Information security

[ follow ]
Information security
fromThe Hacker News
6 minutes ago

Webworm Deploys EchoCreep and GraphWorm Backdoors Using Discord and MS Graph API

Webworm uses Discord and Microsoft Graph API for command-and-control, deploying new backdoors in 2025 and blending malware via a WordPress-impersonating GitHub repository.
Information security
fromZDNET
16 minutes ago

Mobile phishing is a bigger threat than email now - how to stay protected

Mobile phishing and social engineering are increasing faster than email phishing, with higher click-through rates, requiring mobile-focused training and protections.
Information security
fromTNW | Data-Security
44 minutes ago

QIZ Security and Google Cloud partner on quantum-safe encryption

QIZ Security and Google Cloud collaborate to accelerate enterprise migration to quantum-resistant cryptography by providing unified visibility into cryptographic risk across hybrid environments.
Information security
fromDevOps.com
37 minutes ago

1Password Allies With OpenAI to Secure Codex AI Coding Tool - DevOps.com

Codex credentials are issued just-in-time via an MCP server so secret values never appear in code, terminals, model context, or disk.
#cybersecurity
Information security
fromSecurityWeek
37 minutes ago

Anthropic Silently Patches Claude Code Sandbox Bypass

Two Claude Code network sandbox bypasses could have enabled outbound connections to unapproved hosts, but fixes were released, including a null-byte SOCKS5 issue.
Information security
fromTechCrunch
11 minutes ago

GitHub says hackers stole data from thousands of internal repositories | TechCrunch

Attackers compromised an employee device via a poisoned VS Code extension and stole data from about 3,800 internal GitHub repositories.
Information security
fromThe Hacker News
7 hours ago

Grafana GitHub Breach Exposes Source Code via TanStack npm Attack

Breach impact was limited to Grafana Labs GitHub repositories, with no evidence of customer production systems or Grafana Cloud operations being compromised.
Information security
fromTechzine Global
1 day ago

Anthropic allows partners to share findings from Mythos

Partners in Project Glasswing may share Mythos cybersecurity findings, best practices, tools, and code with external parties under responsible disclosure standards.
Information security
fromtheregister
2 days ago

Poland directs officials to ditch Signal in favor of 'secure' state-developed alternative

Poland urges government officials to stop using Signal due to security risks from APT-linked social engineering and phishing that can compromise accounts and sensitive communications.
Information security
fromTechCrunch
1 day ago

Open source tool maker Grafana Labs says hackers stole its code, refuses to pay ransom | TechCrunch

Hackers accessed Grafana’s GitLab using a stolen token, obtained source code repositories, and demanded payment, but Grafana refused and invalidated the token.
Information security
fromSecurityWeek
37 minutes ago

Anthropic Silently Patches Claude Code Sandbox Bypass

Two Claude Code network sandbox bypasses could have enabled outbound connections to unapproved hosts, but fixes were released, including a null-byte SOCKS5 issue.
Information security
fromTechCrunch
11 minutes ago

GitHub says hackers stole data from thousands of internal repositories | TechCrunch

Attackers compromised an employee device via a poisoned VS Code extension and stole data from about 3,800 internal GitHub repositories.
Information security
fromThe Hacker News
7 hours ago

Grafana GitHub Breach Exposes Source Code via TanStack npm Attack

Breach impact was limited to Grafana Labs GitHub repositories, with no evidence of customer production systems or Grafana Cloud operations being compromised.
Information security
fromTechzine Global
1 day ago

Anthropic allows partners to share findings from Mythos

Partners in Project Glasswing may share Mythos cybersecurity findings, best practices, tools, and code with external parties under responsible disclosure standards.
Information security
fromtheregister
2 days ago

Poland directs officials to ditch Signal in favor of 'secure' state-developed alternative

Poland urges government officials to stop using Signal due to security risks from APT-linked social engineering and phishing that can compromise accounts and sensitive communications.
Information security
fromTechCrunch
1 day ago

Open source tool maker Grafana Labs says hackers stole its code, refuses to pay ransom | TechCrunch

Hackers accessed Grafana’s GitLab using a stolen token, obtained source code repositories, and demanded payment, but Grafana refused and invalidated the token.
Information security
fromSecuritymagazine
13 hours ago

GitHub Breached, Internal Repositories Exposed

An unauthorized actor accessed GitHub internal repositories via a compromised employee device and an impacted VS Code extension, with TeamPCP claiming responsibility and selling access data.
Information security
fromThe Hacker News
8 hours ago

GitHub Investigating TeamPCP Claimed Breach of ~4,000 Internal Repositories

GitHub is investigating unauthorized access to internal repositories after TeamPCP listed source code and organizations for sale, while monitoring for customer impact.
#data-breaches
Information security
fromTechzine Global
5 hours ago

Vulnerabilities are the number one cause of data breaches for the first time

Exploiting vulnerabilities is now the leading entry point for data breaches, while AI accelerates exploitation and expands risks from shadow AI, supply chains, and mobile attacks.
Information security
fromComputerWeekly.com
17 hours ago

Vulnerability exploitation now primary origin of data breaches | Computer Weekly

About 31% of breaches start with exploitation of unpatched software vulnerabilities, driven by AI-enabled faster weaponization, requiring stronger risk management and patch readiness.
Information security
fromTechzine Global
5 hours ago

Vulnerabilities are the number one cause of data breaches for the first time

Exploiting vulnerabilities is now the leading entry point for data breaches, while AI accelerates exploitation and expands risks from shadow AI, supply chains, and mobile attacks.
Information security
fromComputerWeekly.com
17 hours ago

Vulnerability exploitation now primary origin of data breaches | Computer Weekly

About 31% of breaches start with exploitation of unpatched software vulnerabilities, driven by AI-enabled faster weaponization, requiring stronger risk management and patch readiness.
Information security
fromThe Hacker News
2 hours ago

Typosquatting Is No Longer a User Problem. It's a Supply Chain Problem

AI-generated lookalike domains embedded in third-party scripts evade firewalls, WAFs, EDR, and CSP, requiring detection that observes executed browser behavior.
#macos-malware
Information security
fromTechRepublic
19 hours ago

Mac Users Face New Malware Threat Spoofing Apple, Google, and Microsoft

SHub Reaper macOS infostealer uses brand-spoofing and social engineering to steal passwords, browser data, crypto data, and business files while maintaining stealth persistence.
Information security
fromtheregister
1 day ago

Do fear the Reaper - stealer swipes macOS users' passwords, wallets, then backdoors them

Reaper macOS infostealer spoofs major trusted brands, uses Script Editor to bypass Terminal defenses, then steals password-manager credentials and crypto-wallet access.
Information security
fromTechRepublic
19 hours ago

Mac Users Face New Malware Threat Spoofing Apple, Google, and Microsoft

SHub Reaper macOS infostealer uses brand-spoofing and social engineering to steal passwords, browser data, crypto data, and business files while maintaining stealth persistence.
Information security
fromtheregister
1 day ago

Do fear the Reaper - stealer swipes macOS users' passwords, wallets, then backdoors them

Reaper macOS infostealer spoofs major trusted brands, uses Script Editor to bypass Terminal defenses, then steals password-manager credentials and crypto-wallet access.
#supply-chain-attacks
Information security
fromSecurityWeek
2 hours ago

Over 320 NPM Packages Hit by Fresh Mini Shai-Hulud Supply Chain Attack

A compromised NPM maintainer account published malicious package versions that triggered multi-stage credential theft and persistence across CI environments and developer tooling.
Information security
fromSecurityWeek
4 hours ago

GitHub Confirms Hack Impacting 3,800 Internal Repositories

About 3,800 GitHub internal repositories were exfiltrated after a poisoned VS Code extension compromised an employee workstation, prompting secret rotation and ongoing monitoring.
Information security
fromThe Hacker News
1 day ago

Compromised Nx Console 18.95.0 Targeted VS Code Developers with Credential Stealer

A compromised Nx Console VS Code extension silently installs a credential-stealing payload via an orphan commit, exfiltrating secrets and adding a macOS backdoor.
Information security
fromTechCrunch
22 hours ago

Hackers have compromised dozens of popular open source packages in an ongoing supply chain attack | TechCrunch

Hackers compromised open source project accounts and released malicious updates to steal credentials and spread malware to downstream users.
Information security
fromSecurityWeek
2 hours ago

Over 320 NPM Packages Hit by Fresh Mini Shai-Hulud Supply Chain Attack

A compromised NPM maintainer account published malicious package versions that triggered multi-stage credential theft and persistence across CI environments and developer tooling.
Information security
fromSecurityWeek
4 hours ago

GitHub Confirms Hack Impacting 3,800 Internal Repositories

About 3,800 GitHub internal repositories were exfiltrated after a poisoned VS Code extension compromised an employee workstation, prompting secret rotation and ongoing monitoring.
Information security
fromThe Hacker News
1 day ago

Compromised Nx Console 18.95.0 Targeted VS Code Developers with Credential Stealer

A compromised Nx Console VS Code extension silently installs a credential-stealing payload via an orphan commit, exfiltrating secrets and adding a macOS backdoor.
Information security
fromTechCrunch
22 hours ago

Hackers have compromised dozens of popular open source packages in an ongoing supply chain attack | TechCrunch

Hackers compromised open source project accounts and released malicious updates to steal credentials and spread malware to downstream users.
#github-actions
Information security
fromnews.bitcoin.com
6 hours ago

GitHub Worm Hits npm Packages With 16M Downloads

A GitHub Actions cache poisoning attack enabled malicious npm packages to pass provenance checks, while a dead-man’s switch wipes developer machines if the npm token is revoked.
Information security
fromtheregister
1 day ago

TanStack weighs invitation-only pull requests after supply chain attack

A GitHub Actions misconfiguration enabled a worm to poison shared cache and extract secrets, prompting TanStack to tighten CI and consider invitation-only PRs.
Information security
fromnews.bitcoin.com
6 hours ago

GitHub Worm Hits npm Packages With 16M Downloads

A GitHub Actions cache poisoning attack enabled malicious npm packages to pass provenance checks, while a dead-man’s switch wipes developer machines if the npm token is revoked.
Information security
fromtheregister
1 day ago

TanStack weighs invitation-only pull requests after supply chain attack

A GitHub Actions misconfiguration enabled a worm to poison shared cache and extract secrets, prompting TanStack to tighten CI and consider invitation-only PRs.
Information security
fromnews.bitcoin.com
7 hours ago

OKX's Gracie Lin Says AI Agents Need Sub-Cent Payments as Bank Rails Slow Tasks

AI agents will trigger CAPTCHAs and MFA blocks, turning web security designed for humans into checkout roadblocks for autonomous commerce.
Information security
fromSecurityWeek
2 hours ago

Caught Off Guard: Securing AI After It Hits Production

Security teams must be involved early in the software development lifecycle to prevent reactive, afterthought security failures as AI use cases move to production.
#code-signing-abuse
Information security
fromtheregister
15 hours ago

Microsoft shuts down illegal code-signing operation used by ransomware crims to mask their malware

Microsoft seized websites and took down a code-signing certificate service used to make ransomware and malware appear legitimate, infecting thousands of US machines including Microsoft-owned systems.
Information security
fromNextgov.com
22 hours ago

Microsoft disrupts cybercrime service offering malware disguised as legitimate software

Fox Tempest abused Microsoft code-signing tools to sell malware-signing services, leading to widespread ransomware and malicious attacks across multiple sectors and countries.
Information security
fromtheregister
15 hours ago

Microsoft shuts down illegal code-signing operation used by ransomware crims to mask their malware

Microsoft seized websites and took down a code-signing certificate service used to make ransomware and malware appear legitimate, infecting thousands of US machines including Microsoft-owned systems.
Information security
fromNextgov.com
22 hours ago

Microsoft disrupts cybercrime service offering malware disguised as legitimate software

Fox Tempest abused Microsoft code-signing tools to sell malware-signing services, leading to widespread ransomware and malicious attacks across multiple sectors and countries.
Information security
fromThe Hacker News
3 hours ago

Microsoft Releases Mitigation for YellowKey BitLocker Bypass CVE-2026-45585 Exploit

Microsoft released a mitigation for the YellowKey BitLocker bypass vulnerability (CVE-2026-45585) affecting multiple Windows 11 and Windows Server 2025 versions.
fromtheregister
3 hours ago

GitHub says internal repos exfiltrated after poisoned VS Code extension attack

GitHub, the world's biggest code repository and DevOps platform, fell victim to a malicious Visual Studio Code (VS Code) extension. The company's initial assessment is that only internal repositories were exfiltrated. The incident was reported by GitHub on X, with follow-up posts revealing a "poisoned VS Code extension" as the cause. The Microsoft-owned code shack continues to "analyze logs, validate secret rotation, and monitor for any follow-on activity."
Information security
Information security
fromtheregister
20 hours ago

Shadow AI invades the workplace, up 4x in the last year

Unauthorized personal accounts are increasingly used to access workplace AI tools, driving a surge in non-malicious insider risk and potential proprietary data exposure.
Information security
fromThe Hacker News
1 day ago

The New Phishing Click: How OAuth Consent Bypasses MFA

EvilTokens used OAuth consent to steal refresh tokens, bypassing MFA and avoiding sign-in detection by exploiting routine user clicks on microsoft.com/devicelogin.
Information security
fromComputerWeekly.com
21 hours ago

Assume autonomy: Why security teams need to rethink defence at machine speed | Computer Weekly

Cybersecurity must shift from human-speed assumptions to an Assume Autonomy mindset, because AI enables autonomous discovery, exploitation, and lateral movement faster than current defenses.
#software-supply-chain-attacks
Information security
fromThe Hacker News
1 day ago

Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account

A compromised npm maintainer account pushed trojanized @antv and related packages, embedding credential-stealing code and creating significant downstream exposure for auto-updating dependencies.
Information security
fromThe Hacker News
1 day ago

Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account

A compromised npm maintainer account pushed trojanized @antv and related packages, embedding credential-stealing code and creating significant downstream exposure for auto-updating dependencies.
Information security
fromThe Hacker News
1 day ago

GitHub Actions Supply Chain Attack Redirects Tags to Steal CI/CD Credentials

Compromised GitHub Actions workflows use imposter commits to steal CI/CD credentials and exfiltrate them to attacker-controlled servers.
Information security
fromInfoWorld
21 hours ago

GitHub scales back bug bounties, reminds users security is their responsibility too

Security reports should show real security impact caused by GitHub, not user choices or hardening/documentation issues, and AI use is encouraged.
Information security
fromThe Hacker News
20 hours ago

Trapdoor Android Ad Fraud Scheme Hit 659 Million Daily Bid Requests Using 455 Apps

Trapdoor uses malicious Android apps and malvertising to drive installs, hidden WebViews, and HTML5 ad requests, generating self-sustaining fraud revenue.
Information security
fromTNW | Anthropic
1 day ago

Project Glasswing partners can now share Mythos findings beyond the programme

Partners can share Mythos vulnerability findings with external security teams, regulators, open-source maintainers, and the public under responsible-disclosure norms.
Information security
fromSecurityWeek
1 day ago

Unpatched ChromaDB Vulnerability Can Lead to Server Takeover

An unpatched ChromaDB flaw enables pre-authentication remote code execution, letting unauthenticated attackers spawn a shell and access server data.
#npm-supply-chain-attacks
Information security
fromtheregister
1 day ago

Shai-Hulud keeps burrowing: 314 npm packages infected after another account compromise

An npm account compromise injected malware into 314 packages, stole cloud and GitHub credentials, and used GitHub as command-and-control via automated token-driven activity.
Information security
fromThe Hacker News
2 days ago

Four Malicious npm Packages Deliver Infostealers and Phantom Bot DDoS Malware

Four npm packages were found to contain information-stealing malware, including a clone of the Shai-Hulud worm and a Golang DDoS botnet payload.
Information security
fromtheregister
1 day ago

Shai-Hulud keeps burrowing: 314 npm packages infected after another account compromise

An npm account compromise injected malware into 314 packages, stole cloud and GitHub credentials, and used GitHub as command-and-control via automated token-driven activity.
Information security
fromThe Hacker News
2 days ago

Four Malicious npm Packages Deliver Infostealers and Phantom Bot DDoS Malware

Four npm packages were found to contain information-stealing malware, including a clone of the Shai-Hulud worm and a Golang DDoS botnet payload.
#data-breach
fromSecurityWeek
2 days ago
Information security

7-Eleven Data Breach Confirmed After ShinyHunters Ransom Demand

7-Eleven confirmed a data breach tied to ShinyHunters, involving compromised franchisee application data and security incident notices sent to affected parties.
Information security
fromSecurityWeek
4 days ago

In Other News: Big Tech vs Canada Encryption Bill, Cisco's Free AI Security Spec, Audi App Flaws

GeForce NOW user data was exposed via a partner breach, while the FCC extended update timelines for covered foreign routers and OpenAI sought EU access to a cyber-focused GPT variant.
Information security
fromSecuritymagazine
1 day ago

Should Customers Worry About the 7-Eleven Data Breach?

Unauthorized access exposed franchise application information stored in 7-Eleven systems, potentially including names and addresses, with other elements unconfirmed.
Information security
fromSecuritymagazine
2 days ago

123,000 Impacted by American Lending Center's Year-Old Breach

A banking and finance data breach involved ransomware, with possible access to sensitive personal information affecting over 123,000 individuals.
Information security
fromSecurityWeek
2 days ago

Grafana Confirms Breach After Hackers Claim They Stole Data

A compromised GitHub token enabled attackers to download Grafana’s codebase, demand ransom, and threaten leaks, but no customer data was taken and systems were unaffected.
Information security
fromSecurityWeek
2 days ago

7-Eleven Data Breach Confirmed After ShinyHunters Ransom Demand

7-Eleven confirmed a data breach tied to ShinyHunters, involving compromised franchisee application data and security incident notices sent to affected parties.
Information security
fromSecurityWeek
4 days ago

In Other News: Big Tech vs Canada Encryption Bill, Cisco's Free AI Security Spec, Audi App Flaws

GeForce NOW user data was exposed via a partner breach, while the FCC extended update timelines for covered foreign routers and OpenAI sought EU access to a cyber-focused GPT variant.
#cybercrime
Information security
fromSecurityWeek
21 hours ago

Microsoft Disrupts Malware-Signing Service Run by 'Fox Tempest'

Fox Tempest used malware-signing-as-a-service with short-lived code-signing certificates to evade detection, and Microsoft disrupted it by revoking certificates, seizing infrastructure, and filing lawsuits.
Information security
fromtheregister
2 days ago

Grafana Labs admits all its codebase are belong to someone who popped its GitHub account

An attacker stole Grafana Labs’ GitHub codebase and demanded ransom to prevent release, but Grafana decided not to pay.
Information security
fromSecurityWeek
21 hours ago

Microsoft Disrupts Malware-Signing Service Run by 'Fox Tempest'

Fox Tempest used malware-signing-as-a-service with short-lived code-signing certificates to evade detection, and Microsoft disrupted it by revoking certificates, seizing infrastructure, and filing lawsuits.
Information security
fromtheregister
2 days ago

Grafana Labs admits all its codebase are belong to someone who popped its GitHub account

An attacker stole Grafana Labs’ GitHub codebase and demanded ransom to prevent release, but Grafana decided not to pay.
Information security
fromThe Hacker News
1 day ago

SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic Access

Multiple unauthenticated vulnerabilities in SEPPMail Secure E-Mail Gateway enable remote code execution and unauthorized access to arbitrary mail and local files.
Information security
fromtheregister
19 hours ago

America's top cyber-defense agency left a GitHub repo open with with passwords, keys, tokens - and incredibly obvious filenames

A public GitHub repository exposed CISA secrets for six months, including tokens, keys, credentials, and certificates, until removal after reporting.
Information security
fromSecurityWeek
1 day ago

Critical Vulnerability Exposes Industrial Robot Fleets to Hacking

PolyScope 5 Dashboard Server has a critical command injection flaw patched in PolyScope 5.25.1, enabling unauthenticated remote code execution if reachable.
Information security
fromEntrepreneur
20 hours ago

Your Next Scam Call Could Sound Exactly Like Your Child. 77% of People Who Received One Lost Money.

AI voice cloning scams can target one in four people, using three seconds of audio to create convincing voice messages that cause financial losses.
Information security
fromNextgov.com
19 hours ago

Telecom firms form new cyber information-sharing group

Major telecom companies formed C2 ISAC to share real-time cybersecurity intelligence and coordinate defenses against persistent network threats.
Information security
fromSecurityWeek
1 day ago

Legacy Windows Tool MSHTA Fuels Surge in Silent Malware Attacks

MSHTA enables Microsoft-signed execution of remote scripts, making it a growing LOLBIN used to deliver and persist malware despite legitimate backward compatibility.
Information security
fromSecurityWeek
1 day ago

PoC Released for DirtyDecrypt Linux Kernel Vulnerability

DirtyDecrypt (DirtyCBC) exploits a missing copy-on-write guard in rxgk_decrypt_skb to overwrite privileged memory or page cache and gain root privileges.
Information security
fromSecurityWeek
21 hours ago

Drupal to Patch Highly Critical Vulnerability at Risk of Quick Exploitation

Drupal will release patches for a highly critical vulnerability on May 20, with mitigation guidance provided and potential exploitation expected soon after disclosure.
Information security
fromTechCrunch
16 hours ago

From teen hacker to Iron Dome researcher, this founder raised $28M to fight AI phishing | TechCrunch

Ocean builds an agentic email security platform that uses AI to detect AI-powered phishing and impersonation by analyzing email context at scale.
fromnews.bitcoin.com
18 hours ago

Echo Protocol Pauses Monad Bridge After Admin Key Breach Sparks $816K Loss

An attacker compromised an administrative key tied to Echo Protocol’s deployment on the Monad blockchain network and used it to mint 1,000 eBTC tokens valued at about $76.7 million. The attacker granted their own wallet minting privileges, then deposited 45 eBTC as collateral into the Curvance decentralized lending protocol. Using that collateral, the attacker borrowed 11.29 WBTC, bridged the borrowed assets to Ethereum, swapped them for ETH, and sent about 385 ETH into Tornado Cash.
Information security
fromTechRepublic
1 day ago

Grafana Rejects Ransom Demand After GitHub Breach Exposes Codebase Theft

Grafana has confirmed that an unauthorized party gained access to its GitHub environment after obtaining a compromised token, allowing the attacker to download parts of its codebase. In a public statement shared on X, the company said its investigation found no evidence that customer data or personal information was accessed and that no evidence that customer systems or operations were affected. The breach was discovered after unusual activity triggered a forensic investigation.
Information security
#phishing
Information security
fromThe Hacker News
1 day ago

How to Reduce Phishing Exposure Before It Turns into Business Disruption

Early phishing detection turns uncertain exposure into evidence, speeds response, and prevents one click from escalating into account compromise, remote access, or disruption.
Information security
fromThe Hacker News
1 day ago

How to Reduce Phishing Exposure Before It Turns into Business Disruption

Early phishing detection turns uncertain exposure into evidence, speeds response, and prevents one click from escalating into account compromise, remote access, or disruption.
Information security
fromThe Hacker News
1 day ago

Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More

Exploited vulnerabilities in trusted systems enable key leakage, cloud access, and production incidents, so patching quiet risks first reduces fast-moving attack impact.
Information security
fromZDNET
1 day ago

5 ways to fortify your network against the new speed of AI attacks

Enterprise intrusions are accelerating as attackers automate handoffs, while humans remain the weakest link, requiring structural network defenses and preventative security changes.
Information security
fromThe Hacker News
2 days ago

Developer Workstations Are Now Part of the Software Supply Chain

Supply chain attacks increasingly target developer and CI/CD credentials, turning trusted software ecosystems into credential-harvesting operations.
Information security
fromSecuritymagazine
2 days ago

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

MFA is often not bypassed; attackers exploit post-authentication or identity lifecycle gaps, so defenses should focus on session monitoring and risk evaluation.
Information security
fromThe Hacker News
2 days ago

Ivanti, Fortinet, SAP, VMware, n8n Patch RCE, SQL Injection, Privilege Escalation Flaws

Security fixes address critical vulnerabilities across Ivanti, Fortinet, and SAP that could enable authentication bypass, unauthorized code execution, and sensitive data exposure.
Information security
fromTechRepublic
6 days ago

Microsoft's Patch Tuesday Update Targets 120 Security Flaws

May Patch Tuesday fixed 120 vulnerabilities, including 31 remote code execution and 61 privilege escalation flaws, with no zero-days reported, requiring prompt IT updates.
Information security
fromSecurityWeek
2 days ago

'Claw Chain' OpenClaw Flaws Allow Sandbox Escape, Backdoor Delivery

Chained OpenClaw vulnerabilities let attackers with sandbox code execution control the agent, bypass restrictions, steal secrets, escalate privileges, and persist on the host.
Information security
fromNextgov.com
1 day ago

Advanced AI models bring government to 'reflection point,' CIA official says

Advanced AI with hacking-like capabilities should be treated as a reflection point for federal agencies handling sensitive information.
#windows-privilege-escalation
Information security
fromSecurityWeek
2 days ago

Researcher Drops MiniPlasma Windows Exploit for Unpatched 2020 CVE

MiniPlasma exploits CVE-2020-17103 in the Windows Cloud Filter driver to gain a System shell, indicating the vulnerability may remain unpatched on Windows 11.
Information security
fromThe Hacker News
2 days ago

MiniPlasma Windows 0-Day Enables SYSTEM Privilege Escalation on Fully Patched Systems

MiniPlasma enables SYSTEM-level privilege escalation on fully patched Windows systems by exploiting cldflt.sys in HsmOsBlockPlaceholderAccess.
Information security
fromSecurityWeek
2 days ago

Researcher Drops MiniPlasma Windows Exploit for Unpatched 2020 CVE

MiniPlasma exploits CVE-2020-17103 in the Windows Cloud Filter driver to gain a System shell, indicating the vulnerability may remain unpatched on Windows 11.
Information security
fromThe Hacker News
2 days ago

MiniPlasma Windows 0-Day Enables SYSTEM Privilege Escalation on Fully Patched Systems

MiniPlasma enables SYSTEM-level privilege escalation on fully patched Windows systems by exploiting cldflt.sys in HsmOsBlockPlaceholderAccess.
Information security
fromArs Technica
2 days ago

Bug bounty businesses bombarded with AI slop

AI-generated bug reports are flooding bug bounty programs with false, low-quality submissions, forcing some companies to suspend or change these schemes.
Information security
fromTNW | Data-Security
1 day ago

Grafana Labs refuses ransom after hackers steal already-open-source code

Hackers stole Grafana’s open-source codebase and demanded ransom to prevent release; Grafana refused, citing FBI guidance and security controls.
Information security
fromtheregister
1 day ago

Linux kernel flaw opens root-only files to unprivileged users

A local kernel flaw lets unprivileged users read root-only files, but a fix landed and ModuleJail aims to reduce similar bug impact.
#nginx
Information security
fromtheregister
2 days ago

NGINX Rift attackers waste no time targeting exposed servers

An unauthenticated heap buffer overflow in NGINX can crash worker processes and, under rare conditions, enable code execution, with active exploitation observed days after disclosure.
Information security
fromThe Hacker News
2 days ago

NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE

CVE-2026-42945 in NGINX heap overflow is actively exploited, enabling unauthenticated worker crashes and potential RCE when ASLR is disabled and specific configuration is known.
Information security
fromtheregister
2 days ago

NGINX Rift attackers waste no time targeting exposed servers

An unauthenticated heap buffer overflow in NGINX can crash worker processes and, under rare conditions, enable code execution, with active exploitation observed days after disclosure.
Information security
fromThe Hacker News
2 days ago

NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE

CVE-2026-42945 in NGINX heap overflow is actively exploited, enabling unauthenticated worker crashes and potential RCE when ASLR is disabled and specific configuration is known.
from24/7 Wall St.
1 day ago

Okta Price Target Bumped to $103 at KeyBanc as Security Spending Catches Fire

Analyst Eric Heath raised the firm’s price target on Okta to $103 from $95 and kept an Overweight rating on the shares, citing a sharper outlook for enterprise security spending in the back half of the year.
Information security
Information security
fromThe Hacker News
1 day ago

INTERPOL Operation Ramz Disrupts MENA Cybercrime Networks with 201 Arrests

A coordinated MENA cybercrime crackdown arrested 201 suspects, identified 382 more, seized 53 servers, and disrupted phishing and malware operations across 13 countries.
Information security
fromnews.bitcoin.com
2 days ago

Crypto Bridge Exploits Hit $328.6M in May as Peckshield Tracks 8 Major Incidents

Bridge verification weaknesses enabled multiple cross-chain exploits, draining $328.6M by mid-May 2026 and pushing 2026 losses past $750M.
fromSecurityWeek
2 days ago

Hackers Earn $1.3 Million at Pwn2Own Berlin 2026

According to TrendAI's Zero Day Initiative (ZDI), white hat hackers have been awarded $1,298,250 for 47 unique vulnerabilities. Nearly $750,000 of the total amount was won by the first two teams: Devcore and StarLabs SG. The two teams also received the highest payouts for a single exploit chain. Devcore earned $200,000 for a remote code execution exploit with System privileges on Microsoft Exchange, and $175,000 for a Microsoft Edge sandbox escape. It also received $100,000 for exploiting Microsoft SharePoint.
Information security
Information security
fromTNW | Data-Security
3 days ago

A student with a laptop and a radio stopped four high-speed trains. The crypto keys hadn't been changed in 19 years.

A university student used cloned TETRA emergency signaling to trigger manual braking across Taiwan’s high-speed rail network, disrupting service for 48 minutes.
Information security
fromwww.theguardian.com
3 days ago

Canvas hack: is it ever a good idea to pay a ransom, and what happens to the data?

Instructure reached an agreement with ransomware attackers after student data theft, login page defacement, and assignment delays, with experts suspecting ransom payment.
Information security
fromThe Hacker News
3 days ago

Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming

Unauthenticated attackers can inject malicious JavaScript into WooCommerce checkout pages via Funnel Builder versions before 3.15.0.3 to steal payment data.
Information security
fromtheregister
4 days ago

Europe built sovereign clouds to escape US control. Then forgot about the processors

European sovereign cloud programs reduce legal exposure, but underlying Intel/AMD management engines operate below host control and can persist outside security visibility.
fromWIRED
4 days ago
Information security

Cybercriminal Twins Caught After They Forgot to Turn Off Microsoft Teams Recording

Stolen iPhones enable phishing targeting contacts, while cyberattacks, drone experiments, maritime blockades, and insider sabotage expand security risks.
Information security
fromThe Hacker News
5 days ago

What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface

Legitimate administrative tools are widely abused in high-severity incidents, so reducing attack surface by removing risky capabilities is faster than relying on detection alone.
Information security
fromTechRepublic
4 days ago

Two Unpatched Windows Exploits Target BitLocker, SYSTEM Access

Two unpatched Windows vulnerabilities, YellowKey and GreenPlasma, can bypass BitLocker protections or escalate privileges after May Patch Tuesday.
[ Load more ]