Information security

[ follow ]
Information security
fromTheregister
3 hours ago

'Hundreds' of Iranian hacking attempts hit IP cameras

Iranian hacking crews have targeted surveillance cameras in Israel and Middle Eastern countries since February 28, exploiting vulnerabilities in Hikvision and Dahua cameras as potential preparation for physical attacks.
Information security
fromBusiness Matters
1 day ago

7 Data Privacy Risks Leaders Miss in 2026

Organizations overlook seven critical privacy risks in 2026 that bypass security awareness, including public WiFi interception, malicious browser extensions, shadow AI tools, unencrypted messaging, credential reuse, unmanaged personal devices, and data retention gaps.
Information security
fromThe Hacker News
18 hours ago

APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

Silver Dragon, an APT41-linked group, targets European and Southeast Asian government entities through server exploitation, phishing, and Cobalt Strike beacons since mid-2024.
Information security
fromSecuritymagazine
1 day ago

Would You Trust an AI Pentester to Work Solo?

AI-powered pentesting excels at speed and pattern recognition but requires human guidance to validate contextual vulnerabilities and novel attack paths that matter most to organizations.
Information security
fromComputerWeekly.com
10 hours ago

Tycoon2FA phishing platform dismantled in major operation | Computer Weekly

Europol-led operation dismantled Tycoon2FA, a phishing service with 2,000 subscribers that bypassed multifactor authentication by intercepting credentials and session cookies across 24,000 domains.
Information security
fromComputerWeekly.com
10 hours ago

Zero-day in Android phone chips under active attack | Computer Weekly

A zero-day memory corruption vulnerability in Qualcomm chipsets affecting over 200 Android devices is actively exploited in the wild, requiring immediate security updates.
Information security
fromForbes
13 hours ago

Adapting Brand Protection Strategies In The Age Of AI And Deepfakes

AI and automation have industrialized brand abuse at scale, requiring brands to move beyond manual enforcement to technology-driven defense strategies that match attacker velocity and economics.
Information security
fromMail Online
8 hours ago

Warning to iPhone users over hacking tool tied to government spyware

Coruna spyware targets iPhones running iOS versions from 2019 to late 2023, exploiting over 20 vulnerabilities to steal sensitive data without user awareness.
Information security
fromTheregister
12 hours ago

Kaspersky: No signs Coruna iPhone exploit kit made by US

Kaspersky disputes claims that the Coruna iPhone exploit kit shares authorship with a 2023 operation targeting Russian diplomats, stating no evidence of code reuse exists between them.
Information security
fromComputerworld
13 hours ago

Iranian cyberattacks fail to materialize but threat remains acute

Iranian cyber groups will likely escalate from current low-level activity to destructive wiper attacks despite a temporary lull following US-Israeli military operations.
#malware-distribution
Information security
fromBusiness Insider
13 hours ago

Online ads just became the internet's biggest malware machine, report says

Malicious ads surpassed email as the primary malware delivery channel in 2025, accounting for over 60% of campaigns, with programmatic advertising instances growing 45% year-over-year.
Information security
fromBusiness Insider
13 hours ago

Online ads just became the internet's biggest malware machine, report says

Malicious ads surpassed email as the primary malware delivery channel in 2025, accounting for over 60% of campaigns, with programmatic advertising instances growing 45% year-over-year.
Information security
fromInfoWorld
1 day ago

Angular releases patches for SSR security issues

Google's Angular team released two security updates for SSR vulnerabilities: a critical SSRF/header injection flaw and a moderate open redirect flaw, requiring immediate patching to prevent authorization header theft and phishing attacks.
Information security
fromSecurityWeek
17 hours ago

Critical FreeScout Vulnerability Leads to Full Server Compromise

A critical zero-click RCE vulnerability in FreeScout bypasses previous patches using zero-width space characters, enabling unauthenticated remote code execution through malicious emails.
Information security
from24/7 Wall St.
4 hours ago

Why Cybersecurity ETF CIBR Belongs in Every Retirement Portfolio Right Now

CIBR tracks cybersecurity companies but has underperformed the broader market over the past five years due to valuation compression in high-growth tech names.
fromThe Hacker News
21 hours ago

CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

A malicious unauthenticated actor may exploit this issue to execute arbitrary commands, which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress. The shortcoming was addressed, along with CVE-2026-22720, a stored cross-site scripting vulnerability, and CVE-2026-22721, a privilege escalation vulnerability that could result in administrative access.
Information security
fromSecurityWeek
19 hours ago

VMware Aria Operations Vulnerability Exploited in the Wild

A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress. CISA added CVE-2026-22719 to its Known Exploited Vulnerabilities (KEV) catalog on Tuesday, instructing federal agencies to address it by March 24.
Information security
#api-security
Information security
fromTechzine Global
14 hours ago

Misused Gemini API key results in sky-high AI costs for startup

A stolen Google Gemini API key resulted in an $82,000 bill for a small startup in two days, revealing significant financial risks when access credentials are compromised.
Information security
fromTheregister
1 day ago

Dev stunned by $82K Gemini API key bill after theft

A developer's stolen Google Gemini API key resulted in $82,314 in unauthorized charges within 48 hours, while Google refused to waive costs citing shared responsibility, threatening the startup's survival.
Information security
fromTechzine Global
14 hours ago

Misused Gemini API key results in sky-high AI costs for startup

A stolen Google Gemini API key resulted in an $82,000 bill for a small startup in two days, revealing significant financial risks when access credentials are compromised.
Information security
fromTheregister
1 day ago

Dev stunned by $82K Gemini API key bill after theft

A developer's stolen Google Gemini API key resulted in $82,314 in unauthorized charges within 48 hours, while Google refused to waive costs citing shared responsibility, threatening the startup's survival.
fromThe Hacker News
9 hours ago

149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict

The hacktivist threat in the Middle East is highly lopsided, with two groups, Keymous+ and DieNet, driving nearly 70% of all attack activity between February 28 and March 2. In all, a total of 149 hacktivist DDoS claims were recorded targeting 110 distinct organizations across 16 countries. The attacks were carried out by 12 different groups, including Keymous+, DieNet, and NoName057(16), which accounted for 74.6% of all activity.
Information security
fromDevOps.com
14 hours ago

Chainguard Expands Repository to Add More Secure Open Source Libraries - DevOps.com

Chainguard has rebuilt nearly one million unique versions of Java dependencies, including enterprise essentials such as Spring Boot, Jackson, Apache Commons, and Log4j, using the Chainguard Factory, an automated platform for creating software builds based on code originally found in open source software repositories.
Information security
#cyberattacks
Information security
fromSecuritymagazine
1 day ago

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

U.S. cyber defenders should expect retaliatory cyberattacks from Iranian state actors and hacktivists targeting critical infrastructure, financial services, healthcare, and media outlets within the next 30 days.
Information security
fromNextgov.com
10 hours ago

Iran-linked hacktivists could target governments, experts warn

Iranian regime-aligned hacktivists may escalate cyberattacks against U.S. state and local government targets, financial services, and energy sectors in retaliation for military operations.
Information security
fromSecuritymagazine
1 day ago

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

U.S. cyber defenders should expect retaliatory cyberattacks from Iranian state actors and hacktivists targeting critical infrastructure, financial services, healthcare, and media outlets within the next 30 days.
Information security
fromNextgov.com
10 hours ago

Iran-linked hacktivists could target governments, experts warn

Iranian regime-aligned hacktivists may escalate cyberattacks against U.S. state and local government targets, financial services, and energy sectors in retaliation for military operations.
Information security
fromDataBreaches.Net
14 hours ago

Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit - DataBreaches.Net

The Coruna exploit kit targeting iOS 13.0-17.2.1 contains 23 exploits across five chains, proliferating among surveillance vendors, Russian espionage groups, and Chinese financially motivated actors throughout 2025.
Information security
fromTechzine Global
18 hours ago

Eurofiber and Colt want quantum-secure connections

Eurofiber and Colt Technology Services launched a quantum-secure fiber optic connection between Amsterdam, London, and Brussels to protect financial institutions from future quantum computer-based cyberattacks.
#6g-security
Information security
fromTheregister
1 day ago

Western governments seek to lock down 6G before it exists

Western governments launched 6G Security and Resilience Principles to embed supply chain controls and cyber safeguards into next-generation mobile networks before standardization occurs.
Information security
fromTheregister
1 day ago

Western governments seek to lock down 6G before it exists

Western governments launched 6G Security and Resilience Principles to embed supply chain controls and cyber safeguards into next-generation mobile networks before standardization occurs.
Information security
fromTechRepublic
9 hours ago

Perplexity AI Browser Flaw Could Let Calendar Invites Access Local Files

A security vulnerability in Perplexity's Comet browser allowed attackers to access local files through hidden instructions in routine content like calendar invitations, exposing risks in AI browser agents that autonomously execute actions while authenticated.
fromSilicon Canals
16 hours ago

A US government iPhone hacking tool has gone feral - and 42,000 devices are already infected - Silicon Canals

Google security researchers released a report detailing Coruna as a highly sophisticated iPhone hacking toolkit that reportedly exploits multiple distinct vulnerabilities in iOS and includes several complete attack chains capable of bypassing iPhone security defenses. The toolkit can silently install malware when users simply visit compromised websites - no clicks, no downloads, no user interaction required.
Information security
#cybersecurity
fromTechCrunch
7 hours ago

U.S. and EU police shut down LeakBase, a site accused of sharing stolen passwords and hacking tools | TechCrunch

LeakBase has been operating since 2021, the authorities said, and had a continuously maintained archive of hacked databases, including hundreds of millions of account credentials, credit card numbers, and banking account and routing information.
Information security
Information security
fromTheregister
2 days ago

Microsoft OAuth scams abuse redirects for malware delivery

Microsoft warns of ongoing OAuth abuse scams using phishing emails and URL redirects to deliver malware and compromise organizational devices, primarily targeting government and public-sector entities.
Information security
fromThe Hacker News
1 day ago

Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries

Russian-speaking threat actors used CyberStrikeAI, a China-linked open-source AI security tool, to attack Fortinet FortiGate appliances, compromising over 600 devices across 55 countries.
Information security
fromFortune
1 day ago

Boards aren't ready for the AI age: What happens when your CEO gets deepfaked? | Fortune

Deepfake fraud losses tripled to $1.1 billion in 2025, with executives vulnerable to synthetic voice and video impersonation attacks targeting both financial theft and reputational damage.
Information security
fromTechzine Global
1 day ago

DeepKeep maps attack surface for AI agents

DeepKeep's AI Agent Scanner identifies security risks in AI agents by mapping vulnerabilities, tool access, and data exposure across supported frameworks using OWASP standards.
Information security
fromTechCrunch
1 day ago

Fig Security emerges from stealth with $38M to help security teams deal with change | TechCrunch

Fig Security monitors enterprise security stacks to ensure detection and response capabilities function properly despite complex tool interactions and system changes.
Information security
fromThe Hacker News
1 day ago

Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

Microsoft warns of phishing campaigns exploiting OAuth redirect mechanisms to bypass email and browser defenses, targeting government and public-sector organizations to deliver malware without stealing credentials.
Information security
fromFortune
1 day ago

Why investing in cybersecurity just became a 'must-have' for CFOs | Fortune

CFOs must treat vendor cyber risk as a material balance sheet risk, integrating resilience assessments and proactive risk quantification into enterprise frameworks amid heightened geopolitical threats.
Information security
fromSecurityWeek
1 day ago

New 'AirSnitch' Attack Shows Wi-Fi Client Isolation Could be a False Sense of Security

Researchers discovered that client isolation in Wi-Fi networks can be bypassed on all tested routers due to missing standardization and inconsistent vendor implementations.
Information security
fromTechRepublic
1 day ago

Chrome Extension Hijacked to Deliver Malware, Steal Crypto Wallets

QuickLens Chrome extension was compromised to deliver malware, steal cryptocurrency wallet data, and execute ClickFix attacks by stripping security headers and establishing command-and-control communications.
Information security
fromComputerworld
1 day ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
Information security
fromSecurityWeek
1 day ago

Vulnerability in MS-Agent AI Framework Can Allow Full System Compromise

CVE-2026-2256 in ModelScope MS-Agent framework allows arbitrary OS command execution through inadequate input sanitization in the Shell tool using regex-based blacklist filtering.
Information security
fromwww.bbc.com
1 day ago

Deepfake attack: 'Many people could have been cheated'

Deepfake technology has increased 3,000% over two years, enabling fraudsters to impersonate executives and manipulate financial markets and corporate security through AI-generated videos and audio.
Information security
fromTheregister
1 day ago

Perplexity Comet browser hole was exploitable via cal invite

Perplexity's Comet browser had critical security vulnerabilities allowing attackers to steal local files and access password vaults through malicious calendar invitations until recently.
#iphone-security-vulnerabilities
Information security
fromNextgov.com
1 day ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
Information security
fromTechCrunch
1 day ago

A suite of government hacking tools targeting iPhones is now being used by cybercriminals | TechCrunch

Government-designed iPhone exploit kit Coruna leaked from surveillance vendor to cybercriminals, Russian espionage groups, and Chinese hackers, demonstrating how state-sponsored tools proliferate into criminal markets.
Information security
fromNextgov.com
1 day ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
Information security
fromTechCrunch
1 day ago

A suite of government hacking tools targeting iPhones is now being used by cybercriminals | TechCrunch

Government-designed iPhone exploit kit Coruna leaked from surveillance vendor to cybercriminals, Russian espionage groups, and Chinese hackers, demonstrating how state-sponsored tools proliferate into criminal markets.
Information security
fromThe Hacker News
1 day ago

SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains

SloppyLemming conducted attacks on Pakistani and Bangladeshi government and critical infrastructure using new malware families BurrowShell and a Rust-based keylogger between January 2025 and January 2026.
Information security
fromSecurityWeek
1 day ago

Honeywell, Researcher Clash Over Impact of Building Controller Vulnerability

A researcher discovered that Honeywell's IQ4 building controller exposes unauthenticated web interfaces and allows remote administrator account creation, but Honeywell disputes the severity, claiming the vulnerability only exists during installation before the system becomes operational.
Information security
fromSecurityWeek
1 day ago

Android Update Patches Exploited Qualcomm Zero-Day

Google released Android security updates patching nearly 130 vulnerabilities, including an exploited zero-day in Qualcomm chipsets affecting over 200 devices through integer overflow in graphics components.
Information security
fromTechRepublic
6 days ago

Google Expands AI Scam Protection to Samsung Galaxy S26

Google expands AI-powered scam detection beyond Pixel phones to Samsung Galaxy S26 and other Android devices, with real-time call and message fraud analysis using on-device AI.
Information security
fromThe Hacker News
1 day ago

Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited

Google disclosed a high-severity Qualcomm Graphics component vulnerability (CVE-2026-21385) being exploited in Android devices, with March 2026 patches addressing 129 total vulnerabilities including critical remote code execution and privilege escalation flaws.
#chrome-security-vulnerability
Information security
fromZDNET
2 days ago

This high-severity Chrome Gemini vulnerability lets malicious extensions spy on your PC

A high-severity vulnerability in Chrome's Gemini feature allows malicious extensions to inject code, enabling attackers to spy on users, steal data, access webcams and microphones, and conduct phishing attacks.
fromThe Hacker News
2 days ago
Information security

New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

A patched Chrome vulnerability (CVE-2026-0628) allowed malicious extensions to escalate privileges and access local files, camera, microphone, and screenshots through insufficient WebView policy enforcement.
fromSecurityWeek
2 days ago
Information security

Vulnerability Allowed Hijacking Chrome's Gemini Live AI Assistant

A Chrome vulnerability allowed malicious extensions to hijack Gemini Live AI assistant and access sensitive user data through privileged browser access.
Information security
fromTheregister
1 day ago

Chrome AI panel became privilege escalator for extensions

A high-severity Chrome vulnerability allowed malicious extensions to hijack the Gemini Live AI panel and gain unauthorized access to system resources like cameras, microphones, and local files.
Information security
fromZDNET
2 days ago

This high-severity Chrome Gemini vulnerability lets malicious extensions spy on your PC

A high-severity vulnerability in Chrome's Gemini feature allows malicious extensions to inject code, enabling attackers to spy on users, steal data, access webcams and microphones, and conduct phishing attacks.
Information security
fromThe Hacker News
2 days ago

New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

A patched Chrome vulnerability (CVE-2026-0628) allowed malicious extensions to escalate privileges and access local files, camera, microphone, and screenshots through insufficient WebView policy enforcement.
Information security
fromSecurityWeek
2 days ago

Vulnerability Allowed Hijacking Chrome's Gemini Live AI Assistant

A Chrome vulnerability allowed malicious extensions to hijack Gemini Live AI assistant and access sensitive user data through privileged browser access.
Information security
fromThe Hacker News
1 day ago

Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

Tier 1 SOC analysts process the highest alert volume with the least experience, creating a structural vulnerability where alert fatigue, decision fatigue, and cognitive overload directly undermine organizational security performance and increase incident costs.
fromSecurityWeek
1 day ago

Iranian Strikes on Amazon Data Centers Highlight Industry's Vulnerability to Physical Disasters

These strikes have caused structural damage, disrupted power delivery to our infrastructure, and in some cases required fire suppression activities that resulted in additional water damage. AWS said in an update on its online dashboard regarding the Iranian drone strikes on its Middle East facilities.
Information security
Information security
from24/7 Wall St.
1 day ago

The Cybersecurity ETF That Missed the Boom Entirely

Global X Cybersecurity ETF (BUG) underperforms despite structural growth in cybersecurity spending, returning -3% over five years while competitors and broader indices significantly outpaced it.
#cybersecurity-leadership
Information security
fromSecuritymagazine
2 days ago

Shawn Fallah - Top Cybersecurity Leaders 2026

Shawn Fallah leads HSI's Cyber and Operational Technology directorate, overseeing technical law enforcement systems and a $1.1 billion budget while advancing modern security infrastructure to counter emerging threats.
Information security
fromSecuritymagazine
2 days ago

Shawn Fallah - Top Cybersecurity Leaders 2026

Shawn Fallah leads HSI's Cyber and Operational Technology directorate, overseeing technical law enforcement systems and a $1.1 billion budget while advancing modern security infrastructure to counter emerging threats.
#cyber-warfare
fromSecurityWeek
1 day ago
Information security

Iran Cyber Front: Hacktivist Activity Rises, but State-Sponsored Attacks Stay Low

Information security
fromFortune
3 days ago

Cyber retaliation from Iran is a problem for U.S. companies - 'It's in the hands of a 19-year-old hacker in a Telegram room,' ex-NSA operative says | Fortune

Iranian cyber operatives compromised a popular prayer app to coordinate civil resistance during strikes, prompting regime loyalists to launch aggressive counter-attacks through decentralized hacker networks.
fromSecurityWeek
1 day ago
Information security

Iran Cyber Front: Hacktivist Activity Rises, but State-Sponsored Attacks Stay Low

Information security
fromFortune
3 days ago

Cyber retaliation from Iran is a problem for U.S. companies - 'It's in the hands of a 19-year-old hacker in a Telegram room,' ex-NSA operative says | Fortune

Iranian cyber operatives compromised a popular prayer app to coordinate civil resistance during strikes, prompting regime loyalists to launch aggressive counter-attacks through decentralized hacker networks.
Information security
fromNextgov.com
1 day ago

CISA appoints new acting cyber chief after recent leadership shakeups

Chris Butera becomes CISA's acting executive assistant director for cybersecurity following leadership restructuring and workforce reductions at the agency.
Information security
fromThe Hacker News
1 day ago

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Threat actors impersonate IT support via email and phone calls to deliver Havoc C2 framework for data exfiltration or ransomware attacks across multiple organizations.
fromThe Hacker News
1 day ago

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

It launches a headless Chrome instance - a browser that operates without a visible window - inside a Docker container, loads the brand's real website, and acts as a reverse proxy between the target and the legitimate site. Recipients are served genuine page content directly through the attacker's infrastructure, ensuring the phishing page is never out of date.
Information security
fromNextgov.com
1 day ago

Why the convergence of AI and cybersecurity must be a top priority for the administration

AI is directly impacting blue team (defender) and red team (attacker) strategies, operations and tactics. Federal cybersecurity teams are increasingly relying on AI for anomaly detection, predictive threat intelligence and faster incident response. AI can flag suspicious behavior, such as access to sensitive systems from unusual locations, without depending on static rules.
Information security
Information security
fromThe Hacker News
2 days ago

Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More

Multiple attack vectors across network systems, cloud infrastructure, and AI platforms exploit access control gaps, exposed credentials, and trusted service misuse to target high-value sectors.
#ai-security-vulnerability
Information security
fromTechzine Global
2 days ago

Flaw in OpenClaw allows complete takeover of AI agent

A critical vulnerability in OpenClaw allowed arbitrary websites to hijack AI assistants through localhost WebSocket connections without user interaction or malicious plugins.
fromSecurityWeek
2 days ago
Information security

OpenClaw Vulnerability Allowed Websites to Hijack AI Agents

OpenClaw AI assistant vulnerability allowed attackers to hijack agents through malicious websites by exploiting localhost assumptions and rate limiter exemptions for loopback connections.
Information security
fromTechzine Global
2 days ago

Flaw in OpenClaw allows complete takeover of AI agent

A critical vulnerability in OpenClaw allowed arbitrary websites to hijack AI assistants through localhost WebSocket connections without user interaction or malicious plugins.
Information security
fromSecurityWeek
2 days ago

OpenClaw Vulnerability Allowed Websites to Hijack AI Agents

OpenClaw AI assistant vulnerability allowed attackers to hijack agents through malicious websites by exploiting localhost assumptions and rate limiter exemptions for loopback connections.
Information security
fromThe Hacker News
2 days ago

How to Protect Your SaaS from Bot Attacks with SafeLine WAF

SaaS applications face constant automated bot attacks that exploit business logic, appearing as legitimate growth while degrading performance; SafeLine WAF protects by inspecting traffic patterns and behavior before requests reach application code.
Information security
fromSecuritymagazine
3 days ago

Why Security Teams Can No Longer Ignore Recruitment Fraud

AI-powered recruitment fraud exploits human trust in hiring workflows, with job scams surging over 1,000% as attackers use deepfakes and impersonation to target vulnerable candidates and organizations during periods of labor market volatility.
Information security
fromThe Hacker News
2 days ago

APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday

Microsoft patched CVE-2026-21513, a high-severity MSHTML Framework vulnerability exploited as a zero-day by Russia-linked APT28, allowing attackers to bypass security features and achieve code execution through malicious files.
Information security
fromTheregister
2 days ago

Memory scalpers hunt scarce DRAM with bot blitz

Web scraping bots are systematically targeting DRAM inventory across e-commerce sites, submitting millions of requests to identify stock for resale at inflated prices, with operators increasingly using AI tools to enhance their scraping effectiveness.
Information security
fromNextgov.com
2 days ago

Intelligence firms watch for uptick in Iran cyber activity after US, Israel strikes

Tehran-linked hackers are escalating digital reconnaissance and preparing potentially disruptive cyber operations following recent U.S. and Israeli strikes on Iran.
Information security
fromTechRepublic
6 days ago

ChatGPT Criminals: AI Scams Target Dating and Legal Impersonators - TechRepublic

Generative AI enhances traditional scams by improving message quality, consistency, and scale, making romance fraud and professional impersonation harder to detect and easier to execute at volume.
Information security
fromThe Hacker News
2 days ago

North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT

North Korean threat actors deployed 26 malicious npm packages using steganography to hide command-and-control infrastructure in Pastebin essays, targeting developers with credential stealers and remote access trojans.
Information security
fromSecurityWeek
2 days ago

North Korean APT Targets Air-Gapped Systems in Recent Campaign

APT37 deployed five new malicious tools in the Ruby Jumper campaign targeting air-gapped systems using USB-based data exfiltration and persistence mechanisms.
Information security
fromThe Hacker News
2 days ago

Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome

Google is developing Merkle Tree Certificates to secure HTTPS against quantum computing threats while maintaining current internet speed and performance.
Information security
fromSecurityWeek
2 days ago

Google Working Towards Quantum-Safe Chrome HTTPS Certificates

Google plans to enhance Chrome's HTTPS certificate resilience against quantum computers using Merkle Tree Certificates that reduce bandwidth while maintaining security and transparency.
Information security
fromNextgov.com
2 days ago

Fake DOD memo about 'compromised' apps shows swift spread of deceptive messaging

A fake U.S. Cyber Command memo falsely claiming apps were compromised and revealing servicemembers' locations circulated during military channels, but DOD confirmed it was not authentic.
fromDataBreaches.Net
2 days ago

CISA Releases New Guidance on Assembling Multi-Disciplinary Insider Threat Management Teams - DataBreaches.Net

CISA's guidance is intended to assist critical infrastructure stakeholders, which includes private sector entities across various sectors, with implementing an insider threat mitigation program that combines physical security, cybersecurity, personnel awareness, and community partnerships. Although framed for critical infrastructure, CISA's guidance is relevant to a broader range of organizations, including those outside of critical infrastructure sectors.
Information security
Information security
fromTheregister
2 days ago

Scammers target Dubai bank accounts amid Iran missile salvo

Cybercriminals impersonated Dubai Crisis Management to exploit missile attack victims, attempting SIM-swap attacks to access bank accounts using stolen UAE Pass and Emirates ID credentials.
Information security
fromTheregister
2 days ago

Israel hacks prayer app to push propaganda to Iran: report

Israel allegedly hacked the Iranian prayer app BadeSaba to distribute messages urging military members to oppose the regime, exploiting the app's 37 million users and their location data.
fromDataBreaches.Net
2 days ago

Wisconsin k-12 district hit by weeklong outage - DataBreaches.Net

A reported "cyber incident" left the Denmark School District in the Village of Denmark, Wisconsin, without internet access for five school days, forcing teachers and students to rely on paper-based workarounds, according to a local news report.
Information security
Information security
fromSecuritymagazine
3 days ago

Iranian Apps, Websites Hacked Following US-Israeli Strikes

Coordinated cyber operations against Iran caused significant internet disruption and compromised news websites and a major religious app with messages urging military surrender.
Information security
fromSecurityWeek
2 days ago

Nick Andersen Appointed Acting Director of CISA

Nick Andersen appointed acting director of CISA, replacing Madhu Gottumukkala who left after failing a polygraph test and uploading sensitive information to public ChatGPT.
#ai-security
Information security
fromThe Hacker News
4 days ago

ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket

OpenClaw fixed a high-severity vulnerability allowing malicious websites to hijack locally running AI agents through password brute-forcing and unauthorized device registration.
Information security
fromSecurityWeek
3 days ago

Hackers Weaponize Claude Code in Mexican Government Cyberattack

Attackers exploited Claude Code to compromise ten Mexican government bodies and a financial institution, exfiltrating 150GB of data affecting 195 million identities by bypassing AI safety guardrails through social engineering.
Information security
fromThe Hacker News
4 days ago

ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket

OpenClaw fixed a high-severity vulnerability allowing malicious websites to hijack locally running AI agents through password brute-forcing and unauthorized device registration.
fromTheregister
4 days ago

DEF CON hackers 'fed up with government,' Jake Braun says

Thinking back to Ben Franklin, we saw society moving in the right direction for the last 500 years because of our commitment to science, human rights, etc., and that seems to be at the very least slowing down, if not reversing. Braun said he blames government for this state of affairs - pointedly 'the inability of government to continue to make the progress we saw from the enlightenment.'
Information security
[ Load more ]