๐Ÿช๐Ÿช๐Ÿช๐Ÿช๐Ÿช When someone said "COOKIE OVERLOAD" this was not what I was expecting. ๐Ÿช๐Ÿช๐Ÿช๐Ÿช๐Ÿช #CrowdStrike

Nil pointer dereference in CrowdStrike falcon-operator
injector.go:37

Pattern: CRD permits null, code assumes non-null

5-line YAML triggers operator crash

Disclosed Jan 14. No response.

15 min later, Verizon went dark.

Full PoC available to security researchers on request.
#BrickStrike #CrowdStrike #verizonoutage #verizon

DATE: January 16, 2026 at 05:31PM
SOURCE: HEALTHCARE INFO SECURITY

Direct article link at end of text block below.

#ISMG Editors: Why Digital #Skimming Is Still Thriving: Also: #AI's Push Into #HealthData, #CrowdStrike's Move to Reshape Competitive Market
https://t.co/D8wYtsENPx
#ChatGPTHealth

Here are any URLs found in the article text:

https://t.co/D8wYtsENPx

Articles can be found by scrolling down the page at https://www.healthcareinfosecurity.com/ under the title "Latest"

-------------------------------------------------

Private, vetted email list for mental health professionals: https://www.clinicians-exchange.org

Healthcare security & privacy posts not related to IT or infosec are at @HIPAABot . Even so, they mix in some infosec with the legal & regulatory information.

-------------------------------------------------

#security #healthcare #doctors #itsecurity #hacking #doxxing #psychotherapy #securitynews #psychotherapist #mentalhealth #psychiatry #hospital #socialwork #datasecurity #webbeacons #cookies #HIPAA #privacy #datanalytics #healthcaresecurity #healthitsecurity #patientrecords @infosec #telehealth #netneutrality #socialengineering

Chinese authorities have told domestic companies to stop using cybersecurity software made by more than a dozen firms from the U.S. and Israel due to national security concerns, sources said. https://www.japantimes.co.jp/business/2026/01/15/tech/china-us-israeli-cybersecurity/?utm_medium=Social&utm_source=mastodon #business #tech #paloaltonetworks #crowdstrike #cybersecurity #china #us #israel #tech
China tells its firms to not use U.S. and Israeli cybersecurity software: sources

Amid trade and diplomatic tensions between China and the U.S., Beijing has been keen to replace Western-made technology โ€‹with domestic alternatives.

The Japan Times

Look, if you are interested in #DigitalSovereignty it is important to realise that the #Iran #InternetBlackout is not really that. It is not the sort of damaging loss of services we have seen recently with #Crowdstrike or #Cloudflare.

The National Information Network of Iran or #IranianIntranet is structured so that they can cut the cables to the outside world and (most) Iranian digital services continue to function. (1/3)

Alright team, it's been a pretty packed 24 hours in the cyber world! We've got some critical RCE vulnerabilities under active exploitation, a deep dive into North Korean "quishing" tactics, and a major regulatory crackdown on AI-generated deepfakes. Let's get into it:

Critical RCE Vulnerabilities Under Active Exploitation โš ๏ธ

- HPE OneView (CVE-2025-37164), a privileged IT infrastructure management platform, has a maximum-severity RCE flaw (CVSS 10.0) that's actively being exploited. Patching is critical as compromise grants centralised control over an organisation's infrastructure.
- The React2Shell vulnerability (CVE-2025-55182), affecting React frameworks like Next.js, allows unauthenticated RCE in default configurations. Vercel, a key maintainer, coordinated a massive industry response, paid out $1M in bug bounties for WAF bypasses, and has blocked over 6 million exploit attempts since disclosure.
- China-linked threat actors were exploiting three VMware ESXi hypervisor escape zero-days (CVE-2025-22224, -22225, -22226) for over a year before VMware publicly disclosed them in March 2025. Initial access was via a compromised SonicWall VPN, leading to VM escape and RCE on the hypervisor.
- Trend Micro Apex Central for Windows has a critical RCE flaw (CVE-2025-69258, CVSS 9.8) allowing unauthenticated remote attackers to load malicious DLLs with SYSTEM privileges. Two other DoS flaws (CVE-2025-69259, -69260) were also patched.

๐ŸŒ‘ Dark Reading | https://www.darkreading.com/vulnerabilities-threats/maximum-severity-hpe-oneview-flaw-exploited
๐Ÿคซ CyberScoop | https://cyberscoop.com/vercel-cto-security-react2shell-vulnerability/
๐Ÿ“ฐ The Hacker News | https://thehackernews.com/2026/01/trend-micro-apex-central-rce-flaw.html
๐Ÿ•ต๐Ÿผ The Register | https://go.theregister.com/feed/www.theregister.com/2026/01/09/china_esxi_zerodays/

North Korean Hackers Adopt "Quishing" Tactics ๐ŸŽฃ

- The FBI has warned that North Korean state-sponsored threat actors, specifically the Kimsuky group (APT43), are using malicious QR codes ("quishing") in spear-phishing campaigns.
- These QR codes redirect victims to attacker-controlled pages (e.g., fake Microsoft 365, Okta, VPN portals) to steal credentials and session tokens, effectively bypassing MFA and traditional enterprise security controls.
- The tactic leverages unmanaged mobile devices, which often lack the same EDR and network inspection capabilities as corporate machines, making it a high-confidence, MFA-resilient identity intrusion vector.

๐Ÿ“ฐ The Hacker News | https://thehackernews.com/2026/01/fbi-warns-north-korean-hackers-using.html
๐Ÿ•ต๐Ÿผ The Register | https://go.theregister.com/feed/www.theregister.com/2026/01/09/pyongyangs_cyberspies_are_turning_qr/

Fake AI Chrome Extensions Steal User Data ๐Ÿค–

- Malicious Google Chrome extensions, masquerading as legitimate AI tools from "AItopia" (e.g., "ChatGPT for Chrome with GPT-5..."), have stolen LLM conversations and browser data from over 900,000 users.
- These extensions exfiltrated sensitive data like proprietary source code, business strategies, confidential research, full URLs from all tabs, and search queries to command-and-control servers.
- This "prompt poaching" highlights the growing attack surface of LLM-powered applications and the risk of installing extensions from unknown sources, even if they appear "Featured" in the Chrome store.

๐ŸŒ‘ Dark Reading | https://www.darkreading.com/cloud-security/fake-ai-chrome-extensions-steal-900k-users-data

Grok AI Deepfake Controversy and Data Privacy โš–๏ธ

- Elon Musk's Grok AI has faced severe backlash for generating sexualised deepfakes, including of children, leading to calls from UK government officials, US senators, and EU regulators for action.
- UK ministers are weighing a ban on X (formerly Twitter) and its AI tools under the Online Safety Act, while US senators have urged Google and Apple to remove the X and Grok apps from their stores for violating terms of service.
- X has limited image generation to paying subscribers, but critics argue this monetises illegal content and doesn't solve the underlying issue, with reports suggesting the feature remains accessible to free users.
- Separately, the California Privacy Protection Agency (CPPA) fined data broker Datamasters $45,000 for selling sensitive health information (e.g., Alzheimer's patients) and other personal data without proper registration, ordering them to cease sales in California.

๐Ÿ•ต๐Ÿผ The Register | https://go.theregister.com/feed/www.theregister.com/2026/01/09/grok_image_generation_uk/
๐Ÿ—ž๏ธ The Record | https://therecord.media/lawmakers-call-on-app-stores-to-remove-grok-x
๐Ÿคซ CyberScoop | https://cyberscoop.com/senators-ask-apple-google-remove-x-after-grok-ai-sexual-deepfakes/
๐Ÿ—ž๏ธ The Record | https://therecord.media/ccpa-fines-data-broker-selling-lists-alzheimers

CISA Sunsets Emergency Directives & NSA Leadership Changes ๐Ÿ›๏ธ

- CISA has retired 10 emergency directives issued between 2019 and 2024, citing successful implementation or redundancy due to the comprehensive Known Exploited Vulnerabilities (KEV) catalog. This reflects an evolving approach to federal cybersecurity.
- Tim Kosiba has been appointed as the new Deputy Chief of the National Security Agency (NSA), following a previous candidate's withdrawal due to political pressure. Kosiba brings over three decades of government experience to the role.

๐Ÿ—ž๏ธ The Record | https://therecord.media/cisa-sunsets-10-emergency-directives
๐Ÿ“ฐ The Hacker News | https://thehackernews.com/2026/01/cisa-retires-10-emergency-cybersecurity.html
๐Ÿ—ž๏ธ The Record | https://therecord.media/timothy-kosiba-nsa-new-deputy-chief

CrowdStrike Acquires SGNL for Identity Security ๐Ÿ”’

- CrowdStrike has acquired identity security startup SGNL for $740 million, aiming to bolster its Falcon cloud security platform with "context-aware authorization" for human, machine, and AI agent identities.
- This acquisition addresses the increasing threat of identity-based attacks and the proliferation of non-human identities, providing dynamic privilege management and real-time access evaluation.
- The deal highlights the growing importance of identity as a primary control plane in major security platforms, moving beyond just detection to being in the path of access.

๐Ÿ•ต๐Ÿผ The Register | https://go.theregister.com/feed/www.theregister.com/2026/01/08/crowdstrikes_740m_sgnl_deal_proves/

France-Russia Prisoner Swap Involving Alleged Cybercriminal ๐ŸŒ

- France released Daniil Kasatkin, a Russian basketball player accused by the US of aiding ransomware negotiations for a major cybercrime outfit impacting 900 victims, in exchange for French conflict researcher Laurent Vinatier, imprisoned in Russia.
- This "Putinswap" highlights the geopolitical dimension of cybercrime, where alleged cybercriminals can become bargaining chips in international diplomacy.
- Kasatkin had been in French custody since June 2025, wanted by US officials for his alleged role in ransomware attacks between 2020-2022.

๐Ÿ•ต๐Ÿผ The Register | https://go.theregister.com/feed/www.theregister.com/2026/01/09/alleged_russian_ransom_payment_negotiator/

#CyberSecurity #ThreatIntelligence #Vulnerabilities #RCE #ZeroDay #Kimsuky #APT43 #Phishing #Quishing #AI #Deepfake #DataPrivacy #RegulatoryCompliance #CISA #NSA #IdentitySecurity #CrowdStrike #Geopolitics #Ransomware

CrowdStrike acquires identity protection startup SGNL for $740 million, aiming to enhance AI-driven identity security as cyber threats grow more sophisticated.
#YonhapInfomax #CrowdStrike #SGNL #Acquisition #IdentitySecurity #ArtificialIntelligence #Economics #FinancialMarkets #Banking #Securities #Bonds #StockMarket
https://en.infomaxai.com/news/articleView.html?idxno=99042
CrowdStrike Acquires Identity Protection Startup SGNL for $740 Million

CrowdStrike acquires identity protection startup SGNL for $740 million, aiming to enhance AI-driven identity security as cyber threats grow more sophisticated.

Yonhap Infomax

So "Zero Standing Privileges" is really just a different way of saying "Just in time privilege escalation" yes?

I hate marketing.

#crowdstrike #sgnl #stopusingvaguemarketingterms

Mich beschleicht das Gefรผhl, dass jeder mausclick รผber #zscaler nach #crowdstrike geschickt wird, dort in eine Warteschlange gerรคt und noch mal mit KI und danach manuell geprรผft wird, dann wieder zurรผck รผber #tata und #VPN zum Arbeitsplatz geschickt wird, damit das Programm schon 40 Sekunden spรคter startet.
Manchmal habe ich das dann gleich 4 mal offen, weil nicht einmal eine Mini Animation Feedback gibt dass der click erfolgreich war.
#zukunftistjetzt #dystopisch
@InfobloxThreatIntel what are 'legit' binaries, how can they be malware with sim checksums and stuff? #binary defense #edr #crowdstrike