Information security

[ follow ]
Information security
fromTechzine Global
3 hours ago

Emergency patch for vulnerability in Oracle E-Business Suite

Critical Oracle E-Business Suite vulnerability CVE-2025-61884 allows unauthenticated attackers to disclose sensitive data across EBS versions 12.2.3–12.2.14; urgent patching recommended.
Information security
fromDataBreaches.Net
3 hours ago

Months After Being Notified, a Software Vendor is Still Exposing Confidential and Sealed Court Records - DataBreaches.Net

A prosecutor case-management vendor left confidential and sealed court records publicly exposed online despite repeated alerts from researchers, an FBI agent, and assisting IT personnel.
fromArs Technica
1 hour ago

No fix yet for attack that lets hackers pluck 2FA codes from Android phones

The new attack, named Pixnapping by the team of academic researchers who devised it, requires a victim to first install a malicious app on an Android phone or tablet. The app, which requires no system permissions, can then effectively read data that any other installed app displays on the screen. Pixnapping has been demonstrated on Google Pixel phones and the Samsung Galaxy S25 phone and likely could be modified to work on other models with additional work.
Information security
Information security
fromEngadget
1 hour ago

Another Game Freak leak claims to show the Pokemon roadmap

Datamined files claim Game Freak plans Pokémon Wind and Waves (2026) plus several upcoming projects including MMO-like multi-region remake Project Seed (2028).
Information security
fromSocial Media Explorer
4 days ago

The Biggest Challenges for Cyber Security Managers - Social Media Explorer

Remote and hybrid work dramatically increases cyber risk by expanding attack surfaces, requiring proactive, adaptive, and human-centric security beyond traditional defenses.
Information security
fromSecuritymagazine
22 hours ago

60% of Security Leaders Say Threat Actors Are Evolving Too Quickly

Security leaders prioritize addressing third-party software and genAI risks and increasingly embed penetration testing to strengthen digital supply chain resilience.
Information security
fromBusiness Matters
23 hours ago

Strengthening Online Security Through Device Intelligence

Device intelligence uses hardware, software, network, and session signals to enable real-time risk-based decisions, reducing fraud while minimizing friction for trustworthy users.
Information security
fromThe Hacker News
10 hours ago

Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk

Unmonitored client-side JavaScript enables attackers to steal payment data while WAFs and network defenses remain blind, creating a critical security gap.
fromThe Hacker News
8 hours ago

Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More

Dozens of Orgs Impacted by Exploitation of Oracle EBS Flaw - Dozens of organizations may have been impacted following the zero-day exploitation of a security flaw in Oracle's E-Business Suite (EBS) software since August 9, 2025, according to Google Threat Intelligence Group (GTIG) and Mandiant. The activity, which bears some hallmarks associated with the Cl0p ransomware crew, is assessed to have fashioned together multiple distinct vulnerabilities, including a zero-day flaw tracked as CVE-2025-61882 (CVSS score: 9.8), to breach target networks and exfiltrate sensitive data.
Information security
#data-breach
#discord
fromZDNET
4 days ago
Information security

70,000 government IDs were exposed in a Discord breach - could yours be next?

fromZDNET
4 days ago
Information security

70,000 government IDs were exposed in a Discord breach - could yours be next?

Information security
fromThe Hacker News
16 hours ago

New Rust-Based Malware "ChaosBot" Hijacks Discord Channels to Control Victims' PCs

ChaosBot is a Rust-based backdoor using Discord C2, compromised credentials, WMI, DLL sideloading, and an FRP reverse proxy to enable reconnaissance, command execution, and persistence.
#breachforums
Information security
fromTheregister
16 hours ago

Techies mistakenly tossed appliance that had no power cord

Removing undocumented, powered-down equipment can unexpectedly disrupt critical network infrastructure and cause a company-wide outage.
Information security
fromThe Hacker News
11 hours ago

Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor

Microsoft revamped Edge's IE mode after reports that attackers abused it using social engineering and Chakra 0-day exploits to gain full device control.
#post-quantum-cryptography
fromMedium
3 weeks ago
Information security

DevOps Quantum Leap: Emerging Use Cases of Quantum-Safe Cryptography

fromMedium
3 weeks ago
Information security

DevOps Quantum Leap: Emerging Use Cases of Quantum-Safe Cryptography

fromTheregister
8 hours ago

Android Pixnapping attack can capture app data like 2FA info

The attack works by accessing information about screen display pixels through a hardware side channel ( GPU.zip), using a technique [PDF] described by security researcher Paul Stone in 2013. Stone's work described how SVG filters could be used in a timing attack [PDF] to read the pixel values from a web page in a cross-origin iframe, a method subsequently mitigated by iframe and cross-origin cookie restrictions.
Information security
Information security
fromComputerWeekly.com
12 hours ago

UK police to upgrade illicit asset recovery system | Computer Weekly

A new cloud-based Asset Recovery IT (ARIT) system will replace JARD to improve tracking, management, international and cryptocurrency recovery of criminal assets for UK policing.
fromComputerWeekly.com
14 hours ago

The importance of upgrading to the latest Windows operating system | Computer Weekly

Windows 10 was launched in July 2015. It was supposed to be the last major operating system (OS) upgrade, but Microsoft released Windows 11 in October 2021, and now Windows 10 has reached end of life, which means it will no longer be updated. Consumers who register for extended support and back up their PCs in the Microsoft cloud will be able to get free security updates until October 2026. Corporate PCs and devices connected to Active Directory will only receive Windows 10 security updates if they are covered by an Extended Security Updates (ESU) subscription.
Information security
fromThe Hacker News
14 hours ago

Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns

"Instead of relying solely on traditional command-and-control (C2) servers that can be taken down, these attackers are leveraging GitHub repositories to host malware configurations," McAfee Labs researchers Harshil Patel and Prabudh Chakravorty said in a report. "When law enforcement or security researchers shut down their C2 infrastructure, Astaroth simply pulls fresh configurations from GitHub and keeps running."
Information security
#rondodox
Information security
fromTechCrunch
1 day ago

The ZoraSafe app wants to protect older people online and will present at TechCrunch Disrupt 2025 | TechCrunch

ZoraSafe will provide older adults with an app combining scam detection, AI call analysis, and gamified microlearning to prevent fraud and teach digital safety.
#ransomware
fromIT Pro
3 days ago
Information security

Rocketing number of ransomware groups as new, smaller players emerge

fromIT Pro
3 days ago
Information security

Rocketing number of ransomware groups as new, smaller players emerge

Information security
fromWIRED
2 days ago

'Happy Gilmore' Producer Buys Spyware Maker NSO Group

North Korean operatives are posing as architecture professionals using fake profiles, résumés, and Social Security numbers to infiltrate US companies.
#sonicwall
#cybersecurity
fromDataBreaches.Net
4 days ago
Information security

Shad White's office finds nearly a third of Mississippi's state agencies fail cybersecurity requirements - DataBreaches.Net

One third of Mississippi state agencies failed to complete required third-party cybersecurity assessments, leaving critical government operations exposed to cybercrime risk.
fromThe Hacker News
4 days ago
Information security

ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More

Attackers increasingly combine social engineering, AI-driven manipulation, and cloud exploitation, widening attack surfaces across communication platforms, devices, and cloud services.
fromDataBreaches.Net
4 days ago
Information security

Shad White's office finds nearly a third of Mississippi's state agencies fail cybersecurity requirements - DataBreaches.Net

#cybercrime
fromDataBreaches.Net
2 days ago
Information security

In a few days, the PowerSchool hacker will learn his sentence, and his life as he has known it will end. - DataBreaches.Net

fromDataBreaches.Net
2 days ago
Information security

In a few days, the PowerSchool hacker will learn his sentence, and his life as he has known it will end. - DataBreaches.Net

fromwww.theguardian.com
2 days ago

Hackers leak Qantas data containing 5 million customer records after ransom deadline passes

The Qantas data, which was stolen from a Salesforce database in a major cyber-attack in June, included customers' email addresses, phone numbers, birth dates and frequent flyer numbers. It did not contain credit card details, financial information or passport details. On Saturday the group marked the data as leaked, writing: Don't be the next headline, should have paid the ransom.
Information security
Information security
fromInfoQ
2 days ago

Google DeepMind Introduces CodeMender, an AI Agent for Automated Code Repair

CodeMender automatically detects, repairs, and hardens software vulnerabilities using AI reasoning, static/dynamic analysis, fuzzing, and verification to generate validated patches for upstream submission.
Information security
fromSFGATE
2 days ago

SF tech company hit with 3 straight lawsuits after wild month

A third-party customer support breach exposed sensitive Discord user data for roughly 70,000 people and prompted negligence lawsuits and extortion claims.
fromThe Hacker News
2 days ago

Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks

The threat actor's use of the security utility was documented by Sophos last month. It's assessed that the attackers weaponized the on-premises SharePoint vulnerabilities known as ToolShell to obtain initial access and deliver an outdated version of Velociraptor (version 0.73.4.0) that's susceptible to a privilege escalation vulnerability ( CVE-2025-6264) to enable arbitrary command execution and endpoint takeover, per Cisco Talos.
Information security
Information security
fromSecurityWeek
3 days ago

In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware

Active exploitation of Gladinet and Zimbra vulnerabilities and social-engineered payroll attacks against US universities have led to ongoing mitigations and warnings.
Information security
fromSecuritymagazine
3 days ago

Help Desk Havoc: Why Identity Verification Is Still the Weakest Link in Targeted Attacks

Help desks are a critical, under-protected attack vector in zero trust deployments, enabling social-engineering breaches that bypass authentication and cause major disruption.
Information security
fromHarvard Business Review
3 days ago

The Business Rewards and Identity Risks of Agentic AI - SPONSOR CONTENT FROM CYBERARK

Agentic AI introduces a new, complex identity class combining human-like decision-making with machine characteristics, significantly expanding identity security challenges for access, governance, and deprovisioning.
Information security
fromSecuritymagazine
3 days ago

85,000 Pet and Pet Owner Records Exposed

An unsecured, unencrypted database exposed 85,361 files (158 GB) containing policyholder and pet PII—including names, contact details, medical records, and partial credit card numbers.
Information security
fromComputerWeekly.com
3 days ago

Beyond the refresh: Your cyber strategy must include AI PCs | Computer Weekly

Modern AI-powered PC refreshes strengthen security, productivity and resilience while addressing expanded attack surfaces from hybrid work and ageing device risks.
Information security
fromDataBreaches.Net
3 days ago

Telstra Denies Scattered Spider Data Breach Claims Amid Ransom Threats - DataBreaches.Net

Telstra denies a claimed breach of nearly 19 million records, saying data was scraped publicly and no sensitive credentials were exposed.
Information security
fromSecurityWeek
3 days ago

ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities

Multiple high-severity input-validation vulnerabilities in Ivanti Endpoint Manager allow authenticated attackers to achieve remote code execution or local privilege escalation.
Information security
fromInfoWorld
3 days ago

Lessons from the Salesforce breach

Enterprise data interconnectedness requires continuous evolution of cloud security from both providers and customers to mitigate cascading breaches.
fromNextgov.com
3 days ago

When AI agents go rogue, the federal government needs reversible resilience

The age of agentic AI - where autonomous systems make decisions and take actions at speed - has dawned in ways government agencies may struggle to grasp. As agencies explore ways to bring agentic AI into public service, resilience can no longer be a component of the strategy; it is the strategy. When integrating AI agents, the federal government must prioritize rapid reversibility and transparent, auditable recovery.
Information security
#github-actions
fromMedium
3 weeks ago
Information security

From Jenkins to GitHub Actions: Evolving a Secure DevSecOps Pipeline with Canary Deployments

fromMedium
3 weeks ago
Information security

From Jenkins to GitHub Actions: Evolving a Secure DevSecOps Pipeline with Canary Deployments

Information security
fromSecurityWeek
3 days ago

Juniper Networks Patches Critical Junos Space Vulnerabilities

Juniper released patches addressing nearly 220 vulnerabilities across Junos OS, Junos Space, and Security Director, including nine critical-severity flaws.
Information security
fromTheregister
3 days ago

Zero-day in popular file-sharing software actively exploited

Apply the available mitigation immediately for Gladinet CentreStack and Triofox to mitigate actively exploited CVE-2025-11371, as no patch is available.
Information security
fromTheregister
3 days ago

Hacktivists deactivate after falling into researchers' trap

TwoNet hacktivists were deceived by a honeypot into compromising a fake water treatment plant, demonstrating real risks to ICS and critical infrastructure.
fromSecurityWeek
3 days ago

Cisco, Fortinet, Palo Alto Networks Devices Targeted in Coordinated Campaign

The threat intelligence firm initially warned of scanning attempts targeting Cisco ASA devices in early September, roughly three weeks before Cisco disclosed two zero-day vulnerabilities impacting Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) software. The bugs, tracked as CVE-2025-20333 (CVSS score of 9.9) and CVE-2025-20362 (CVSS score of 6.5), were exploited in attacks linked to the ArcaneDoor espionage campaign, which has been attributed to hackers based in China.
Information security
Information security
fromSecurityWeek
3 days ago

Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks

Attackers exploited Oracle E-Business Suite, including CVE-2025-61882, to deploy malware such as GoldVein.Java and deliver second-stage payloads for extortion.
Information security
fromThe Hacker News
3 days ago

From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation

A deserialization vulnerability in GoAnywhere MFT's License Servlet (CVE-2025-10035) has been actively exploited since September 11, enabling unauthenticated command injection and Medusa ransomware deployment.
fromThe Hacker News
3 days ago

The AI SOC Stack of 2026: What Sets Top-Tier Platforms Apart?

The SOC of 2026 will no longer be a human-only battlefield. As organizations scale and threats evolve in sophistication and velocity, a new generation of AI-powered agents is reshaping how Security Operations Centers (SOCs) detect, respond, and adapt. From prompt-dependent copilots to autonomous, multi-agent systems, the current market offers everything from smart assistants to force-multiplying automation.
Information security
Information security
fromThe Hacker News
3 days ago

Microsoft Warns of 'Payroll Pirates' Hijacking HR SaaS Accounts to Steal Employee Salaries

Storm-2657 hijacks employee HR SaaS accounts via phishing and AitM attacks, then redirects salary payments to attacker-controlled bank accounts by modifying payment settings.
#oracle-e-business-suite
fromDataBreaches.Net
3 days ago

Watsonville Community Hospital had a data breach - or two. It would be helpful to know which. - DataBreaches.Net

On December 8, 2024, DataBreaches reported that Watsonville Community Hospital in California was continuing to respond to what they referred to as a cyberattack on November 29. No gang had claimed responsibility at that point, patients hadn't been notified yet, and the hospital wasn't stating whether the attack involved encryption of any files. Weeks later, and in a substitute notice posted on December 31, 2024, they noted that patients' name, date of birth, Social Security number, passport number, and diagnosis information may have been present in files that had been accessed in a "recent data security event" that was still under investigation. The hospital did not confirm or deny whether this was a ransomware attack.
Information security
fromThe Hacker News
3 days ago

Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers

Stealit leverages Node.js SEA and Electron, spreading via fake game and VPN installers to deliver subscription-based RATs and steal data across Windows and Android.
Information security
fromIT Pro
3 days ago

Researchers sound alarm over AI hardware vulnerabilities that expose training data

GATEBLEED: power-gating behavior in ML accelerators leaks distinguishable usage signals that can reveal whether specific data were used to train an AI model.
#phishing
Information security
fromThe Hacker News
3 days ago

175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign

175 malicious npm packages host redirect scripts via the unpkg CDN to facilitate Beamglea credential-harvesting phishing targeting over 135 industrial, technology, and energy companies.
Information security
fromWIRED
3 days ago

North Korean Scammers Are Doing Architectural Design Now

North Korean-linked freelancers produce real architectural and structural plans—sometimes via front companies—posing safety risks and potential compromises to residential and critical infrastructure.
Information security
fromDataBreaches.Net
3 days ago

Don't breathe that sigh of relief just yet: BreachForums is gone, but the Salesforce leak site isn't - DataBreaches.Net

BreachForums was seized by the FBI and international partners; ShinyHunters declares the forum dead, warns of compromised databases, seized servers, and imminent crackdown.
Information security
fromABC7 San Francisco
3 days ago

San Jose dad lured to Bitcoin ATM by scammer claiming to be son in latest scheme to steal money

Scammers use Bitcoin ATMs to force victims to convert cash into cryptocurrency, enabling rapid theft while leaving blockchain traces that can sometimes aid investigations.
Information security
fromChannelPro
4 days ago

DNS Security 101: Safeguarding your business from cyber threats

Organizations must strengthen DNS security to prevent phishing, malware distribution, domain and subdomain hijacking, and other cyberattacks exploiting lookalike domains.
Information security
fromTechzine Global
4 days ago

Object First introduces Ootbi Mini for small offices

Ootbi Mini delivers compact, immutable Zero Trust storage that makes local Veeam backups ransomware-proof for small offices and edge environments.
Information security
fromThe Hacker News
4 days ago

SaaS Breaches Start with Tokens - What Security Teams Must Watch

Stolen OAuth and API tokens enable attackers to bypass MFA and access SaaS systems, making token hygiene and rotation critical to prevent breaches.
Information security
fromTechCrunch
4 days ago

'Dozens' of organizations had data stolen in Oracle-linked hacks | TechCrunch

Clop used a zero-day in Oracle E-Business Suite to steal corporate executive and company data from dozens of organizations since at least July 10.
Information security
fromFast Company
4 days ago

This Discord feature you barely noticed could now be your biggest privacy risk

About 70,000 Discord users had government ID images and some personal data exposed after a third-party customer service vendor was hacked, creating identity theft risk.
Information security
fromTheregister
4 days ago

Zero-day lets nation-state spies cross-examine US law firm

Attackers exploited a zero-day to access Williams & Connolly attorney email accounts in a likely nation-state-linked cyberattack.
Information security
fromwww.housingwire.com
4 days ago

Proof launches new secure digital identity tool Certify

Cryptographic identity layer Certify lets users embed verifiable identity into digital media and data, enabling instantaneous authenticity verification and preventing deepfake and document fraud.
Information security
fromTechCrunch
4 days ago

Italian businessman's phone reportedly targeted with Paragon spyware | TechCrunch

Francesco Gaetano Caltagirone was notified of being targeted by Paragon spyware, expanding the list of Italian victims beyond journalists and activists.
Information security
fromSecurityWeek
4 days ago

Chinese Hackers Breached Law Firm Williams & Connolly via Zero-Day

State-sponsored hackers breached Williams & Connolly and accessed a small number of attorneys' email accounts by exploiting an unspecified zero-day vulnerability.
fromThe Hacker News
4 days ago

New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps

A rapidly evolving Android spyware campaign called ClayRat has targeted users in Russia using a mix of Telegram channels and lookalike phishing websites by impersonating popular apps like WhatsApp, Google Photos, TikTok, and YouTube as lures to install them. "Once active, the spyware can exfiltrate SMS messages, call logs, notifications, and device information; taking photos with the front camera; and even send SMS messages or place calls directly from the victim's device," Zimperium researcher Vishnu Pratapagiri said in a report shared with The Hacker News.
Information security
Information security
fromTechzine Global
4 days ago

How to Safeguard and Prepare Exchange Server against Natural Disasters?

Implement geographically distributed high-availability (DAG), comprehensive backups, redundant power/networking, documented recovery procedures, and regular testing to minimize Exchange Server disaster impact.
Information security
fromThe Hacker News
4 days ago

From Phishing to Malware: AI Becomes Russia's New Cyber Weapon in War on Ukraine

Russian-linked hackers increasingly use AI to create phishing messages and generate malware, raising incident counts and producing AI-developed stealers like WRECKSTEEL.
[ Load more ]