Oracle has released its January 2026 Critical Patch Update (CPU), delivering 337 security patches that address around 230 unique CVEs across more than 30 Oracle product families. This update is one of Oracle’s largest CPUs to date and includes fixes for over 235 remotely exploitable vulnerabilities that do not require authentication. Among the most severe issues are CVE-2025-66516, affecting the widely used Apache Tika library, and CVE-2026-21962, impacting the WebLogic Server Proxy Plug-in—both rated CVSS 10.0. While no vulnerabilities are currently confirmed to be actively exploited, Oracle strongly advises immediate attention due to the potential impact on enterprise environments. The significance of this CPU lies in both the severity and the breadth of exposure. Many of the vulnerabilities stem from shared third-party components, meaning a single CVE can affect multiple Oracle products simultaneously. Product families such as Oracle Communications, Fusion Middleware, Financial Services Applications, Java SE, and MySQL received a high volume of fixes, with a large percentage being remotely exploitable. Systems deployed at the network edge, especially proxy services and middleware components, face increased risk if left unpatched. Organizations should prioritize patching based on critical severity, internet exposure, and business impact. Internet-facing services and products relying on shared libraries should be addressed first to reduce the attack surface. Although testing remains important, delaying patches for high-risk systems increases the likelihood of post-disclosure exploitation. Leveraging threat intelligence and asset visibility can help security teams patch more effectively and reduce overall enterprise risk.
Okta has issued a warning about a new wave of highly sophisticated voice-based social engineering (vishing) attacks using custom phishing kits designed to steal Single Sign-On (SSO...
A critical security vulnerability has been disclosed in the GNU InetUtils telnet daemon (telnetd) that allows remote attackers to gain unauthorized root access to affected systems....
The attack begins with a fraudulent PNB MetLife payment gateway webpage designed to closely mimic the insurer’s legitimate premium payment portal. Victims are typically lured via...