New research shows 3 flaws dubbed #ClaudyDay in Claude AI could be chained to steal user data using fake Google Ads, hidden prompts, and built-in features.

Read: https://hackread.com/claudy-day-flaws-data-theft-fake-claude-ai-ads/

#CyberSecurity #AI #ClaudeAI #InfoSec #DataSecurity #ThreatResearch #Malware #Privacy

“Claudy Day” Flaws Allow Data Theft via Fake Claude AI Ads, Report

Researchers detail “Claudy Day” flaws in Claude AI that could enable data theft using fake Google Ads, hidden prompts, and built-in features.

Hackread - Cybersecurity News, Data Breaches, AI and More
Technical Analysis of SnappyClient | ThreatLabz

SnappyClient is a C2 framework that features multiple evasion techniques that enable remote access and data theft.

New.

Kaspersky: The SOC Files: Time to “Sapecar”. Unpacking a new Horabot campaign in Mexico https://securelist.com/horabot-campaign/119033/ @Kaspersky #infosec #threatresearch

The SOC Files: Time to “Sapecar”. Unpacking a new Horabot campaign in Mexico

Kaspersky SOC uncovered and analyzed a complex Horabot campaign in Mexico. In this article we share insights into how it is unleashed and how to hunt for this threat.

Kaspersky
CursorJack: weaponizing Deeplinks to exploit Cursor IDE | Proofpoint US

Author’s Note: This post reflects Proofpoint Threat Research observations in a controlled test environment as of January 19, 2026. Proofpoint has no commercial, customer, partner, or vendor

Proofpoint

New.

Halcyon: Report: Attackers Know When Your Team Goes Home: February 2026 ROC STAR Report https://www.halcyon.ai/resources/reports/roc-star-report-february-2026 #infosec #ransomware #threatresearch

ROC STAR Report: February 2026

The Halcyon ROC STAR Report is a monthly threat intelligence publication from Halcyon's Ransomware Operations Center

New.

BitSight: Are AI Security Tools the New EDR? Attackers Are Treating Them That Way https://www.bitsight.com/blog/ai-security-tools-new-edr-attackers-targeting-ai #infosec #threatresearch

Are AI security tools the new EDR? Attackers think so | Bitsight

AI security tools are becoming prime targets for attackers. Learn why governance, visibility, and cyber risk intelligence must evolve beyond reactive defense.

Bitsight

New.

Kaspersky: Free real estate: GoPix, the banking Trojan living off your memory https://securelist.com/gopix-banking-trojan/119173/ #threatresearch #infosec #malware

Also from Kaspersky:

How chatting with a bot can lead to tragedy https://www.kaspersky.com/blog/chatbot-wrongful-death-cases/55446/ #chatbots

Free real estate: GoPix, the banking Trojan living off your memory

Kaspersky GReAT experts describe the unprecedentedly complex Brazilian banking Trojan GoPix that employs memory-only implants, Proxy AutoConfig (PAC) files for man-in-the-middle attacks, and malvertising via Google Ads.

Kaspersky

New.

Cyble: AI-Assisted Phishing Campaign Exploits Browser Permissions to Capture Victim Data https://cyble.com/blog/ai-assisted-phishing-campaign/ #phishing #infosec #threatresearch #JavaScript

AI-Assisted Phishing Campaign harvesting Victim Data

Cyble analyzes an AI-driven phishing campaign that abuses browser permissions to capture victims images and exfiltrate the data to attacker-controlled Telegram bots.

Cyble

"Over the past two weeks, Cisco has disclosed half a dozen new vulnerabilities in Catalyst SD-WAN Manager, half of which are now known to be exploited in the wild."

VulnCheck, posted yesterday: Herding Cats: Recent Cisco SD-WAN Manager Vulnerabilities https://www.vulncheck.com/blog/cisco-sd-wan-manager-vulns @vulncheck #infosec #vulnerability #threatresearch #Cisco

Herding Cats: Recent Cisco SD-WAN Manager Vulnerabilities | Blog | VulnCheck

VulnCheck’s Initial Access Intelligence team has been tracking and analyzing half a dozen recent vulnerabilities in Cisco Catalyst SD-WAN Manager, several of which have begun to see in-the-wild exploitation. Industry focus has been on CVE-2026-20127, but several other vulnerabilities also pose significant risk.

VulnCheck
Initial access techniques used by Iran-based threat actors

Analysis of attacks originating from Iran-linked threat groups reveals a preference for certain techniques

SOPHOS