Information security

[ follow ]
Information security
fromThe Hacker News
1 hour ago

New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login

SAP released patches for 13 vulnerabilities including a CVSS 10.0 insecure deserialization in NetWeaver AS Java enabling arbitrary OS command execution.
Information security
fromInfoQ
7 hours ago

HashiCorp Warns Traditional Secret Scanning Tools Are Falling Behind

Traditional secret scanning tools fail to prevent secret exposure; prevention-first integration across developer tools, CI/CD pipelines, and incident response is required.
Information security
fromChannelPro
27 minutes ago

Future-proofing cybersecurity: Understanding Quantum-Safe AI and how to create resilient defences.

Quantum computing threatens current public-key encryption, prompting deployment of NIST-standard post-quantum algorithms for secure key exchange and digital signatures.
fromZDNET
5 hours ago

5 ways the Linux nmap command can help keep your network secure

The nmap command (short for network mapper) is a network exploration/security auditing tool that can rapidly scan networks to help you find out what hosts are available. With nmap, you can discover open ports and services, and even find out what operating systems are on your network. I've used nmap to find out what machines are on a network and what ports/services are open. If I find a port that shouldn't be open, I can close it to avoid security issues.
Information security
#data-breach
fromThe Verge
15 hours ago
Information security

Discord blamed a vendor for its data breach - now the vendor says it was 'not hacked'

fromDataBreaches.Net
13 hours ago
Information security

Discord blamed a vendor for its data breach - now the vendor says it was 'not hacked' - DataBreaches.Net

Approximately 70,000 Discord users' government ID photos may have been exposed via a vendor incident, while the vendor 5CA publicly denies being hacked or handling those IDs.
fromTechzine Global
1 day ago
Information security

Data of millions of Qantas customers published months after hack

Personal data of 5.7 million Qantas customers appeared online after a Salesforce-related cyberattack; credit card, financial, and passport information were not taken.
fromThe Verge
15 hours ago
Information security

Discord blamed a vendor for its data breach - now the vendor says it was 'not hacked'

Information security
fromThe Hacker News
18 hours ago

Moving Beyond Awareness: How Threat Hunting Builds Readiness

Security awareness campaigns raise awareness but must be paired with continuous validation and proactive threat hunting to sustain security and prevent lapses.
#cybersecurity
Information security
fromComputerWeekly.com
15 hours ago

Cohesity CEO: 'The Middle East is moving faster than any other region in data resilience' | Computer Weekly

Cohesity provides an immutable, zero‑trust cyber resilience platform using generative AI to secure, detect, and rapidly recover enterprise data globally and in the Middle East.
#satellite-security
fromTechCrunch
17 hours ago
Information security

Satellites found exposing unencrypted data, including phone calls and some military comms | TechCrunch

fromFuturism
9 hours ago
Information security

Researchers Alarmed to Discover Satellites Broadcasting Unencrypted Military Secrets

fromWIRED
1 day ago
Information security

Satellites Are Leaking the World's Secrets: Calls, Texts, Military and Corporate Data

fromTechCrunch
17 hours ago
Information security

Satellites found exposing unencrypted data, including phone calls and some military comms | TechCrunch

fromFuturism
9 hours ago
Information security

Researchers Alarmed to Discover Satellites Broadcasting Unencrypted Military Secrets

fromWIRED
1 day ago
Information security

Satellites Are Leaking the World's Secrets: Calls, Texts, Military and Corporate Data

#sonicwall
fromwww.theguardian.com
1 day ago

Cyber-attacks rise by 50% in past year, UK security agency says

In what officials described as a call to arms, national security officials and ministers are urging all organisations, from the smallest businesses to the largest employers, to draw up contingency plans for the eventuality that your IT infrastructure [is] crippled tomorrow and all your screens [go] blank. The NCSC, which is part of GCHQ, said highly sophisticated China, capable and irresponsible Russia, Iran and North Korea were the main state threats, in its annual review published on Tuesday.
Information security
fromNextgov.com
15 hours ago

Bridging the gap: Unlock the power of AI for government agencies through cross-domain solutions

Government data is highly segmented by design, often separated by security classification levels to protect sensitive data and operations. While this segmentation is essential for national security, it also presents data-sharing obstacles that must be overcome. Fortunately, Cross-Domain Solutions (CDS) can help overcome obstacles such as safely training AI models with untrusted data, sharing classified AI capabilities with partners and connecting users or systems to AI tools across classification boundaries.
Information security
#post-quantum-cryptography
fromMedium
4 weeks ago
Information security

DevOps Quantum Leap: Emerging Use Cases of Quantum-Safe Cryptography

fromMedium
4 weeks ago
Information security

DevOps Quantum Leap: Emerging Use Cases of Quantum-Safe Cryptography

fromTheregister
8 hours ago

Microsoft frightful Patch Tuesday: 175+ CVEs, 3 under attack

Spooky season is in full swing, and this extends to Microsoft's October Patch Tuesday with security updates for a frightful 175 Microsoft vulnerabilities, plus an additional 21 non-Microsoft CVEs. And even scarier than the sheer number of bugs: three are listed as under attack, with three others publicly known, and 17 deemed critical security holes. Let's start with the flaws that attackers already found and exploited before Redmond pushed patches.
Information security
fromThe Hacker News
18 hours ago

What AI Reveals About Web Applications- and Why It Matters

Before an attacker ever sends a payload, they've already done the work of understanding how your environment is built. They look at your login flows, your JavaScript files, your error messages, your API documentation, your GitHub repos. These are all clues that help them understand how your systems behave. AI is significantly accelerating reconnaissance and enabling attackers to map your environment with greater speed and precision.
Information security
Information security
fromZero Day Initiative
12 hours ago

Zero Day Initiative - The October 2025 Security Update Review

Adobe released 12 bulletins addressing 36 CVEs, including multiple Critical code-execution vulnerabilities in Substance 3D Stager, Dimension, Illustrator, Commerce, and FrameMaker.
Information security
fromAzure DevOps Blog
15 hours ago

Modernizing Authentication for Legacy Visual Studio Clients - Azure DevOps Blog

Legacy Visual Studio client authentication is being replaced with Entra-backed tokens, improving security but causing more frequent interactive reauthentication; upgrade clients to supported versions.
fromThe Hacker News
14 hours ago

Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year

According to the U.S. government, it's assessed to be a publicly-traded, Beijing-based company known as Integrity Technology Group. "The group cleverly modified a geo-mapping application's Java server object extension (SOE) into a functioning web shell," the cybersecurity company said in a report shared with The Hacker News. "By gating access with a hardcoded key for exclusive control and embedding it in system backups, they achieved deep, long-term persistence that could survive a full system recovery."
Information security
fromThe Cyber Express
21 hours ago

Critical CVE-2025-61927 VM Context Escape In Happy DOM Library

A critical security flaw has been identified in Happy DOM, a widely used JavaScript library primarily employed for server-side rendering and testing frameworks. The vulnerability, cataloged as CVE-2025-61927, allows attackers to escape the library's virtual machine (VM) context, leading to potential remote code execution on vulnerable systems. This flaw threatens millions of applications that depend on Happy DOM. The root of this vulnerability lies in the improper isolation of the Node.js VM context within Happy DOM versions 19 and earlier.
Information security
#oracle-e-business-suite
#android-security
fromZDNET
15 hours ago
Information security

This new 'Pixnapping' exploit can steal everything on your Android screen - even 2FA codes

fromZDNET
15 hours ago
Information security

This new 'Pixnapping' exploit can steal everything on your Android screen - even 2FA codes

#pixnapping
fromWIRED
9 hours ago
Information security

A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

fromWIRED
9 hours ago
Information security

A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

fromTheregister
14 hours ago

Chinese gang used ArcGIS as a backdoor for a year

Researchers at ReliaQuest say that the espionage outfit, which Microsoft tracks as a China-based state-sponsored actor, modified a legitimate ArcGIS server object extension (SOE) to act as a web shell, giving them long-term, near-invisible access. By exploiting ArcGIS' extensibility features while avoiding traditional, signature-based malware, Flax Typhoon embedded itself so deeply that even restoring systems from backups simply reinstalled the implant.
Information security
fromThe Hacker News
23 hours ago

npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels

Webhooks on Discord are a way to post messages to channels in the platform without requiring a bot user or authentication, making them an attractive mechanism for attackers to exfiltrate data to a channel under their control. "Importantly, webhook URLs are effectively write-only," Socket researcher Olivia Brown said in an analysis. "They do not expose channel history, and defenders cannot read back prior posts just by knowing the URL."
Information security
#windows-10
Information security
fromMedium
1 week ago

Admin Series: Understanding User-Based Access Control (UBAC) in Snowflake

Disable UBAC by applying a session policy that disallows secondary roles at the account or user level while keeping the bundle enabled.
Information security
fromThe Hacker News
1 day ago

Researchers Expose TA585's MonsterV2 Malware Capabilities and Attack Chain

TA585 independently conducts sophisticated phishing and web-injection campaigns to deliver MonsterV2 RAT via ClickFix social engineering and PowerShell-based payload execution.
Information security
fromcointelegraph.com
16 hours ago

How a crypto trader turned $3K into $2M after CZ mentioned a memecoin

A CZ mention and thin liquidity caused memecoin 4 to skyrocket from small buys, turning a joke token into a rapid, non‑fundamental market surge.
Information security
fromFuturism
13 hours ago

Man Launches "World's First Waymo DDoS" by Ordering 50 Robotaxis to Dead End Street

A coordinated mass ordering prank mimicked a DDoS on Waymo, causing service disruption and prompting the company to suspend nearby ride requests temporarily.
Information security
fromSocial Media Explorer
5 days ago

The Biggest Challenges for Cyber Security Managers - Social Media Explorer

Remote and hybrid work dramatically increases cyber risk by expanding attack surfaces, requiring proactive, adaptive, and human-centric security beyond traditional defenses.
Information security
fromSecuritymagazine
2 days ago

60% of Security Leaders Say Threat Actors Are Evolving Too Quickly

Security leaders prioritize addressing third-party software and genAI risks and increasingly embed penetration testing to strengthen digital supply chain resilience.
Information security
fromBusiness Matters
2 days ago

Strengthening Online Security Through Device Intelligence

Device intelligence uses hardware, software, network, and session signals to enable real-time risk-based decisions, reducing fraud while minimizing friction for trustworthy users.
Information security
fromThe Hacker News
1 day ago

Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk

Unmonitored client-side JavaScript enables attackers to steal payment data while WAFs and network defenses remain blind, creating a critical security gap.
fromThe Hacker News
1 day ago

Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More

Dozens of Orgs Impacted by Exploitation of Oracle EBS Flaw - Dozens of organizations may have been impacted following the zero-day exploitation of a security flaw in Oracle's E-Business Suite (EBS) software since August 9, 2025, according to Google Threat Intelligence Group (GTIG) and Mandiant. The activity, which bears some hallmarks associated with the Cl0p ransomware crew, is assessed to have fashioned together multiple distinct vulnerabilities, including a zero-day flaw tracked as CVE-2025-61882 (CVSS score: 9.8), to breach target networks and exfiltrate sensitive data.
Information security
Information security
fromTechzine Global
1 day ago

Emergency patch for vulnerability in Oracle E-Business Suite

Critical Oracle E-Business Suite vulnerability CVE-2025-61884 allows unauthenticated attackers to disclose sensitive data across EBS versions 12.2.3–12.2.14; urgent patching recommended.
Information security
fromwww.bbc.com
2 days ago

ID photos of 70,000 users may have been leaked, Discord says

Official ID photos and limited personal data of about 70,000 Discord users were potentially exposed after a third-party age-verification provider was targeted.
Information security
fromThe Hacker News
2 days ago

New Rust-Based Malware "ChaosBot" Hijacks Discord Channels to Control Victims' PCs

ChaosBot is a Rust-based backdoor using Discord C2, compromised credentials, WMI, DLL sideloading, and an FRP reverse proxy to enable reconnaissance, command execution, and persistence.
Information security
fromIT Pro
1 day ago

Third time lucky? The FBI just took down BreachForums, again

The FBI seized BreachForums-related domains, disrupting a central cybercriminal marketplace used to sell stolen data, coordinate attacks, and conduct extortion.
Information security
fromTheregister
2 days ago

Techies mistakenly tossed appliance that had no power cord

Removing undocumented, powered-down equipment can unexpectedly disrupt critical network infrastructure and cause a company-wide outage.
Information security
fromDataBreaches.Net
1 day ago

Months After Being Notified, a Software Vendor is Still Exposing Confidential and Sealed Court Records - DataBreaches.Net

A prosecutor case-management vendor left confidential and sealed court records publicly exposed online despite repeated alerts from researchers, an FBI agent, and assisting IT personnel.
fromArs Technica
1 day ago

No fix yet for attack that lets hackers pluck 2FA codes from Android phones

The new attack, named Pixnapping by the team of academic researchers who devised it, requires a victim to first install a malicious app on an Android phone or tablet. The app, which requires no system permissions, can then effectively read data that any other installed app displays on the screen. Pixnapping has been demonstrated on Google Pixel phones and the Samsung Galaxy S25 phone and likely could be modified to work on other models with additional work.
Information security
Information security
fromThe Hacker News
1 day ago

Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor

Microsoft revamped Edge's IE mode after reports that attackers abused it using social engineering and Chakra 0-day exploits to gain full device control.
Information security
fromComputerWeekly.com
1 day ago

UK police to upgrade illicit asset recovery system | Computer Weekly

A new cloud-based Asset Recovery IT (ARIT) system will replace JARD to improve tracking, management, international and cryptocurrency recovery of criminal assets for UK policing.
fromComputerWeekly.com
1 day ago

The importance of upgrading to the latest Windows operating system | Computer Weekly

Windows 10 was launched in July 2015. It was supposed to be the last major operating system (OS) upgrade, but Microsoft released Windows 11 in October 2021, and now Windows 10 has reached end of life, which means it will no longer be updated. Consumers who register for extended support and back up their PCs in the Microsoft cloud will be able to get free security updates until October 2026. Corporate PCs and devices connected to Active Directory will only receive Windows 10 security updates if they are covered by an Extended Security Updates (ESU) subscription.
Information security
fromThe Hacker News
1 day ago

Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns

"Instead of relying solely on traditional command-and-control (C2) servers that can be taken down, these attackers are leveraging GitHub repositories to host malware configurations," McAfee Labs researchers Harshil Patel and Prabudh Chakravorty said in a report. "When law enforcement or security researchers shut down their C2 infrastructure, Astaroth simply pulls fresh configurations from GitHub and keeps running."
Information security
Information security
fromThe Hacker News
1 day ago

Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors

RondoDox botnet campaigns exploit over 50 vulnerabilities across 30+ vendors and use loader-as-a-service with Mirai/Morte to expand automated network exploitation.
Information security
fromEngadget
1 day ago

Another Game Freak leak claims to show the Pokemon roadmap

Datamined files claim Game Freak plans Pokémon Wind and Waves (2026) plus several upcoming projects including MMO-like multi-region remake Project Seed (2028).
Information security
fromTechCrunch
2 days ago

The ZoraSafe app wants to protect older people online and will present at TechCrunch Disrupt 2025 | TechCrunch

ZoraSafe will provide older adults with an app combining scam detection, AI call analysis, and gamified microlearning to prevent fraud and teach digital safety.
Information security
fromDataBreaches.Net
2 days ago

From sizzle to drizzle to fizzle: The massive data leak that wasn't - DataBreaches.Net

A ransomware group leaked data from six of 39 targeted companies, published downloads across onion and clear-net sites, then halted further leaks despite followers' expectations.
Information security
fromWIRED
3 days ago

'Happy Gilmore' Producer Buys Spyware Maker NSO Group

North Korean operatives are posing as architecture professionals using fake profiles, résumés, and Social Security numbers to infiltrate US companies.
#cybercrime
fromDataBreaches.Net
3 days ago
Information security

In a few days, the PowerSchool hacker will learn his sentence, and his life as he has known it will end. - DataBreaches.Net

fromDataBreaches.Net
3 days ago
Information security

In a few days, the PowerSchool hacker will learn his sentence, and his life as he has known it will end. - DataBreaches.Net

fromwww.theguardian.com
4 days ago

Hackers leak Qantas data containing 5 million customer records after ransom deadline passes

The Qantas data, which was stolen from a Salesforce database in a major cyber-attack in June, included customers' email addresses, phone numbers, birth dates and frequent flyer numbers. It did not contain credit card details, financial information or passport details. On Saturday the group marked the data as leaked, writing: Don't be the next headline, should have paid the ransom.
Information security
Information security
fromInfoQ
4 days ago

Google DeepMind Introduces CodeMender, an AI Agent for Automated Code Repair

CodeMender automatically detects, repairs, and hardens software vulnerabilities using AI reasoning, static/dynamic analysis, fuzzing, and verification to generate validated patches for upstream submission.
Information security
fromSFGATE
4 days ago

SF tech company hit with 3 straight lawsuits after wild month

A third-party customer support breach exposed sensitive Discord user data for roughly 70,000 people and prompted negligence lawsuits and extortion claims.
fromThe Hacker News
3 days ago

Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks

The threat actor's use of the security utility was documented by Sophos last month. It's assessed that the attackers weaponized the on-premises SharePoint vulnerabilities known as ToolShell to obtain initial access and deliver an outdated version of Velociraptor (version 0.73.4.0) that's susceptible to a privilege escalation vulnerability ( CVE-2025-6264) to enable arbitrary command execution and endpoint takeover, per Cisco Talos.
Information security
Information security
fromSecurityWeek
4 days ago

In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware

Active exploitation of Gladinet and Zimbra vulnerabilities and social-engineered payroll attacks against US universities have led to ongoing mitigations and warnings.
Information security
fromSecuritymagazine
5 days ago

Help Desk Havoc: Why Identity Verification Is Still the Weakest Link in Targeted Attacks

Help desks are a critical, under-protected attack vector in zero trust deployments, enabling social-engineering breaches that bypass authentication and cause major disruption.
Information security
fromHarvard Business Review
4 days ago

The Business Rewards and Identity Risks of Agentic AI - SPONSOR CONTENT FROM CYBERARK

Agentic AI introduces a new, complex identity class combining human-like decision-making with machine characteristics, significantly expanding identity security challenges for access, governance, and deprovisioning.
Information security
fromSecuritymagazine
5 days ago

85,000 Pet and Pet Owner Records Exposed

An unsecured, unencrypted database exposed 85,361 files (158 GB) containing policyholder and pet PII—including names, contact details, medical records, and partial credit card numbers.
Information security
fromComputerWeekly.com
4 days ago

Beyond the refresh: Your cyber strategy must include AI PCs | Computer Weekly

Modern AI-powered PC refreshes strengthen security, productivity and resilience while addressing expanded attack surfaces from hybrid work and ageing device risks.
Information security
fromDataBreaches.Net
4 days ago

Telstra Denies Scattered Spider Data Breach Claims Amid Ransom Threats - DataBreaches.Net

Telstra denies a claimed breach of nearly 19 million records, saying data was scraped publicly and no sensitive credentials were exposed.
Information security
fromSecurityWeek
4 days ago

ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities

Multiple high-severity input-validation vulnerabilities in Ivanti Endpoint Manager allow authenticated attackers to achieve remote code execution or local privilege escalation.
Information security
fromInfoWorld
4 days ago

Lessons from the Salesforce breach

Enterprise data interconnectedness requires continuous evolution of cloud security from both providers and customers to mitigate cascading breaches.
fromNextgov.com
4 days ago

When AI agents go rogue, the federal government needs reversible resilience

The age of agentic AI - where autonomous systems make decisions and take actions at speed - has dawned in ways government agencies may struggle to grasp. As agencies explore ways to bring agentic AI into public service, resilience can no longer be a component of the strategy; it is the strategy. When integrating AI agents, the federal government must prioritize rapid reversibility and transparent, auditable recovery.
Information security
Information security
fromMedium
4 weeks ago

GitHub Actions as a Secure DevOps Orchestrator: Beyond CI/CD

Use GitHub Actions to automate SBOM generation, secret scanning, compliance enforcement, and block risky deployments to secure the CI/CD pipeline.
Information security
fromSecurityWeek
4 days ago

Juniper Networks Patches Critical Junos Space Vulnerabilities

Juniper released patches addressing nearly 220 vulnerabilities across Junos OS, Junos Space, and Security Director, including nine critical-severity flaws.
Information security
fromTheregister
4 days ago

Zero-day in popular file-sharing software actively exploited

Apply the available mitigation immediately for Gladinet CentreStack and Triofox to mitigate actively exploited CVE-2025-11371, as no patch is available.
Information security
fromTheregister
4 days ago

Hacktivists deactivate after falling into researchers' trap

TwoNet hacktivists were deceived by a honeypot into compromising a fake water treatment plant, demonstrating real risks to ICS and critical infrastructure.
fromSecurityWeek
4 days ago

Cisco, Fortinet, Palo Alto Networks Devices Targeted in Coordinated Campaign

The threat intelligence firm initially warned of scanning attempts targeting Cisco ASA devices in early September, roughly three weeks before Cisco disclosed two zero-day vulnerabilities impacting Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) software. The bugs, tracked as CVE-2025-20333 (CVSS score of 9.9) and CVE-2025-20362 (CVSS score of 6.5), were exploited in attacks linked to the ArcaneDoor espionage campaign, which has been attributed to hackers based in China.
Information security
Information security
fromSecurityWeek
4 days ago

Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks

Attackers exploited Oracle E-Business Suite, including CVE-2025-61882, to deploy malware such as GoldVein.Java and deliver second-stage payloads for extortion.
Information security
fromThe Hacker News
4 days ago

From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation

A deserialization vulnerability in GoAnywhere MFT's License Servlet (CVE-2025-10035) has been actively exploited since September 11, enabling unauthenticated command injection and Medusa ransomware deployment.
fromThe Hacker News
4 days ago

The AI SOC Stack of 2026: What Sets Top-Tier Platforms Apart?

The SOC of 2026 will no longer be a human-only battlefield. As organizations scale and threats evolve in sophistication and velocity, a new generation of AI-powered agents is reshaping how Security Operations Centers (SOCs) detect, respond, and adapt. From prompt-dependent copilots to autonomous, multi-agent systems, the current market offers everything from smart assistants to force-multiplying automation.
Information security
Information security
fromThe Hacker News
4 days ago

Microsoft Warns of 'Payroll Pirates' Hijacking HR SaaS Accounts to Steal Employee Salaries

Storm-2657 hijacks employee HR SaaS accounts via phishing and AitM attacks, then redirects salary payments to attacker-controlled bank accounts by modifying payment settings.
[ Load more ]