Information security

[ follow ]
Information security
fromThe Hacker News
3 hours ago

FBI Reports $262M in ATO Fraud as Researchers Cite Growing AI Phishing and Holiday Scams

Cybercriminals impersonate financial institutions to steal money and sensitive information, enabling account takeover fraud that caused over $262 million in losses this year.
fromSecuritymagazine
8 hours ago

Navigating Cybersecurity's Tightrope: Balancing Skills, AI, and Human Resilience

The cybersecurity landscape is a dynamic arena in which innovation and threats evolve relentlessly. ISACA's State of Cybersecurity 2025 report - drawing insights from more than 3,800 professionals worldwide - offers a critical snapshot of this environment. It highlights persistent staffing shortages, the transformative impact of AI, rising stress levels and constrained budgets. Together, these findings underscore the delicate balance organizations must strike between technology, talent and well-being.
Information security
#npm
fromTheregister
1 day ago
Information security

Wormable npm attack returns as 25,000 repos spill secrets

A wormable npm malware campaign (Shai-Hulud 2.0) compromised over 25,000 developer secrets by trojanizing packages and publishing stolen credentials to victims' GitHub repositories.
fromThe Hacker News
1 day ago
Information security

Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft

A renewed Sha1-Hulud supply-chain campaign compromises hundreds of npm packages, executes malicious preinstall scripts, registers self-hosted runners, and exfiltrates secrets.
Information security
fromIT Pro
21 hours ago

Shai-Hulud malware is back with a vengeance and hit more than 19,000 GitHub repositories so far - here's what developers need to know

Shai-Hulud worm infects npm packages, compromising ~700 packages and over 19,000 GitHub repositories to exfiltrate credentials, spread malicious payloads, and delete user files.
Information security
fromThe Hacker News
14 hours ago

Years of JSONFormatter and CodeBeautify Leaks Expose Thousands of Passwords and API Keys

Organizations are exposing thousands of sensitive credentials by pasting secrets into popular online code-formatting tools, creating easily discoverable, shareable links.
#clickfix
Information security
fromThe Hacker News
19 hours ago

ToddyCat's New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens

ToddyCat steals browser-based OAuth tokens and uses SMB-accessible TomBerBil variants to exfiltrate and decrypt corporate email credentials and browser data.
Information security
fromInfoWorld
10 hours ago

Developers left large cache of credentials exposed on code generation websites

Shareable 'Save' URLs and an exposed /service/getDataFromID API allowed retrieval of sensitive user-submitted data and thousands of secrets.
#hashjack
fromZDNET
18 hours ago
Information security

Use AI browsers? Be careful. This exploit turns trusted sites into weapons - here's how

fromZDNET
18 hours ago
Information security

Use AI browsers? Be careful. This exploit turns trusted sites into weapons - here's how

fromSecuritymagazine
1 day ago

3 Top Cybersecurity Trends from 2025

2025 has been a transformative year for cybersecurity, with emerging technologies and evolving threats changing the landscape as we once knew it. Reflecting on the year, there are several trends that come to my mind, both good and bad. Organizations prepared for a quantum future, foreign adversaries and cybercriminals alike made strategic moves, and industries as a whole found themselves targeted with waves of cyberattacks (such as the case with the retail sector).
Information security
#commercial-spyware
Information security
fromTheregister
18 hours ago

Clop's Oracle EBS rampage reaches Dartmouth College

Dartmouth College suffered data theft after Clop exploited an Oracle E-Business Suite zero-day, exposing names, SSNs, and some financial account information.
fromTheregister
9 hours ago

Akira ransomware crew infected enterprise systems during M&A

Routine mergers and acquisitions are giving extortionists an easy way in, with Akira affiliates reaching parent networks through compromised SonicWall gear inherited in the deal. In every Akira attack the threat detection firm analyzed between June and October that involved buggy SonicWall SSL VPN appliances, the ransomware operators gained access to the bigger, acquiring enterprises because they had already compromised the smaller companies' SonicWall gear.
Information security
Information security
fromThe Hacker News
20 hours ago

3 SOC Challenges You Need to Solve Before 2026

By 2026, threat actors will adopt AI as primary weapon, scaling attacks, automating reconnaissance, and executing hyper-realistic social engineering, forcing SOC transformation.
Information security
fromTheregister
15 hours ago

Get ready for 2026, the year of AI-aided ransomware

Cybercriminals will increasingly adopt agentic AI to automate attacks, following state-sponsored pioneers, enabling more autonomous, scalable, low-effort cyber operations.
Information security
fromTechzine Global
17 hours ago

Sysdig: Benelux leads the way in cloud-native security

Benelux organizations lead in cloud-native security with higher cloud adoption, stronger identity controls, and greater automation, reflecting GDPR/NIS2-driven maturity.
#data-breach
fromTechCrunch
1 day ago
Information security

US banks scramble to assess data theft after hackers breach financial tech firm | TechCrunch

fromTechCrunch
1 day ago
Information security

US banks scramble to assess data theft after hackers breach financial tech firm | TechCrunch

#autonomous-threat-analysis
fromWIRED
1 day ago
Information security

Amazon Is Using Specialized AI Agents for Deep Bug Hunting

fromWIRED
1 day ago
Information security

Amazon Is Using Specialized AI Agents for Deep Bug Hunting

Information security
fromZDNET
19 hours ago

Is spyware hiding on your phone? The telltale signs to find out (and how to remove it fast)

Spyware on smartphones can secretly record, track, and steal personal data, often disguised as legitimate apps or parental/work monitoring tools.
Information security
fromAxios
13 hours ago

Deepfakes are flooding retailers as part of scammers' return fraud operations

AI-powered deepfake voice bots are impersonating customers to exploit customer-service systems and obtain fraudulent refunds; these attacks are increasing in volume and sophistication.
Information security
fromZDNET
20 hours ago

5 reasons cyber insurance can be a worthy investment for your small business

Cyber insurance offers small businesses financial protection and a structured way to assess and improve security while balancing premiums against incident risk.
fromwww.bbc.com
19 hours ago

Cryptology firm cancels elections after losing encryption key

The International Association for Cryptologic Research (IACR) uses an electronic voting system which needs three members, each with part of an encrypted key, to access the results. In a statement, the scientific organisation said one of the trustees had lost their key in "an honest but unfortunate human mistake", making it impossible for them to decrypt - and uncover - the final results.
Information security
fromBusiness Matters
2 days ago

5 Signs You're Using a Truly Secure Online Trading Platform

Online trading has become a normal part of how people invest and manage money today. With so many platforms available, it can be hard to tell which ones truly protect personal data and funds. Knowing how to identify a secure trading platform helps safeguard both money and peace of mind. A trusted platform follows clear rules, uses strong security tools, and treats users with honesty.
Information security
#fortiweb
fromThe Hacker News
1 day ago
Information security

Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More

Widespread exploitation of FortiWeb and Chrome zero-days, plus supply-chain and SaaS compromises, forced major vendors into rapid incident response and urgent patching.
fromTechzine Global
5 days ago
Information security

Fortinet hit again by zero-day vulnerability in FortiWeb

A second actively exploited FortiWeb zero-day (CVE-2025-58034) enables code execution for logged-in attackers; immediate upgrade to the latest FortiWeb is required.
fromThe Hacker News
1 day ago
Information security

Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More

#oracle-identity-manager
fromTechzine Global
1 day ago
Information security

Warning about vulnerability in Oracle Identity Manager

CVE-2025-61757 in Oracle Identity Manager enables unauthenticated remote code execution and is actively exploited, requiring immediate patching.
fromThe Hacker News
4 days ago
Information security

CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability

CVE-2025-61757 enables pre-authenticated remote code execution in Oracle Identity Manager via an authentication bypass, actively exploited and added to CISA's KEV.
#fluent-bit
fromTheregister
1 day ago

CISA orders feds to patch Oracle Identity Manager zero-day

Searchlight Cyber researchers Adam Kues and Shubham Shah, who discovered the flaw, have published their own technical teardown of the vulnerability that doesn't mince words about the ease with which criminals can weaponize it. The researchers call exploitation "trivial," describing a single HTTP request that bypasses OIM's normal authentication flow and ultimately gives an attacker remote system-level control. Oracle disclosed the bug in October, but didn't indicate that it was under active exploitation.
Information security
Information security
fromTheregister
1 day ago

Ex-CISA officials, CISOs aim to stop the spread of hacklore

Many common cybersecurity warnings are outdated; prioritize patching, software updates, strong passwords or passkeys, and multi-factor authentication over avoidance-based tips.
Information security
fromTelecompetitor
1 day ago

Ransomware Spikes During Holidays and Weekends: Report

Ransomware attacks most often occur on weekends and holidays and increase after mergers and acquisitions due to reduced staffing and weakened governance.
Information security
fromComputerworld
2 days ago

How has cloud flipped the regular security narrative?

In cloud environments, compromised identity credentials and excessive permissions allow attackers to bypass defenses and exfiltrate massive sensitive data across interconnected services.
Information security
fromBleepingComputer
1 day ago

SCCM and WSUS in a Hybrid World: Why It's Time for Cloud-native Patching

SCCM and WSUS are ill-suited for hybrid work; cloud-native patch management is required to ensure timely, reliable endpoint patching.
fromIT Pro
1 day ago

Wall Street giants warned of data exposure following supply chain attack

Corporate data associated with certain of our clients' relationship with SitusAMC such as accounting records and legal agreements has been impacted.
Information security
#cybersecurity
fromNature
5 days ago
Information security

Cyberattacks' harm to universities is growing - and so are their effects on research

fromNature
5 days ago
Information security

Cyberattacks' harm to universities is growing - and so are their effects on research

fromTechzine Global
2 days ago

The rise (and fall?) of shadow AI

As software application development teams now start to embrace an increasing number of automation tools to provide AI-driven (or at least AI-assisted) coding functions in their codebases, a Newtonian equal and opposite reaction is also surfacing in the shape of governance controls and guardrails to keep AI injections in check as these technologies now surface in the software supply chain.
Information security
fromIT Pro
1 day ago

Simulating attacks: how to use tabletop exercises in incident response

Among the benefits, tabletop exercises simulate a real-life attack so firms can put incident response plans to the test, including decision-making processes, communications and technical measures. When done well, tabletop exercises can expose blind spots and help response teams "build the muscle memory needed to act fast when the real thing hits", says Adam Harrison, managing director in the cyber security practice at FTI Consulting. So what types of tabletop exercises are available and how can you use them in your business?
Information security
fromTheregister
2 days ago

Cryptology association lost key needed to run its election

That problem related to the fact that the IACR's bylaws require three members of its election committee to each hold a portion of the cryptographic key material required to jointly decrypt the results. "This aspect of Helios' design ensures that no two trustees could collude to determine the outcome of an election or the contents of individual votes on their own: all trustees must provide their decryption shares," the update explains.
Information security
Information security
fromTheregister
1 day ago

FCC guts Salt Typhoon telco rules despite espionage risk

FCC revoked the January CALEA-based telecom cybersecurity ruling, calling it unlawful and ineffective and reversing post–Salt Typhoon mandatory safeguards after carriers tightened security voluntarily.
Information security
fromBusiness Insider
1 day ago

Former GitHub CEO Thomas Dohmke has a new gig

Former GitHub CEO Thomas Dohmke joined Apiiro to help build protections securing AI-generated software code and codebases against increased cybersecurity risks.
Information security
fromTheregister
2 days ago

Weaponized file name flaw allows RCE through glob

A shell-invocation flaw in glob's CLI -c option enables remote code execution on POSIX systems when processing attacker-controlled filenames; update affected glob versions immediately.
fromSpeckyboy Design Magazine
2 days ago

The 7 Best WordPress Plugins for Blocking Spam in 2025 - Speckyboy

It seems like everyone has a spam story or two to tell. And we're not talking about in a lifetime. No, spam is an everyday nuisance and something we live with. The problem impacts every corner of the web. Sure, it litters social networks and enterprise applications. But even the smallest websites are bombarded with phony comments, form submissions, user registrations, and e-commerce orders. This hurts the user experience and makes life miserable for site owners.
Information security
Information security
fromThe Hacker News
3 days ago

China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services

China-linked APT31 conducted prolonged cyber espionage against Russia's IT sector in 2024–2025 using legitimate cloud services and concealed exfiltration techniques.
Information security
fromThe Hacker News
4 days ago

Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks

Attackers use browser push notifications via Matrix Push C2 to deliver phishing links cross-platform and fileless, offered as a malware-as-a-service platform.
Information security
fromWIRED
3 days ago

US Border Patrol Is Spying on Millions of American Drivers

Multiple recent incidents expose privacy and security risks across platforms: widespread WhatsApp phone-number harvesting, intrusive school vape surveillance, unpatched networking vulnerabilities, and conference air monitoring.
Information security
fromArs Technica
4 days ago

Cryptography group cancels election results after official loses secret key

A lost trustee private key prevented decryption of IACR’s Helios-election ballots, causing results cancellation and prompting a re-run with revised key-sharing rules.
Information security
fromArs Technica
3 days ago

This hacker conference installed a literal antivirus monitoring system

Kawaiicon installed DIY CO 2 monitors with a public dashboard showing real-time room-by-room ventilation to help attendees assess air quality and reduce disease transmission.
Information security
fromIT Pro
4 days ago

Security experts claim the CVE Program isn't up to scratch anymore - inaccurate scores and lengthy delays mean the system needs updated

The CVE/NVD system is failing: many open-source vulnerabilities lack timely or accurate CVSS scores, creating operational risk for enterprises.
Information security
fromThe Hacker News
4 days ago

APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains

APT24 uses BADAUDIO and other malware to maintain persistent remote access in a nearly three-year campaign targeting Taiwan, U.S. sectors via supply-chain and phishing attacks.
Information security
fromTechCrunch
4 days ago

CrowdStrike fires 'suspicious insider' who passed information to hackers | TechCrunch

CrowdStrike fired a suspicious insider who allegedly shared internal screenshots with the Scattered Lapsus$ Hunters hacking collective; the company says its systems were not compromised.
#trytond
Information security
fromTechCrunch
4 days ago

Google says hackers stole data from 200 companies following Gainsight breach | TechCrunch

Hackers stole Salesforce-stored data from over 200 company instances via Gainsight apps in a large-scale supply-chain breach.
fromNew Relic
4 days ago

How to Keep a Secure Environment with New Relic: Your Observability Shield

However, this change has come with some difficulties, since all our business information is stored online there has also been a spike in criminals who want to get profit out of stealing said information or preventing business operations. Just in 2024, the FBI has reported over $16.6 billion in losses related to cybercrime, and this value is only increasing year over year making that an "observable" environment must also be a "secure" one.
Information security
Information security
fromInfoQ
5 days ago

Trust No One: Securing the Modern Software Supply Chain with Zero Trust

Apply Zero Trust principles to secure software supply chains and CI/CD pipelines by managing dependencies, enforcing controls, and embedding developer-focused security practices.
Information security
fromArs Technica
4 days ago

Thousands of hacked Asus routers are under control of suspected China-state hackers

A suspected China-state group has compromised thousands of unsupported Asus routers across multiple countries, likely using them for covert operations and espionage.
Information security
fromTechzine Global
4 days ago

Salesforce data once again leaked via third-party application

Third-party Gainsight integrations exposed Salesforce customer data, affecting hundreds of instances; Gainsight, Salesforce, and Google Mandiant are investigating while asserting no Salesforce vulnerability.
Information security
fromTechzine Global
5 days ago

Cisco boosts phase-out of insecure legacy with new initiative

Cisco is retiring insecure legacy features and enforcing secure-by-default configurations across networking platforms to defend against AI-driven attacks and prepare for post-quantum cryptography.
fromTechzine Global
4 days ago

SolarWinds lawsuit dropped: CISOs can breathe a sigh of relief

A lawsuit brought by the US Securities & Exchange Commission (SEC) against SolarWinds has been dropped. The legal fire was also directed at the company's CISO, Timothy G. Brown. Brown's alleged personal responsibility will now not be determined in court. It therefore appears that CISOs have less to fear from the law than previously thought. CISOs are responsible for securing their company's IT infrastructure.
Information security
Information security
fromThe Hacker News
4 days ago

Why IT Admins Choose Samsung for Mobile Security

Samsung Galaxy devices with Knox provide hardware-backed, multi-layered security and centralized management that enables Zero Trust access while preserving employee productivity.
fromTechCrunch
4 days ago

Impersonators are (still) targeting companies with fake TechCrunch outreach | TechCrunch

A growing number of scammers are impersonating TechCrunch reporters and event leads and reaching out to companies, pretending to be our staff when they absolutely are not. These bad actors are using our name and reputation to try to dupe unsuspecting businesses. It drives us crazy and infuriates us on your behalf. It ebbs and flows. Judging by the increased number of emails we're receiving, asking, "Does this person really work for you?" it appears to be happening more actively at the moment.
Information security
Information security
fromNextgov.com
5 days ago

SEC to drop high-profile SolarWinds hack lawsuit

The SEC dismissed its lawsuit accusing SolarWinds and its CISO of misleading investors about cybersecurity weaknesses related to the Sunburst breach.
Information security
fromZDNET
5 days ago

Don't get ghost tapped: 5 ways to block thieves from scanning your wallet

Ghost tapping enables criminals to trigger unauthorized contactless payments by using NFC readers near victims' mobile wallets or tap-to-pay cards.
fromWIRED
4 days ago

NordPass Is a Near-Perfect Password Manager, Except for This One Issue

NordPass has made a lot of progress over the past six years since its debut. Originally launched as a barebones password manager for the company to bundle alongside NordVPN, there was never much reason to use it. It lacked features, and even with a solid free plan, you could get better functionality elsewhere. Today, however, NordPass is one of the best password managers on the market.
Information security
fromThe Verge
4 days ago

Press a button and this SSD will self-destruct with all your data

Portable SSD offers one-button irreversible chip-based data destruction to securely erase confidential or classified information.
fromGOBankingRates
5 days ago

3 Ways To Recognize Fake Shops on Social Media This Holiday Season

Nearly two-thirds (62%) of Americans said they're likely to grab a holiday deal as soon as they spot one, according to the 2025 Norton Cyber Safety Insights Report, as reported by Gen Digital, the parent company of Norton and GOBankingRates. And this is often without vetting the source. That kind of impulse buying can make shoppers easy targets for fake online stores.
Information security
Information security
fromNextgov.com
4 days ago

ICE - overwhelmed with applicants - leans on cyber talent program to speed tech hiring

ICE is using DHS's Cyber Talent Management System to rapidly hire cybersecurity and tech talent to support expanded immigration enforcement, surveillance, and deportation operations.
fromChannelPro
4 days ago

Palo Alto Networks to acquire Chronosphere in $3.35bn deal

Chronosphere was built to scale for the data demands of the AI era from day one, which is why it is chosen by leading AI-native and born-in-the-cloud organizations,
Information security
Information security
fromThe Hacker News
5 days ago

Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows

Tsundere is an expanding Windows-targeting botnet that installs Node.js, executes arbitrary JavaScript from a C2 server, and uses npm libraries plus registry persistence.
Information security
fromThe Hacker News
5 days ago

ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves

Cyber threats are rapidly evolving as criminals exploit browser extensions, smart devices, social platforms, and novel malware while governments and companies intensify countermeasures.
Information security
fromTheregister
5 days ago

Rogue techie pleads guilty in $862K employer attack

An Ohio IT contractor pleaded guilty to hacking his former employer, resetting 2,500 passwords via stolen credentials and PowerShell, causing nearly $1,000,000 in damages.
Information security
fromThe Hacker News
5 days ago

ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet

A two-year-old Ray framework authentication flaw enables ShadowRay 2.0 to create a self-replicating NVIDIA GPU cryptocurrency-mining botnet.
Information security
fromTheregister
5 days ago

Palo Alto kit sees massive surge in malicious activity

Malicious traffic against Palo Alto GlobalProtect portals surged nearly 40-fold in 24 hours, originating largely from specific networks and linked to prior threat campaigns.
fromThe Hacker News
5 days ago

New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices

Cybersecurity researchers have disclosed details of a new Android banking trojan called Sturnus that enables credential theft and full device takeover to conduct financial fraud. "A key differentiator is its ability to bypass encrypted messaging," ThreatFabric said in a report shared with The Hacker News. "By capturing content directly from the device screen after decryption, Sturnus can monitor communications via WhatsApp, Telegram, and Signal." Another notable feature is its ability to stage overlay attacks by serving fake login screens atop banking apps to capture victims' credentials.
Information security
Information security
fromTechzine Global
5 days ago

Veeam Data Platform v13 available: more security and hypervisor options

Veeam Data Platform v13 adds integrated threat detection, AI malware analysis, immutable backups, expanded hypervisor and Azure instant-recovery to boost ransomware and disaster resilience.
Information security
fromTheregister
5 days ago

Salesforce flags another third-party security incident

Gainsight-published applications' compromised external connections allowed unauthorized access to some customers' Salesforce data; Salesforce revoked tokens and removed apps from AppExchange.
Information security
fromTechCrunch
5 days ago

Salesforce says some of its customers' data was accessed after Gainsight breach | TechCrunch

Customer data in Salesforce connected through Gainsight-published applications was compromised, prompting investigations and a claim of responsibility by the ShinyHunters hacking group.
fromeLearning Industry
5 days ago

Building Cybersecurity Resilience In A Hyperconnected World

In a world where every click and connection creates both opportunity and exposure, digital progress and digital risk now go hand in hand. As technology propels organizational innovation, it simultaneously widens the surface for cyberthreats. From AI-generated attacks to sophisticated ransomware, what was once an IT problem is now everyone's responsibility. This article explores how organizations can move past defense to build resilient-by-design cybersecurity: the ability to anticipate, withstand, recover, and adapt in the face of evolving digital threats.
Information security
[ Load more ]