Threat Advisories:
Hive Pro recognized in Gartner® Magic Quadrant™ for Exposure Assessment Platform, 2025 Watch platform in action
February 3, 2026

Monthly Threat Digest JANUARY 2026

For a detailed threat digest, download the pdf file here




In January, the cybersecurity arena drew significant attention due to the active exploitation of eight zero-day vulnerabilities. The standout “celebrity” vulnerability, Ni8mare (CVE-2026-21858), exposes n8n workflow automation instances to unauthenticated remote code execution, potentially cascading into full infrastructure compromise. Cisco’s CVE-2026-20045, affecting Unified Communications products, is already being actively exploited against internet-facing deployments, while the critical HPE OneView vulnerability (CVE-2025-37164) enables code injection attacks on enterprise infrastructure management systems.

GlassWorm is a self-propagating supply chain malware targeting Visual Studio Code extensions using “invisible” Unicode characters and leveraging Solana blockchain for unkillable C2 infrastructure. The Astaroth banking trojan has evolved with WhatsApp-based worm propagation capabilities, harvesting contact lists to distribute malicious archives in self-reinforcing infection loops. VoidLink, a sophisticated cloud-native Linux malware framework written in Zig, emerged with 37 plugins designed for long-term stealth access across AWS, GCP, Azure, and Kubernetes environments. 

Concurrently, five threat actors have engaged in various campaigns. Iran-linked MuddyWater is evolving by deploying RustyWater, a new Rust-based RAT targeting diplomatic, maritime, financial, and telecom entities across the Middle East with enhanced stealth capabilities. Mustang Panda maintains persistent operations against government entities using the CoolClient backdoor with advanced clipboard monitoring and proxy credential extraction capabilities. As the cybersecurity landscape evolves, organizations must remain vigilant and proactively address emerging threats.


Subscribe to receive our weekly threat digests and alerts directly in your inbox.

Recent Resources

Dive into our library of resources for expert insights, guides, and in-depth analysis on maximizing Uni5 Xposure’s capabilities

Book a demo and find out more about how Hive Pro can double your operational efficiency

Book a Demo