<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:admin="http://webns.net/mvcb/"
     xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:media="http://search.yahoo.com/mrss/">
<channel>
<title>RoxoHost Tech Blog – Hosting, Cloud &amp;amp; Security News &amp; Popular Posts</title>
<link>https://blog.roxohost.com/rss/popular-posts</link>
<description>RoxoHost Tech Blog – Hosting, Cloud &amp;amp; Security News &amp; Popular Posts</description>
<dc:language>en</dc:language>
<dc:rights></dc:rights>

<item>
<title>Malicious Fake Moltbot VS Code Extension Found Dropping Remote Access Malware</title>
<link>https://blog.roxohost.com/malicious-fake-moltbot-vs-code-extension-found-dropping-remote-access-malware</link>
<guid>https://blog.roxohost.com/malicious-fake-moltbot-vs-code-extension-found-dropping-remote-access-malware</guid>
<description><![CDATA[ Cybersecurity researchers have uncovered a fake Moltbot (formerly Clawdbot) Visual Studio Code extension that posed as an AI coding assistant but secretly installed malware, giving attackers persistent remote access. The extension was removed from the official VS Code Marketplace after discovery. ]]></description>
<enclosure url="http://blog.roxohost.com/uploads/images/202601/image_750x_697b0d92a0bc6.jpg" length="95366" type="image/jpeg"/>
<pubDate>Thu, 29 Jan 2026 13:01:36 +0530</pubDate>
<dc:creator>jkdotin</dc:creator>
<media:keywords>Moltbot malware, fake VS Code extension, Clawdbot security risk, malicious VS Code plugin, AI coding assistant scam, ScreenConnect malware, developer security threat, supply chain attack, infostealer malware</media:keywords>
</item>

<item>
<title>Mouse Jacking: The Silent Cyber Attack You Never See</title>
<link>https://blog.roxohost.com/mouse-jacking</link>
<guid>https://blog.roxohost.com/mouse-jacking</guid>
<description><![CDATA[ What&#039;s Mouse-jacking and why its devastating. ]]></description>
<enclosure url="http://blog.roxohost.com/uploads/images/202601/image_750x_696d9b2581ad3.jpg" length="107612" type="image/jpeg"/>
<pubDate>Mon, 19 Jan 2026 08:05:51 +0530</pubDate>
<dc:creator>Sujith</dc:creator>
<media:keywords>mousejacking attack, mouse jacking cyber attack, wireless mouse hacking, 2.4GHz mouse vulnerability, USB receiver hacking, HID attack, wireless keyboard injection, cyber security threats 2026, mousejacking vulnerability, logitech unifying vulnerability, keystroke injection attack, hardware hacking, wireless device security, cyber attack without malware, physical layer attacks</media:keywords>
</item>

<item>
<title>Critical Zoom Node Vulnerability Allows Remote Code Execution (CVE&amp;2026&amp;22844)</title>
<link>https://blog.roxohost.com/critical-zoom-node-vulnerability-allows-remote-code-execution-cve-2026-22844</link>
<guid>https://blog.roxohost.com/critical-zoom-node-vulnerability-allows-remote-code-execution-cve-2026-22844</guid>
<description><![CDATA[ A newly disclosed critical vulnerability in Zoom Node Multimedia Routers (MMRs) allows authenticated meeting participants to execute arbitrary commands remotely. Tracked as CVE-2026-22844 with a CVSS score of 9.9, the flaw affects Zoom Node deployments running versions prior to 5.2.1716.0 and requires immediate patching. ]]></description>
<enclosure url="http://blog.roxohost.com/uploads/images/202601/image_750x_69721aa8e8e49.jpg" length="87394" type="image/jpeg"/>
<pubDate>Thu, 22 Jan 2026 18:10:44 +0530</pubDate>
<dc:creator>jkdotin</dc:creator>
<media:keywords>Zoom vulnerability, CVE-2026-22844, Zoom Node MMR flaw, Zoom command injection, Zoom security issue, remote code execution Zoom, critical CVE 2026, Zoom hybrid meetings vulnerability</media:keywords>
</item>

<item>
<title>Pakistan&amp;Linked Cyber Campaigns Target Indian Government Using Google Sheets &amp;amp; Fake Adobe Updates</title>
<link>https://blog.roxohost.com/pakistan-linked-cyber-campaigns-target-indian-government-using-google-sheets-fake-adobe-updates</link>
<guid>https://blog.roxohost.com/pakistan-linked-cyber-campaigns-target-indian-government-using-google-sheets-fake-adobe-updates</guid>
<description><![CDATA[ Indian government entities have been targeted by two sophisticated cyber-espionage campaigns, dubbed Gopher Strike and Sheet Attack, attributed to a Pakistan-linked threat actor. The attacks leverage phishing emails, fake Adobe update prompts, and trusted platforms like Google Sheets and GitHub to deploy custom Golang-based malware, enabling persistent access and remote command execution on infected systems. ]]></description>
<enclosure url="http://blog.roxohost.com/uploads/images/202601/image_750x_6979ad342986d.jpg" length="101690" type="image/jpeg"/>
<pubDate>Wed, 28 Jan 2026 12:01:48 +0530</pubDate>
<dc:creator>jkdotin</dc:creator>
<media:keywords>Pakistan cyber attack, Indian government cyber attack, Gopher Strike, Sheet Attack, APT36, Golang malware, fake Adobe update attack, phishing campaign India, Google Sheets C2, GitHub malware, cyber espionage India, Zscaler ThreatLabz, advanced persistent threat</media:keywords>
</item>

<item>
<title>Massive 149M Credentials Leak Discovered – Gmail, Facebook, Instagram &amp;amp; Government Accounts Exposed</title>
<link>https://blog.roxohost.com/massive-149m-credentials-leak-discovered-gmail-facebook-instagram-government-accounts-exposed</link>
<guid>https://blog.roxohost.com/massive-149m-credentials-leak-discovered-gmail-facebook-instagram-government-accounts-exposed</guid>
<description><![CDATA[ A 149 million credentials database, including Gmail, Facebook, Instagram, and government accounts, was found exposed in an unprotected cloud repository. Learn how the breach happened, who’s affected, and steps to stay safe. ]]></description>
<enclosure url="http://blog.roxohost.com/uploads/images/202601/image_750x_69774799c1dcf.jpg" length="103311" type="image/jpeg"/>
<pubDate>Mon, 26 Jan 2026 16:20:09 +0530</pubDate>
<dc:creator>jkdotin</dc:creator>
<media:keywords>credentials leak, data breach, Gmail hack, Facebook hack, Instagram hack, government accounts exposed, infostealer malware, cyber security, exposed passwords, credential-stuffing</media:keywords>
</item>

</channel>
</rss>