πŸ›‘οΈ InfoSec Blue Team Briefing

Friday, January 23, 2026

🚨 Critical Vulnerability Alert

We have a critical security alert. CVE-2025-68645, a vulnerability in Zimbra Collaboration webmail allows unauthenticated remote attackers to include arbitrary files via crafted requests to /h/rest endpoint, has been added to the CISA Known Exploited Vulnerabilities catalog.

🎧 Audio Briefing

Download MP3

Good morning. This is your security briefing for Thursday, January 22, 2026, covering nine articles analyzed overnight. All attribution is by the article authors. All article analysis is automated.

We have a critical security alert. CVE-2025-68645, a vulnerability in Zimbra Collaboration webmail allows unauthenticated remote attackers to include arbitrary files via crafted requests to /h/rest endpoint, has been added to the CISA Known Exploited Vulnerabilities catalog.

Cisco has disclosed a critical remote code execution vulnerability in Unified Communications products that allows unauthenticated attackers to execute arbitrary commands and escalate to root privileges. Cisco PSIRT confirms active exploitation in the wild, and patches have been released with no workarounds available.

According to Check Point Research, the North Korean-aligned threat actor KONNI has been observed using AI-generated PowerShell backdoors in phishing campaigns targeting software developers and engineering teams working on blockchain and cryptocurrency projects. The malware employs advanced obfuscation and anti-analysis techniques, with KONNI's operational reach expanding to Japan, Australia, and India beyond South Korea.

Solar Group reports discovery of a new modular backdoor named ShadowRelay targeting public sector organizations, with initial compromise occurring in summer 2024 via ProxyShell vulnerabilities on Exchange servers. The sophisticated backdoor exhibits state-sponsored APT characteristics, featuring modular plugin architecture, advanced evasion techniques including process injection and port reuse, and the ability to create networks of compromised machines for long-term espionage operations.

Expel researchers report that the ClearFake malware campaign has evolved to use living off the land techniques, exploiting the legitimate Windows file SyncAppvPublishingServer.vbs to execute obfuscated PowerShell commands in hidden mode. The campaign now leverages the cdn.jsdelivr.net CDN to host malicious code, enabling evasion of EDR products and URL blocklists while executing fileless malware in memory.

Arctic Wolf has identified unknown threat actors conducting unauthorized configuration changes on Fortinet FortiGate devices through compromised Single Sign-On accounts, starting January 15, 2026. The campaign involves creating generic accounts for persistence, granting VPN access, and exfiltrating firewall configurations, potentially exploiting authentication bypass vulnerabilities CVE-2025-59718 and CVE-2025-59719, with the speed of attacks suggesting automated activity.

TrustedSec researchers detail a privilege escalation technique exploiting Active Directory's primaryGroupID attribute that allows attackers to grant themselves Domain Admins privileges while remaining invisible to standard group membership enumeration tools. The technique creates significant blind spots in security monitoring, as tools like Get-ADGroupMember may not detect membership derived from primaryGroupID modifications.

SpecterOps researchers discovered authentication bypass and XXE vulnerabilities in Microsoft Deployment Toolkit that allow attackers to locate MDT servers, manipulate computer objects, and extract privileged Active Directory credentials. Microsoft responded by retiring MDT effective January 6, 2026, rather than patching the vulnerabilities, leaving organizations using the toolkit exposed to credential theft and lateral movement attacks.

The Citizen Lab at the University of Toronto confirms that Jordanian authorities have been using Cellebrite forensic extraction products since at least 2020 to extract data from seized phones of activists, journalists, and civil society members without consent. The practice was confirmed through forensic analysis identifying specific Cellebrite artifacts including HostIDs, SystemBUIDs in DLL files, and process names, raising significant human rights concerns regarding surveillance and suppression of free expression.

watchTowr Labs reports on attackers exploiting SmarterTools SmarterMail using decompilers to achieve authentication bypass, tracked as WT-2026-0001. This concludes today's security briefing.

That concludes today's briefing.

πŸ“° Articles Covered