Information security

[ follow ]
Information security
fromSecuritymagazine
9 hours ago

Economic Uncertainty Leads to Additional Security Risks

Economic and geopolitical-driven supply chain shifts and third-party remote access are raising cyber risk to CPS, prompting supply-chain redesigns and security overhauls.
fromTechzine Global
4 hours ago

Cisco tackles branch network complexity with Unified Branch

A branch environment is completely different from that of an organization's head office. Of course, employees want a fast and, above all, reliable Wi-Fi connection there too. The same applies to the internet connection. In addition, employees also see workloads disappearing to other locations. In addition to SaaS and public cloud, they are also moving to the company's central data center. New AI workloads at the branch, like more automated customer services at retail sites, certainly don't make the branch environment any easier to manage.
Information security
Information security
fromTechzine Global
22 hours ago

Critical vulnerability exposed in JavaScript library expr-eval

A critical expr-eval vulnerability (CVE-2025-12735) permits remote code execution by abusing evaluate() context validation, risking full system compromise.
#glassworm
fromInfoWorld
1 day ago
Information security

How GlassWorm wormed its way back into developers' code - and what it says about open source security

fromInfoWorld
1 day ago
Information security

How GlassWorm wormed its way back into developers' code - and what it says about open source security

fromArs Technica
21 hours ago

ClickFix may be the biggest security threat your family has never heard of

Another campaign, documented by Sekoia, targeted Windows users. The attackers behind it first compromise a hotel's account for Booking.com or another online travel service. Using the information stored in the compromised accounts, the attackers contact people with pending reservations, an ability that builds immediate trust with many targets, who are eager to comply with instructions, lest their stay be canceled. The site eventually presents a fake CAPTCHA notification that bears an almost identical look and feel to those required by content delivery network Cloudflare.
Information security
#gootloader
fromTheregister
21 hours ago

Hitachi-owned GlobalLogic admits data stolen by Clop

Digital engineering outfit GlobalLogic says personal data from more than 10,000 current and former employees was exposed in the wave of Oracle E-Business Suite (EBS) attacks attributed to the Clop ransomware gang. The Hitachi-owned biz joins a growing roster of high-profile victims that also now includes The Washington Post and Allianz UK. In a filing with Maine's attorney general, the US-based GlobalLogic said that 10,471 individuals were affected after criminals gained unauthorized access to its systems.
Information security
Information security
fromThe Hacker News
21 hours ago

Android Trojan 'Fantasy Hub' Malware Service Turns Telegram Into a Hub for Hackers

Fantasy Hub is an Android RAT sold via Telegram as Malware-as-a-Service enabling device control, SMS interception, data exfiltration, and banking fraud against BYOD users.
Information security
fromChannelPro
22 hours ago

Kaseya: SMBs remain cautious on AI despite persistent human error threat

SMBs remain cautious about AI in cyber defenses, prioritizing human-error mitigation and incident readiness amid persistent phishing impacts and costly breaches.
fromThe Hacker News
21 hours ago

CISO's Expert Guide To AI Supply Chain Attacks

AI-enabled supply chain attacks are exploding in scale and sophistication - Malicious package uploads to open-source repositories jumped 156% in the past year. AI-generated malware has game-changing characteristics - It's polymorphic by default, context-aware, semantically camouflaged, and temporally evasive. Real attacks are already happening - From the 3CX breach affecting 600,000 companies to NullBulge attacks weaponizing Hugging Face and GitHub repositories.
Information security
fromThe Hacker News
14 hours ago

WhatsApp Malware 'Maverick' Hijacks Browser Sessions to Target Brazil's Biggest Banks

The campaign involves two components: A self-propagating malware referred to as SORVEPOTEL that's spread via the desktop web version of WhatsApp and is used to deliver a ZIP archive containing the Maverick payload. The malware is designed to monitor active browser window tabs for URLs that match a hard-coded list of financial institutions in Latin America. Should the URLs match, it establishes contact with a remote server to fetch follow-on commands to gather system information and serve phishing pages to steal credentials.
Information security
Information security
fromIT Pro
22 hours ago

GitHub is awash with leaked AI company secrets - API keys, tokens, and credentials were all found out in the open

65% of 50 examined AI companies leaked verified secrets on GitHub, often buried in deleted forks, gists, and developer repositories.
#cybersecurity
#side-channel-attack
#konni
Information security
fromIT Pro
23 hours ago

Are we in a cyber awareness crisis?

UK organisations face declining employee cyber vigilance, rising data loss incidents, and CISOs report diminishing staff understanding of security responsibilities.
Information security
fromSecuritymagazine
1 day ago

You're In Charge: Can You Keep the Business Running?

Senior leaders' crisis responses determine outcomes; resilience depends on preparation, connected systems, and rapid activation of plans and personnel.
fromZDNET
16 hours ago

Your desktop firewall isn't enough - here's how to protect your entire network

You might think the only thing you need to do to prevent that would be to use your desktop operating system's firewall. Although that's a great start, you need more protection. One of the best ways to protect your home network is to deploy a dedicated firewall, and there are a few ways you can do that. Also: How to secure your home and office network: The best DNS blockers and firewalls
Information security
fromInfoWorld
18 hours ago

Microsoft's .NET 10 arrives with AI, runtime, and language improvements

For cryptography, .NET 10 introduces extensive new APIs across cryptography, globalization, numerics, serialization, collections, and diagnostics. Also, with quantum computing on the horizon, .NET 10 expands post-quantum cryptography support with Windows Cryptography API: Next Generation (CNG) support, enhanced ML-DSA with simplified APIs, and HashML-DSA support, plus Composite ML-DSA for hybrid approaches. Additional cryptography enhancements include AES KeyWrap with Padding support for secure key wrapping scenarios.
Information security
#cybercrime
Information security
fromwww.theguardian.com
1 day ago

Tech giants vow to defend users in US as spyware companies make inroads with Trump administration

Apple and WhatsApp will warn users if governments target their phones with spyware, while Paragon and NSO pursue expanded access to the US market.
#cyber-insurance
fromZDNET
1 day ago

How Microsoft finally makes good on its syncable passkey promise - and what's coming next

Under the guidance of the multi-vendor FIDO Alliance, the passkey standard -- considered a non-phishable type of login credential -- has been around for five years. However, the global shift to passkeys has been hindered by the immaturity of some supporting technologies in today's operating systems and devices, as well as in the various identity management systems used by relying parties.
Information security
fromTechCrunch
18 hours ago

EU considers law to phase out Huawei and ZTE equipment from bloc's telecom networks | TechCrunch

The European Commission is stepping up efforts to bolster the security of Europe's telecommunications networks by urging member states to phase out equipment from vendors such as Chinese tech giants Huawei and ZTE from its 5G and next-gen networks, Bloomberg reported, citing anonymous sources. The EC had in 2020 recommended that member nations stop using tech from "high-risk" vendors like Huawei and ZTE, and now its vice president, Henna Virkkunen, is pushing to turn that recommendation into regulation, Bloomberg reported.
Information security
Information security
fromSecuritymagazine
1 day ago

The New Battlefield: 3 Veterans Discuss Their Transition to Cybersecurity

Military skills translate to cybersecurity as a shifted battlefield requiring vigilance, adaptability, and mission-focused defense of people and digital assets.
Information security
fromSecuritymagazine
1 day ago

Bringing AI to The SOC Is Not Intended to Replace Humans

AI-powered SOCs must use a consolidated context lake and multi-agent architecture to enable autonomous reasoning, continuous learning, and coordinated SecOps at scale.
Information security
fromThe Hacker News
1 day ago

Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More

Cybercrime is evolving: attackers use hidden hypervisor-based VMs, AI side-channel leaks, sleeper logic bombs, and stealthy Android spyware with increasing coordination.
Information security
fromBleepingComputer
1 day ago

Popular JavaScript library expr-eval vulnerable to RCE flaw

Critical RCE vulnerability (CVE-2025-12735) in expr-eval/expr-eval-fork allows remote code execution via unvalidated Parser.evaluate() context variables.
Information security
fromThe Hacker News
1 day ago

Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature

CVE-2025-12480 in Gladinet Triofox enabled unauthenticated access to configuration pages, allowing admin account creation and SYSTEM-level arbitrary code execution via antivirus path abuse.
#ransomware
#runc
#phishing
Information security
fromAmazon Web Services, Inc.
1 day ago

Privilege Escalation in Aurora PostgreSQL using AWS JDBC Wrapper, AWS Go Wrapper, AWS NodeJS Wrapper, AWS Python Wrapper, AWS PGSQL ODBC driver

CVE-2025-12967 in AWS Wrappers for Amazon Aurora PostgreSQL allows low-privilege authenticated users to escalate privileges to the rds_superuser role.
Information security
fromThe Hacker News
1 day ago

New Browser Security Report Reveals Emerging Threats for Enterprises

Most identity, SaaS, and AI-related risks converge in users' browsers, creating a parallel threat surface beyond traditional DLP, EDR, and SSE controls.
Information security
fromTechzine Global
1 day ago

Sysdig Falco and Stratoshark strengthen open source cloud security

Falco now automatically captures SCAP files on rule triggers and stores them for Stratoshark-enabled forensic cloud analysis, linking real-time detection to deep post-event investigation.
#nessus
fromTheregister
1 day ago

AI companies keep publishing private API keys to GitHub

"Some of these leaks could have exposed organizational structures, training data, or even private models," said Wiz threat researchers Shay Berkovich and Rami McCarthy in a blog post. The secrets consist of API keys, tokens, and other digital credentials that are supposed to be kept out of code commits to git repos. But as the security biz noted last month, developers of VS Code extensions keep making their secrets known, a problem that McCarthy has attributed in part to vibe coding.
Information security
fromSecuritymagazine
2 days ago

Where to Stretch Your Cybersecurity Budget

It's really important to go back to just the cybersecurity basics. Are you using multi-factor authentication? Are you training your staff and employees at all levels to not click that link? Are you patching your systems? Do you have good monitoring software and applications that are monitoring your network even when you're sleeping?
Information security
Information security
fromTheregister
2 days ago

Data breach at Chinese infosec firm reveals weapons arsenal

Knownsec breach leaked thousands of classified cyber-espionage tools and global target data; Indian software exports rose to $218 billion in FY24/25.
Information security
fromTheregister
2 days ago

Allianz UK confirms Oracle EBS compromise

Clop gang exploited an Oracle E-Business Suite vulnerability to compromise Allianz UK customer data, affecting 80 current and 670 former customers while LV systems remained unaffected.
Information security
fromZDNET
1 day ago

12 ways to find viruses on your PC for free (and how to remove them)

Modern antivirus and browser defenses make PC infections uncommon, but stealthy malware can still quietly steal data and occasionally infect systems.
fromIT Pro
1 day ago

Small businesses can't get cyber strategies up and running - here's why

Small and medium-sized businesses (SMBs) across the UK are struggling to get cybersecurity strategy plans up and running, according to new research. Analysis from Kaspersky shows more than two-thirds (67%) of SMBs lack "fully actionable" cybersecurity strategies. This means that while many have developed theoretical plans for how to tackle growing security threats, real-world implementation is falling flat. These shortcomings are leaving a concerning number of businesses at higher risk of attacks amidst an escalating cyber threat landscape, the company warned.
Information security
fromSecuritymagazine
2 days ago

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

When thieves stole more than $80 million in jewels from the Louvre in Paris, they didn't exploit a total absence of security but rather gaps in the museum's broader security program, encompassing both aging systems and situational awareness, according to early reports. The museum's director later confirmed that the balcony used in the break-in wasn't covered by a functioning external camera; the only camera nearby faced the wrong direction.
Information security
fromNextgov.com
1 day ago

CMMC enforcement begins after eight years of warnings

The defense industry has had nearly a decade of warnings, but today (Monday, Nov. 10) marks the day that companies need to start complying with the government's standards around how they protect controlled unclassified information. Of course, they should have been complying with the National Institute of Standards & Technology's SP 800-171 standard for the last eight years. But now the Cybersecurity Maturity Model Certification program begins in earnest.
Information security
Information security
fromSecuritymagazine
2 days ago

Will Bernhjelm to Deliver Keynote at 2025 SECURITY 500 Conference

Mall of America elevated security to mission-critical by integrating pioneering technologies, expanding K9 capabilities, and creating comprehensive officer training under VP of Security's leadership.
Information security
fromFuturism
2 days ago

Malware Is Now Using AI to Rewrite Its Own Code to Avoid Detection

PROMPTFLUX malware leverages large language models via the Gemini API to dynamically rewrite and obfuscate its own code, enabling adaptive, harder-to-detect attacks.
Information security
fromTheregister
2 days ago

Louvre cybersecurity an absolute mess, secret audits reveal

The Louvre suffered decade-long, basic infosec failures—weak passwords and obsolete systems—enabling remote attackers to gain critical system and badge-control access.
fromInfoQ
4 days ago

Redis Critical Remote Code Execution Vulnerability Discovered After 13 Years

Exploiting the so-called "RediShell" remote code execution vulnerability, an authenticated user can use a specially crafted script to manipulate the garbage collector, trigger a use-after-free, and potentially execute arbitrary code remotely. The vulnerability exploits a 13-year-old UAF memory corruption bug in Redis, allowing a post-auth attacker to send a crafted Lua script to escape the default Lua sandbox and execute arbitrary native code.
Information security
fromInsideHook
4 days ago

Norwegian Agency Finds Security Risks on Electric Buses

When you see a car, truck or bus making its way down the road, who do you assume is control of it? This isn't a trick question. Decades ago, there would have been one answer: the person behind the wheel. In more recent years, as vehicles became increasingly connected to the internet and driver-assist and self-driving technology grew more widespread, it's not as clear if a driver is, well, a driver.
Information security
fromBuzzFeed
3 days ago

This Dangerous Phone Scam Is Tricking People With Just Four Simple Words

A random "can you hear me?" question should be your first red flag that this unsolicited call could be a scam, said Kelly Richmond Pope, a professor of forensic accounting at DePaul University and the author of Fool Me Once: Scams, Stories, and Secrets From the Trillion-Dollar Fraud Industry. A conversation with a random number that starts with "can you hear me?" is suspicious "because it's so outside of the typical conversational cycle," Pope said.
Information security
Information security
fromThe Hacker News
5 days ago

Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities

A malicious VS Code extension named susvsex uses AI-assisted code to zip, exfiltrate, and encrypt files and leverages GitHub as a command-and-control channel.
Information security
fromInfoWorld
5 days ago

Malicious npm packages contain Vidar infostealer

Malicious npm packages delivered Vidar infostealer via postinstall scripts, remained on the registry for about two weeks, and were downloaded over 2,240 times.
Information security
fromTheregister
4 days ago

Crims plant time bomb malware in industrial .NET extensions

Malicious NuGet packages published in 2023 contained small destructive payloads hidden in benign code, scheduled to trigger between 2027–2028, including attacks on industrial PLCs.
Information security
fromThe Hacker News
4 days ago

Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation

Nine NuGet packages contained time-delayed logic bombs able to sabotage databases and industrial PLCs, with trigger dates set for August 2027 and November 2028.
fromThe Hacker News
4 days ago

From Log4j to IIS, China's Hackers Turn Legacy Bugs into Global Espionage Tools

A China-linked threat actor has been attributed to a cyber attack targeting an U.S. non-profit organization with an aim to establish long-term persistence, as part of broader activity aimed at U.S. entities that are linked to or involved in policy issues. The organization, according to a report from Broadcom's Symantec and Carbon Black teams, is "active in attempting to influence U.S. government policy on international issues." The attackers managed to gain access to the network for several weeks in April 2025.
Information security
#credential-compromise
Information security
fromTechzine Global
4 days ago

Cisco firewalls under attack: patching required

Cisco firewall products face ongoing exploitation causing device reboots and network outages; urgent updating to the latest patched software is required to prevent service disruption.
Information security
fromThe Hacker News
4 days ago

Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp

A zero-day in Samsung's libimagecodec.quram.so (CVE-2025-21042) was exploited to deliver LANDFALL spyware via malicious WhatsApp DNG images targeting the Middle East.
Information security
fromFast Company
4 days ago

Why Google is really warning 2.5 billion Gmail users to stop using their passwords

Google advises abandoning passwords in favor of stronger protections after Salesforce-sourced data boosted targeted phishing and impersonation attacks.
Information security
fromArs Technica
4 days ago

Commercial spyware "Landfall" ran rampant on Samsung phones for almost a year

A Samsung image-processing vulnerability enabled zero-click Landfall spyware to install via malicious images, modify SELinux for deep access, exfiltrate data, and activate sensors.
fromTechCrunch
4 days ago

Washington Post confirms data breach linked to Oracle hacks | TechCrunch

Last month, Google said that the ransomware gang Clop was targeting companies after exploiting multiple vulnerabilities in Oracle's E-Business Suite software, which companies use for their business operations, storing their human resources files, and other sensitive data. The exploits allowed the hackers to steal their customer's business data and employee records from more than 100 companies, per Google.
Information security
Information security
fromAxios
5 days ago

Congressional Budget Office investigating hack of its systems

Nation-state hackers breached Congressional Budget Office systems, potentially exposing internal communications about pending legislation; the CBO says it contained the incident and increased monitoring.
fromTheregister
4 days ago

Landfall spyware used in 0-day attacks on Samsung phones

A previously unknown Android spyware family called LANDFALL exploited a zero-day in Samsung Galaxy devices for nearly a year, installing surveillance code capable of recording calls, tracking locations, and harvesting photos and logs before Samsung finally patched it in April. The surveillance campaign likely began in July 2024 and abused CVE-2025-21042, a critical bug in Samsung's image-processing library that affects Galaxy devices running Android versions 13, 14, 15, and 16,
Information security
Information security
fromTechzine Global
4 days ago

Arctic Wolf acquires UpSight Security for ransomware prevention in Aurora

Arctic Wolf is acquiring UpSight Security to add on-device predictive AI ransomware prevention and rollback to the Aurora endpoint platform, preventing encryption and enabling recovery.
fromComputerWeekly.com
4 days ago

Resilience for resilience: Managing burnout among cyber leaders | Computer Weekly

CISOs often operate in environments where security is underfunded, under prioritised, or misunderstood at the board and C-suite level. A lack of senior-level buy-in trickles down into: Budget constraints that limit the scope and impact of the CISO function, including resources for tooling and automation. Skills shortages and restrictive operating models that prevent effective delegation. Strategic misalignment, where short-term delivery is prioritised over long-term business resilience and customer outcomes.
Information security
fromArs Technica
4 days ago

How to trade your $214,000 cybersecurity job for a jail cell

Martin had apparently seen how this system worked in practice through his job, and he approached a pair of other people to help him make some easy cash. One of these people was allegedly Ryan Goldberg of Watkinsville, Georgia, who worked as an incident manager at the cybersecurity firm Sygnia. Goldberg told the FBI that Martin had recruited him to "try and ransom some companies."
Information security
fromWIRED
4 days ago

The Government Shutdown Is a Ticking Cybersecurity Time Bomb

implemented additional monitoring and new security controls to further protect the agency's systems
Information security
fromAbove the Law
4 days ago

Trump Cybersecurity Policy Is Indistinguishable From A Foreign Attack - Above the Law

Last year almost a dozen major U.S. ISPs were the victim of a massive, historic intrusion by Chinese hackers who managed to spy on public U.S. officials for more than a year. The "Salt Typhoon" hack was so severe, the intruders spent much of the last year rooting around the ISP networks even after discovery. AT&T and Verizon, two of the compromised companies, apparently didn't think it was worth informing subscribers any of this happened.
Information security
fromLos Angeles Times
4 days ago

A shadowy L.A. crime ring is hijacking the IDs of foreign scholars, fraud expert says

Using apartments in the San Fernando Valley and Glendale area, a shadowy group of identity thieves has been quietly exploiting a new kind of victim - foreign scholars who left the U.S. years ago but whose Social Security numbers still linger in American databases, according to a cybercrime expert. Criminals are resurrecting these dormant identities and submitting hundreds of applications for bank accounts and credit cards, says David Maimon, head of fraud insights at SentiLink and a criminology professor at Georgia State University.
Information security
Information security
fromSecuritymagazine
5 days ago

Panelists Return to SECURITY 500 to Discuss Navigating Tough Decisions

Security leaders will confront high-stakes ethical dilemmas through an interactive "Would You Rather" panel at the 2025 SECURITY 500 Conference in Washington, D.C.
Information security
fromInfoWorld
5 days ago

We can't ignore cloud governance anymore

Effective cloud governance with top-down commitment transforms risks into opportunities, enabling innovation, accountability, and reduced outages, inefficiencies, and non-compliance.
Information security
fromInfoWorld
5 days ago

RCE in React Native CLI opens Dev Servers to attacks

The Metro development server exposes an unsafe /open-url endpoint and defaults to listening on 0.0.0.0, allowing remote command execution unless patched.
fromArs Technica
5 days ago

Wipers from Russia's most cut-throat hackers rain destruction on Ukraine

In April, the group targeted a Ukrainian university with two wipers, a form of malware that aims to permanently destroy sensitive data and often the infrastructure storing it. One wiper, tracked under the name Sting, targeted fleets of Windows computers by scheduling a task named DavaniGulyashaSdeshka, a phrase derived from Russian slang that loosely translates to "eat some goulash," researchers from ESET said. The other wiper is tracked as Zerlot.
Information security
Information security
fromZDNET
5 days ago

Google spots malware in the wild that morphs mid-attack, thanks to AI

AI-powered large language models are being used in active cyberattacks to create adaptive malware that dynamically rewrites code, steals credentials, and evades detection.
Information security
fromTheregister
5 days ago

What are the most common passwords? No surprises here

Predictable numeric and keyboard-sequence passwords remain extremely common, making accounts highly vulnerable to modern cracking tools and brute-force attacks.
fromTheregister
5 days ago

SonicWall blames state-backed crew for September breach

SonicWall has blamed an unnamed, state-sponsored collective for the September break-in that saw cybercriminals rifle through a cache of firewall configuration backups. The network security vendor said it spotted "suspicious activity" in early September involving the unauthorized downloading of backup firewall configuration files from "a specific cloud environment." The company initially said that "fewer than 5 percent" of its firewall installed base had files accessed,
Information security
Information security
fromIT Pro
5 days ago

M&S reveals massive financial hit from cyber attack

A cyber attack drove Marks & Spencer's H1 2025 statutory profit down 99%, generating roughly £102m of one-off costs despite a £100m insurance payout.
fromSecuritymagazine
6 days ago

The Silent Insider Threat: When Employees Undermine Cybersecurity Messaging

Cybersecurity is as much about communication as it is about code. When leadership sends mixed signals - one message in a company memo, another in marketing materials - the inconsistency confuses employees and customers alike. A StratusPoint IT report found that 74% of data breaches involved a human element, including social engineering and error. These incidents often begin with misunderstanding rather than malice.
Information security
fromThe Hacker News
5 days ago

Bitdefender Named a Representative Vendor in the 2025 Gartner Market Guide for Managed Detection and Response

Bitdefender has once again been recognized as a Representative Vendor in the Gartner® Market Guide for Managed Detection and Response (MDR) - marking the fourth consecutive year of inclusion. According to Gartner, more than 600 providers globally claim to deliver MDR services, yet only a select few meet the criteria to appear in the Market Guide. While inclusion is not a ranking or comparative assessment, we believe it underscores Bitdefender's human-driven approach to MDR and our continued alignment with Gartner's rigorous inclusion standards.
Information security
[ Load more ]