Information security

[ follow ]
Information security
fromThe Hacker News
46 minutes ago

Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence

Iranian APT Infy (Prince of Persia) remains active and is conducting widespread campaigns using updated Foudre and Tonnerre malware with DGA-based C2.
Information security
fromWIRED
18 hours ago

Hackers Stole Millions of PornHub Users' Data for Extortion

US border and law-enforcement agencies are expanding surveillance capabilities while AI tools enable sophisticated scams and a major breach exposed PornHub user data.
fromTech Times
22 hours ago

Remote Work Security Solutions: Behavioral Access Control Enhances Workforce Protection

Traditional password-based protection is no longer sufficient, prompting organizations to adopt behavioral access control systems that continuously analyze user actions for anomalies. These platforms monitor keystrokes, mouse activity, application usage, and network patterns to detect suspicious behavior in real time. By combining machine learning, biometric verification, and zero-trust principles, companies enhance workforce protection while minimizing the risk of account compromise.
Information security
Information security
fromWIRED
19 hours ago

7 Useful Tips for Anyone Connecting to Public Wi-Fi

Maximize public Wi‑Fi performance and safety by minimizing background processes, positioning near routers, preferring wired connections, and using protections like a VPN.
#hpe-oneview
fromwww.theregister.com
2 days ago
Information security

HPE OneView RCE bug scores a perfect 10

A critical unauthenticated remote code execution vulnerability (CVE-2025-37164) in HPE OneView allows attackers centralized control; customers must upgrade or apply hotfix immediately.
fromThe Hacker News
2 days ago
Information security

HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution

HPE OneView contains a maximum-severity RCE vulnerability (CVE-2025-37164) fixed in version 11.00; hotfixes are available for earlier releases.
Information security
fromInfoWorld
2 days ago

React2Shell is the Log4j moment for front end development

A Flight protocol validation failure in React Server Components and Next.js (React2Shell, CVE-2025-55182) enables unauthenticated remote code execution and rapid ransomware deployment.
fromTechzine Global
1 day ago

HPE OneView requires patch for vulnerability with highest CVE score

Hewlett Packard Enterprise has fixed a critical vulnerability in OneView Software that allows remote code execution. The bug received the maximum CVSS score of 10.0 and has now been fixed in version 11.00. HPE announced in a security advisory that the vulnerability, numbered CVE-2025-37164, is extremely dangerous. An unauthenticated attacker could remotely execute code by exploiting this flaw. OneView is an IT infrastructure management solution that controls all systems within organizations from a single central dashboard.
Information security
#watchguard
Information security
fromThe Hacker News
1 day ago

Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers

UNK_AcademicFlare used device-code phishing to steal Microsoft 365 credentials and conduct account takeovers targeting government, think tanks, higher education, and transportation since September 2025.
#cve-2025-20393
fromTechCrunch
1 day ago
Information security

Hundreds of Cisco customers are vulnerable to new Chinese hacking campaign, researchers say | TechCrunch

fromTechCrunch
1 day ago
Information security

Hundreds of Cisco customers are vulnerable to new Chinese hacking campaign, researchers say | TechCrunch

Information security
fromTechCrunch
1 day ago

Hacks, thefts and disruption: The worst data breaches of 2025 | TechCrunch

2025 featured unprecedented cyberattacks: massive U.S. government data exfiltration by DOGE, state-sponsored intrusions, and widespread ransomware extortion against corporations.
fromThe Hacker News
1 day ago

New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards

UEFI and IOMMU are designed to enforce a security foundation and prevent peripherals from performing unauthorized memory accesses, effectively ensuring that DMA-capable devices can manipulate or inspect system memory before the operating system is loaded. The vulnerability, discovered by Nick Peterson and Mohamed Al-Sharifi of Riot Games in certain UEFI implementations, has to do with a discrepancy in the DMA protection status. While the firmware indicates that DMA protection is active, it fails to configure and enable the IOMMU during the critical boot phase.
Information security
fromNextgov.com
1 day ago

The cyberwarfare landscape is changing - here's how to prepare

Even incidents like the Colonial Pipeline ransomware attack, which showed us how the cyber world and our physical lives intersect, stopped far short of societal disruption. However, the threat of cyberwar has been building, influenced by advancements in AI and increased presence of actors in U.S. systems and telecommunication networks. A military conflict could escalate these attacks to scale, crippling critical infrastructure and public safety systems like power grids, transportation networks and emergency response, even disrupting military communications and undermining response.
Information security
Information security
fromThe Hacker News
1 day ago

Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks

Nigerian authorities arrested the alleged RaccoonO365 developer after collaboration with Microsoft and the FBI for credential-harvesting phishing operations.
#msmq
fromThe Hacker News
1 day ago

Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware

The campaign "uses CountLoader as the initial tool in a multistage attack for access, evasion, and delivery of additional malware families," Cyderes Howler Cell Threat Intelligence team said in an analysis. CountLoader was previously documented by both Fortinet and Silent Push, detailing the loader's ability to push payloads like Cobalt Strike, AdaptixC2, PureHVNC RAT, Amatera Stealer, and PureMiner. The loader has been detected in the wild since at least June 2025.
Information security
Information security
fromArs Technica
1 day ago

Riot Games is making an anti-cheat change that could be rough on older PCs

Vanguard may block high-rank players until motherboard BIOS updates are installed to mitigate a chipset firmware vulnerability affecting multiple Intel and AMD motherboard families.
Information security
fromHarvard Business Review
1 day ago

6 Cybersecurity Predictions for the AI Economy in 2026 - SPONSOR CONTENT FROM PALO ALTO NETWORKS

Autonomous AI agents will drive an AI-native economy, requiring proactive security and trustworthy data and identity to manage new insider and quantum risks.
fromAzure DevOps Blog
1 day ago

Work item linking for Advanced Security alerts now available - Azure DevOps Blog

Security vulnerabilities don't fix themselves. Someone needs to track them, prioritize them, and actually ship the fix. If you've ever tried to manage security alerts alongside your regular sprint work, though, you know the friction: you're looking at an alert in one tab, switching to your backlog in another, trying to remember which vulnerability you were supposed to file a bug for.
Information security
fromwww.theguardian.com
1 day ago

The Com: the growing cybercrime network behind recent Pornhub hack

Ransomware hacks, data theft, crypto scams and sextortion cover a broad range of cybercrimes carried out by an equally varied list of assailants. But there is also an English-speaking criminal ecosystem carrying out these activities that defies conventional categorisation. Nonetheless, it does have a name: the Com. Short for community, the Com is a loose affiliation of cyber-criminals, largely native English language speakers typically aged from 16 to 25.
Information security
fromTheregister
2 days ago

Ten mistakes marred firewall upgrade at Australian telco

Technicians working on a firewall upgrade made at least ten mistakes, contributing to two deaths, according to a report on a September incident that saw Australian telco Optus unable to route calls to emergency services. As The Register reported at the time, Australia's equivalent of the USA's 911 and the UK's 999 and 112 emergency contact number is 000 - Triple Zero - and local law requires all telcos to route emergency calls to that number.
Information security
#holiday-scams
#bot-detection
Information security
fromwww.housingwire.com
1 day ago

AI-driven wire fraud schemes reshape real estate security in 2025

Criminals increasingly combine AI-driven deepfakes, improved timing, contextual realism, and human patience to execute sophisticated wire fraud against title transactions.
Information security
fromFortune
1 day ago

An AT&T exec manifested his C-suite position when he was earning his MBA: 'I literally came up with a plan to become a CISO' | Fortune

Execute a deliberate career plan, develop technical and leadership experience, and demonstrate cybersecurity's value to earn CISO roles across organizations.
Information security
fromBusiness Matters
3 days ago

Choosing Security Providers: A Strategic Guide for Businesses

Choose security partners with full SIA compliance, comprehensive insurance, experienced personnel, advanced technology, and proven operational standards to ensure effective protection.
fromTheregister
2 days ago

China turns on a vast and very rapid experimental network

As reported in Chinese state media, tests of the network saw it shift 72 terabytes of data in 1.6 hours, across a distance of around 1,000 km between a radio telescope in Guizhou province and a university in Hubei. We think that's almost 100 Gbit/s, an impressive feat for a sustained long-distance data transfer even if it took place in a controlled environment.
Information security
Information security
fromThe Verge
1 day ago

Google sues web scraper for sucking up search results 'at an astonishing scale'

SerpApi circumvents Google's SearchGuard by masking hundreds of millions of automated queries to appear as human users, thereby violating federal law.
fromwww.mercurynews.com
1 day ago

Help! My two-factor authentication on Amazon stopped working

I've been an Amazon customer for 20 years, but after changing my phone number, I'm locked out of my account because two-factor authentication (2FA) still uses my old number. I've called Amazon six times, sent photos of my driver's license three times, and even emailed executives using your contacts but no one has fixed it. Amazon updated the phone number on my account, but 2FA remains broken.
Information security
Information security
fromComputerWeekly.com
2 days ago

Fortinet vulnerabilities prompt pre-holiday warnings | Computer Weekly

Two Fortinet SAML vulnerabilities allow bypassing FortiCloud SSO, enabling admin access and potential credential exposure across multiple Fortinet products; patches and mitigations available.
Information security
fromThe Hacker News
2 days ago

ThreatsDay Bulletin: WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories

Attackers increasingly repurpose existing tools and exploit exposed AI servers, leaked tokens, and social-engineering SMS scams, accelerating the cyber threat landscape.
#cisco-asyncos
fromThe Hacker News
3 days ago
Information security

Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances

A critical AsyncOS zero-day (CVE-2025-20393) enables remote root command execution when Spam Quarantine is internet-exposed, actively exploited by China-linked APT UAT-9686.
fromTechCrunch
3 days ago
Information security

Cisco says Chinese hackers are exploiting its customers with a new zero-day | TechCrunch

Critical Cisco AsyncOS vulnerability enables full takeover of exposed devices; no patches exist and wiping/rebuilding software is the only current mitigation.
fromTechCrunch
3 days ago
Information security

Cisco says Chinese hackers are exploiting its customers with a new zero-day | TechCrunch

#react2shell
fromTheregister
2 days ago
Information security

React2Shell: Microsoft counts hundreds of hacked machines

Attackers exploited React2Shell (CVE-2025-55182) to compromise several hundred servers, execute arbitrary code, deploy malware, and in some cases deliver ransomware.
fromThe Hacker News
4 days ago
Information security

React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors

React2Shell is exploited to deploy stealthy remote-access malware such as KSwapDoor and ZnDoor, enabling encrypted mesh communications, command execution, and file operations.
fromTheregister
2 days ago

Another bad week for SonicWall as SMA 1000 0-day exploited

SonicWall's official notice, published this week, says users should update to the latest hotfix versions immediately and restrict access to the Appliance Management Console to trusted networks. The vendor's PSIRT team says the issue affects only SMA 1000 appliances and does not impact other SonicWall firewall products or SSL VPN functions, but the fact that attackers have already begun exploiting the flaw underscores how exposed remote-access infrastructure remains.
Information security
fromThe Hacker News
3 days ago

CISA Flags Critical ASUS Live Update Flaw After Evidence of Active Exploitation

The vulnerability, tracked as CVE-2025-59374 (CVSS score: 9.3), has been described as an "embedded malicious code vulnerability" introduced by means of a supply chain compromise that could allow attackers to perform unintended actions. "Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise," according to a description of the flaw published in CVE.org. "The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met these conditions and installed the compromised versions were affected."
Information security
Information security
fromThe Hacker News
2 days ago

China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware

LongNosedGoblin uses Group Policy and cloud services for C2 to deploy custom C# malware, conducting cyber espionage against Southeast Asian and Japanese government entities.
Information security
fromThe Hacker News
2 days ago

North Korea-Linked Hackers Steal $2.02 Billion in 2025, Leading Global Crypto Theft

North Korean-linked threat actors stole at least $2.02 billion in cryptocurrency in 2025, driving a global surge and accounting for a record share of service compromises.
Information security
fromThe Hacker News
2 days ago

Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App

Kimsuky distributes a DocSwap Android RAT via QR-code phishing pages impersonating CJ Logistics, using deceptive prompts and embedded encrypted APKs.
Information security
fromComputerWeekly.com
2 days ago

Passwords to prompts: Identity and AI redefined cyber in 2025 | Computer Weekly

AI agents became the largest unmonitored attack surface, identity threats shifted to synthetic impersonation, and nation-states targeted AI models and training data.
Information security
fromTheregister
2 days ago

Your car's web browser may be on the road to cyber ruin

Embedded browsers in devices such as smart TVs, e-readers, and cars are often years out of date and expose users to known security vulnerabilities.
fromTheregister
2 days ago

Crypto crooks co-opt stolen AWS creds to mine coins

Your AWS account could be quietly running someone else's cryptominer. Cryptocurrency thieves are using stolen Amazon account credentials to mine for coins at the expense of AWS customers, abusing their Elastic Container Service (ECS) and their Elastic Compute Cloud (EC2) resources, in an ongoing operation that started on November 2. The illicit cryptocurrency-mining campaign abuses compromised valid AWS Identity and Access Management (IAM) credentials with "admin-like privileges" - it doesn't exploit a vulnerability -
Information security
fromTechCrunch
2 days ago

Tech provider for NHS England confirms data breach | TechCrunch

DXS International, a U.K.-based company that provides healthcare tech for England's National Health Service (NHS), disclosed a cyberattack in a statement on Thursday. In a filing with the London Stock Exchange, the company said it experienced a "a security incident affecting its office servers," discovered on December 14. The company said it "immediately" contained the breach working together with the NHS, and hired a cybersecurity firm to investigate "the nature and extent of the incident."
Information security
Information security
fromwww.aljazeera.com
3 days ago

New Somalia e-visa security flaw puts personal data of thousands at risk

Somalia's e-visa website is insecure, allowing mass downloads of e-visas that expose passport numbers, full names, and dates of birth.
Information security
fromTheregister
2 days ago

NHS tech supplier probes cyberattack on internal systems

DXS International experienced a contained cyberattack on office servers with minimal product impact while forensic and regulatory investigations proceed.
Information security
fromSecuritymagazine
3 days ago

630M Passwords Stolen, FBI Reveals: What This Says About Credential Value

A seized dataset of 630 million stolen credentials added to Have I Been Pwned included 46 million previously unseen vulnerable passwords, highlighting persistent credential risk.
fromThe Verge
2 days ago

Riot Games found a motherboard security flaw that helps PC cheaters

"had this issue gone unnoticed, it would have completely nullified all existing DMA detection and prevention tech currently on the market - including that of other gaming companies - due to the nature of this class of cheats running in a privileged area that anti-cheats typically do not run."
Information security
fromComputerworld
2 days ago

WhatsApp accounts targeted in 'GhostPairing' attack

A warning for WhatsApp users: cybercriminals have discovered an alarmingly simple way to access a user's conversations in real time by manipulating the app's device pairing or linking routine.
Information security
fromZDNET
2 days ago

The internet in 2025: Bigger, more fragile than ever - and 'fundamentally rewired' by AI

According to Cloudflare, the internet's second-largest content delivery network (CDN), global internet traffic grew nearly 20% in 2025. You and I watching more YouTube videos is not what's driving that growth. Much of this rise comes from bots, AI crawlers, and automated attacks rather than human users. At the same time, satellite connectivity, post-quantum encryption, and mobile-heavy use have reshaped how and where people access the internet.
Information security
#north-korea
fromFortune
2 days ago
Information security

North Korea stole a record amount of crypto-again: report estimates its hackers' 2025 haul at $2 billion | Fortune

fromFortune
3 days ago
Information security

How Amazon's CSO defends against efforts by North Korean IT workers to infiltrate his company | Fortune

fromFortune
2 days ago
Information security

North Korea stole a record amount of crypto-again: report estimates its hackers' 2025 haul at $2 billion | Fortune

fromFortune
3 days ago
Information security

How Amazon's CSO defends against efforts by North Korean IT workers to infiltrate his company | Fortune

Information security
fromZDNET
2 days ago

Did maintainers abandon your critical open-source tool? This rescue plan offers a lifeline

EmeritOSS provides stability-focused maintenance and security patches for mature, unmaintained open-source projects like Kaniko, Kubeapps, and Ingress-NGINX.
Information security
fromFast Company
2 days ago

Deepfakes are no longer just a disinformation problem. They are your next supply chain risk

Deepfakes have evolved into a systemic corporate threat capable of enabling enterprise-scale fraud, corrupting workflows, and undermining executive identity verification.
Information security
fromChannelPro
2 days ago

Platform consolidation is the solution for MSPs' growing pains

MSPs face expanding complexity and responsibilities while the MSP solutions market grows, creating opportunities alongside intensified pressure to scale and secure hybrid environments.
fromThe Hacker News
2 days ago

The Case for Dynamic AI-SaaS Security as Copilots Scale

The result is an explosion of AI capabilities across the SaaS stack, a phenomenon of AI sprawl where AI tools proliferate without centralized oversight. For security teams, this represents a shift. As these AI copilots scale up in use, they are changing how data moves through SaaS. An AI agent can connect multiple apps and automate tasks across them, effectively creating new integration pathways on the fly.
Information security
Information security
fromSecuritymagazine
3 days ago

No More Failures of Imagination: Future Proofing Airport Employee Screening

TSA requires larger airports to screen aviation workers and their belongings, prompting adoption of AI-enabled millimeter-wave screening to counter evolving insider and explosive threats.
Information security
fromWIRED
2 days ago

ICE Seeks Cyber Upgrade to Better Surveil and Investigate Its Employees

ICE is renewing a cybersecurity contract to expand monitoring, collection, and sharing of employee digital activity for security and internal investigations.
fromABC7 San Francisco
2 days ago

AI-powered 'cloned voice' scams on the rise, experts warn. Here's how to protect yourself

Cyber security experts are warning we should be on alert for AI scams -- and there's one circulating using the cloned voices of victims' loved ones. Here's how it works. Scammers gather voice samples from videos posted on social media, and in some cases even your own voicemail. They then use AI to replicate how that person sounds. Three seconds of audio is all it takes! Some victims report the voices are identical.
Information security
Information security
fromTechzine Global
2 days ago

Fortinet and Arista combine best-of-breed networking and security for AI data centers

Fortinet and Arista deliver a modular Secure AI Data Center combining Fortinet security and ASIC offload with Arista low-latency networking for scalable, best-of-breed AI infrastructure.
Information security
fromThe Hacker News
3 days ago

New ForumTroll Phishing Attacks Target Russian Scholars Using Fake eLibrary Emails

Operation ForumTroll-linked phishing targeted Russian academics using aged fake eLibrary domains to deliver LeetAgent and Dante spyware via one-time links and personalized ZIP files.
Information security
fromComputerWeekly.com
3 days ago

ClickFix attacks that bypass cyber controls on the rise | Computer Weekly

ClickFix attacks surged in 2025, tricking users into running commands that bypass conventional defenses and enable RATs, credential theft, and ransomware.
Information security
fromThe Hacker News
3 days ago

SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances

SonicWall SMA 100 series appliances contain a locally exploitable privilege escalation vulnerability (CVE-2025-40602) actively exploited; users must apply platform-hotfix updates immediately.
Information security
fromThe Hacker News
3 days ago

APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign

APT28 conducted a sustained credential-harvesting phishing campaign targeting UKR[.]net users to steal login credentials and two-factor authentication codes for GRU intelligence collection.
fromThe Hacker News
3 days ago

China-Linked Ink Dragon Hacks Governments Using ShadowPad and FINALDRAFT Malware

The threat actor known as Jewelbug has been increasingly focusing on government targets in Europe since July 2025, even as it continues to attack entities located in Southeast Asia and South America. Check Point Research is tracking the cluster under the name Ink Dragon. It's also referenced by the broader cybersecurity community under the names CL-STA-0049, Earth Alux, and REF7707. The China-aligned hacking group is assessed to be active since at least March 2023.
Information security
#browser-extensions
Information security
fromwww.standard.co.uk
3 days ago

London council hit by cyber attack says personal data copied and taken away'

Westminster City Council suffered a November 24 cyber attack that likely copied sensitive personal data from a shared IT system with Kensington and Chelsea Council.
Information security
fromThe Hacker News
3 days ago

Fix SOC Blind Spots: See Threats to Your Industry & Country in Real Time

Proactive, context-rich SOCs using threat intelligence and sector-specific visibility reduce alert fatigue, anticipate campaigns, and prevent incidents rather than merely responding.
fromZDNET
4 days ago

Is your smart home an easy target? 6 ways experts lock theirs down

Most of us have some internet of things (IoT) devices at home, whether it's a phone, a tablet, or a collection of security cameras and sensors. When you learn that 120,000 home security cameras were hacked in South Korea for sexploitation footage, it makes you think twice about adding such devices to your home, which is your most sacred space for privacy.
Information security
#data-breach
Information security
fromThe Hacker News
3 days ago

Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks

Kimwolf is a NDK-compiled DDoS botnet infecting at least 1.8 million Android-based TVs, set-top boxes, and tablets worldwide.
Information security
fromComputerWeekly.com
3 days ago

Security platform consolidation in 2026: The AI imperative | Computer Weekly

Organizations must consolidate cybersecurity platforms to survive AI-driven, adaptive attacks that operate in real time; fragmented tool stacks cannot respond fast enough.
Information security
fromTechzine Global
3 days ago

ARTPEC-9 and Axis Edge Vault: a unified hardware-rooted framework for cybersecure surveillance

ARTPEC-9 strengthens network camera security with hardware-backed features, deep device-level safeguards, and integration with Axis OS to enhance surveillance resilience and threat mitigation.
Information security
fromWIRED
3 days ago

Microsoft Will Finally Kill an Encryption Cipher That Enabled a Decade of Windows Hacks

Microsoft will disable default RC4 support in Windows domain controllers to remove an obsolete, vulnerable cipher long exploited by attackers.
Information security
fromLogRocket Blog
3 days ago

React2Shell exploit: What happened and lessons learned - LogRocket Blog

A deserialization flaw in React Server Components (React2Shell, CVE-2025-55182) enabled remote code execution with CVSS 10.0 and was rapidly exploited in the wild.
fromLondon Business News | Londonlovesbusiness.com
3 days ago

Top IT challenges businesses face (and how 24/7 support helps) - London Business News | Londonlovesbusiness.com

Technology plays an important role in how businesses operate, communicate, and deliver services. As systems become more advanced, many companies find themselves facing IT challenges that disrupt daily work, affect productivity, and impact customer experience. Believe it or not, these issues aren't limited to large organisations, as small and medium-sized businesses often feel the pressure even more, especially when IT responsibilities fall on already busy teams.
Information security
Information security
fromZDNET
3 days ago

PC experts warn against using your router's USB port - here's what to do instead

Router USB ports expose networks to security vulnerabilities through outdated protocols; avoid using them and choose safer central storage alternatives.
fromNextgov.com
3 days ago

CISA opens 100 applications for CyberCorps students

The Cybersecurity and Infrastructure Security Agency said it will make 100 internship opportunities available to students participating in a government scholarship program that's been hampered by federal hiring freezes enacted by the Trump administration. The move announced Wednesday would allow undergraduate and graduate students to enter the cyber defense agency under the CyberCorps: Scholarship for Service Program, a longstanding workforce pipeline used to place top student talent into U.S. cybersecurity positions.
Information security
fromFuturism
3 days ago

Hacker Busts Startup Running Huge Web of AI-Generated "Influencers" on Instagram

the entire backend used to manage its phone farm - so it provides an extraordinary glimpse at how the service is actually being used to manipulate social media at scale. Speaking to 404 on condition of anonymity, the hacker said they can "see the phones in use, which manager [computers controlling the phones] they had, which TikTok accounts they were assigned, proxies in use (and their passwords), and pending tasks. As well as the link to control devices for each manager."
Information security
Information security
fromZDNET
4 days ago

Need to encrypt Mac files? I found a free app that makes it super easy

Encrypto for macOS simplifies AES-256 file encryption, sharing, password hints, and cross-platform compatibility with Windows.
Information security
fromTechzine Global
3 days ago

Cisco Foundation AI takes on key role within Identity Intelligence

Cisco Identity Intelligence uses an internally developed Foundation-sec-1.1-8B-Instruct AI model to analyze identity behavior and detect complex, domain-specific threats.
fromTheregister
3 days ago

Nomad settles with the FTC over $186M cyberattack

Illusory Systems, which trades as Nomad, allegedly misled users about the security of its cryptocurrency bridge, which was compromised in 2022 in an attack that led to $186 million worth of funds being stolen. The FTC alleged that Nomad pushed an update in June 2022 containing "inadequately tested code" that, in turn, introduced a "significant vulnerability" that was exploited around a month later.
Information security
fromFast Company
3 days ago

How Cloudflare, 'the most important internet company you've never heard of,' took center stage

But for the better part of 2025, cofounder and CEO Matthew Prince has been trying to change that. The company's core business is to improve the performance and enhance the security of websites and online applications, protecting against malicious actors and routing web traffic through its data centers to optimize performance. "Six billion people pass through our network every single month," Prince says. If Cloudflare is doing its job well, no one notices.
Information security
Information security
fromEngadget
3 days ago

How a VPN works (and why you should care)

A VPN creates an encrypted tunnel to a remote server that masks device IP, protects privacy, and enables location-based access and secure remote networking.
Information security
fromThe Hacker News
4 days ago

Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure

GRU-linked APT44 ran a 2021–2025 campaign targeting Western critical infrastructure, exploiting misconfigured network edge devices and known software vulnerabilities.
Information security
fromTheregister
4 days ago

China's Ink Dragon hides out in European government networks

Ink Dragon expanded espionage into European government networks, using compromised servers as relay nodes, stealing credentials and updating backdoors to blend with Microsoft cloud activity.
Information security
fromThe Hacker News
4 days ago

Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data

A malicious NuGet package impersonating Tracer.Fody stole Stratis cryptocurrency wallet files and passwords, exfiltrating them to a Russian-hosted server.
fromThe Hacker News
4 days ago

Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass

Cybersecurity company Arctic Wolf said it observed active intrusions involving malicious single sign-on (SSO) logins on FortiGate appliances on December 12, 2025. The attacks exploit two critical authentication bypasses (CVE-2025-59718 and CVE-2025-59719, CVSS scores: 9.8). Patches for the flaws were released by Fortinet last week for FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager. "These vulnerabilities allow unauthenticated bypass of SSO login authentication via crafted SAML messages, if the FortiCloud SSO feature is enabled on affected devices," Arctic Wolf Labs said in a new bulletin.
Information security
Information security
fromThe Hacker News
4 days ago

Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign

Threat actors use compromised AWS IAM credentials and novel persistence methods to deploy widespread crypto-mining across ECS and EC2, evading detection and extending operations.
fromTheregister
5 days ago

SoundCloud bounces some VPNs as it cleans up cyberattack

"SoundCloud recently detected unauthorized activity in an ancillary service dashboard," opens a Monday post from the company. "Upon making this discovery, we immediately activated our incident response protocols and promptly contained the activity. We also engaged leading third-party cybersecurity experts to assist in a thorough investigation and response." Not long after SoundCloud and its hired help contained the incident, the site became the subject of multiple denial of service attacks.
Information security
[ Load more ]