Hacking List -  2026  2025   2024  2023  2021  2020  2019  2018

DATE

NAME

Info

CATEG.

WEB

28.1.26 ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services Cybersecurity researchers have disclosed details of a new campaign that combines ClickFix -style fake CAPTCHAs with a signed Microsoft Application Hack The Hacker News
27.1.26 China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023 Cybersecurity researchers have discovered a JScript -based command-and-control (C2) framework called PeckBirdy that has been put to use by China- Hack The Hacker News
25.1.26 ShinyHunters claim hacks of Okta, Microsoft SSO accounts for data theft The ShinyHunters extortion gang claims it is behind a wave of ongoing voice phishing attacks targeting single sign-on (SSO) accounts at Okta, Microsoft, and Google, enabling threat actors to breach corporate SaaS platforms and steal company data for extortion. Hack

BleepingComputer

25.1.26 Fake ad blocker extension crashes the browser for ClickFix attacks A malvertising campaign is using a fake ad-blocking Chrome and Edge extension named NexShield that intentionally crashes the browser in preparation for ClickFix attacks. Hack

BleepingComputer

22.1.26 LastPass Warns of Fake Maintenance Messages Targeting Users' Master Passwords LastPass is alerting users to a new active phishing campaign that's impersonating the password management service, which aims to trick users Hack The Hacker News
18.1.26 Credential-stealing Chrome extensions target enterprise HR platforms Malicious Chrome extensions on the Chrome Web Store masquerading as productivity and security tools for enterprise HR and ERP platforms were discovered stealing authentication credentials or blocking management pages used to respond to security incidents. Hack

BleepingComputer

18.1.26 Malicious GhostPoster browser extensions found with 840,000 installs Another set of 17 malicious extensions linked to the GhostPoster campaign has been discovered in Chrome, Firefox, and Edge stores, where they accumulated a total of 840,000 installations. Hack

BleepingComputer

18.1.26 Microsoft updates Windows DLL that triggered security alerts Microsoft has resolved a known issue that was causing security applications to flag a core Windows component, the company said in a service alert posted this week. Hack

BleepingComputer

18.1.26 Reprompt attack hijacked Microsoft Copilot sessions for data theft Researchers identified an attack method dubbed "Reprompt" that could allow attackers to infiltrate a user's Microsoft Copilot session and issue commands to exfiltrate sensitive data. Hack

BleepingComputer

17.1.26 Hidden Telegram proxy links can reveal your IP address in one click A single click on what may appear to be a Telegram username or harmless link is all it takes to expose your real IP address to attackers due to how proxy links are handled. Telegram says it will add warnings to proxy links after researchers demonstrated that such one-click interactions could reveal a Telegram user's real IP address. Hack

BleepingComputer

17.1.26 Five Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts Cybersecurity researchers have discovered five new malicious Google Chrome web browser extensions that masquerade as human resources (HR) and enterprise resource planning Hack The Hacker News
16.1.26 AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks A critical misconfiguration in Amazon Web Services (AWS) CodeBuild could have allowed complete takeover of the cloud service provider's own GitHub repositories, including its AWS Hack The Hacker News
16.1.26 Researchers Reveal Reprompt Attack Allowing Single-Click Data Exfiltration From Microsoft Copilot Cybersecurity researchers have disclosed details of a new attack method dubbed Reprompt that could allow bad actors to exfiltrate sensitive data from artificial intelligence (AI) chatbots Hack The Hacker News
14.1.26 n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens Threat actors have been observed uploading a set of eight packages on the npm registry that masqueraded as integrations targeting the n8n workflow automation platform to steal Hack The Hacker News
9.1.26 FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing The U.S. Federal Bureau of Investigation (FBI) on Thursday released an advisory warning of North Korean state-sponsored threat actors leveraging malicious QR codes in spear-phishing Hack The Hacker News
9.1.26 Jaguar Land Rover wholesale volumes down 43% after cyberattack Jaguar Land Rover (JLR) revealed this week that a September 2025 cyberattack led to a 43% decline in third-quarter wholesale volumes. Hack

BleepingComputer

9.1.26 ClickFix attack uses fake Windows BSOD screens to push malware A new ClickFix social engineering campaign is targeting the hospitality sector in Europe, using fake Windows Blue Screen of Death (BSOD) screens to trick users into manually compiling and executing malware on their systems. Hack

BleepingComputer

9.1.26 VSCode IDE forks expose users to "recommended extension" attacks Popular AI-powered integrated development environment solutions, such as Cursor, Windsurf, Google Antigravity, and Trae, recommend extensions that are non-existent in the OpenVSX registry, allowing threat actors to claim the namespace and upload malicious extensions. Hack

BleepingComputer

7.1.26 VS Code Forks Recommend Missing Extensions, Creating Supply Chain Risk in Open VSX Popular artificial intelligence (AI)-powered Microsoft Visual Studio Code (VS Code) forks such as Cursor, Windsurf, Google Antigravity, and Trae have been found to recommend Hack The Hacker News
3.1.26 New ErrTraffic service enables ClickFix attacks via fake browser glitches A new cybercrime tool called ErrTraffic allows threat actors to automate ClickFix attacks by generating 'fake glitches' on compromised websites to lure users into downloading payloads or following malicious instructions Hack

BleepingComputer