Information security

[ follow ]
Information security
fromTechRepublic
1 hour ago

Google Issues High-Risk Security Patch for 3.5 Billion Chrome Users

Google has released a security update for Chrome addressing eight high-risk vulnerabilities affecting its 3.5 billion users.
#phishing
Information security
fromTechRepublic
19 hours ago

Microsoft 365 Under Siege: Phishing Campaign Bypasses MFA Across 5 Countries

A sophisticated phishing campaign exploiting Microsoft 365 accounts has affected over 340 organizations across five countries using a legitimate OAuth feature.
Information security
fromThe Hacker News
1 hour ago

AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion

Threat actors are using AitM phishing to compromise TikTok for Business accounts, targeting business accounts for malvertising and malware distribution.
Information security
fromTechRepublic
19 hours ago

Microsoft 365 Under Siege: Phishing Campaign Bypasses MFA Across 5 Countries

A sophisticated phishing campaign exploiting Microsoft 365 accounts has affected over 340 organizations across five countries using a legitimate OAuth feature.
Information security
fromThe Hacker News
2 days ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
#ai
fromZDNET
2 days ago
Information security

How Claude Code's new auto mode prevents AI coding disasters - without slowing you down

Information security
fromNextgov.com
19 hours ago

ODNI is building a framework to boost spy agencies' AI adoption

The Office of the Director of National Intelligence is enhancing AI adoption for cybersecurity within the intelligence community as part of a modernization effort.
Information security
fromTechzine Global
2 days ago

Fujitsu brings AI and social issues together

Fujitsu leverages AI to address social issues in healthcare, marine ecosystems, and cybersecurity through data-driven decision-making and digital twin technology.
Information security
fromZDNET
2 days ago

How Claude Code's new auto mode prevents AI coding disasters - without slowing you down

Claude's auto mode enhances safety by reducing permission prompts while maintaining control over risky commands.
#cybersecurity
Information security
fromTechzine Global
5 hours ago

Iran lashes out on the digital front as attacks go global

Cyber activity linked to the Iran conflict has escalated, with significant wiper attacks, phishing campaigns, and hacktivist activity emerging from outside Iran.
Information security
fromSecurityWeek
3 hours ago

RSAC 2026 Conference Announcements Summary (Days 3-4)

Accenture and Anthropic launched Cyber.AI to automate security workflows using AI, while Akamai and Bolster AI introduced solutions to combat brand impersonation and phishing.
Information security
fromThe Hacker News
5 hours ago

LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks

Three vulnerabilities in LangChain and LangGraph could expose sensitive enterprise data, including filesystem files, environment secrets, and conversation history.
Information security
fromSecuritymagazine
14 hours ago

How to Grow Your Cybersecurity Skills, According to Experts

Cybersecurity leaders are innovating and evolving their careers through education, soft skills, networking, and unique paths for professional growth.
Information security
fromTechzine Global
5 hours ago

Iran lashes out on the digital front as attacks go global

Cyber activity linked to the Iran conflict has escalated, with significant wiper attacks, phishing campaigns, and hacktivist activity emerging from outside Iran.
Information security
fromTheregister
7 hours ago

Security boffins harvest bumper crop of API keys from web

Almost 2,000 API credentials were found exposed on 10,000 webpages, posing significant security risks to organizations and critical infrastructure.
Information security
fromSecurityWeek
5 hours ago

CISA Flags Critical PTC Vulnerability That Had German Police Mobilized

CISA warns of a critical vulnerability in PTC's Windchill software, with potential for exploitation despite no current evidence of attacks.
#tp-link
Information security
fromTechRepublic
23 hours ago

TP-Link Fixes Bug That Lets Hackers Take Over Routers Without a Password

TP-Link patched critical vulnerabilities in Archer NX routers that allowed unauthorized firmware installation and network manipulation.
Information security
fromTechRepublic
23 hours ago

TP-Link Fixes Bug That Lets Hackers Take Over Routers Without a Password

TP-Link patched critical vulnerabilities in Archer NX routers that allowed unauthorized firmware installation and network manipulation.
fromSecurityWeek
3 hours ago

Coruna iOS Exploit Kit Likely an Update to Operation Triangulation

These findings led us to conclude that this exploit kit was not patchworked but rather designed with a unified approach. We assume that it's an updated version of the same exploitation framework that was used - at least to some extent - in Operation Triangulation.
Information security
Information security
fromThe Hacker News
1 day ago

ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories

A sophisticated malware campaign targets Web3 support teams using deceptive links to deliver malicious executables and establish persistent communication with threat actors.
#ai-security
Information security
fromTechRepublic
23 hours ago

The Next Billion Users Won't Be Human: Securing the Agentic Enterprise

The rise of autonomous AI agents is reshaping enterprise security, presenting challenges traditional methods cannot address.
Information security
fromFast Company
2 days ago

This Microsoft security team stress-tests AI for its worst-case scenarios

AI products face probing for weaknesses, leading to risks like mental illness, cybercrime, and evolving bypass techniques.
Information security
fromComputerworld
1 day ago

What IT leaders need to know about AI-fueled death fraud

AI-generated fake death certificates pose significant risks for businesses by enabling fraudsters to exploit customer accounts and data.
Information security
fromSecurityWeek
1 day ago

BIND Updates Patch High-Severity Vulnerabilities

ISC released BIND 9 updates to fix four vulnerabilities, including two high-severity bugs that can lead to memory leaks and high CPU consumption.
#post-quantum-cryptography
Information security
fromComputerWeekly.com
1 day ago

Google targets 2029 for post-quantum cyber readiness | Computer Weekly

Google plans to migrate to post-quantum cryptography by 2029, accelerating its timeline due to advancements in quantum technology and emerging security threats.
Information security
fromComputerWeekly.com
1 day ago

Google targets 2029 for post-quantum cyber readiness | Computer Weekly

Google plans to migrate to post-quantum cryptography by 2029, accelerating its timeline due to advancements in quantum technology and emerging security threats.
Information security
fromSecurityWeek
1 day ago

Cisco Patches Multiple Vulnerabilities in IOS Software

Cisco released patches for high- and medium-severity vulnerabilities in IOS and IOS XE, primarily to prevent denial-of-service conditions.
fromComputerworld
21 hours ago

Enterprise laptops adopt Intel's new Core Ultra Series 3 chips

Users of systems running on the new chips will see over 30% faster performance, up to 80% better graphics, and up to 4x AI performance compared to four-year-old systems.
Information security
Information security
fromThe Hacker News
1 day ago

Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks

Coruna exploit kit is an evolved version of the Operation Triangulation exploit, targeting iOS devices with multiple vulnerabilities.
fromInfoWorld
1 day ago

Databricks pitches Lakewatch as a cheaper SIEM - but is it really?

"This is more likely to complement existing SIEMs than replace them. Early adoption will come from large enterprises already committed to Databricks, especially those seeking flexibility or cost control."
Information security
Information security
fromTNW | Offers
2 days ago

Team password manager costs $1.50 & just added the features businesses actually need

Stolen credentials are a major security risk; using a password manager like Passpack can mitigate this threat effectively.
Information security
fromInfoWorld
2 days ago

PyPI warns developers after LiteLLM malware found stealing cloud and CI/CD credentials

Compromised LiteLLM packages executed a three-stage payload targeting sensitive data in cloud environments before being removed from PyPI.
Information security
fromTechRepublic
2 days ago

Nearly 7M Email Addresses Exposed in Crunchyroll Third-Party Breach

Crunchyroll was breached through a third-party vendor, compromising user data and internal systems via a support agent's account.
Information security
fromComputerWeekly.com
1 day ago

Platformisation or platform theatre? Navigating cyber consolidation | Computer Weekly

Consolidation in enterprise security is necessary but can introduce risks like single points of failure and integration issues.
Information security
fromTheregister
1 day ago

Scammers have virtual smartphones on speed dial for fraud

Cloud phones are increasingly exploited by cybercriminals for authorized push payment fraud due to their legitimate appearance and ease of use.
Information security
fromSecurityWeek
2 days ago

From Trivy to Broad OSS Compromise: TeamPCP Hits Docker Hub, VS Code, PyPI

TeamPCP hacking group expanded its attacks to multiple platforms, exploiting vulnerabilities and compromising credentials for malicious purposes.
Information security
fromTechRepublic
1 day ago

Inside RSA 2026: Security Leaders Grapple With AI's Growing Role and Risks

The RSA Conference 2026 emphasizes the rise of AI in cybersecurity and the critical need for governance and trust in AI systems.
#ransomware
Information security
fromThe Hacker News
2 days ago

Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks

A Russian national was sentenced to two years for managing a botnet used in ransomware attacks against U.S. companies.
Information security
fromSecuritymagazine
3 days ago

Security Leaders Share Thoughts on Foster City Cyberattack

Foster City declared a state of emergency due to a ransomware attack, highlighting vulnerabilities in municipal IT infrastructure and the need for better funding and security.
Information security
fromThe Hacker News
2 days ago

Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks

A Russian national was sentenced to two years for managing a botnet used in ransomware attacks against U.S. companies.
Information security
fromSecuritymagazine
3 days ago

Security Leaders Share Thoughts on Foster City Cyberattack

Foster City declared a state of emergency due to a ransomware attack, highlighting vulnerabilities in municipal IT infrastructure and the need for better funding and security.
#cybercrime
Information security
fromNextgov.com
1 day ago

European officials highlight private sector help in major cybercrime takedowns

Private sector partners play a crucial role in cybercrime takedowns, aiding law enforcement in disrupting criminal activities and infrastructure.
Information security
fromNextgov.com
1 day ago

European officials highlight private sector help in major cybercrime takedowns

Private sector partners play a crucial role in cybercrime takedowns, aiding law enforcement in disrupting criminal activities and infrastructure.
Information security
fromNextgov.com
2 days ago

New NSA director pushes for more intel-sharing with allies in internal meeting

Gen. Josh Rudd emphasizes enhanced intelligence-sharing with allies and a focus on foreign adversaries like Russia and China.
#ai-agents
fromThe Hacker News
3 days ago
Information security

5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents

Gartner's Market Guide for Guardian Agents highlights the rapid adoption of AI agents and the associated governance risks.
Information security
fromZDNET
3 days ago

1 in 2 security leaders say they're not ready for AI attacks - 4 actions to take now

AI-powered cybercrime is a significant and growing threat to businesses, with many feeling unprotected.
#citrix
Information security
fromSecurityWeek
3 days ago

Critical Citrix NetScaler Vulnerability Poised for Exploitation, Security Firms Warn

Citrix released critical patches for vulnerabilities in NetScaler ADC and Gateway, addressing memory leaks and session mixup issues.
Information security
fromThe Hacker News
3 days ago

Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks

Citrix released security updates for critical vulnerabilities in NetScaler ADC and Gateway that could leak sensitive data.
Information security
fromSecurityWeek
3 days ago

Critical Citrix NetScaler Vulnerability Poised for Exploitation, Security Firms Warn

Citrix released critical patches for vulnerabilities in NetScaler ADC and Gateway, addressing memory leaks and session mixup issues.
Information security
fromThe Hacker News
3 days ago

Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks

Citrix released security updates for critical vulnerabilities in NetScaler ADC and Gateway that could leak sensitive data.
Information security
fromThe Hacker News
2 days ago

Tax Search Ads Deliver ScreenConnect Malware Using Huawei Driver to Disable EDR

A malvertising campaign targets U.S. individuals searching for tax documents, delivering rogue installers that blind security programs using BYOVD techniques.
Information security
fromComputerWeekly.com
2 days ago

Cyber pros must grasp the vibe coding nettle, says NCSC chief | Computer Weekly

Cyber security professionals must develop safeguards for AI-enhanced software generation to prevent vulnerabilities and cyber attacks.
Information security
fromTechRepublic
2 days ago

New 'DarkSword' Leak Puts Millions of iPhones at Risk After Initial Attack

The leaked DarkSword exploit kit poses a significant threat to outdated iPhones, making attacks easier for less experienced hackers.
#ai-safety
Information security
fromTechCrunch
2 days ago

OpenAI adds open source tools to help developers build for teen safety | TechCrunch

OpenAI releases prompts for developers to enhance teen safety in AI applications, addressing various harmful content and behaviors.
Information security
fromTechCrunch
2 days ago

OpenAI adds open source tools to help developers build for teen safety | TechCrunch

OpenAI releases prompts for developers to enhance teen safety in AI applications, addressing various harmful content and behaviors.
Information security
fromTechzine Global
3 days ago

HPE embeds security in network further with SRX400 and AI governance

HPE aims to deeply integrate security into networks with the new SRX400 Series Firewalls and updates to enhance cyber resilience.
#cyberattack
Information security
fromSecurityWeek
3 days ago

Stryker Says Malicious File Found During Probe Into Iran-Linked Attack

Stryker identified a malicious file used in a cyberattack by the Iran-linked group Handala, disrupting operations but finding no evidence of malware or ransomware.
Information security
fromSecurityWeek
3 days ago

Stryker Says Malicious File Found During Probe Into Iran-Linked Attack

Stryker identified a malicious file used in a cyberattack by the Iran-linked group Handala, disrupting operations but finding no evidence of malware or ransomware.
Information security
fromTechzine Global
3 days ago

Palo Alto Networks launches Prisma Browser for Business

Palo Alto Networks launches Prisma Browser for Business, a secure browser designed for SMBs to protect against cyber threats and enhance productivity.
fromSecurityWeek
3 days ago

Chrome 146 Update Patches High-Severity Vulnerabilities

The first vulnerability, CVE-2026-4673, is a heap buffer overflow issue in WebAudio that earned the reporting researcher a $7,000 bug bounty reward. Google has yet to determine the bounty amount for CVE-2026-4677, another bug reported by the same researcher.
Information security
fromArs Technica
3 days ago

Self-propagating malware poisons open source software and wipes Iran-based machines

CanisterWorm, as Aikido has named the malware, targets organizations' CI/CD pipelines used for rapid development and deployment of software. Every developer or CI pipeline that installs this package and has an npm token accessible becomes an unwitting propagation vector.
Information security
Information security
fromTechzine Global
2 days ago

Databricks launches Lakewatch: agentic SIEM on the Lakehouse

Lakewatch is an open SIEM platform that consolidates security, IT, and business data, enabling rapid threat detection and response using AI agents.
[ Load more ]