Information security

[ follow ]
Information security
fromTechRepublic
3 hours ago

New Verizon Report Reveals the Security Gap Attackers Are Exploiting Most

Vulnerability exploitation, AI-enabled attacks, third-party risk, and ransomware are driving breaches, while human error remains a major factor.
Information security
fromtheregister
3 hours ago

Npm registry sets stage for more secure package publishing

GitHub added staged (gated) publishing for npm packages, requiring maintainer review and 2FA approval before staged releases become public.
Information security
fromtheregister
3 hours ago

Threat hunters find Google API keys still usable 23 minutes after deletion

Deleted Google API keys can remain usable for up to 23 minutes, enabling attackers to run requests and incur charges before revocation propagates.
#cybercrime
Information security
fromComputerWeekly.com
4 hours ago

Police op targets VPN service favoured by ransomware gangs | Computer Weekly

A major VPN used by cyber criminals for anonymity, fraud, ransomware, and data exfiltration was dismantled in Operation Saffron with Europol and Bitdefender support.
Information security
fromSecurityWeek
2 days ago

Microsoft Disrupts Malware-Signing Service Run by 'Fox Tempest'

Fox Tempest used malware-signing-as-a-service with short-lived code-signing certificates to evade detection, and Microsoft disrupted it by revoking certificates, seizing infrastructure, and filing lawsuits.
Information security
fromComputerWeekly.com
4 hours ago

Police op targets VPN service favoured by ransomware gangs | Computer Weekly

A major VPN used by cyber criminals for anonymity, fraud, ransomware, and data exfiltration was dismantled in Operation Saffron with Europol and Bitdefender support.
Information security
fromSecurityWeek
2 days ago

Microsoft Disrupts Malware-Signing Service Run by 'Fox Tempest'

Fox Tempest used malware-signing-as-a-service with short-lived code-signing certificates to evade detection, and Microsoft disrupted it by revoking certificates, seizing infrastructure, and filing lawsuits.
Information security
fromSecuritymagazine
23 hours ago

Strategies, Expert Insights from the 2026 Verizon DBIR

Software vulnerabilities became the leading access method, mobile attacks rose, and generative AI is accelerating exploitation and expanding breach patterns.
Information security
fromThe Hacker News
9 hours ago

ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories

Attacks increasingly use trusted systems and normal workflows, with AI enabling faster, harder-to-detect intrusion tooling and tunneling into internal networks.
#cybersecurity
fromTechCrunch
1 day ago
Information security

GitHub says hackers stole data from thousands of internal repositories | TechCrunch

Information security
fromSecurityWeek
1 day ago

Anthropic Silently Patches Claude Code Sandbox Bypass

Two Claude Code network sandbox bypasses could have enabled outbound connections to unapproved hosts, but fixes were released, including a null-byte SOCKS5 issue.
Information security
fromTechCrunch
1 day ago

GitHub says hackers stole data from thousands of internal repositories | TechCrunch

Attackers compromised an employee device via a poisoned VS Code extension and stole data from about 3,800 internal GitHub repositories.
Information security
fromSecuritymagazine
1 day ago

Financial Services, Cybersecurity and the Evolving Threat Landscape

Financial institutions can manage accelerating cyber threats by integrating resilience into daily operations, strengthening governance and risk management, and leveraging collaboration.
Information security
fromComputerWeekly.com
1 day ago

Bulgaria fires up Google Cloud for national cyber security | Computer Weekly

Bulgaria deployed Google Cloud Cybershield to centralize AI-powered cyber intelligence and telemetry, reducing detection and response time across government entities.
Information security
fromThe Hacker News
1 day ago

Grafana GitHub Breach Exposes Source Code via TanStack npm Attack

Breach impact was limited to Grafana Labs GitHub repositories, with no evidence of customer production systems or Grafana Cloud operations being compromised.
#cisco-secure-workload
Information security
fromTechzine Global
10 hours ago

Cisco Secure Workload vulnerability can be exploited via API call

A critical unauthenticated flaw in Cisco Secure Workload internal REST APIs grants full Site Admin privileges, enabling cross-tenant data access and configuration changes.
Information security
fromSecurityWeek
11 hours ago

Cisco Patches Critical Vulnerability in Secure Workload

Critical Secure Workload REST API flaw enables cross-tenant access with Site Admin privileges; patches are available for affected versions.
Information security
fromTechzine Global
10 hours ago

Cisco Secure Workload vulnerability can be exploited via API call

A critical unauthenticated flaw in Cisco Secure Workload internal REST APIs grants full Site Admin privileges, enabling cross-tenant data access and configuration changes.
Information security
fromSecurityWeek
11 hours ago

Cisco Patches Critical Vulnerability in Secure Workload

Critical Secure Workload REST API flaw enables cross-tenant access with Site Admin privileges; patches are available for affected versions.
Information security
fromtheregister
12 hours ago

Cisco serves up yet another perfect 10 bug with Secure Workload admin flaw

Unauthenticated crafted API requests can grant Site Admin privileges, enabling cross-tenant data access and configuration changes in Cisco Secure Workload.
Information security
fromSecurityWeek
15 hours ago

Supply Chain Security Crisis: Too Many Vulnerabilities, Too Little Visibility

Velocity without visibility creates a supply chain cybersecurity crisis as exploitation outpaces patching and only a small subset of CVEs is truly exploitable.
#ai-agents
Information security
fromDevOps.com
15 hours ago

Microsoft Open-Sources RAMPART and Clarity to Bring Agent Safety Into the Dev Workflow - DevOps.com

AI agents now perform real actions across systems, requiring continuous safety engineering beyond one-time checks.
Information security
fromnews.bitcoin.com
1 day ago

OKX's Gracie Lin Says AI Agents Need Sub-Cent Payments as Bank Rails Slow Tasks

AI agents will trigger CAPTCHAs and MFA blocks, turning web security designed for humans into checkout roadblocks for autonomous commerce.
Information security
fromDevOps.com
15 hours ago

Microsoft Open-Sources RAMPART and Clarity to Bring Agent Safety Into the Dev Workflow - DevOps.com

AI agents now perform real actions across systems, requiring continuous safety engineering beyond one-time checks.
Information security
fromnews.bitcoin.com
1 day ago

OKX's Gracie Lin Says AI Agents Need Sub-Cent Payments as Bank Rails Slow Tasks

AI agents will trigger CAPTCHAs and MFA blocks, turning web security designed for humans into checkout roadblocks for autonomous commerce.
#software-supply-chain-attacks
fromWIRED
14 hours ago
Information security

A Hacker Group Is Poisoning Open Source Code at an Unprecedented Scale

Information security
fromThe Hacker News
2 days ago

Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account

A compromised npm maintainer account pushed trojanized @antv and related packages, embedding credential-stealing code and creating significant downstream exposure for auto-updating dependencies.
Information security
fromWIRED
14 hours ago

A Hacker Group Is Poisoning Open Source Code at an Unprecedented Scale

Hackers used a poisoned VSCode extension to compromise thousands of GitHub repositories, spreading malware through open source tools and extorting victims.
Information security
fromThe Hacker News
2 days ago

Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account

A compromised npm maintainer account pushed trojanized @antv and related packages, embedding credential-stealing code and creating significant downstream exposure for auto-updating dependencies.
Information security
fromThe Hacker News
2 days ago

GitHub Actions Supply Chain Attack Redirects Tags to Steal CI/CD Credentials

Compromised GitHub Actions workflows use imposter commits to steal CI/CD credentials and exfiltrate them to attacker-controlled servers.
Information security
fromSecurityWeek
13 hours ago

Google's Surge in Chrome Vulnerability Discoveries Likely Driven by AI

Chrome vulnerability counts reported by Google surged from single digits to 100 within weeks, likely aided by AI-driven testing and remediation automation.
#microsoft-defender
Information security
fromThe Hacker News
11 hours ago

Microsoft Warns of Two Actively Exploited Defender Vulnerabilities

Microsoft Defender privilege escalation and denial-of-service vulnerabilities are actively exploited, and fixes are available via updated Defender Antimalware Platform versions and definition updates.
Information security
fromSecurityWeek
13 hours ago

Microsoft Patches Exploited UnDefend and RedSun Defender Zero-Days

Microsoft released patches for two Microsoft Defender vulnerabilities exploited in the wild, adding them to CISA’s KEV list with a June 3 patch deadline.
Information security
fromThe Hacker News
11 hours ago

Microsoft Warns of Two Actively Exploited Defender Vulnerabilities

Microsoft Defender privilege escalation and denial-of-service vulnerabilities are actively exploited, and fixes are available via updated Defender Antimalware Platform versions and definition updates.
Information security
fromSecurityWeek
13 hours ago

Microsoft Patches Exploited UnDefend and RedSun Defender Zero-Days

Microsoft released patches for two Microsoft Defender vulnerabilities exploited in the wild, adding them to CISA’s KEV list with a June 3 patch deadline.
#ai-agent-security
Information security
fromtheregister
12 hours ago

Microsoft storms RAMPART, adds Clarity to agentic AI safety

RAMPART and another open-source tool help teams test, measure, and mitigate risks in agentic AI through automated red-teaming in CI/CD pipelines.
Information security
fromThe Hacker News
1 day ago

Microsoft Open-Sources RAMPART and Clarity to Secure AI Agents During Development

RAMPART and Clarity provide open-source tools for testing AI agents’ safety and security and for pressure-testing assumptions early in development.
Information security
fromtheregister
12 hours ago

Microsoft storms RAMPART, adds Clarity to agentic AI safety

RAMPART and another open-source tool help teams test, measure, and mitigate risks in agentic AI through automated red-teaming in CI/CD pipelines.
Information security
fromThe Hacker News
1 day ago

Microsoft Open-Sources RAMPART and Clarity to Secure AI Agents During Development

RAMPART and Clarity provide open-source tools for testing AI agents’ safety and security and for pressure-testing assumptions early in development.
Information security
fromTechRepublic
1 day ago

Microsoft Disrupts Malware-Signing Service Used by Ransomware Gangs

Fox Tempest abused Azure Artifact Signing to generate fraudulent code-signing certificates, enabling malware and ransomware to appear trusted and evade defenses.
Information security
fromThe Hacker News
8 hours ago

Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor

Showboat is a modular Linux post-exploitation malware used against a Middle East telecom provider, providing remote shell, file transfer, and SOCKS5 proxy capabilities.
#drupal
Information security
fromSecurityWeek
12 hours ago

Drupal Patches Highly Critical Vulnerability Exposing Websites to Hacking

CVE-2026-9082 enables unauthenticated arbitrary SQL injection on Drupal sites using PostgreSQL, potentially leading to privilege escalation and remote code execution.
Information security
fromSecurityWeek
2 days ago

Drupal to Patch Highly Critical Vulnerability at Risk of Quick Exploitation

Drupal will release patches for a highly critical vulnerability on May 20, with mitigation guidance provided and potential exploitation expected soon after disclosure.
Information security
fromSecurityWeek
12 hours ago

Drupal Patches Highly Critical Vulnerability Exposing Websites to Hacking

CVE-2026-9082 enables unauthenticated arbitrary SQL injection on Drupal sites using PostgreSQL, potentially leading to privilege escalation and remote code execution.
Information security
fromSecurityWeek
2 days ago

Drupal to Patch Highly Critical Vulnerability at Risk of Quick Exploitation

Drupal will release patches for a highly critical vulnerability on May 20, with mitigation guidance provided and potential exploitation expected soon after disclosure.
fromComputerworld
22 hours ago

Microsoft is working on a patch for 'YellowKey' attack on Bitlocker, offers temporary fix

“Organizations should start by auditing their environment for the conditions that exist that leave them vulnerable to YellowKey,” said Eric Grenier, senior director analyst at Gartner. “They should also have a clear understanding of their risk acceptance in the case of a lost/stolen device and, based on that acceptance (or non-acceptance), follow the steps such as customizing Secure Boot and ensuring firmware and Boot integrity.”.
Information security
#data-breach
Information security
fromtheregister
11 hours ago

Attackers spill plaintext passwords of 46k Myspace93 users after 2021 breach

More than 46,000 Myspace93 users had plaintext usernames and passwords exposed after a 2021 breach involving unencrypted credential storage.
Information security
fromSecuritymagazine
2 days ago

Should Customers Worry About the 7-Eleven Data Breach?

Unauthorized access exposed franchise application information stored in 7-Eleven systems, potentially including names and addresses, with other elements unconfirmed.
Information security
fromtheregister
11 hours ago

Attackers spill plaintext passwords of 46k Myspace93 users after 2021 breach

More than 46,000 Myspace93 users had plaintext usernames and passwords exposed after a 2021 breach involving unencrypted credential storage.
Information security
fromSecuritymagazine
2 days ago

Should Customers Worry About the 7-Eleven Data Breach?

Unauthorized access exposed franchise application information stored in 7-Eleven systems, potentially including names and addresses, with other elements unconfirmed.
fromtheregister
16 hours ago

Zombie user account let hackers control the city's water

Unfortunately, even though Greg was no longer around, his account was, and it retained extensive privileges, including domain admin rights, SCADA (Supervisory Control and Data Acquisition) operator access, and even the ability to perform help desk functions. It's unclear if someone from auditing ever needed this level of access, but a former employee definitely did not.
Information security
Information security
fromThe Hacker News
18 hours ago

Highly Critical Drupal Core Flaw Exposes PostgreSQL Sites to RCE Attacks

Drupal released security updates for a highly critical PostgreSQL-only Drupal Core vulnerability that can enable remote code execution, privilege escalation, or information disclosure.
#agentic-ai
Information security
fromSecurityWeek
11 hours ago

Ocean Emerges From Stealth With $28M for Agentic Email Security Platform

Ocean raised $28M to deploy AI agents that analyze every email for hidden malicious intent and automate security triage and employee guidance.
Information security
fromSecurityWeek
1 day ago

AI-Powered App Attacks Are Faster, More Frequent and Harder to Stop

Agentic AI collapses attacker cost and expertise, making all apps primary targets and turning app publication into an immediate security exposure event.
Information security
fromSecurityWeek
11 hours ago

Ocean Emerges From Stealth With $28M for Agentic Email Security Platform

Ocean raised $28M to deploy AI agents that analyze every email for hidden malicious intent and automate security triage and employee guidance.
Information security
fromSecurityWeek
1 day ago

AI-Powered App Attacks Are Faster, More Frequent and Harder to Stop

Agentic AI collapses attacker cost and expertise, making all apps primary targets and turning app publication into an immediate security exposure event.
fromThe Cipher Brief
13 hours ago

Iran's Digital War Machine Targeting U.S. Infrastructure

Israel wiped out a major military hub in southeastern Tehran, a site that Western intel says was the nerve center for the IRGC. The facility didn't just house the Quds Force and Basij; it served as the literal "brain" for Iran's global hacking campaigns and internal security operations.
Information security
Information security
fromHarvard Business Review
11 hours ago

The Case for Hiring a Chief Resilience Officer

Disruptions cause the most damage through cascading failures across connected systems, halting operations, delaying services, harming customers, and triggering financial and regulatory impacts.
Information security
fromZDNET
1 day ago

How AI can trick you into making fake payments - 5 red flags

AI-accelerated scams are rapidly increasing consumer harm by compressing fraud cycles and shifting fraud toward social engineering that tricks people into authorizing malicious actions.
Information security
fromThe Hacker News
1 day ago

GitHub Investigating TeamPCP Claimed Breach of ~4,000 Internal Repositories

GitHub is investigating unauthorized access to internal repositories after TeamPCP listed source code and organizations for sale, while monitoring for customer impact.
Information security
fromThe Hacker News
1 day ago

Agent AI is Coming. Are You Ready?

Identity dark matter now exceeds visible identity elements, increasing the risk that AI agents bypass access controls through shortcuts and credential misuse.
Information security
fromSecurityWeek
1 day ago

1Password Teams With OpenAI to Stop AI Coding Agents From Leaking Credentials

An integration enables OpenAI Codex coding agents to use enterprise credentials without exposing secrets in prompts, code, repositories, terminals, or model context.
#supply-chain-attacks
Information security
fromDevOps.com
1 day ago

GitHub Breach Tied to Malicious VS Code Extension Exposes Thousands of Internal Repositories

A compromised Visual Studio Code extension led to access of about 3,800 internal repositories, with no evidence found of customer or external enterprise impact.
fromTechCrunch
2 days ago
Information security

Hackers have compromised dozens of popular open source packages in an ongoing supply chain attack | TechCrunch

Information security
fromDevOps.com
1 day ago

GitHub Breach Tied to Malicious VS Code Extension Exposes Thousands of Internal Repositories

A compromised Visual Studio Code extension led to access of about 3,800 internal repositories, with no evidence found of customer or external enterprise impact.
Information security
fromSecurityWeek
1 day ago

Over 320 NPM Packages Hit by Fresh Mini Shai-Hulud Supply Chain Attack

A compromised NPM maintainer account published malicious package versions that triggered multi-stage credential theft and persistence across CI environments and developer tooling.
Information security
fromSecurityWeek
1 day ago

GitHub Confirms Hack Impacting 3,800 Internal Repositories

About 3,800 GitHub internal repositories were exfiltrated after a poisoned VS Code extension compromised an employee workstation, prompting secret rotation and ongoing monitoring.
Information security
fromThe Hacker News
2 days ago

Compromised Nx Console 18.95.0 Targeted VS Code Developers with Credential Stealer

A compromised Nx Console VS Code extension silently installs a credential-stealing payload via an orphan commit, exfiltrating secrets and adding a macOS backdoor.
Information security
fromTechCrunch
2 days ago

Hackers have compromised dozens of popular open source packages in an ongoing supply chain attack | TechCrunch

Hackers compromised open source project accounts and released malicious updates to steal credentials and spread malware to downstream users.
Information security
fromThe Hacker News
1 day ago

Webworm Deploys EchoCreep and GraphWorm Backdoors Using Discord and MS Graph API

Webworm uses Discord and Microsoft Graph API for command-and-control, deploying new backdoors in 2025 and blending malware via a WordPress-impersonating GitHub repository.
#data-breaches
Information security
fromTechzine Global
1 day ago

Vulnerabilities are the number one cause of data breaches for the first time

Exploiting vulnerabilities is now the leading entry point for data breaches, while AI accelerates exploitation and expands risks from shadow AI, supply chains, and mobile attacks.
Information security
fromComputerWeekly.com
2 days ago

Vulnerability exploitation now primary origin of data breaches | Computer Weekly

About 31% of breaches start with exploitation of unpatched software vulnerabilities, driven by AI-enabled faster weaponization, requiring stronger risk management and patch readiness.
Information security
fromTechzine Global
1 day ago

Vulnerabilities are the number one cause of data breaches for the first time

Exploiting vulnerabilities is now the leading entry point for data breaches, while AI accelerates exploitation and expands risks from shadow AI, supply chains, and mobile attacks.
Information security
fromComputerWeekly.com
2 days ago

Vulnerability exploitation now primary origin of data breaches | Computer Weekly

About 31% of breaches start with exploitation of unpatched software vulnerabilities, driven by AI-enabled faster weaponization, requiring stronger risk management and patch readiness.
Information security
fromZDNET
1 day ago

Mobile phishing is a bigger threat than email now - how to stay protected

Mobile phishing and social engineering are increasing faster than email phishing, with higher click-through rates, requiring mobile-focused training and protections.
Information security
fromThe Hacker News
1 day ago

Typosquatting Is No Longer a User Problem. It's a Supply Chain Problem

AI-generated lookalike domains embedded in third-party scripts evade firewalls, WAFs, EDR, and CSP, requiring detection that observes executed browser behavior.
Information security
fromtheregister
1 day ago

Even Claude agrees: hole in its sandbox was real and dangerous

Two Claude Code network sandbox bypasses were silently fixed without CVE or advisory, enabling attacker-controlled code execution and exfiltration of sandbox-accessible credentials and data.
#macos-malware
Information security
fromTechRepublic
2 days ago

Mac Users Face New Malware Threat Spoofing Apple, Google, and Microsoft

SHub Reaper macOS infostealer uses brand-spoofing and social engineering to steal passwords, browser data, crypto data, and business files while maintaining stealth persistence.
Information security
fromtheregister
2 days ago

Do fear the Reaper - stealer swipes macOS users' passwords, wallets, then backdoors them

Reaper macOS infostealer spoofs major trusted brands, uses Script Editor to bypass Terminal defenses, then steals password-manager credentials and crypto-wallet access.
Information security
fromTechRepublic
2 days ago

Mac Users Face New Malware Threat Spoofing Apple, Google, and Microsoft

SHub Reaper macOS infostealer uses brand-spoofing and social engineering to steal passwords, browser data, crypto data, and business files while maintaining stealth persistence.
Information security
fromtheregister
2 days ago

Do fear the Reaper - stealer swipes macOS users' passwords, wallets, then backdoors them

Reaper macOS infostealer spoofs major trusted brands, uses Script Editor to bypass Terminal defenses, then steals password-manager credentials and crypto-wallet access.
Information security
fromnews.bitcoin.com
1 day ago

GitHub Worm Hits npm Packages With 16M Downloads

A GitHub Actions cache poisoning attack enabled malicious npm packages to pass provenance checks, while a dead-man’s switch wipes developer machines if the npm token is revoked.
Information security
fromTNW | Data-Security
1 day ago

QIZ Security and Google Cloud partner on quantum-safe encryption

QIZ Security and Google Cloud collaborate to accelerate enterprise migration to quantum-resistant cryptography by providing unified visibility into cryptographic risk across hybrid environments.
Information security
fromDevOps.com
1 day ago

1Password Allies With OpenAI to Secure Codex AI Coding Tool - DevOps.com

Codex credentials are issued just-in-time via an MCP server so secret values never appear in code, terminals, model context, or disk.
Information security
fromSecurityWeek
1 day ago

Caught Off Guard: Securing AI After It Hits Production

Security teams must be involved early in the software development lifecycle to prevent reactive, afterthought security failures as AI use cases move to production.
Information security
fromThe Hacker News
1 day ago

Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks

Microsoft disrupted a malware-signing-as-a-service operation using Artifact Signing, seizing infrastructure and blocking access to stop ransomware and other attacks.
Information security
fromArs Technica
1 day ago

Google publishes exploit code threatening millions of Chromium users

Unfixed Chromium vulnerability lets websites exploit Browser Fetch to monitor activity, proxy browsing, and enable denial-of-service, potentially turning many devices into a botnet.
#code-signing-abuse
Information security
fromtheregister
2 days ago

Microsoft shuts down illegal code-signing operation used by ransomware crims to mask their malware

Microsoft seized websites and took down a code-signing certificate service used to make ransomware and malware appear legitimate, infecting thousands of US machines including Microsoft-owned systems.
Information security
fromNextgov.com
2 days ago

Microsoft disrupts cybercrime service offering malware disguised as legitimate software

Fox Tempest abused Microsoft code-signing tools to sell malware-signing services, leading to widespread ransomware and malicious attacks across multiple sectors and countries.
Information security
fromtheregister
2 days ago

Microsoft shuts down illegal code-signing operation used by ransomware crims to mask their malware

Microsoft seized websites and took down a code-signing certificate service used to make ransomware and malware appear legitimate, infecting thousands of US machines including Microsoft-owned systems.
Information security
fromNextgov.com
2 days ago

Microsoft disrupts cybercrime service offering malware disguised as legitimate software

Fox Tempest abused Microsoft code-signing tools to sell malware-signing services, leading to widespread ransomware and malicious attacks across multiple sectors and countries.
Information security
fromThe Hacker News
1 day ago

Microsoft Releases Mitigation for YellowKey BitLocker Bypass CVE-2026-45585 Exploit

Microsoft released a mitigation for the YellowKey BitLocker bypass vulnerability (CVE-2026-45585) affecting multiple Windows 11 and Windows Server 2025 versions.
Information security
fromGameSpot
1 day ago

Your Nvidia GPU Needs A Driver Update Right Now, Unless You Enjoy Surprise Malware DLC

Update Nvidia GPU display drivers to address a Windows and Linux driver vulnerability that could enable unauthorized access, data theft, or malicious code injection.
Information security
fromMail Online
1 day ago

Warning to Gmail users over fake 'friend' invites stealing accounts

Phishing emails disguised as trusted e-invitations can steal Google credentials or install malware after users click RSVP links.
Information security
fromSecuritymagazine
1 day ago

GitHub Breached, Internal Repositories Exposed

An unauthorized actor accessed GitHub internal repositories via a compromised employee device and an impacted VS Code extension, with TeamPCP claiming responsibility and selling access data.
fromtheregister
1 day ago

GitHub says internal repos exfiltrated after poisoned VS Code extension attack

GitHub, the world's biggest code repository and DevOps platform, fell victim to a malicious Visual Studio Code (VS Code) extension. The company's initial assessment is that only internal repositories were exfiltrated. The incident was reported by GitHub on X, with follow-up posts revealing a "poisoned VS Code extension" as the cause. The Microsoft-owned code shack continues to "analyze logs, validate secret rotation, and monitor for any follow-on activity."
Information security
Information security
fromSecurityWeek
1 day ago

Microsoft Rolls Out Mitigations for 'YellowKey' BitLocker Bypass

YellowKey enables physical attackers to bypass BitLocker by spawning a shell in recovery mode, and Microsoft provides mitigations to restore WinRE protection.
fromInfoWorld
1 day ago

GitHub admits major source code leak after 3,800 internal repositories breached

“Yesterday we detected and contained a compromise of an employee device involving a poisoned VS [Visual Studio] Code extension. We removed the malicious extension version, isolated the endpoint, and began incident response immediately,” GitHub said.
Information security
fromSecurityWeek
1 day ago

Quantum Bridge Raises $8 Million for Quantum-Safe Key Distribution Solution

Quantum Bridge announced on Wednesday that it has raised $8 million in Series A funding for its quantum-safe key distribution solution. The new funding, which brings the total raised by the company to $16 million, was supported by Wayra (Telefónica), Cadenza VC, Club degli Investitori angels, HPE, and Bacchus Venture Capital.
Information security
Information security
fromtheregister
2 days ago

Shadow AI invades the workplace, up 4x in the last year

Unauthorized personal accounts are increasingly used to access workplace AI tools, driving a surge in non-malicious insider risk and potential proprietary data exposure.
Information security
fromThe Hacker News
2 days ago

The New Phishing Click: How OAuth Consent Bypasses MFA

EvilTokens used OAuth consent to steal refresh tokens, bypassing MFA and avoiding sign-in detection by exploiting routine user clicks on microsoft.com/devicelogin.
Information security
fromComputerWeekly.com
2 days ago

Assume autonomy: Why security teams need to rethink defence at machine speed | Computer Weekly

Cybersecurity must shift from human-speed assumptions to an Assume Autonomy mindset, because AI enables autonomous discovery, exploitation, and lateral movement faster than current defenses.
Information security
fromInfoWorld
2 days ago

GitHub scales back bug bounties, reminds users security is their responsibility too

Security reports should show real security impact caused by GitHub, not user choices or hardening/documentation issues, and AI use is encouraged.
Information security
fromThe Hacker News
2 days ago

Trapdoor Android Ad Fraud Scheme Hit 659 Million Daily Bid Requests Using 455 Apps

Trapdoor uses malicious Android apps and malvertising to drive installs, hidden WebViews, and HTML5 ad requests, generating self-sustaining fraud revenue.
Information security
fromTNW | Anthropic
2 days ago

Project Glasswing partners can now share Mythos findings beyond the programme

Partners can share Mythos vulnerability findings with external security teams, regulators, open-source maintainers, and the public under responsible-disclosure norms.
Information security
fromSecurityWeek
2 days ago

Unpatched ChromaDB Vulnerability Can Lead to Server Takeover

An unpatched ChromaDB flaw enables pre-authentication remote code execution, letting unauthenticated attackers spawn a shell and access server data.
Information security
fromtheregister
2 days ago

Shai-Hulud keeps burrowing: 314 npm packages infected after another account compromise

An npm account compromise injected malware into 314 packages, stole cloud and GitHub credentials, and used GitHub as command-and-control via automated token-driven activity.
Information security
fromThe Hacker News
2 days ago

SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic Access

Multiple unauthenticated vulnerabilities in SEPPMail Secure E-Mail Gateway enable remote code execution and unauthorized access to arbitrary mail and local files.
Information security
fromtheregister
2 days ago

America's top cyber-defense agency left a GitHub repo open with with passwords, keys, tokens - and incredibly obvious filenames

A public GitHub repository exposed CISA secrets for six months, including tokens, keys, credentials, and certificates, until removal after reporting.
Information security
fromSecurityWeek
2 days ago

Critical Vulnerability Exposes Industrial Robot Fleets to Hacking

PolyScope 5 Dashboard Server has a critical command injection flaw patched in PolyScope 5.25.1, enabling unauthenticated remote code execution if reachable.
Information security
fromEntrepreneur
2 days ago

Your Next Scam Call Could Sound Exactly Like Your Child. 77% of People Who Received One Lost Money.

AI voice cloning scams can target one in four people, using three seconds of audio to create convincing voice messages that cause financial losses.
Information security
fromNextgov.com
2 days ago

Telecom firms form new cyber information-sharing group

Major telecom companies formed C2 ISAC to share real-time cybersecurity intelligence and coordinate defenses against persistent network threats.
Information security
fromSecurityWeek
2 days ago

Legacy Windows Tool MSHTA Fuels Surge in Silent Malware Attacks

MSHTA enables Microsoft-signed execution of remote scripts, making it a growing LOLBIN used to deliver and persist malware despite legitimate backward compatibility.
Information security
fromSecurityWeek
2 days ago

PoC Released for DirtyDecrypt Linux Kernel Vulnerability

DirtyDecrypt (DirtyCBC) exploits a missing copy-on-write guard in rxgk_decrypt_skb to overwrite privileged memory or page cache and gain root privileges.
Information security
fromTechCrunch
2 days ago

From teen hacker to Iron Dome researcher, this founder raised $28M to fight AI phishing | TechCrunch

Ocean builds an agentic email security platform that uses AI to detect AI-powered phishing and impersonation by analyzing email context at scale.
fromnews.bitcoin.com
2 days ago

Echo Protocol Pauses Monad Bridge After Admin Key Breach Sparks $816K Loss

An attacker compromised an administrative key tied to Echo Protocol’s deployment on the Monad blockchain network and used it to mint 1,000 eBTC tokens valued at about $76.7 million. The attacker granted their own wallet minting privileges, then deposited 45 eBTC as collateral into the Curvance decentralized lending protocol. Using that collateral, the attacker borrowed 11.29 WBTC, bridged the borrowed assets to Ethereum, swapped them for ETH, and sent about 385 ETH into Tornado Cash.
Information security
fromTechRepublic
3 days ago

Grafana Rejects Ransom Demand After GitHub Breach Exposes Codebase Theft

Grafana has confirmed that an unauthorized party gained access to its GitHub environment after obtaining a compromised token, allowing the attacker to download parts of its codebase. In a public statement shared on X, the company said its investigation found no evidence that customer data or personal information was accessed and that no evidence that customer systems or operations were affected. The breach was discovered after unusual activity triggered a forensic investigation.
Information security
Information security
fromSecurityWeek
2 days ago

201 Arrested in Crackdown on Cybercrime in Middle East, North Africa

Operation Ramz arrested 201 people, identified 382 suspects, seized 53 servers, and identified 3,867 victims across 13 MENA countries to disrupt phishing and malware threats.
[ Load more ]