Infosec News
-
2025 Cybersecurity Predictions vs Reality
This article reviews 90+ predictions from 36 cybersecurity experts and compares them to what actually occurred in 2025. The main finding: most predictions were accurate, especially those focused on AI amplifying existing threats rather than creating new ones.
Key Outcomes
- AI Amplified Existing Attacks
- AI was widely adopted by attackers to scale and automate known techniques.
- Observed uses included AI-assisted phishing, automated recon, and malware with runtime code mutation to evade detection.
- Underground markets began selling configurable AI-powered attack tools.
- AI reduced the skill barrier and increased attack speed and volume.
Result: Prediction confirmed. AI increased efficiency, not novelty.
- SaaS, Cloud, and Identity Became the Main Attack Surface
- SaaS misconfigurations, excessive permissions, insecure APIs, and third-party integrations were major breach drivers.
- Identity and access failures eclipsed traditional perimeter security issues.
- Large-scale cloud outages were often caused by configuration errors.
Result: Prediction confirmed. Identity and SaaS security became critical weaknesses.
- Ransomware Fragmented Further
- Law enforcement pressure led to more, smaller ransomware groups rather than fewer.
- 30 to 40 percent increase in active ransomware operators.
- Affiliates increasingly moved between groups, complicating attribution.
Result: Prediction confirmed. Ransomware evolved into a fragmented ecosystem.
- Supply Chain Attacks Increased
- Enterprises were compromised through trusted vendors and enterprise software.
- SaaS and third-party providers became common initial access vectors.
Result: Prediction confirmed. Vendor risk became a primary concern.
- Data Became the Core Security Asset
- Data protection and governance overtook infrastructure as the main security focus.
- Large credential leaks and AI training on sensitive data accelerated this shift.
- Data visibility and classification became prerequisites for AI use.
Result: Prediction confirmed. Data security underpins most modern risks.
- Regulation Added Complexity Without Reducing Attacks
- Increased compliance and reporting requirements did not deter attackers.
- Regulatory burden primarily impacted internal operations, not threat actors.
Result: Prediction confirmed. Regulation did not materially change the threat landscape.
Bottom Line
2025 validated long-standing warnings rather than introducing new threat classes.
The biggest risks were known problems amplified by AI, automation, and scale, not futuristic scenarios.
Source:
-
Verizon Nationwide Outage (Jan. 14, 2026)
Verizon Communications experienced a major nationwide wireless network outage beginning around midday on January 14, 2026, disrupting voice, text, and mobile data services across the United States for approximately ten hours. Customers reported their phones showing “SOS” or “SOS-only” status in place of normal signal bars, indicating loss of cellular connectivity.
Outage monitoring sites such as DownDetector logged hundreds of thousands of reports at the peak, with impacts reported coast-to-coast in major metropolitan areas including New York City, Chicago, Boston, Atlanta, Dallas, and others. Some local officials warned that emergency calls (911) for Verizon users could be unreliable during the disruption, recommending alternatives such as landlines or other carriers where possible.
Verizon acknowledged the outage via social media and later confirmed that service was restored late Wednesday night. The company apologized for the interruption and stated it will issue account credits to affected customers. Verizon did not immediately disclose a specific technical cause, though internal reviews are expected.
The Federal Communications Commission (FCC) indicated it would review the outage’s impact on network reliability and public safety communications.
Sources:
-
Atomic Wallet - Where Did My XMR Go?
Many Atomic Wallet users recently logged in to find their Monero (XMR) balances missing or incorrect, causing understandable concern.
According to Atomic Wallet support, this is a display and synchronization issue specific to Monero, not a loss of funds. Atomic states that all XMR remains safe on-chain and that their development team is working on a fix. Once synchronization is corrected, balances and transaction history should update normally.

Users can independently confirm their funds by restoring their XMR wallet in another trusted Monero wallet using their existing keys or seed phrase. Multiple users report that their full balances appear correctly when checked outside Atomic, confirming the issue is isolated to Atomic’s wallet interface.
Given Atomic Wallet’s 2023 security breach, users are understandably cautious. While this situation appears unrelated and no theft has been reported, verifying balances independently is recommended.
Summary
- Issue affects XMR balance display in Atomic Wallet
- Funds are still on-chain and under user control
- Atomic says a fix is in progress
- Users can verify funds using another Monero wallet
- Use caution, verify independently, and never share your private keys or seed phrase with anyone

Sources:
- @cyclone (independent verification with Atomic)
- https://x.com/AtomicWallet/status/2011796132112826643
-

haahahahahah -
Ivanti EPMM Zero-Day RCE - CVE-2026-1281 & CVE-2026-1340
Ivanti has disclosed two critical zero-day vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340. Both flaws are unauthenticated code injection issues that allow remote attackers to achieve arbitrary code execution on affected EPMM appliances. Active exploitation has been confirmed, and CVE-2026-1281 has been added to CISA’s Known Exploited Vulnerabilities catalog.
The vulnerabilities affect EPMM 12.x versions prior to 12.8.0.0 and are tied to In-House Application Distribution and Android File Transfer Configuration features. Successful exploitation grants full control over the EPMM appliance, enabling attackers to establish persistence, access sensitive mobile device management data, and potentially pivot into connected enterprise environments.
Ivanti has released interim RPM-based patches, though these must be reapplied after upgrades. A permanent fix is scheduled for EPMM 12.8.0.0. Organizations are strongly advised to apply mitigations immediately, review logs for signs of exploitation, and treat exposed EPMM instances as high-risk assets.
Source:
-
Notepad++ Supply Chain Compromised
What Happened
Notepad++ was involved in a supply chain compromise where parts of its update delivery infrastructure were breached. The application’s source code was not modified, but attackers were able to tamper with the update distribution path for a limited period. In targeted cases, users running older versions and using the built-in updater could have been redirected to malicious installer binaries hosted on attacker-controlled infrastructure.
The campaign appears to have been highly targeted rather than mass exploitation, consistent with espionage-style activity. The issue was identified and remediated after the Notepad++ team migrated infrastructure and tightened update security.
Impact
- Risk was limited primarily to older Notepad++ versions using legacy update mechanisms.
- Users who did manual downloads from trusted mirrors were unlikely to be affected.
- No evidence suggests the official source repository itself was compromised.
What Users Should Do
- Update immediately to the latest Notepad++ version using a fresh manual download from the official site or trusted mirrors.
- Verify digital signatures and hashes of the installer before execution.
- If Notepad++ was updated automatically during the affected timeframe:
- Treat the system as potentially exposed.
- Run endpoint security scans.
- Review network logs for suspicious outbound connections.
- Enterprise environments should audit systems where Notepad++ is installed and consider blocking auto-updaters that lack strict signature validation.
Sources:
-
Windows Notepad Remote Code Execution - CVE-2026-20841
Summary
Not to be outdone by the recent Notepad++ RCE, the Windows Notepad CVE-2026-20841 is a high-severity remote code execution (RCE) vulnerability affecting the modern Windows Notepad application. The issue was introduced after Microsoft added Markdown and rich link support to Notepad.
The vulnerability stems from improper sanitation of special elements within commands, effectively allowing command injection via crafted Markdown links.
Technical Details
An attacker can craft a malicious
.mdfile containing a specially constructed link. When a user opens the file in Notepad and Ctrl-clicks the link, the application may invoke external protocols or executables without sufficient validation or security warnings.Successful exploitation allows arbitrary code execution in the context of the logged-in user.
Key Characteristics
- Type: Remote Code Execution
- Vector: Malicious Markdown file with crafted link
- User Interaction Required: Yes (file open + link click)
- Privileges Gained: Same as current user
- Attack Surface: Expanded via Markdown rendering and clickable links
Impact
If exploited, an attacker could:
- Execute arbitrary binaries
- Download and run malware
- Establish persistence
- Perform lateral movement (depending on user privileges)
However, there were no confirmed in-the-wild exploits at the time of disclosure.
Remediation
Microsoft addressed the vulnerability in the February 2026 Patch Tuesday updates for the Windows 11 Notepad flaw by displaying warnings when clicking a link if it does not use the http:// or https:// protocol.

Sources:
- https://www.cve.org/CVERecord?id=CVE-2026-20841
- https://www.bleepingcomputer.com/news/microsoft/windows-11-notepad-flaw-let-files-execute-silently-via-markdown-links/
- https://www.helpnetsecurity.com/2026/02/12/windows-notepad-markdown-feature-opens-door-to-rce-cve-2026-20841/
- https://socprime.com/blog/cve-2026-20841-vulnerability/
- https://www.techradar.com/pro/security/microsoft-patches-concerning-windows-11-notepad-security-flaw
-
Chrome CSS Zero-Day (CVE-2026-2441) – Active Exploitation Confirmed
Google has released an emergency security update for Chrome after confirming active exploitation of a high-severity zero-day vulnerability in the browser’s CSS handling engine.
The flaw, tracked as CVE-2026-2441, is a use-after-free memory corruption issue in Chrome’s CSS parsing/rendering component. Although CSS is generally considered non-executable, improper memory management allows attackers to craft malicious webpages that can trigger arbitrary code execution within the Chrome renderer process.
Key Details:
- Type: Use-after-free (memory corruption)
- Component: Chrome CSS engine
- Severity: High (CVSS ~8.8)
- Exploitation: Confirmed in the wild
- Impact: Remote code execution via malicious webpage
Successful exploitation requires a victim to visit a specially crafted website. While Chrome’s sandbox limits direct system access, attackers often chain renderer bugs with sandbox escapes for full compromise.
Google has patched the issue in the latest stable release. All users, especially enterprise environments and those running Chromium-based browsers (Edge, Brave, Opera), should update immediately.
Sources:
-
New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises
That guest network you set up for your neighbors may not be as secure as you think.

To prevent malicious Wi-Fi clients from attacking other clients on the same network, vendors have introduced
client isolation, a combination of mechanisms that block direct communication between clients. However, client isolation is not a standardized feature, making its security guarantees unclear.Source: New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises
Github: https://github.com/vanhoefm/airsnitch
AirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networks -
Gemini Access to Unintended Public Google Cloud API Keys
Recent research by Truffle Security identified 2,863 publicly exposed Google Cloud API keys that can authenticate to Google Gemini endpoints following API enablement. These keys, commonly embedded in client-side JavaScript for benign services such as maps and analytics, were not originally intended for AI access.
When the Gemini (Generative Language) API is enabled within a Google Cloud project, all existing API keys in that project inherit access by default, including publicly exposed keys. This creates a significant risk of unauthorized data access and quota abuse.
Key Findings
- API keys with the prefix
AIzawere found embedded in public-facing code - Enabling the Gemini API retroactively grants those keys access to AI endpoints
- Newly created API keys default to “Unrestricted”, allowing access to all enabled APIs
- Attackers can:
- Access
/filesand/cachedContentsendpoints - Execute Gemini API calls
- Generate excessive LLM usage charges
- Access
- One reported case alleged $82,314.44 in unauthorized charges within 48 hours
A separate scan by Quokka identified over 35,000 Google API keys embedded across 250,000 Android applications, indicating broader ecosystem exposure.
Risk Impact
This issue transforms what were historically treated as low-risk billing identifiers into high-value AI credentials.
Potential consequences include:
- Data exposure via AI-related endpoints
- API quota theft and financial loss
- Expanded blast radius through AI-integrated cloud services
- Elevated abuse potential due to generative AI capabilities
The behavior was initially considered intended functionality. Google has since implemented proactive controls to detect and block leaked API keys attempting Gemini access. No confirmed exploitation campaigns have been publicly reported at this time.
Recommended Actions
Organizations using Google Cloud should:
- Audit enabled APIs in all projects
- Identify and rotate exposed API keys immediately
- Prioritize older keys deployed under previous guidance
- Restrict API keys to specific services and referrers
- Remove API keys from client-side code where possible
- Implement continuous API monitoring and anomaly detection
Sources:
- API keys with the prefix