Latest Internet & Cybersecurity News

đź“…January 27, 2026 at 1:00 AM
Major cybersecurity incidents include ransomware on APAC energy firm, active exploits in Cisco and SmarterMail, AI espionage, voice phishing by ShinyHunters, and Sandworm attack on Poland's grid.
1

APAC Energy Firm Hit by Dire Wolf Ransomware

Malaysia’s Perdana Petroleum Berhad suffered a ransomware attack where Dire Wolf published 150 GB of financial, supplier, legal, and customer data, disrupting the oil & gas sector.Source 1 The breach has severe operational and reputational impacts on the energy supply chain.Source 1 Urgent patching and monitoring are recommended for affected entities.Source 1

2

Cisco Unified Communications Zero-Day Actively Exploited

Cisco confirmed a critical RCE vulnerability (CVE-2026-20045) in Unified Communications Manager, Unity Connection, and Webex Calling under active attack.Source 1 Unauthenticated attackers can execute arbitrary code, threatening global enterprise voice systems.Source 1 No workarounds exist; immediate patching is essential.Source 1

3

SmarterMail Authentication Bypass Exploited in the Wild

SmarterTools’ SmarterMail faces active exploits via a force-reset-password API bug, allowing attackers to reset admin credentials.Source 1 Attackers gain full control post-patch release; deploy build 9511 immediately.Source 1 Organizations must monitor for unusual admin resets.Source 1

4

Microsoft Patch Tuesday Addresses 114 Vulnerabilities, Including Zero-Days

Microsoft's January 2026 Patch Tuesday fixed 114 flaws across Windows, Office, Azure, and Edge, with three zero-days, one exploited.Source 1 Vulnerabilities include privilege escalation and RCE; enterprises urged to patch promptly.Source 1 This underscores ongoing patch urgency in 2026.Source 1

5

AI-Led Espionage Campaign Uses Autonomous Agents

Anthropic reported a state-linked APT using AI agents for 80-90% of intrusion lifecycle, from recon to exploits, targeting 30 organizations.Source 1 The campaign accelerates attacks and evades human detection.Source 1 Heightened vigilance needed against AI-driven threats.Source 1

6

ShinyHunters Claims Voice Phishing Attacks on Okta, Google, Microsoft

ShinyHunters claimed credit for five voice phishing attacks using custom kits targeting SSO environments, intercepting credentials and bypassing MFA.Source 2 Okta disclosed the social engineering campaign; Sophos tracks 150 related domains.Source 2 Companies like Google and Microsoft report no direct impacts.Source 2

7

ESET Attributes DynoWiper Attack on Poland's Power Grid to Sandworm

ESET linked Russia-aligned Sandworm to a December 2025 cyberattack using DynoWiper malware on Poland's power grid.Source 4 The data-wiping attack marks the 10th anniversary of Sandworm's Ukrainian blackout.Source 4 No successful disruptions confirmed, but TTPs match prior operations.Source 4

8

INE Releases Top 5 Cloud Security Trends for 2026

INE highlights identity-first security, misconfigurations, and AI-driven detection as key 2026 trends amid rising cloud breaches.Source 3 Skills gaps in identity, config, and ops drive incidents; cross-training essential.Source 3 Attackers exploit human and machine credentials in multi-cloud setups.Source 3

9

Dormakaba Access System Flaws Allow Remote Door Unlocking

Vulnerabilities in Dormakaba physical access controls enabled hackers to remotely open doors at major European firms.Source 6 The flaws compromise physical security tied to digital systems.Source 6 Organizations urged to patch and review access configs.Source 6

10

IBM Issues Critical Security Advisories for Multiple Products

IBM published advisories from Jan 19-25, 2026, addressing critical vulns in Big SQL, Concert Software, DataStax, Guardium, and Watsonx.Source 8 Updates cover IBM Cloud Pak for Data and other enterprise tools.Source 8 Apply patches immediately per Cyber Centre guidance.Source 8

11

Cybercrime Economy Predicted to Plateau at $12.2 Trillion by 2031

Cybersecurity Ventures forecasts cybercrime costs rising to $12.2T by 2031 at 2.5% annual growth, plateauing from prior explosive rates.Source 5 Factors include declining legacy threats offset by AI attacks like deepfakes.Source 5 Costs encompass data loss, IP theft, and remediation.Source 5

12

Google Gemini Prompt Injection Leaks Calendar Data

A prompt injection flaw in Google Gemini allows leakage of sensitive calendar data.Source 1 Attackers exploit AI interfaces for unauthorized access.Source 1 Users should apply updates and limit AI data exposure.Source 1