Vulnerabilities & Patches

Critical n8n Vulnerabilities and Rising Nation-State Threats: What Security Teams Need to Know This Week

Critical n8n Vulnerabilities and Rising Nation-State Threats: What Security Teams Need to Know This Week

If you’ve been following the security news this week, you’ve probably noticed a few stories that deserve our immediate attention. While we’re seeing some positive developments in identity management and industry expansion, there are also some concerning vulnerabilities and threat predictions that we need to discuss.

Two Critical Flaws Put AI Workflows at Risk

Let’s start with the most urgent issue: Pillar Security just discovered two critical vulnerabilities in n8n, the popular AI workflow automation platform. These aren’t your typical bugs – we’re talking about flaws that could lead to complete system takeover, supply chain compromise, and credential harvesting.

When Your Security Tools Become the Attack Vector: This Week's Supply Chain Wake-Up Call

When Your Security Tools Become the Attack Vector: This Week’s Supply Chain Wake-Up Call

You know that sinking feeling when you realize the tools meant to protect you might be working against you? This week delivered a particularly sobering reminder of just how fragile our security infrastructure can be, with attackers successfully compromising antivirus update servers and finding creative new ways to abuse legitimate platforms.

The eScan Breach: When Protection Becomes Infection

The biggest story this week has to be the compromise of eScan’s update infrastructure. Unknown attackers managed to hijack the legitimate update mechanism for this Indian antivirus solution, pushing multi-stage malware directly to enterprise and consumer systems that thought they were getting security patches.

When Default Passwords Meet Nation-States: Why February's Security Wake-Up Calls Hit Different

When Default Passwords Meet Nation-States: Why February’s Security Wake-Up Calls Hit Different

I’ve been staring at this week’s security news, and honestly, it feels like we’re watching several different movies play out simultaneously – and none of them have happy endings. From AI tools quietly shipping code to China to nation-state actors exploiting the most basic security failures, February 2nd delivered a reality check that’s worth unpacking.

The Poland Attack: When Basic Security Hygiene Becomes a National Security Issue

Let’s start with what should be the most shocking story, but somehow isn’t anymore. Poland’s CERT released details about attackers hitting their energy infrastructure using – wait for it – default credentials on industrial control systems.

Supply Chain Attacks Hit Developer Tools Hard: What the Notepad++ and VSCode Incidents Tell Us

Supply Chain Attacks Hit Developer Tools Hard: What the Notepad++ and VSCode Incidents Tell Us

If you thought supply chain attacks were just about big enterprise software, this week’s news should change your mind. We’re seeing attackers go after the everyday tools developers use – and they’re getting frighteningly good at it.

The most concerning story comes from the Notepad++ compromise, where Chinese state-sponsored hackers managed to hijack the popular code editor’s update mechanism for six months. Six months! That’s not a quick hit-and-run – that’s a sustained, strategic operation targeting one of the most trusted tools in a developer’s toolkit.

When Security Goes Wrong: From Jailed Pen Testers to Supply Chain Attacks

When Security Goes Wrong: From Jailed Pen Testers to Supply Chain Attacks

You know that sinking feeling when you realize your perfectly legitimate security test might look suspicious to someone watching? Well, imagine that “someone” is law enforcement, and instead of a quick explanation, you end up spending time in jail. That’s exactly what happened to two penetration testers in Iowa back in 2019, and the fallout is still making waves in our community.

Supply Chain Attacks Are Getting Personal: What This Week's Incidents Tell Us About Our Blind Spots

Supply Chain Attacks Are Getting Personal: What This Week’s Incidents Tell Us About Our Blind Spots

I’ve been tracking several concerning incidents from this week that paint a pretty clear picture of where attackers are focusing their efforts in 2026. What’s particularly striking is how these campaigns are targeting the tools we trust most – from our development environments to our file sharing services – while simultaneously getting more aggressive in their extortion tactics.

That Record-Breaking 31.4 Tbps DDoS Attack Should Change How We Think About Defense

That Record-Breaking 31.4 Tbps DDoS Attack Should Change How We Think About Defense

I’ll be honest – when I first saw the numbers from December’s Aisuru/Kimwolf botnet attack, I had to double-check them. 31.4 terabits per second. That’s not just a new record; it’s a quantum leap that makes our previous understanding of “massive” DDoS attacks look quaint.

For context, the previous record was around 3.47 Tbps. We’re talking about a roughly 900% increase in attack volume. To put that in perspective, 31.4 Tbps is equivalent to downloading the entire contents of Netflix’s catalog in about 30 seconds. When threat actors can marshal that kind of firepower, we need to seriously reconsider our defensive strategies.

Law Enforcement Strikes Back While Tech Giants Juggle Trust and Security

Law Enforcement Strikes Back While Tech Giants Juggle Trust and Security

It’s been quite a week for security news, and I wanted to share some thoughts on what’s been happening. We’re seeing some significant wins against cybercriminals alongside some concerning developments in the tech world that affect how we think about data protection and user trust.

The FBI’s Double Win Against Cybercrime

Let’s start with the good news – law enforcement had a really productive week. The FBI managed to seize the RAMP cybercrime forum, which was one of the last major platforms openly advertising ransomware services. What makes this particularly significant is that RAMP was filling the void left by other shuttered forums, becoming a go-to marketplace for malware and hacking tools.

When Gaming Mods Meet Corporate Networks: Why Your Security Perimeter Just Got More Complicated

When Gaming Mods Meet Corporate Networks: Why Your Security Perimeter Just Got More Complicated

You know that feeling when you think you’ve got your security boundaries figured out, and then reality comes along to remind you otherwise? That’s exactly what happened this week as we watched everything from Chinese APT groups upgrading their toolkits to kids’ gaming mods becoming corporate security nightmares.

Let me walk you through what caught my attention in the security world lately, because some of these developments are going to change how we think about protecting our organizations.

MongoDB Attacks and Million-Device Botnets: Why Basic Security Still Matters Most

MongoDB Attacks and Million-Device Botnets: Why Basic Security Still Matters Most

I’ve been watching the security news this week, and honestly, it feels like we’re stuck in a time loop. While everyone’s talking about AI threats and nation-state actors, cybercriminals are still making bank from the same fundamental mistakes we’ve been warning about for years.

The MongoDB Problem That Won’t Go Away

Let’s start with something that should be ancient history by now: exposed MongoDB instances getting hit by extortion attacks. I know, I know – we’ve been talking about securing database deployments since MongoDB first hit the scene. But here we are in 2026, and threat actors are still running automated scripts to find unsecured instances, steal the data, wipe the databases, and demand relatively small ransoms for restoration.