27001 HIPAA PCI-DSS

Key Actions

  • • Prioritize vulnerability remediation using NIST's LEV (Likely Exploited Vulnerabilities) metric for better risk assessment
  • • Conduct immediate audit of Fortinet firewall configurations and rotate VPN credentials if affected
  • • Implement IoT device inventory and patch management programs to reduce exposure to proxy network threats

ThreatsDay Bulletin: GhostAd Drain, macOS Attacks, Proxy Botnets, Cloud Exploits, and 12+ Stories

Jan 01, 2026 The Hacker News Score: 0.9

ThreatsDay Bulletin reports multiple active security threats including a Lithuanian national extradited for distributing clipboard-stealing malware (KMSAuto) affecting 2.8 million systems and stealing $1.2 million in virtual assets, and a coordinated campaign exploiting 10+ Adobe ColdFusion CVEs targeting organizations across multiple countries. The bulletin highlights evolving attack patterns with emphasis on precision exploitation of multiple vulnerabilities and social engineering tactics.

My Take

The KMSAuto story is a perfect reminder that your users pirating software to save a few bucks on licenses just became your incident response problem. If you're not monitoring for clipboard hijackers and you handle crypto or financial data, you're missing one of the easier detections in the book.

SOC2 ISO27001 GDPR HIPAA PCI-DSS

Key Actions

  • • Patch Adobe ColdFusion systems immediately with fixes for CVE-2023-26359, CVE-2023-38205, CVE-2023-44353, and other identified CVEs
  • • Implement endpoint detection and response (EDR) monitoring for clipboard-stealing malware variants and suspicious code execution
  • • Conduct security awareness training to prevent malware distribution via trojanized software tools

The biggest cybersecurity and cyberattack stories of 2025

Jan 01, 2026 BleepingComputer Score: 0.9

This article summarizes major cybersecurity incidents and cyberattacks from 2025, including the PornHub data breach affecting 200+ million subscribers and widespread ClickFix social engineering attacks targeting multiple platforms. The incidents involve sensitive personal data exposure and malware distribution affecting users across Windows, macOS, and Linux systems.

My Take

The PornHub breach is a nightmare scenario for privacy teams—GDPR fines aside, good luck explaining to your board why you're managing *that* kind of sensitive data without defense-in-depth. ClickFix attacks are the reminder that your security awareness training needs to catch up to 2025: users don't click attachments anymore, they're copying malicious commands because a fake CAPTCHA told them to.

GDPR CCPA SOC2

Key Actions

  • • Notify affected users of data breaches in compliance with GDPR/CCPA notification requirements
  • • Implement multi-factor authentication to prevent OAuth token theft from ConsentFix variants
  • • Educate users about ClickFix social engineering tactics and verify system messages through official channels

New GlassWorm malware wave targets Macs with trojanized crypto wallets

Jan 01, 2026 BleepingComputer Score: 0.9

GlassWorm malware campaign has launched a fourth wave targeting macOS developers through trojanized VSCode extensions in OpenVSX and Microsoft Visual Studio Marketplace. The malware steals developer credentials, cryptocurrency wallet data, browser information, and Keychain passwords while establishing remote access capabilities via VNC and SOCKS proxy. The evolving attack now uses AES-256 encryption, AppleScript, and attempts to replace legitimate hardware wallet applications with trojans.

My Take

If your developers are installing VS Code extensions without vetting them, your supply chain security controls are theoretical at best. This is exactly the kind of attack path your ISO 27001 asset management and SOC 2 change management controls should catch—but only if you're actually enforcing them beyond the policy doc.

SOC2 ISO27001

Key Actions

  • • Audit and remove malicious extensions from development environments: studio-velte-distributor.pro-svelte-extension, cudra-production.vsce-prettier-pro, Puccin-development.full-access-catppuccin-pro-extension
  • • Review and revoke potentially compromised GitHub, npm, and OpenVSX account credentials
  • • Implement endpoint detection and response (EDR) solutions to monitor for suspicious AppleScript execution and LaunchAgent modifications

Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign

Jan 02, 2026 The Hacker News Score: 0.9

Cybercriminals exploited Google Cloud's Application Integration email service to conduct a multi-stage phishing campaign targeting approximately 3,200 customers across multiple regions. The attackers impersonated Google notifications and bypassed email security filters by sending from legitimate Google domains, ultimately stealing credentials through fake Microsoft login pages. This incident highlights vulnerabilities in cloud service abuse and the need for enhanced email security controls.

My Take

The phishing emails came from *actual* Google infrastructure, which is why they sailed past your expensive email security stack. This is your reminder that allowlists and domain reputation are helpful until they're weaponized—teach your users to verify the journey, not just the sender.

SOC2 GDPR ISO27001

Key Actions

  • • Review and strengthen email authentication protocols (DMARC, SPF, DKIM)
  • • Implement advanced email filtering and threat detection for phishing attempts
  • • Conduct security awareness training focusing on cloud service impersonation tactics

Adobe ColdFusion Servers Targeted in Coordinated Campaign

Jan 02, 2026 SecurityWeek Score: 0.9

A coordinated initial access campaign targeted approximately a dozen vulnerabilities in Adobe ColdFusion servers globally, with thousands of requests originating from Japan-based infrastructure during Christmas 2025. The attackers exploited publicly disclosed vulnerabilities from 2023-2024 using JNDI/LDAP injection techniques, with the primary targets located in the US, Spain, India, and other countries. The campaign represents a broader exploitation effort by likely initial access brokers, targeting over 700 security defects across multiple platforms.

My Take

If you're still running ColdFusion servers with 2023 vulnerabilities unpatched, you've got bigger problems than compliance findings—you're practically running a 'for sale' sign for access brokers. Asset inventory and patch management aren't sexy controls, but they're the ones that actually stop campaigns like this cold.

SOC2 ISO27001 HIPAA PCI-DSS

Key Actions

  • • Immediately patch Adobe ColdFusion servers with latest security updates for 2023-2024 disclosed vulnerabilities
  • • Review access logs for December 24-26, 2025 and monitor for suspicious JNDI/LDAP injection attempts from IP addresses associated with CTG Server Limited
  • • Implement enhanced security monitoring during holiday periods when staffing is reduced

Critical Vulnerability Allows Bluetooth Takeover of WHILL Electric Wheelchairs

Jan 02, 2026 HIPAA Journal Score: 0.9

A critical Bluetooth vulnerability has been discovered in WHILL electric wheelchairs that could allow remote takeover of the devices, posing serious safety risks to users who depend on these mobility aids. This incident affects medical devices and potentially impacts patient safety and privacy regulations. Organizations using or distributing these devices should assess exposure and coordinate with manufacturers on patching and mitigation strategies.

My Take

This is what keeps me up at night about IoT in healthcare - we bolted Bluetooth onto a medical device without thinking through the threat model, and now vulnerable people are literally at risk. If you're managing connected medical devices, this is your wake-up call to inventory what's rolling (or rolling around) your facilities with wireless radios and default pairing modes.

HIPAA ISO27001

Key Actions

  • • Contact WHILL for security patches and firmware updates
  • • Conduct risk assessment of affected devices in use
  • • Document vulnerability and response in audit logs

data breach

2 articles

The Wegman’s Supermarket Chain Is Probably Using Facial Recognition

Jan 07, 2026 Schneier on Security Score: 0.9

Wegman's Supermarket chain is collecting biometric facial recognition data from customers without apparent explicit consent or transparency. This practice raises significant privacy concerns and potential violations of biometric data protection regulations across multiple jurisdictions.

My Take

If you're deploying facial recognition in retail without explicit consent and clear signage, you're not just risking BIPA fines in Illinois—you're writing checks your legal team will be cashing for years across multiple state laws. The "we'll stay quiet and hope nobody notices" approach stopped working the moment Clearview AI became a cautionary tale.

GDPR CCPA HIPAA

Key Actions

  • • Review biometric data collection practices for GDPR Article 9 compliance (special category data)
  • • Assess CCPA/CPRA obligations regarding biometric information disclosure and consumer rights
  • • Audit consent mechanisms and privacy notices for facial recognition collection

Covenant Health Data Breach Impacts 478,000 Individuals

Jan 02, 2026 SecurityWeek Score: 0.9

Covenant Health, a Massachusetts-based healthcare provider, disclosed a significant data breach affecting 478,188 individuals after a ransomware attack on May 18, 2025. The breach exposed sensitive personal and health information including names, SSNs, medical records, and insurance details. The Qilin ransomware group claimed responsibility and publicly released the stolen data after the ransom was not paid.

My Take

Props to Covenant for not paying—refusing to fund criminal operations is the right call even when it hurts. But here's the hard truth: if Qilin got in and exfiltrated 478k records, your HIPAA "compliance" program failed at the only job that actually matters.

HIPAA GDPR

Key Actions

  • • Review and strengthen incident response procedures to reduce investigation and disclosure timelines
  • • Conduct comprehensive HIPAA breach notification audit and ensure timely and accurate reporting to authorities
  • • Implement ransomware prevention measures and network segmentation to prevent large-scale data exfiltration