Information security

[ follow ]
#ai
Information security
fromTheregister
3 hours ago

Singapore boffins get diverse SIEMs singing in harmony

A new technique translates security rules across multiple SIEMs, simplifying cyber-defense for organizations with diverse systems.
Information security
from24/7 Wall St.
14 hours ago

"The Nuclear Weapons of Cybersecurity": Why Treasury Just Warned Banks About AI's New Power

The Treasury Secretary and Fed Chair warned Wall Street banks about AI's potential to exploit software vulnerabilities rapidly.
Information security
fromFuturism
2 days ago

Claude Deleted a Company's Entire Database, Illustrating a Danger Every CEO Should Be Aware of

AI agents can cause significant damage by making autonomous decisions without proper safeguards, as demonstrated by a catastrophic database deletion incident.
Information security
fromArs Technica
3 days ago

Amid Mythos' hyped cybersecurity prowess, researchers find GPT-5.5 is just as good

Fear-based marketing is criticized in the context of limited AI model releases, particularly regarding cybersecurity advancements.
Information security
fromSecuritymagazine
4 days ago

Company Database Deleted by AI Agent: What Security Leaders Need to Know

An AI agent deleted a company's production database in nine seconds due to a credential mismatch, violating operational rules and lacking verification.
Information security
fromTheregister
3 hours ago

Singapore boffins get diverse SIEMs singing in harmony

A new technique translates security rules across multiple SIEMs, simplifying cyber-defense for organizations with diverse systems.
Information security
from24/7 Wall St.
14 hours ago

"The Nuclear Weapons of Cybersecurity": Why Treasury Just Warned Banks About AI's New Power

The Treasury Secretary and Fed Chair warned Wall Street banks about AI's potential to exploit software vulnerabilities rapidly.
Information security
fromFuturism
2 days ago

Claude Deleted a Company's Entire Database, Illustrating a Danger Every CEO Should Be Aware of

AI agents can cause significant damage by making autonomous decisions without proper safeguards, as demonstrated by a catastrophic database deletion incident.
Information security
fromArs Technica
3 days ago

Amid Mythos' hyped cybersecurity prowess, researchers find GPT-5.5 is just as good

Fear-based marketing is criticized in the context of limited AI model releases, particularly regarding cybersecurity advancements.
Information security
fromSecuritymagazine
4 days ago

Company Database Deleted by AI Agent: What Security Leaders Need to Know

An AI agent deleted a company's production database in nine seconds due to a credential mismatch, violating operational rules and lacking verification.
#cybersecurity
Information security
fromThe Hacker News
14 hours ago

Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE & More

Cyber attackers are increasingly exploiting vulnerabilities in SaaS environments, using sophisticated methods like vishing for data theft and control over systems.
Information security
fromTechRepublic
17 hours ago

Canvas Breach May Put 275M Users, 9,000 Schools at Risk

Instructure confirmed a Canvas breach affecting user information and messages, with hackers claiming 275 million users and nearly 9,000 schools impacted.
Information security
fromThe Hacker News
14 hours ago

Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE & More

Cyber attackers are increasingly exploiting vulnerabilities in SaaS environments, using sophisticated methods like vishing for data theft and control over systems.
Information security
fromSecurityWeek
17 hours ago

DigiCert Revokes Certificates After Support Portal Hack

DigiCert revoked certificates fraudulently obtained through a cyberattack targeting its support portal, affecting multiple customer accounts.
Information security
fromTechRepublic
17 hours ago

Canvas Breach May Put 275M Users, 9,000 Schools at Risk

Instructure confirmed a Canvas breach affecting user information and messages, with hackers claiming 275 million users and nearly 9,000 schools impacted.
Information security
fromTheregister
1 day ago

Five Eyes warn agentic is too dangerous for rapid rollout

Agentic AI poses significant risks, requiring careful adoption and robust security measures to protect critical infrastructure from exploitation.
Information security
fromTechRepublic
8 hours ago

Microsoft Defender Bug Triggers False Malware Alerts for DigiCert Certificates

Microsoft Defender mistakenly flagged legitimate DigiCert certificates as malware, disrupting trust relationships for IT teams after an April 30 update.
Information security
fromInfoQ
1 day ago

Cloudflare Processes 10M+ Daily Insights with New Security Overview Dashboard

Cloudflare's new Security Overview dashboard consolidates security signals into actionable insights, prioritizing vulnerabilities for efficient risk management.
#ai-security
Information security
fromComputerworld
3 days ago

AI agents can bypass guardrails and put credentials at risk, Okta study finds

Agentic platforms like OpenClaw pose significant risks by exposing sensitive data and bypassing security measures under real-world conditions.
Information security
fromComputerworld
3 days ago

AI agents can bypass guardrails and put credentials at risk, Okta study finds

Agentic platforms like OpenClaw pose significant risks by exposing sensitive data and bypassing security measures under real-world conditions.
Information security
fromSecurityWeek
4 days ago

Anthropic Unveils Claude Security to Counter AI-Powered Exploit Surge

Claude Security aims to empower defenders against advanced AI threats by providing automated vulnerability scanning and patching capabilities.
#linux
Information security
fromThe Hacker News
1 day ago

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

A critical Linux vulnerability allows unprivileged users to gain root access, impacting various distributions and requiring immediate patching.
Information security
fromWIRED
3 days ago

Dangerous New Linux Exploit Gives Attackers Root Access to Countless Computers

A critical Linux vulnerability allows unprivileged users to gain root access, posing severe risks to data centers and personal devices.
Information security
fromThe Verge
3 days ago

Severe Linux Copy Fail security flaw uncovered using AI scanning help

Nearly all Linux distributions since 2017 are vulnerable to the Copy Fail exploit, allowing users to gain administrator privileges.
Information security
fromTechzine Global
3 days ago

Linux distributions worldwide targeted by the Copy Fail exploit

The 'Copy Fail' vulnerability (CVE-2026-31431) in the Linux kernel allows unprivileged users to gain root access, affecting all major distributions since 2017.
Information security
fromTheregister
5 days ago

Linux cryptographic code flaw offers fast route to root

Major Linux distributions are patching a local privilege escalation vulnerability known as Copy Fail (CVE-2026-31431) due to a logic flaw in the kernel.
Information security
fromThe Hacker News
1 day ago

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

A critical Linux vulnerability allows unprivileged users to gain root access, impacting various distributions and requiring immediate patching.
Information security
fromWIRED
3 days ago

Dangerous New Linux Exploit Gives Attackers Root Access to Countless Computers

A critical Linux vulnerability allows unprivileged users to gain root access, posing severe risks to data centers and personal devices.
Information security
fromThe Verge
3 days ago

Severe Linux Copy Fail security flaw uncovered using AI scanning help

Nearly all Linux distributions since 2017 are vulnerable to the Copy Fail exploit, allowing users to gain administrator privileges.
Information security
fromTechzine Global
3 days ago

Linux distributions worldwide targeted by the Copy Fail exploit

The 'Copy Fail' vulnerability (CVE-2026-31431) in the Linux kernel allows unprivileged users to gain root access, affecting all major distributions since 2017.
Information security
fromTheregister
5 days ago

Linux cryptographic code flaw offers fast route to root

Major Linux distributions are patching a local privilege escalation vulnerability known as Copy Fail (CVE-2026-31431) due to a logic flaw in the kernel.
#cpanel
Information security
fromTechCrunch
11 hours ago

Hackers are still exploiting the cPanel bug to gain control of thousands of websites | TechCrunch

Hackers are actively exploiting a critical vulnerability in cPanel and WHM, affecting over 550,000 servers and leading to numerous compromises.
Information security
fromSecurityWeek
21 hours ago

Over 40,000 Servers Compromised in Ongoing cPanel Exploitation

Over 40,000 servers have been compromised due to a critical cPanel zero-day vulnerability, CVE-2026-41940, allowing unauthorized administrative access.
Information security
fromTechCrunch
4 days ago

Hackers are actively exploiting a bug in cPanel, used by millions of websites | TechCrunch

A critical vulnerability in cPanel and WHM allows hackers to gain full control of affected servers, necessitating immediate patching by users.
Information security
fromTheregister
4 days ago

Critical cPanel, WHM flaw probs exploited as 0-day, pros say

A critical vulnerability in cPanel and WHM allows attackers to bypass authentication and gain root access, affecting millions of domains.
Information security
fromSecurityWeek
4 days ago

Critical cPanel & WHM Vulnerability Exploited as Zero-Day for Months

A critical authentication bypass vulnerability in cPanel & WHM allows remote attackers to gain administrative access, risking system takeover.
Information security
fromTechCrunch
11 hours ago

Hackers are still exploiting the cPanel bug to gain control of thousands of websites | TechCrunch

Hackers are actively exploiting a critical vulnerability in cPanel and WHM, affecting over 550,000 servers and leading to numerous compromises.
Information security
fromSecurityWeek
21 hours ago

Over 40,000 Servers Compromised in Ongoing cPanel Exploitation

Over 40,000 servers have been compromised due to a critical cPanel zero-day vulnerability, CVE-2026-41940, allowing unauthorized administrative access.
Information security
fromTechCrunch
4 days ago

Hackers are actively exploiting a bug in cPanel, used by millions of websites | TechCrunch

A critical vulnerability in cPanel and WHM allows hackers to gain full control of affected servers, necessitating immediate patching by users.
Information security
fromTheregister
4 days ago

Critical cPanel, WHM flaw probs exploited as 0-day, pros say

A critical vulnerability in cPanel and WHM allows attackers to bypass authentication and gain root access, affecting millions of domains.
Information security
fromSecurityWeek
4 days ago

Critical cPanel & WHM Vulnerability Exploited as Zero-Day for Months

A critical authentication bypass vulnerability in cPanel & WHM allows remote attackers to gain administrative access, risking system takeover.
#phishing
Information security
fromTechRepublic
3 days ago

Microsoft Flagged 8.3B Phishing Emails in Q1 as QR Codes, CAPTCHAs Rise

Phishing attacks are evolving, utilizing QR codes and modular strategies, requiring comprehensive security measures beyond traditional email defenses.
Information security
fromThe Hacker News
4 days ago

ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories

New phishing kits are evolving, integrating advanced features for targeted attacks, while security vulnerabilities continue to pose significant risks online.
Information security
fromThe Hacker News
11 hours ago

Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM Tools

An active phishing campaign using legitimate RMM software has targeted over 80 organizations since April 2025, enabling persistent remote access.
Information security
fromSecurityWeek
2 days ago

New Bluekit Phishing Kit Features AI Assistant

Bluekit is a sophisticated phishing kit with AI capabilities, automated domain registration, and extensive templates for various online services.
Information security
fromTechRepublic
3 days ago

Microsoft Flagged 8.3B Phishing Emails in Q1 as QR Codes, CAPTCHAs Rise

Phishing attacks are evolving, utilizing QR codes and modular strategies, requiring comprehensive security measures beyond traditional email defenses.
Information security
fromThe Hacker News
3 days ago

30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign

A Vietnamese-linked operation uses Google AppSheet for phishing, compromising around 30,000 Facebook accounts to sell them back through an illicit storefront.
Information security
fromThe Hacker News
4 days ago

ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories

New phishing kits are evolving, integrating advanced features for targeted attacks, while security vulnerabilities continue to pose significant risks online.
Information security
fromNextgov.com
10 hours ago

Operational technology providers are feeling 'annoyance' at exclusion from Anthropic's Mythos rollout, sources say

Operational technology providers seek access to Anthropic's Mythos model for cybersecurity, citing exclusion from initial rollout affecting critical infrastructure.
#account-security
Information security
fromWIRED
4 days ago

OpenAI Rolls Out 'Advanced' Security Mode for At-Risk Accounts

OpenAI introduces Advanced Account Security to enhance protection against account takeover attacks for ChatGPT and Codex users.
Information security
fromWIRED
4 days ago

OpenAI Rolls Out 'Advanced' Security Mode for At-Risk Accounts

OpenAI introduces Advanced Account Security to enhance protection against account takeover attacks for ChatGPT and Codex users.
#cybercrime
Information security
fromSecurityWeek
4 days ago

AI Fuels 'Industrial' Cybercrime as Time-to-Exploit Shrinks to Hours

Industrialized cybercrime utilizes AI and automation for efficient, sophisticated attacks, necessitating defenders to adopt similar technologies for effective countermeasures.
Information security
fromThe Hacker News
17 hours ago

Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and Russia

A China-based cybercrime group is targeting organizations in Russia and India with a new malware called ABCDoor via phishing emails.
Information security
fromSecurityWeek
4 days ago

AI Fuels 'Industrial' Cybercrime as Time-to-Exploit Shrinks to Hours

Industrialized cybercrime utilizes AI and automation for efficient, sophisticated attacks, necessitating defenders to adopt similar technologies for effective countermeasures.
Information security
fromSecurityWeek
22 hours ago

Edtech Firm Instructure Discloses Data Breach Amid Hacker Leak Threats

Instructure faced a cyberattack leading to a data breach, affecting personal information of millions in the education sector.
#moveit-automation
Information security
fromThe Hacker News
12 hours ago

Progress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass

Progress Software has released updates for critical security flaws in MOVEit Automation, including an authentication bypass vulnerability.
Information security
fromThe Hacker News
12 hours ago

Progress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass

Progress Software has released updates for critical security flaws in MOVEit Automation, including an authentication bypass vulnerability.
Information security
fromSecurityWeek
11 hours ago

Cisco Moves to Acquire Astrix Security to Tackle Non-Human Identity Risks

Cisco intends to acquire Astrix Security to enhance security for non-human identities in response to rising AI-related risks.
Information security
fromwww.dw.com
2 days ago

North Korea rejects US cybercrime claims as 'absurd slander'

North Korea denied US cybercrime allegations, calling them absurd slander and asserting it does not pose a cyber threat.
#malware
Information security
fromSecurityWeek
3 days ago

Hugging Face, ClawHub Abused for Malware Distribution

Threat actors exploit AI distribution platforms to distribute malware through trojanized shared files, relying on social engineering tactics to deceive users.
Information security
fromSecurityWeek
3 days ago

Hugging Face, ClawHub Abused for Malware Distribution

Threat actors exploit AI distribution platforms to distribute malware through trojanized shared files, relying on social engineering tactics to deceive users.
Information security
fromSecurityWeek
3 days ago

Sophisticated Deep#Door Backdoor Enables Espionage, Disruption

A new Python-based backdoor framework, Deep#Door, enables persistent remote command execution and surveillance on Windows systems.
Information security
fromDeveloper Tech News
3 days ago

Open-source registries hit by 'Mini Shai-Hulud' supply chain attacks

The 'Mini Shai-Hulud' worm targets developer credentials across multiple ecosystems, exploiting vulnerabilities in popular packages to steal sensitive information.
#quantum-computing
Information security
fromnews.bitcoin.com
4 days ago

Silence Labs Launches Quantum-Safe Vault to Secure Crypto Custody

Silence Laboratories launched a quantum-safe custody vault to protect digital assets from future cryptographic threats using post-quantum signatures and multi-party computation.
Information security
fromInfoQ
5 days ago

Meta's Approach to Migrating their Systems to Post-Quantum Cryptography

Meta is migrating to post-quantum cryptography to protect against quantum computing threats, using a five-level maturity model to track progress.
Information security
fromnews.bitcoin.com
4 days ago

Silence Labs Launches Quantum-Safe Vault to Secure Crypto Custody

Silence Laboratories launched a quantum-safe custody vault to protect digital assets from future cryptographic threats using post-quantum signatures and multi-party computation.
Information security
fromInfoQ
5 days ago

Meta's Approach to Migrating their Systems to Post-Quantum Cryptography

Meta is migrating to post-quantum cryptography to protect against quantum computing threats, using a five-level maturity model to track progress.
Information security
fromEntrepreneur
4 days ago

How AI Shrinks the Window Between Data Loss and Recovery

AI-powered continuous data protection significantly reduces the risk of data loss compared to traditional nightly backup methods.
Information security
fromTechRepublic
4 days ago

New Global Scam Uses Fake Meeting Links to Run PowerShell Malware

BlueNoroff hackers exploit fake Zoom calls and fileless malware to steal credentials from Web3 and cryptocurrency organizations.
#software-supply-chain
Information security
fromThe Hacker News
3 days ago

Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

A software supply chain attack campaign uses sleeper packages to push malicious payloads for credential theft and tampering.
Information security
fromThe Hacker News
4 days ago

PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials

Malicious versions of the Lightning Python package were released, enabling credential theft through an automated attack chain.
Information security
fromThe Hacker News
3 days ago

Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

A software supply chain attack campaign uses sleeper packages to push malicious payloads for credential theft and tampering.
Information security
fromThe Hacker News
4 days ago

PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials

Malicious versions of the Lightning Python package were released, enabling credential theft through an automated attack chain.
Information security
fromTechRepublic
4 days ago

Billions of Chrome Users Urged to Update After Google Patches 30 Security Flaws

Google patched 30 Chrome vulnerabilities, including four Critical flaws, requiring users to update their browsers for enhanced security.
Information security
fromSecurityWeek
3 days ago

Google Adjusts Bug Bounties: Chrome Payouts Drop as Android Rewards Rise Amid AI Surge

Google has revamped its Vulnerability Reward Programs to prioritize high-impact vulnerabilities and actionable reports, adjusting reward amounts accordingly.
Information security
fromTechzine Global
3 days ago

Anthropic Claude Security available to all Enterprise customers

Claude Security is now in public beta for Enterprise customers, scanning code for vulnerabilities and suggesting targeted patches using the Claude Opus 4.7 model.
#openai
Information security
fromTechCrunch
4 days ago

OpenAI announces new advanced security for ChatGPT accounts, including a partnership with Yubico | TechCrunch

OpenAI launched Advanced Account Security with Yubico to enhance protection against phishing for ChatGPT users.
Information security
fromTNW | Next-Featured
4 days ago

OpenAI launches hardware security keys for ChatGPT with Yubico partnership and disables password login for high-risk users

OpenAI launched Advanced Account Security, replacing passwords with hardware keys and disabling email recovery, targeting sensitive user accounts.
Information security
fromTechCrunch
4 days ago

OpenAI announces new advanced security for ChatGPT accounts, including a partnership with Yubico | TechCrunch

OpenAI launched Advanced Account Security with Yubico to enhance protection against phishing for ChatGPT users.
Information security
fromTNW | Next-Featured
4 days ago

OpenAI launches hardware security keys for ChatGPT with Yubico partnership and disables password login for high-risk users

OpenAI launched Advanced Account Security, replacing passwords with hardware keys and disabling email recovery, targeting sensitive user accounts.
#ddos-attack
Information security
fromTechCrunch
3 days ago

Ubuntu services hit by outages after DDoS attack | TechCrunch

Hacktivists launched a DDoS attack on Ubuntu and Canonical, disrupting services and preventing users from updating the operating system.
Information security
fromTechCrunch
3 days ago

Ubuntu services hit by outages after DDoS attack | TechCrunch

Hacktivists launched a DDoS attack on Ubuntu and Canonical, disrupting services and preventing users from updating the operating system.
fromComputerworld
3 days ago

Windows shell spoofing vulnerability puts sensitive data at risk

CISA can shorten the deadline to three days in cases of high-risk exploitation. However, for CVE-2026-32202, the CVSS score was rated at 4.3, which does not meet the policy threshold for a faster patch cycle.
Information security
Information security
fromComputerWeekly.com
4 days ago

Almost half of UK businesses hit by cyber attacks | Computer Weekly

Cyber security threats in the UK are significant, with many organizations experiencing breaches or attacks, highlighting the need for robust security measures.
Information security
fromTheregister
4 days ago

Ongoing supply chain attacks worm into SAP npm packages

Supply chain attacks have compromised multiple npm packages, including those from SAP and Intercom, with credential-stealing malware affecting developers.
Information security
fromTechzine Global
4 days ago

Critical kernel vulnerability affects a wide range of Linux distributions

A vulnerability in the Linux kernel allows local users to elevate privileges to root level, raising significant security concerns.
Information security
fromSecurityWeek
4 days ago

Critical Gemini CLI Flaw Enabled Host Code Execution, Supply Chain Attacks

A critical vulnerability in Gemini CLI allows remote code execution, enabling attackers to exploit CI/CD pipelines for supply chain attacks.
[ Load more ]