Comprehensive Threat Exposure Management Platform
For a detailed threat digest, download the pdf file here

In January, the cybersecurity arena drew significant attention due to the active exploitation of eight zero-day vulnerabilities. The standout “celebrity” vulnerability, Ni8mare (CVE-2026-21858), exposes n8n workflow automation instances to unauthenticated remote code execution, potentially cascading into full infrastructure compromise. Cisco’s CVE-2026-20045, affecting Unified Communications products, is already being actively exploited against internet-facing deployments, while the critical HPE OneView vulnerability (CVE-2025-37164) enables code injection attacks on enterprise infrastructure management systems.
GlassWorm is a self-propagating supply chain malware targeting Visual Studio Code extensions using “invisible” Unicode characters and leveraging Solana blockchain for unkillable C2 infrastructure. The Astaroth banking trojan has evolved with WhatsApp-based worm propagation capabilities, harvesting contact lists to distribute malicious archives in self-reinforcing infection loops. VoidLink, a sophisticated cloud-native Linux malware framework written in Zig, emerged with 37 plugins designed for long-term stealth access across AWS, GCP, Azure, and Kubernetes environments.
Concurrently, five threat actors have engaged in various campaigns. Iran-linked MuddyWater is evolving by deploying RustyWater, a new Rust-based RAT targeting diplomatic, maritime, financial, and telecom entities across the Middle East with enhanced stealth capabilities. Mustang Panda maintains persistent operations against government entities using the CoolClient backdoor with advanced clipboard monitoring and proxy credential extraction capabilities. As the cybersecurity landscape evolves, organizations must remain vigilant and proactively address emerging threats.
Subscribe to receive our weekly threat digests and alerts directly in your inbox.