I added hover over text, it messed up some of the formatting. But whatever, I gotta go write my TPS report.

Krebs on Security

Dark Reading

The Hacker News [ THN ] - Best Security Blog

2026-01-24 - Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware
2026-01-24 - New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector
2026-01-24 - Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents
2026-01-24 - CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog
2026-01-23 - CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
2026-01-23 - Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls
2026-01-23 - TikTok Forms U.S. Joint Venture to Continue Operations Under 2025 Executive Order
2026-01-23 - Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access
2026-01-23 - Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms
2026-01-22 - New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack
2026-01-22 - Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access
2026-01-22 - ThreatsDay Bulletin: Pixel Zero-Click, Redis RCE, China C2s, RAT Ads, Crypto Scams & 15+ Stories
2026-01-22 - Filling the Most Common Gaps in Google Workspace Security
2026-01-22 - Malicious PyPI Package Impersonates SymPy, Deploys XMRig Miner on Linux Hosts
2026-01-22 - SmarterMail Auth Bypass Exploited in the Wild Two Days After Patch Release
2026-01-22 - Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations
2026-01-22 - Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex

Schneier on Security

2026-01-22 - befriends a giant space squid in the comic Star Trek: Strange New Worlds: The Seeds of Salvation #5.

As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Blog moderation policy.

">Friday Squid Blogging: Giant Squid in the Star Trek Universe
2026-01-22 - blog post from Anthropic:

In a recent evaluation of AI models’ cyber capabilities, current Claude models can now succeed at multistage attacks on networks with dozens of hosts using only standard, open-source tools, instead of the custom tools needed by previous generations. This illustrates how barriers to the use of AI in relatively autonomous cyber workflows are rapidly coming down, and highlights the importance of security fundamentals like promptly patching known vulnerabilities.

[…]

A notable development during the testing of Claude Sonnet 4.5 is that the model can now succeed on a minority of the networks without the custom cyber toolkit needed by previous generations. In particular, Sonnet 4.5 can now exfiltrate all of the (simulated) personal information in a high-fidelity simulation of the Equifax data breach—­one of the costliest cyber attacks in history—­using only a Bash shell on a widely-available Kali Linux host (standard, open-source tools for penetration testing; not a custom toolkit). Sonnet 4.5 accomplishes this by instantly recognizing a publicized CVE and writing code to exploit it without needing to look it up or iterate on it. Recalling that the original Equifax breach happened by exploiting a publicized CVE that had not yet been patched, the prospect of highly competent and fast AI agents leveraging this approach underscores the pressing need for security best practices like prompt updates and patches. ...

">AIs are Getting Better at Finding and Exploiting Internet Vulnerabilities
2026-01-22 - large language models (LLMs) do.

Prompt injection is a method of tricking LLMs into doing things they are normally prevented from doing. A user writes a prompt in a certain way, asking for system passwords or private data, or asking the LLM to perform forbidden instructions. The precise phrasing overrides the LLM’s ...

">Why AI Keeps Falling for Prompt Injection Attacks

ThreatPost

Sydney Morning Herald

New York Times

2026-01-24 - TikTok Strikes Deal to Create New U.S. Entity and Loosen App’s Ties to China
2026-01-23 - Will I Have to Download a New TikTok App? And Other Big Questions About The Deal.
2026-01-23 - Here’s Who Just Bought TikTok
2026-01-24 - Five Ways People Are Using Claude Code
2026-01-24 - Why the Power May Not Go Out Until After the Storm Has Passed
2026-01-24 - U.S. Automakers’ Foreign Troubles Now Extend to Canada
2026-01-23 - S.E.C. Drops Case Against Cryptocurrency Firm Founded by Winklevoss Twins
2026-01-23 - Will ChatGPT Ads Change OpenAI? + Amanda Askell Explains Claude’s New Constitution
2026-01-23 - Why iPhone and Android Weather Apps Are Freaking Out About Winter Storm Forecasts
2026-01-22 - The Drama at Thinking Machines, a New A.I. Start-Up, Is Riveting Silicon Valley
2026-01-22 - How to Deal With That Drawer Full of Old Gadgets
2026-01-22 - Elon Musk’s Grok A.I. Chatbot Made Millions of Sexualized Images, New Estimates Show

Wall Street Journal

BBC

2026-01-23 - What does a new US TikTok deal mean for users?
2026-01-23 - Is China quietly winning the AI race?
2026-01-22 - Ubisoft cancels six games including Prince of Persia and closes studios
2026-01-23 - AI ready: The advantages of being a young entrepreneur
2026-01-22 - Bezos' Blue Origin announces satellite rival to Musk's Starlink
2026-01-23 - TikTok closes deal to split US app from global business

SecurityBrief AU

ITNews AU

2026-01-22 - Fix out for remotely exploited Cisco enterprise UC suite bug

BleepingComputer

2026-01-25 - 1Password adds pop-up warnings for suspected phishing sites
2026-01-25 - Microsoft investigates Windows 11 boot failures after January updates
2026-01-24 - Microsoft releases emergency OOB update to fix Outlook freezes
2026-01-24 - Sandworm hackers linked to failed wiper attack on Poland’s energy systems
2026-01-24 - Konni hackers target blockchain engineers with AI-built malware
2026-01-23 - ShinyHunters claim hacks of Okta, Microsoft SSO accounts for data theft
2026-01-23 - Malicious AI extensions on VSCode Marketplace steal developer data
2026-01-23 - CISA confirms active exploitation of four enterprise software bugs
2026-01-23 - US to deport Venezuelans who emptied bank ATMs using malware
2026-01-23 - Hackers exploit critical telnetd auth bypass flaw to get root
2026-01-23 - What an AI-Written Honeypot Taught Us About Trusting Machines
2026-01-23 - Microsoft: Outlook for iOS crashes, freezes due to coding error
2026-01-23 - Hackers get $1,047,000 for 76 zero-days at Pwn2Own Automotive 2026
2026-01-23 - Fortinet confirms critical FortiCloud auth bypass not fully patched
2026-01-22 - Okta SSO accounts targeted in vishing-based data theft attacks

/r/NetSec

2026-01-25 - /u/Mcnst
[link] [comments]">cvsweb.openbsd.org fights AI crawler bots by redirecting hotlinking requests to theannoyingsite.com (labelled "Malware" by eero), gets blacklisted by eero, too, for "Phishing & Deception"
2026-01-25 - /u/GelosSnake
[link] [comments]">địt mẹ mày morphisec: When Malware Authors Taunt Security Researchers
2026-01-25 - /u/netsec_burn
[link] [comments]">BREAKMEIFYOUCAN! - Exploiting Keyspace Reduction and Relay Attacks in 3DES and AES-protected NFC Technologies
2026-01-25 - /u/utku1337
[link] [comments]">Your Vibe Coded AI App Can Bankrupt You
2026-01-25 -

Your proprietary code is flowing into Frontier AI models in the Cloud undetected. Husn Canaries allow you to receive instant alerts when Claude, ChatGPT, Copilot, Gemini, or any AI coding assistant analyzes your code. Know exactly when your intellectual property is exposed, whether by your team, contractors, or attackers.

submitted by
/u/0xRaindrop
[link] [comments]">Husn Canaries - Defense-in-Depth for AI Coding Assistant Governance
2026-01-23 - /u/SleepingProcess
[link] [comments]">Arctic Wolf Observes Malicious Configuration Changes On Fortinet FortiGate Devices via SSO Accounts | Arctic Wolf
2026-01-23 - /u/MegaManSec2
[link] [comments]">Firefox / WebRTC Encoded Transforms: UAF via undetached ArrayBuffer / CVE-2025-1432
2026-01-23 - /u/CyberMasterV
[link] [comments]">Organized Traffer Gang on the Rise Targeting Web3 Employees and Crypto Holders
2026-01-23 -

Hey everyone,

I’m an independent developer and for the past few months I’ve been working on a tool called Syd. Before I invest more time and money into it, I’m trying to get honest feedback from people who actually work in security.

Syd is a fully local, offline AI assistant for penetration testing and security analysis. The easiest way to explain it is “ChatGPT for pentesting”, but with some important differences. All data stays on your machine, there are no cloud calls or APIs involved, and it’s built specifically around security tooling and workflows rather than being a general-purpose chatbot. The whole point is being able to analyse client data that simply cannot leave the network.

Right now Syd works with BloodHound, Nmap, and I’m close to finishing Volatility 3 support.

With BloodHound, you upload the JSON export and Syd parses it into a large set of structured facts automatically. You can then ask questions in plain English like what the shortest path to Domain Admin is, which users have DCSync rights, or which computers have unconstrained delegation. The answers are based directly on the data and include actual paths, users, and attack chains rather than generic explanations.

With Nmap, you upload the XML output and Syd analyses services, versions, exposed attack surface and misconfigurations. You can ask things like what the most critical issues are, which Windows servers expose SMB, or which hosts are running outdated SSH. The output is prioritised and includes CVE context and realistic next steps.

I’m currently finishing off Volatility 3 integration. The idea here is one-click memory analysis using a fixed set of plugins depending on the OS. You can then ask practical questions such as whether there are signs of malware, what processes look suspicious, or what network connections existed. It’s not trying to replace DFIR tooling, just make memory analysis more approachable and faster to reason about.

The value, as I see it, differs slightly depending on who you are. For consultants, it means analysing client data without uploading anything to third-party AI services, speeding up report writing, and giving junior testers a way to ask “why is this vulnerable?” without constantly interrupting seniors. For red teams, it helps quickly identify attack paths during engagements and works in restricted or air-gapped environments with no concerns about data being reused for training. For blue teams, it helps with triage and investigation by allowing natural language questions over logs and memory without needing to be an expert in every tool.

One thing I’ve been careful about is hallucination. Syd has a validation layer that blocks answers if they reference data that doesn’t exist in the input. If it tries to invent IPs, PIDs, users, or hosts, the response is rejected with an explanation. I’m trying to avoid the confident-but-wrong problem as much as possible.

I’m also considering adding support for other tools, but only if there’s real demand. Things like Burp Suite exports, Nuclei scans, Nessus or OpenVAS reports, WPScan, SQLMap, Metasploit workspaces, and possibly C2 logs. I don’t want to bolt everything on just for the sake of it.

The reason I’m posting here is that I genuinely need validation. I’ve been working on this solo for months with no sales and very little interest, and I’m at a crossroads. I need to know whether people would actually use something like this in real workflows, which tools would matter most to integrate next, and whether anyone would realistically pay for it. I’m also unsure what pricing model would even make sense, whether that’s one-time, subscription, or free for personal use with paid commercial licensing.

Technically, it runs on Windows, macOS and Linux. It uses a local Qwen 2.5 14B model, runs as a Python desktop app, has zero telemetry and no network dependencies. Sixteen gigabytes of RAM is recommended and a GPU helps but isn’t required.

I can share screenshots or record a walkthrough showing real BloodHound and Nmap workflows if there’s interest.

I’ll be honest, this has been a grind. I believe in the idea of a privacy-first, local assistant for security work, but I need to know if there’s actually a market for it or if the industry is happy using cloud AI tools despite the data risks, sticking to fully manual analysis, or relying on scripts and frameworks without LLMs.

Syd is not an automated scanner, not a cloud SaaS, not a ChatGPT wrapper, and not an attempt to replace pentesters. It’s meant to be an assistant, nothing more.

If this sounds useful, I’m happy to share a demo or collaborate with others. I’d really appreciate any honest feedback, positive or negative.

Thanks for reading.

sydsec.co.uk

https://www.youtube.com/@SydSecurity

[info@sydsec.co.uk](mailto:info@sydsec.co.uk)

submitted by /u/Glass-Ant-6041
[link] [comments]">Syd - Air-Gapped Red and blueteam
2026-01-22 - /u/scopedsecurity
[link] [comments]">CVE-2026-22200: Ticket to Shell in osTicket
2026-01-22 - /u/nibblesec
[link] [comments]">Intercepting OkHttp at Runtime With Frida
2026-01-22 - /u/ulldma
[link] [comments]">AI-supported vulnerability triage with the GitHub Security Lab Taskflow Agent
2026-01-22 - /u/div3rto
[link] [comments]">Single malformed BRID/HHIT DNS packet can crash ISC BIND
2026-01-22 - /u/dx7r__
[link] [comments]">Attackers With Decompilers Strike Again (SmarterTools SmarterMail WT-2026-0001 Auth Bypass) - watchTowr Labs

/r/InfoSecNews

2026-01-25 - Nike is investigating a possible data breach, after WorldLeaks claims submitted by /u/quellaman
[link] [comments] ">Nike is investigating a possible data breach, after WorldLeaks claims
2026-01-25 - 1Password adds pop-up warnings for suspected phishing sites submitted by /u/quellaman
[link] [comments] ">1Password adds pop-up warnings for suspected phishing sites
2026-01-24 - FBI Accessed Windows Laptops After Microsoft Shared BitLocker Recovery Keys submitted by /u/jamessonnycrockett
[link] [comments] ">FBI Accessed Windows Laptops After Microsoft Shared BitLocker Recovery Keys
2026-01-24 - Konni hackers target blockchain engineers with AI-built malware submitted by /u/quellaman
[link] [comments] ">Konni hackers target blockchain engineers with AI-built malware
2026-01-23 - 149 Million Login Credentials from Roblox, TikTok, Netflix, Disney+, Crypto Wallets and others Found Online submitted by /u/jamessonnycrockett
[link] [comments] ">149 Million Login Credentials from Roblox, TikTok, Netflix, Disney+, Crypto Wallets and others Found Online
2026-01-24 - https://thehackernews.com/2026/01/multi-stage-phishing-campaign-targets.html submitted by /u/quellaman
[link] [comments] ">https://thehackernews.com/2026/01/multi-stage-phishing-campaign-targets.html
2026-01-24 - CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog submitted by /u/quellaman
[link] [comments] ">CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog
2026-01-24 - New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector submitted by /u/quellaman
[link] [comments] ">New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector
2026-01-23 - US to deport Venezuelans who emptied bank ATMs using malware submitted by /u/quellaman
[link] [comments] ">US to deport Venezuelans who emptied bank ATMs using malware
2026-01-23 - Hackers exploit critical telnetd auth bypass flaw to get root submitted by /u/quellaman
[link] [comments] ">Hackers exploit critical telnetd auth bypass flaw to get root
2026-01-23 - Venezuelan Nationals Face Deportation After Multi State ATM Jackpotting Scheme submitted by /u/jamessonnycrockett
[link] [comments] ">Venezuelan Nationals Face Deportation After Multi State ATM Jackpotting Scheme
2026-01-23 - CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities submitted by /u/quellaman
[link] [comments] ">CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
2026-01-23 - Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls submitted by /u/quellaman
[link] [comments] ">Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls
2026-01-23 - Hackers get $1,047,000 for 76 zero-days at Pwn2Own Automotive 2026 submitted by /u/quellaman
[link] [comments] ">Hackers get $1,047,000 for 76 zero-days at Pwn2Own Automotive 2026
2026-01-23 -

I’ve been seeing a lot of talk about how Software Bill of Materials (SBOMs) are moving from "nice to have" to "regulatory requirement" this year.

This write-up covers why the industry is pushing for automated provenance tracking and real-time dependency intelligence: https://cybernews-node.blogspot.com/2026/01/software-supply-chain-security-another.htm

The part that gets me is the move toward "continuous verification"—the idea that a scan during the build process isn't enough anymore because dependencies can drift or get compromised after deployment.

Is anyone here actually seeing better security from this, or is it just creating a mountain of "compliance paperwork" for the dev teams to deal with?

submitted by /u/No_Fisherman1212
[link] [comments]">software supply chain security is basically the "final boss" of 2026. are SBOMs actually helping?
2026-01-23 - ShinyHunters Leak Alleged Data of Millions From SoundCloud, Crunchbase and Betterment LLC submitted by /u/jamessonnycrockett
[link] [comments] ">ShinyHunters Leak Alleged Data of Millions From SoundCloud, Crunchbase and Betterment LLC
2026-01-23 - Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access submitted by /u/quellaman
[link] [comments] ">Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access
2026-01-23 - TikTok Forms U.S. Joint Venture to Continue Operations Under 2025 Executive Order submitted by /u/quellaman
[link] [comments] ">TikTok Forms U.S. Joint Venture to Continue Operations Under 2025 Executive Order
2026-01-23 - /u/quellaman
[link] [comments]">AIs are Getting Better at Finding and Exploiting Internet Vulnerabilities - Schneier on Security
2026-01-23 - Under Armour Investigates Data Breach submitted by /u/quellaman
[link] [comments] ">Under Armour Investigates Data Breach
2026-01-23 - Machine learning–powered Android Trojans bypass script-based Ad Click detection submitted by /u/quellaman
[link] [comments] ">Machine learning–powered Android Trojans bypass script-based Ad Click detection
2026-01-22 - Google to Pay $8.25M Settlement Over Child Data Tracking in Play Store submitted by /u/jamessonnycrockett
[link] [comments] ">Google to Pay $8.25M Settlement Over Child Data Tracking in Play Store
2026-01-23 - Curl ending bug bounty program after flood of AI slop reports submitted by /u/quellaman
[link] [comments] ">Curl ending bug bounty program after flood of AI slop reports
2026-01-22 - Hackers Are Using LinkedIn DMs and PDF Tools to Deploy Trojans submitted by /u/jamessonnycrockett
[link] [comments] ">Hackers Are Using LinkedIn DMs and PDF Tools to Deploy Trojans
2026-01-23 - New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack submitted by /u/quellaman
[link] [comments] ">New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack