Good morning. This is your security briefing for Thursday, January 29, 2026, covering 7 articles analyzed overnight. All attribution is by the article authors, and all article analysis is automated.
We have a critical security alert. CVE-2026-1281, a remote code execution in Ivanti Endpoint Manager Mobile, has been added to the CISA Known Exploited Vulnerabilities catalog.
Horizon3.ai reports on CVE-2025-40551, a critical unauthenticated remote code execution vulnerability in SolarWinds Web Help Desk that exploits Java deserialization through the jabsorb library. The exploit chain bypasses CSRF protections and blacklist filters, with additional vulnerabilities including static default credentials and security protection bypass. SolarWinds has released version 2026.1 to address these issues.
Sekoia.io and LenAI have published related research on ClickFix malware distribution infrastructure. Sekoia reports that IClickFix has compromised over 3,800 WordPress sites since late 2024, affecting users in 82 countries and distributing NetSupport RAT, Emmenhtal Loader, and XFiles Stealer through fake Cloudflare Turnstile lures. LenAI's analysis of the underlying ErrTraffic distribution system uncovered critical vulnerabilities including authenticated RCE through file upload, authentication bypass, and local file disclosure that could allow attackers to compromise the criminal infrastructure itself.
CrowdStrike and Truesec both report on North Korean threat activity. CrowdStrike reveals that LABYRINTH CHOLLIMA has evolved into three specialized subgroups since 2018, with GOLDEN CHOLLIMA and PRESSURE CHOLLIMA focusing on cryptocurrency theft using Jeus and AppleJeus malware, while core LABYRINTH CHOLLIMA conducts espionage against manufacturing, defense, and logistics sectors. Separately, Truesec reports that Lazarus is targeting financial sector professionals in the Nordic region through LinkedIn social engineering attacks delivering the BeaverTail remote access trojan.
HarfangLab reports on RedKitten, a newly identified campaign targeting Iranian NGOs and human rights activists documenting abuses during the Dey 1404 Protests. The campaign, potentially state-aligned with Iranian government interests, leverages GitHub and Google Drive for payload delivery and Telegram for command and control, with evidence suggesting AI-accelerated development using Large Language Models.
Security researcher eversinc33 released drvtrace, a WinDbg plugin for tracing module transitions in debugged Windows kernel drivers. The tool accompanies a technical blog series covering static and dynamic analysis techniques, including unpacking VMProtect-protected drivers, anti-rootkit methods, and kernel-level keylogging using undocumented Windows structures.
That concludes today's briefing.