Threat and Security Update – January, 2026

Share This Article


Stay Ahead of Threats with the Latest Vulnerability Updates for January


Stay up to date on critical cyber risks, Microsoft’s January Patch Tuesday, and other notable third-party vulnerabilities. Timely patching is key to maintaining a strong security posture and protecting your business from threats. 

Quick Highlights

  • Microsoft Patch Tuesday: 
    – 112 vulnerabilities disclosed
    – 8 rated Critical, 3 are Zero-Day (1 actively exploited)  
  • High-Severity Advisories from Major Vendors: 
    Adobe: 17 critical vulnerabilities patched across 11 products 
    Fortinet: 1 high-severity flaws in FortiOS and FortiSwitchManager 
    SAP: 4 critical vulnerabilities in SAP Landscape Transformation, SAP S/4HANA, and SAP Wily Introscope Enterprise Manager 
    n8n: Fixed critical vulnerability affecting versions 1.65–1.120.4 
    React Server: Disclosed critical RCE vulnerability in React Server Components 
    Veeam: Disclosed multiple critical vulnerabilities affecting Veeam Backup & Replication v 13.0.1.180 and earlier   
  • Top Threats to Watch: 
    AI‑Powered Social Engineering & Identity Attacks – Attackers are abusing OAuth device-code authorization flows, QR‑code “Quishing,” and LinkedIn comment‑reply impersonation to bypass MFA and steal credentials at scale. 
    Supply‑Chain & Developer Ecosystem Compromises – Major compromises include the Office Assistant supply‑chain attack, malicious VS Code/OpenVSX extensions (GlassWorm), and breach of Target developer systems—highlighting continued targeting of dev environments and CI/CD ecosystems. 
    AI‑Driven Malware & Botnet Expansion – GoBruteforcer campaigns leverage AI‑generated default credentials and weak configurations to compromise 50,000+ servers, especially crypto and blockchain environments. 
    Malicious Browser Extensions Harvesting AI Chats & Corporate Data – Two Chrome extensions with 900k+ installs stole ChatGPT/DeepSeek conversations and corporate browsing data, demonstrating large‑scale exfiltration from trusted browser ecosystems. 
    Critical RCE Vulnerabilities Actively Exploited in the Wild – Active exploitation of WatchGuard Firebox (CVE‑2025‑14733), Fortinet FG‑IR‑19‑283, React Server Components (CVSS 10.0), Veeam Backup & Replication, and n8n workflow vulnerabilities poses severe risk for remote code execution, config theft, and full system compromise. 

Windows 10 Reaches End of Support

As of October 14, 2025, Microsoft has officially ended support for Windows 10. This month’s Patch Tuesday was the final security update for the OS—unless your organization enrolls in the Extended Security Updates (ESU) program. 

  • What This Means for Your Organization: 
    – No more security patches or bug fixes for Windows 10 devices  
    – Increased exposure to vulnerabilities and compliance risks  
  • Continued support requires either:  
    – Enrolling in Microsoft’s paid ESU program, or  
    Upgrading to Windows 11 

Need help planning your transition? 
Fortress SRM can help assess your environment, prioritize upgrades, and ensure your endpoints remain patch-compliant and secure.

Patch Tuesday Summary

Microsoft January 2026 Patch Tuesday 
112 vulnerabilities disclosed, including 8 critical and 3 zero-days. By category:

  • 57 Elevation of Privilege 
  • 22 Remote Code Execution 
  • 22 Information Disclosure 
  • 5 Spoofing 
  • Tampering 
  • 3 Security Feature Bypass 
  • 2 Denial of Service 

Critical Common Vulnerabilities and Exposures (CVEs)

Windows Zero-Days

CVE-ID Details Severity Exploited? 
CVE-2025-62221 Elevation of Privilege Flaw in Windows Cloud Files Mini Filter Driver which can be used to gain SYSTEM privileges Important Yes 
CVE-2025-64671 Remote Code Execution Vulnerability in GitHub Copilot for Jetbrains which can allow an attack to execute commands locally Important No 
CVE-2025-54100 Remote Code Execution Vulnerability in PowerShell which could allow embedded scripts to be executed if the webpage is fetched using Invoke-WebRequest Important No 

Other Critical CVE’s Worth Mentioning

CVE-ID Details Severity Exploited? 
CVE-2026-20957 Microsoft Excel Remote Code Execution Vulnerability Critical No 
CVE-2026-20952 Microsoft Office Remote Code Execution Vulnerability Critical No 
CVE-2026-20854 Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability Critical No 
CVE-2026-20955 Microsoft Excel Remote Code Execution Vulnerability Critical No 
CVE-2026-20953 Microsoft Office Remote Code Execution Vulnerability Critical No 
CVE-2026-20944 Microsoft Word Remote Code Execution Vulnerability Critical No 
CVE-2026-20876 Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability Critical No 
CVE-2026-20822 Windows Graphics Component Elevation of Privilege Vulnerability Critical No 

Microsoft January 2026 Security Update Release

3rd Party Critical CVE’s Worth Mentioning

Adobe Products *

Affected Product CVE-ID(s) Critical Issues Key Risks 
Adobe Dreamweaver CVE-2026-21267 CVE-2026-21268 CVE-2026-21274 CVE-2026-21271 CVE-2026-21272 5 Critical Arbitrary code execution Arbitrary file system write 
Adobe InDesign CVE-2026-21275 CVE-2026-21276 CVE-2026-21277 CVE-2026-21304 4 Critical Arbitrary code execution 
Adobe Substance 3D Modeler CVE-2026-21298 CVE-2026-21299 2 Critical Arbitrary code execution 
Adobe Illustrator CVE-2026-21280 1 Critical Arbitrary code execution 
Adobe InCopy CVE-2026-21281 1 Critical Arbitrary code execution 
Adobe Bridge CVE-2026-21283 1 Critical Arbitrary code execution 
Adobe Substance 3D Stager CVE-2026-21287 1 Critical Arbitrary code execution  
Adobe Substance 3D Painter CVE-2026-21305 1Critical Arbitrary code execution  
Adobe Substance 3D Sampler CVE-2026-21306  1 Critical Arbitrary code execution 
Adobe ColdFusion CVE-2025-66516 0 Critical, 1 Important Arbitrary code execution 
Adobe Substance 3D Designer CVE-2026-21308 0 Critical, 1 Important Memory leak 

Adobe Security Bulletins

Fortinet *

Affected Product CVE-ID Description Severity Exploited? 
FortiOS  FortiSwitchManager   CVE-2025-25249 A heap-based buffer overflow vulnerability in cw_acd daemon may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests High No 

Fortinet PSIRT Advisories

SAP *

Affected Component CVE-ID Description Severity Exploited? 
SAP S/4HANA (Private Cloud and On-Premise) CVE-2026-0501 CVE-2026-0498 CVE-2026-0501 – Due to insufficient input validation, an authenticated user could execute crafted SQL queries to read, modify, and deletebackend database data. CVE-2026-0498 – allows an attacker with admin privileges to exploit a vulnerability in the function module exposed via RFC. Critical No 
SAP Landscape Transformation CVE-2026-0491 Allows an attacker with admin privileges to exploit a vulnerability in the function module exposed via RFC. Critical No 
SAP Wily Introscope Enterprise Manager CVE-2026-0500 Due to the usage of vulnerable third party component, an unauthenticated attacker could create a malicious JNLP file accessible by a public facing URL. Critical No 

SAP January 2026 Security Notes

Google Chrome

  • Version: 144.0.7559.59/60 (Windows and Mac), 144.0.7559.59 (Linux) 
  • Release Date: Tuesday, January 13, 2026 
  • Key Fixes: High CVE-2026-0899, High CVE-2026-0900 and High CVE-2026-0901 

Chrome Release Notes

Mozilla Firefox

  • Version: Firefox 147 
  • Release Date: Tuesday, January 13, 2026 
  • Key Fixes: High CVE-2026-0877/78/79/80/81/82 

Mozilla Release Notes

* Not handled by Fortress SRM. 

Threat Intelligence Trends – January 2026

The following resources are grouped by threat type / category. 

Emerging Threats

SOCRadar Annual Dark Web Report 2025  
SOCRadar’s 2025 Annual Dark Web Report highlights a data‑driven overview of underground cybercrime, showing that data leaks dominate dark web activity, with database‑related threats making up 64.06% of observed incidents and selling posts 59.32%. The United States remains the top target, responsible for 19.91% of dark‑web mentions and over 41% of ransomware attacks, while Public Administration emerges as the most exposed sector at 12.85%. 
Read more → 

Silent Push Uncovers Long‑Running Magecart Skimming Campaign  
Security researchers discovered a sophisticated Magecart web‑skimming network that has been active since at least 2022, targeting major payment cards including American Express, Discover, Mastercard, JCB, UnionPay, and others. 
Read more →

Target’s Dev Server Taken Offline After Hackers Claim Theft of Internal Source Code 
Hackers published samples of what they claim is stolen internal Target source code on a public Gitea instance, advertising a much larger 860GB dataset for sale and referencing internal systems, developer metadata, and private repositories. 
Read more →

Trust Wallet Confirms Extension Hack Led to $7 Million Crypto Theft 
Trust Wallet confirmed that a malicious Chrome extension update (version 2.68) published on December 24 allowed attackers to exfiltrate sensitive wallet data, resulting in approximately $7 million in stolen cryptocurrency. 
Read more →

Senior U.S. Officials Impersonated in Malicious Smishing & Vishing Campaign 
An IC3 Public Service Announcement warns that since at least 2023, threat actors have been impersonating senior U.S. government officials through smishing (SMS phishing) and AI‑generated vishing calls to build rapport with victims before moving conversations to encrypted apps. 
Read more →

Ransomware & Malware Deployment

Office Assistant Supply Chain Attack Delivers Malicious Plugin  
Security researchers uncovered a long‑running supply‑chain attack in which the popular Chinese AI‑powered Office Assistant application (version 3.1.10.1) secretly loaded a malicious downloader component that contacted C2 domains, retrieved multi‑stage payloads, and ultimately deployed the Mltab malicious browser plugin.
Read more →

GlassWorm Goes Mac: Fresh Infrastructure, New Tricks  
A new GlassWorm wave marks a major pivot from Windows to macOS, distributing malicious VS Code/OpenVSX extensions that use AES‑256‑CBC–encrypted JavaScript payloads instead of earlier invisible Unicode or Rust‑based techniques.
Read more →

MacSync Stealer Evolves into Code‑Signed Swift Malware 
Security researchers discovered a new MacSync Stealer variant delivered as a code‑signed and notarized Swift application inside a disk image, allowing it to bypass Gatekeeper and avoid traditional execution‑chain indicators. 
Read more →

GachiLoader: Obfuscated Node.js Loader Spread via YouTube Ghost Network 
Check Point Research identified GachiLoader, a heavily obfuscated Node.js‑based loader distributed through compromised YouTube accounts promoting fake game cheats and cracked software. 
Read more → 

Social Engineering Exploits

Convincing LinkedIn Comment‑Reply Tactic Used in New Phishing Campaign   
A new phishing campaign is flooding LinkedIn posts with fake “reply” comments impersonating LinkedIn, falsely claiming policy violations and urging users to click external links masked with lnkd.in shorteners for added credibility. 
Read more → 

GRU‑Linked BlueDelta Evolves Credential‑Harvesting Tactics 
Russia‑linked BlueDelta (APT28) expanded its credential‑harvesting campaigns throughout February–September 2025, targeting Turkish energy and nuclear researchers, a European think tank, and organizations in North Macedonia and Uzbekistan. The group used highly tailored lures, spoofed Microsoft OWA, Google, and Sophos VPN login pages. 
Read more → 

North Korean Kimsuky Actors Leverage Malicious QR Codes in Spearphishing (Quishing) Campaigns 
A new FBI Cybersecurity Advisory warns that North Korean Kimsuky actors are increasingly using malicious QR codes (“Quishing”) in highly targeted spearphishing campaigns against U.S. think tanks, NGOs, academia, and government‑linked entities. 
Read more → 

DocuSign Impersonation Wave Leveraging Real‑Time LogoKit Customization 
Security researchers  identified a growing wave of DocuSign impersonation attacks in which phishing emails mimic authentic DocuSign notifications, spoof sender domains, and address recipients by their login name to increase credibility. 
Read more → 

Access Granted: Phishing With Device Code Authorization Enables Stealthy M365 Account Takeovers 
Proofpoint researchers warn that multiple threat clusters—both financially motivated and state‑aligned—are now abusing Microsoft’s OAuth 2.0 device code authorization flow to trick users into granting attackers access to their Microsoft 365 accounts. 
Read more → 

AI-Driven Threats

Inside GoBruteforcer: AI‑Generated Server Defaults, Weak Passwords, and Crypto‑Focused Campaigns 
Check Point Research analyzed an evolved GoBruteforcer botnet variant that exploits AI‑generated server deployment examples and legacy stacks like XAMPP, which frequently include predictable default usernames and weak passwords, leaving over 50,000 internet‑facing servers vulnerable. 
Read more → 

LLMs & Ransomware: An Operational Accelerator, Not a Revolution 
SentinelOne researchers conclude that large language models (LLMs) are accelerating ransomware operations—improving speed, scalability, multilingual phishing, tooling generation, data triage, and negotiation—without fundamentally transforming attacker tactics. 
Read more → 

Chrome Extensions Impersonate AI Tools to Steal ChatGPT & DeepSeek Chats 
Security researchers report that two malicious Chrome extensions—Chat GPT for Chrome with GPT‑5, Claude Sonnet & DeepSeek AI and AI Sidebar with Deepseek, ChatGPT, Claude and more—accumulated over 900,000 installs while secretly exfiltrating full ChatGPT and DeepSeek conversation data and users’ browsing activity. 
Read more → 

Vulnerabilities Actively Exploited

Security Advisory: Vulnerability in n8n Versions 1.65–1.120.4 
n8n disclosed a critical security vulnerability affecting versions 1.65–1.120.4, specifically in workflows using a Form Submission trigger with file upload and a Form Ending node returning binary data. 
Read more → 

Vulnerabilities Resolved in Veeam Backup & Replication 13.0.1.1071 (KB4792) 
Veeam’s KB4792 advisory discloses multiple vulnerabilities affecting Veeam Backup & Replication 13.0.1.180 and all earlier v13 builds, all of which were fixed in version 13.0.1.1071. 
Read more → 

Critical Security Vulnerability in React Server Components (RSC) 
React disclosed CVE‑2025‑55182, a critical unauthenticated remote code execution (RCE) vulnerability (CVSS 10.0) affecting React Server Components, caused by unsafe deserialization of payloads sent to React Server Function endpoints. 
Read more → 

WatchGuard Firebox iked Out‑of‑Bounds Write Vulnerability (WGSA‑2025‑00027) 
WatchGuard disclosed WGSA‑2025‑00027, a critical Out‑of‑Bounds Write vulnerability (CVE‑2025‑14733) in the Fireware OS ikedprocess, allowing remote unauthenticated RCE on Firebox appliances. 
Read more → 

Product Security Advisory & Analysis: Observed Abuse of FG‑IR‑19‑283 (CVE‑2020‑12812) 
Fortinet has confirmed active, in‑the‑wild exploitation of the long‑patched FortiGate authentication bypass vulnerability FG‑IR‑19‑283 / CVE‑2020‑12812, originally disclosed in July 2020. 
Read more → 

Recommended Actions

Mitigations

  • Patch all affected systems immediately, prioritizing critical vulnerabilities in Microsoft Patch Tuesday (8 Critical, 3 Zero‑Days), Adobe products, SAP, Fortinet, and WatchGuard Fireware OS (CVE‑2025‑14733) to prevent remote code execution and active exploitation attempts. 
  • Upgrade or retire Windows 10 endpoints (end‑of‑support October 14, 2025) or enroll devices in Microsoft’s ESU program to maintain patch coverage. 
  • Harden identity infrastructure by enforcing MFA everywhere, disabling vulnerable LDAP/2FA configurations in FortiGate devices, and reviewing OAuth app permissions to defend against device‑code phishing abuses (per Proofpoint research). 
  • Remove malicious or suspicious browser extensions, especially AI‑related Chrome add-ons impersonating legitimate tools, and enforce extension allowlisting enterprise‑wide to prevent “prompt‑poaching” attacks. 
  • Apply security updates for n8n workflows, upgrading to version 1.121.0+ to fix the file‑access vulnerability in Form Submission workflows. 
  • Update React applications and frameworks (Next.js, Parcel/Vite RSC plugins) to patched versions addressing the CVE‑2025‑55182 RCE deserialization flaw. 
  • Ensure Veeam Backup & Replication is updated to version 13.0.1.1071 to close RCE paths exploitable by Backup/Tape Operators or Backup Admins. 
  • Harden exposed servers and databases by eliminating default/AI‑generated weak credentials to reduce susceptibility to GoBruteforcer botnet campaigns. 

Monitoring

  • Monitor identity platforms (Azure AD/M365) for unusual OAuth device‑code authorizations, unexpected app consents, anomalous MFA‑less logins, and session‑token reuse attempts. 
  • Watch for VPN and firewall anomalies, including FortiGate login attempts using case‑variant usernames (e.g., Jsmith vs jsmith) and WatchGuard Firebox connections to any published Indicators of Attack (IOAs). 
  • Enable alerting for Chrome/Edge extension installations, especially AI sidebar/chat extensions, and track outbound connections to known attacker C2 domains associated with data‑exfiltrating browser extensions. 
  • Monitor for signs of n8n exploitation, such as unexpected file reads, unauthorized workflow executions, or abnormal file‑handling behavior in Form Submission workflows. 
  • Continuously monitor internetfacing services (FTP/MySQL/PostgreSQL/phpMyAdmin) for brute‑force attempts, high‑volume authentication failures, and scanning activity consistent with GoBruteforcer botnet behavior. 

Detection Tips

  • Look for RCE exploitation attempts targeting WatchGuard Firebox (CVE‑2025‑14733), including unexpected outbound connections to attacker IPs, exfiltration of config files, or rapid creation of gzip archives containing credentials. 
  • Detect devicecode phishing chains by flagging user activity involving login.microsoft.com/devicelogin with suspicious timing, unexpected device codes, or unknown applications requesting access tokens. 
  • Identify malicious browser extensions by scanning for extensions communicating with domains such as deepaichats[.]com, chatsaigpt[.]com, or suspicious Lovable‑hosted infrastructure used in AI‑chat exfiltration campaigns. 
  • Check for indicators of GoBruteforcer infection, including newly dropped web shells, outbound IRC beaconing, high‑frequency scanning of public IP space, or processes using default/AI‑generated usernames (e.g., myuser, appuser). 
  • Hunt for React Server Component exploitation by reviewing server logs for malformed RSC payloads, unexpected POST requests to RSC/Server Function endpoints, or errors related to deserialization. 
  • Inspect n8n logs for anomalous access patterns, especially unauthorized POST requests to Form Submission endpoints that include unexpected file‑handling fields. 

About Fortress SRM’s Vigilant Managed Cyber Hygiene Offering 

Why Patching Matters

Unpatched software is a leading cause of breaches—nearly 1 in 3 attacks exploit known vulnerabilities. 

Vigilant Managed Cyber Hygiene

 Fortress SRM’s Vigilant Managed Cyber Hygiene simplifies patch management. 

  • Automated updates with 97%+ success rate for Microsoft & 100+ third-party applications 
  • Critical patches, OS upgrades, and configuration updates for all devices, on/off network 
  • 24/7/365 U.S.-based monitoring and real-time reporting for full visibility 

Stay Protected. Stay Proactive.

Learn how Fortress SRM can enhance your cybersecurity strategy →