ThreatWatch
Curated cybersecurity news, vulnerabilities, and threat intelligence. Stay informed without the noise.
Last updated: Jan 30, 2026 • 01:40 UTC
Ivanti EPMM Zero-Days Actively Exploited (CVE-2026-1281, CVE-2026-1340)
Two critical vulnerabilities in Ivanti Endpoint Manager Mobile are being actively exploited in zero-day attacks. Patch immediately.
Match Group Breach Exposes Tinder, Hinge, OkCupid User Data
Match Group confirmed a cybersecurity incident compromising user data across Tinder, Match.com, Meetic, OkCupid, and Hinge dating platforms.
175,000 Ollama AI Servers Exposed Across 130 Countries
SentinelOne reveals massive exposure of Ollama AI infrastructure. Nearly half have tool-calling enabled for code execution. 30% located in China.
FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs
FBI takes down notorious RAMP forum, one of the few remaining platforms openly promoting ransomware operations and malware services.
n8n Workflow Automation RCE via Sandbox Escape
Two sandbox escape vulnerabilities in n8n workflow automation allow attackers to execute arbitrary code on the underlying host.
Polish Energy Grid Cyberattack Hit 30 Facilities
Coordinated attack on Poland's power grid in December targeted CHP facilities and wind/solar dispatch systems across multiple DER sites.
Hugging Face Abused for Android Malware Distribution
Threat actors using Hugging Face ML platform to host thousands of Android malware APK variants targeting financial and payment services.
Aisuru Botnet Sets DDoS Record at 31.4 Tbps
Aisuru/Kimwolf botnet launched record-breaking DDoS attack in December 2025, peaking at 31.4 Tbps and 200 million requests per second.
Mustang Panda Deploys Updated COOLCLIENT Backdoor
China-linked APT targeting government entities in Myanmar, Mongolia, Malaysia, and Russia with updated COOLCLIENT backdoor alongside PlugX.
eScan Antivirus Update Server Breached, Pushed Malware
MicroWorld Technologies confirms eScan update server was compromised and used to distribute malicious updates to customers.
Want In-Depth Analysis?
Check out my editorial articles for detailed breakdowns and practical advice.
Read Security Articles