πŸ›‘οΈ InfoSec Blue Team Briefing

Wednesday, January 28, 2026

🚨 Critical Vulnerability Alert

We have critical security alerts. CVE-2026-24858 affecting Fortinet FortiOS and CVE-2026-23760 affecting SmarterMail email server have been added to the CISA Known Exploited Vulnerabilities catalog.

🎧 Audio Briefing

Download MP3

Good morning. This is your security briefing for Tuesday, January 27, 2026, covering 10 articles analyzed overnight. All attribution is by the article authors. All article analysis is automated.

We have critical security alerts. CVE-2026-24858 affecting Fortinet FortiOS and CVE-2026-23760 affecting SmarterMail email server have been added to the CISA Known Exploited Vulnerabilities catalog.

The OpenSSL Project released a security advisory addressing multiple vulnerabilities including CVE-2026-22795 and CVE-2026-22796 affecting specific versions of OpenSSL. These vulnerabilities pose security risks that could potentially be exploited to compromise systems, and defenders are urged to apply recommended upgrades immediately.

Google Threat Intelligence Group reports that Russian and Chinese government-backed threat actors, along with financially motivated groups, are actively exploiting CVE-2025-8088, a critical path traversal vulnerability in WinRAR patched in July 2025. Attackers leverage Alternate Data Streams to write malicious files to the Windows Startup folder, achieving persistent access on compromised systems across military, government, technology, and commercial sectors.

AmberWolf discovered a local privilege escalation vulnerability, CVE-2025-9142, in Check Point Harmony SASE agent's Perimeter81 component. The flaw allows attackers to exploit a directory traversal weakness in the service running with SYSTEM privileges by manipulating JWT tokens to write arbitrary files and achieve SYSTEM-level access.

Zscaler ThreatLabz identified the 'Gopher Strike' campaign targeting Indian government entities using custom Golang-based malware including GOGITTER downloader, GITSHELLPAD backdoor, and GOSHELL loader to deploy Cobalt Strike Beacons. The threat actors leverage private GitHub repositories for command and control communication, indicating a well-resourced actor conducting potential espionage against government targets.

Kaspersky Lab reports that the HoneyMyte threat actor has updated its CoolClient backdoor with enhanced data-stealing capabilities, including browser credential harvesting, document theft, and system reconnaissance tools. The malware uses DLL sideloading techniques with legitimate software from vendors like Sangfor, BitDefender, and VLC Media Player, targeting government sectors across Myanmar, Mongolia, Malaysia, Russia, Pakistan, and Thailand.

According to Reuters, a UK court awarded $4.1 million to Saudi dissident Ghanem Al-Masarir, ruling that Saudi Arabia was responsible for hacking his mobile phones using Pegasus spyware and orchestrating a physical assault against him in London. The case demonstrates state-sponsored cyber-espionage using nation-state exclusive spyware combined with physical intimidation tactics.

Code Blue 2024 conference videos have been published on YouTube, featuring technical presentation videos covering various security research topics, vulnerability analysis, and attack techniques from security researchers and practitioners.

Varonis Threat Labs identified 'Exfil Out&Look,' a novel attack technique that weaponizes Outlook add-ins to exfiltrate sensitive email data without detection. The method exploits malicious or overly permissive add-ins, particularly through Outlook Web Access, to intercept email events and extract content including subjects, bodies, recipients, and attachments from Microsoft 365 environments.

Blackpoint reports a cybersecurity campaign distributing Amatera Stealer malware through fake CAPTCHA pages targeting enterprise environments with Microsoft Application Virtualization components. The attack employs advanced evasion techniques including abuse of signed Microsoft scripts, in-memory execution, steganography, and multi-stage delivery mechanisms to bypass traditional security defenses.

The Department of Justice Office of Public Affairs announced charges against 87 defendants in an international ATM jackpotting scheme involving members of Tren de Aragua transnational criminal organization. Attackers deployed Ploutus malware variant by physically compromising ATMs, replacing hard drives or using thumb drives to install malware that forced cash dispensing and deleted evidence, resulting in millions of dollars stolen from U.S. financial institutions.

That concludes today's briefing.

πŸ“° Articles Covered