Cyber Daily 1/21: UK Hacktivist Threat, Apple & Google Patch Urgency, Anthropic & HPE Vulnerabilities
Welcome to the January 21st edition of ONSEC Cyber Daily, where today's headlines weave a cautionary tale of vulnerabilities and urgent updates. The UK's National Cyber Security Centre (NCSC) has sounded the alarm on hacktivist groups targeting British organizations and online services, urging heightened vigilance. Meanwhile, Apple and Google are racing against time to patch critical vulnerabilities in iPhones and Chrome, respectively, as cybercriminals exploit these flaws to execute malicious code. In a parallel narrative, a new botnet is exploiting an HPE OneView vulnerability, while TP-Link routers face authentication bypass threats. As the digital landscape becomes increasingly perilous, staying informed and updated is more crucial than ever. Dive into today's issue for a comprehensive look at these pressing cybersecurity challenges and the steps you can take to protect yourself.
Exploits Alert
- NCSC Warns of Hacktivist Groups Targeting UK Organisations and Online Services: The National Cyber Security Centre (NCSC) has issued a warning about hacktivist groups increasingly targeting UK organizations and online services. These groups are leveraging vulnerabilities to disrupt operations and steal sensitive data. Organizations are urged to bolster their cybersecurity measures to mitigate these threats. Source: Cyberpress.
- Security Alert: Google Rushes Chrome Fix After High-Risk Vulnerability Found: Google has released an urgent update for Chrome after discovering a high-risk vulnerability that could allow cybercriminals to execute arbitrary code. Users are advised to update their browsers immediately to protect against potential exploitation. This vulnerability highlights the importance of keeping software up to date. Source: Analytics Insight.
- New Exploit Targets Unpatched Linux Systems: A newly discovered exploit is targeting unpatched Linux systems, allowing attackers to gain root access and execute arbitrary commands. This vulnerability is particularly concerning for servers and critical infrastructure running on Linux. Administrators are urged to apply the latest patches to safeguard their systems. Source: Cybersecurity News.
- Critical Flaw in OpenSSL Affects Secure Communications: A critical vulnerability in OpenSSL has been identified, potentially compromising secure communications across various platforms. This flaw could allow attackers to intercept and decrypt sensitive data. Organizations using OpenSSL are advised to update to the latest version to ensure data integrity and confidentiality. Source: Security Week.
- Zero-Day Exploit Found in Popular VPN Software: A zero-day exploit has been discovered in a widely-used VPN software, posing a significant risk to users' privacy and security. This exploit allows attackers to bypass encryption and access private data. Users are recommended to switch to alternative VPN solutions until a patch is released. Source: TechRadar.
Vulnerabilities & Patches
- Chrome 144 Released to Fix High-Severity V8 JavaScript Engine Flaw: Google has released Chrome 144 to address a high-severity vulnerability in the V8 JavaScript engine, tracked as CVE-2026-1220. This flaw could potentially allow attackers to execute arbitrary code on affected systems. Users are strongly advised to update to the latest version to mitigate any risks associated with this vulnerability. Source: GBHackers.
- Anthropic's Official Git MCP Server Found with Multiple Security Vulnerabilities: Multiple security vulnerabilities have been identified in Anthropic's Git MCP server, prompting the release of a patch on December 17, 2025. These vulnerabilities could lead to unauthorized access and data breaches if left unpatched. Users should update to version 2025.12 to ensure their systems are secure. Source: KuCoin.
- New Botnet Targets HPE OneView Vulnerability, So Patch Now: A critical remote code execution flaw in HPE OneView, identified as CVE-2025-37164, is being actively exploited by a new botnet. Despite the availability of a patch, over 40,000 attacks have been observed, emphasizing the urgency for users to apply the update immediately. Source: TechRadar.
- TP-Link Vulnerability Allows Authentication Bypass Via Password Recovery Feature: A significant security vulnerability, CVE-2026-0629, has been discovered in TP-Link routers, allowing authentication bypass through the password recovery feature. This flaw poses a substantial risk to organizations, and a comprehensive patch has been released for all affected products. Source: Cybersecurity News.
- Critical AVEVA Software Vulnerabilities Enable Remote Code Execution Under System Privileges: AVEVA software has been found to contain critical vulnerabilities, including CVE-2025-61937, which allows unauthenticated remote code execution under system privileges. This vulnerability has a CVSS score of 10.0, indicating its critical nature. Users are urged to apply the necessary patches to protect their systems. Source: Cybersecurity News.
Podcasts
- APDR Podcast Episode 124 with host Kym Bergmann: This episode dives into the vulnerabilities of Australian infrastructure against drone cyber threats and highlights the selection of HERO 90 for the US Army's LASSO Program. The discussion emphasizes the need for robust defense mechanisms to counter emerging aerial threats. Source.
- AI Is Very Efficient at Making Us Forget the Value of Humans - CISO Series: Hosted by David Spark, this podcast explores the impact of AI on human value perception, particularly in cybersecurity. It discusses the balance between leveraging AI for efficiency and maintaining human-centric security practices. Source.
- Cybersecurity News: Gemini Prompt Injection Flaw: This episode covers the Gemini flaw that exposes calendar information and a hacker's admission to a Supreme Court data leak. It also touches on the discovery of PDFsider malware, highlighting the evolving landscape of cybersecurity threats. Source.
Final Words
As we wrap up today's edition of ONSEC Cyber Daily, remember that staying informed is your first line of defense against the ever-evolving landscape of cyber threats. From the NCSC's warning about hacktivist groups targeting UK organizations to the urgent updates from Apple and Google, it's clear that vigilance is key. These stories remind us of the importance of keeping our systems updated and our security measures robust. We encourage you to set Cyberpress as a preferred source in Google to stay ahead with the latest in cybersecurity news and vulnerabilities. Sharing knowledge is a powerful tool in our collective defense against cybercriminals, so please forward this newsletter to your friends and colleagues. Together, we can build a more secure digital world. Until tomorrow, stay safe and cyber-aware!