Information security

[ follow ]
#post-quantum-cryptography
fromInfoQ
2 days ago
Information security

Standardizing Post-Quantum IPsec: Cloudflare Adopts Hybrid ML-KEM to Replace Ciphersuite Bloat

Information security
fromComputerWeekly.com
17 minutes ago

Trump looks to power up post-quantum, AI security | Computer Weekly

The Trump administration's cyber strategy prioritizes maintaining US technological superiority in post-quantum cryptography, artificial intelligence, and securing innovation against emerging threats.
Information security
fromInfoQ
2 days ago

Standardizing Post-Quantum IPsec: Cloudflare Adopts Hybrid ML-KEM to Replace Ciphersuite Bloat

Cloudflare implemented hybrid ML-KEM encryption in IPsec to meet NIST's 2030 quantum-resistant deadline without requiring hardware upgrades or complex configurations.
Information security
fromThe Hacker News
4 days ago

Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders

Attackers are collecting encrypted data today to decrypt later using quantum computers, requiring organizations to adopt quantum-resistant encryption now to protect long-term sensitive data.
Information security
fromZDNET
5 hours ago

Cybercriminals are using AI to attack the cloud faster - and third-party software is the weak link

AI accelerates vulnerability exploitation from weeks to days, forcing organizations to adopt AI-powered automated defenses against cloud attacks targeting weak third-party software.
#phishing-as-a-service
Information security
fromThe Hacker News
3 hours ago

Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware

Law enforcement and security companies dismantled Tycoon2FA and LeakBase, major infrastructure supporting phishing-as-a-service operations that compromised MFA credentials at scale.
Information security
fromThe Hacker News
3 hours ago

Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware

Law enforcement and security companies dismantled Tycoon2FA and LeakBase, major infrastructure supporting phishing-as-a-service operations that compromised MFA credentials at scale.
Information security
fromThe Hacker News
4 days ago

Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks

Law enforcement and security companies dismantled Tycoon 2FA, a major phishing-as-a-service toolkit that facilitated credential harvesting attacks affecting nearly 100,000 organizations globally.
Information security
fromZDNET
5 hours ago

Microsoft's Agent 365 helps you spot risky AI agents before they cause trouble - here's how

Machine identities are multiplying 82 times faster than human identities, creating insider threats that Microsoft addresses through Agent 365 and Microsoft 365 E7 for enterprise AI agent governance and security.
Information security
fromThe Hacker News
10 hours ago

Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure

Chinese threat actor CL-UNK-1068 conducted years-long cyber espionage campaign targeting high-value organizations across aviation, energy, government, law enforcement, pharmaceutical, technology, and telecommunications sectors in South, Southeast, and East Asia.
Information security
fromTheregister
5 hours ago

Russian crims phish way into Signal and WhatsApp accounts

Russian-linked hackers target Signal and WhatsApp accounts by tricking users into sharing security codes rather than breaking encryption, successfully compromising government officials, journalists, and military personnel globally.
Information security
fromTechzine Global
9 hours ago

OpenAI unveils Codex Security to detect vulnerabilities in AI code

OpenAI's Codex Security tool uses AI and agent-based analysis to detect code vulnerabilities with reduced false positives by understanding entire codebase context and prioritizing actual security risks.
Information security
fromThe Hacker News
2 hours ago

UNC4899 Used AirDrop File Transfer and Cloud Exploits to Steal Millions From Crypto Firm

North Korean threat actor UNC4899 compromised a cryptocurrency organization's cloud environment through social engineering and DevOps exploitation to steal millions in cryptocurrency.
Information security
fromThe Hacker News
7 hours ago

Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft

Two Chrome extensions were compromised through ownership transfers, enabling attackers to inject malware, execute arbitrary code, and steal user data from thousands of users.
Information security
fromTechzine Global
6 hours ago

Mass attack by Russian hackers on Dutch military personnel and civil servants

Russian hackers target Signal and WhatsApp accounts of Dutch government employees and military personnel by impersonating support chatbots to steal verification codes and exploit linked device features for remote account access.
Information security
fromSecurityWeek
5 hours ago

ClickFix Attack Uses Windows Terminal to Evade Detection

A new ClickFix attack variant bypasses Run dialog protections by instructing victims to use Windows Terminal for executing malicious PowerShell commands that lead to Lumma Stealer infections.
Information security
fromSecurityWeek
2 hours ago

Cybersecurity M&A Roundup: 42 Deals Announced in February 2026

Forty-two cybersecurity M&A deals were announced in February 2026, with major acquisitions focused on AI-driven security, attack surface management, and identity verification capabilities.
fromTheregister
2 hours ago

Crims hit EV charger firm ELECQ, steal customer contact data

In a notice sent to customers on Monday and seen by The Register, the EV charging outfit said that it detected "unusual activity" on its AWS cloud platform on March 7 and quickly discovered that attackers had launched a ransomware attack against parts of its infrastructure. According to the message, some databases were both encrypted and copied during the intrusion, meaning that the crooks likely walked off with user information before the company pulled the plug.
Information security
#malware-distribution
Information security
fromSecurityWeek
6 hours ago

Cloned AI Tool Sites Distribute Malware in 'InstallFix' Campaign

InstallFix campaign uses cloned webpages and malvertising to distribute information-stealing malware through fake installation pages for popular development tools.
Information security
fromSecurityWeek
6 hours ago

Cloned AI Tool Sites Distribute Malware in 'InstallFix' Campaign

InstallFix campaign uses cloned webpages and malvertising to distribute information-stealing malware through fake installation pages for popular development tools.
Information security
fromThe Cipher Brief
1 hour ago

The Drone War's Real Problem Isn't Technology - It's Speed

Defense acquisition reforms implement recommended changes but fail to address the fundamental cycle-time gap between rapidly evolving adversary capabilities and the military's ability to deploy countermeasures.
#ai-security
Information security
fromTechCrunch
29 minutes ago

OpenAI acquires Promptfoo to secure its AI agents | TechCrunch

OpenAI acquired Promptfoo, an AI security startup, to integrate its LLM vulnerability testing technology into OpenAI Frontier for enterprise AI agent security.
Information security
fromThe Hacker News
2 days ago

OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues

OpenAI launched Codex Security, an AI-powered security agent that identifies, validates, and fixes vulnerabilities in code, now available in research preview with free access for one month.
Information security
fromTheregister
16 hours ago

Iran is the first out-loud cyberwar the US has fought

Cyber operations have become a central component of US-Iran military conflict, marking a significant shift from their traditionally peripheral role in previous conflicts.
Information security
fromFortune
34 minutes ago

Iranian drone attacks on Amazon's Gulf data centers a harbinger of new tactics in future conflicts, experts say | Fortune

Iranian drone strikes on AWS data centers in the Middle East marked the first deliberate targeting of data centers in conflict, exposing the vulnerability of cloud infrastructure that supports both commercial services and U.S. military operations.
Information security
fromSPORTbible
6 hours ago

Dodgy Fire Stick users warned as eight areas in UK targeted in 'Operation Eider'

UK police launched a crackdown on illegal Fire Sticks across eight new areas, targeting modified devices used to stream premium sports content illegally.
Information security
fromTechzine Global
6 hours ago

Sovereign: the new normal for AI and cloud native (and how to make it work)

Sovereign cloud and AI deployments require organizations to maintain complete control over data location, infrastructure operations, and access, fundamentally changing Kubernetes operational requirements and threat models.
Information security
fromSecurityWeek
1 day ago

Recent Cisco Catalyst SD-WAN Vulnerability Now Widely Exploited

Cisco Catalyst SD-WAN vulnerability CVE-2026-20127, initially exploited as a zero-day, now sees widespread internet-wide exploitation by multiple threat actors across global regions.
Information security
fromBusiness Insider
9 hours ago

A $7.5 billion cop-tech darling runs headfirst into human consequences

A Flock Safety license plate reader misidentified a vehicle's plate, leading to a police dog attack and wrongful arrest that was later dismissed.
Information security
fromTheregister
1 day ago

Manage attack infrastructure? AI agents can now help

AI agents enable cybercriminals and nation-state hackers to automate reconnaissance, infrastructure management, and attack planning, significantly increasing the speed and scale of cyberattacks.
Information security
fromSecurityWeek
2 days ago

US Cyber Strategy Targets Adversaries, Critical Infrastructure, and Emerging Technologies

Trump administration releases comprehensive cyber strategy emphasizing government-private sector coordination, deterrence, regulatory reform, and investment in AI and quantum technologies to strengthen national cybersecurity.
Information security
fromThe Hacker News
2 days ago

Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model

Anthropic's Claude AI discovered 22 Firefox vulnerabilities including 14 high-severity issues, demonstrating AI's capability in security research while showing limitations in exploit development.
Information security
fromThe Verge
2 days ago

DJI will pay $30K to the man who accidentally hacked 7,000 Romo robovacs

DJI awarded $30,000 to a security researcher who discovered vulnerabilities in its robot network that exposed 7,000 devices and allowed unauthorized access to video streams.
Information security
fromSecurityWeek
2 days ago

Over 100 GitHub Repositories Distributing BoryptGrab Stealer

BoryptGrab, an information stealer distributed through over 100 GitHub repositories, harvests browser data, cryptocurrency wallets, and system information while some variants deploy a TunnesshClient backdoor for remote access.
Information security
fromBusiness Insider
2 days ago

He started out as a preteen hacker. Now it's his job to stop corporate cyberattacks.

A former hacker who created credit card generation programs as a child now leads cybersecurity at a major company, leveraging his early hacking experience to combat modern AI-driven threats.
Information security
fromThe Hacker News
3 days ago

China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

A China-linked APT group targets South American telecommunications infrastructure with three new implants across Windows, Linux, and edge devices since 2024.
#zero-day-vulnerabilities
Information security
fromTechzine Global
3 days ago

China and spyware companies dominate zero-day attacks

Zero-day vulnerability exploits reached 90 cases in 2025, with Chinese cyber espionage groups and commercial spyware companies driving attacks increasingly toward enterprise infrastructure and security equipment.
Information security
fromTechCrunch
4 days ago

Google says half of all zero-days it tracked in 2025 targeted buggy enterprise tech | TechCrunch

Nearly half of tracked zero-day vulnerabilities in 2024 targeted enterprise devices, with security infrastructure like firewalls and VPNs being primary targets for hackers seeking corporate data access.
Information security
fromTechzine Global
3 days ago

China and spyware companies dominate zero-day attacks

Zero-day vulnerability exploits reached 90 cases in 2025, with Chinese cyber espionage groups and commercial spyware companies driving attacks increasingly toward enterprise infrastructure and security equipment.
Information security
fromTechCrunch
4 days ago

Google says half of all zero-days it tracked in 2025 targeted buggy enterprise tech | TechCrunch

Nearly half of tracked zero-day vulnerabilities in 2024 targeted enterprise devices, with security infrastructure like firewalls and VPNs being primary targets for hackers seeking corporate data access.
Information security
fromSecurityWeek
3 days ago

In Other News: FBI Hacked, US Security Pro Killed in Iran War, Hijacked Cameras Used in Khamenei Strike

Weekly cybersecurity roundup covers FBI network breach investigation, LeakBase forum administrator identification, Avira antivirus vulnerabilities, and Google Gemini API security risks.
Information security
fromThe Hacker News
3 days ago

Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer

Microsoft discovered a ClickFix campaign using Windows Terminal to deploy Lumma Stealer malware through social engineering and hex-encoded commands.
Information security
fromTheregister
2 days ago

Spyware disguised as emergency-alert app sent to Israelis

Hamas-linked attackers distributed spyware disguised as an emergency-alert app to Israeli smartphones via SMS phishing messages impersonating the official Oref Alert rocket warning service.
Information security
fromSecurityWeek
3 days ago

Iranian APT Hacked US Airport, Bank, Software Company

Iranian APT MuddyWater compromised networks across US aerospace, defense, banking, and NGO sectors, deploying new backdoors Dindoor and Fakeset amid regional military tensions.
Information security
fromSecurityWeek
3 days ago

CISA Adds iOS Flaws From Coruna Exploit Kit to KEV List

CISA added three previously unknown iOS vulnerabilities to the KEV list after discovering they were exploited by the Coruna iOS exploit kit, which targets financial data across iOS 13.0 to 17.2.1.
fromwww.theguardian.com
3 days ago

North Korean agents using AI to trick western firms into hiring them, Microsoft says

The scam typically involves state-backed fraudsters applying for remote IT work in the west, using fake identities and the help of facilitators in the country where the company targeted is based. Once hired, they send their wages back to Kim Jong-un's state and have even been known to threaten to release sensitive company data after being fired.
Information security
Information security
fromThe Hacker News
3 days ago

Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog

CISA added two critical vulnerabilities affecting Hikvision and Rockwell Automation products to its Known Exploited Vulnerabilities catalog due to active exploitation evidence.
fromTechzine Global
3 days ago

2025 was a new record year for ransomware

Qilin was the most active ransomware group in 2025 with 1,022 attacks, accounting for 13 percent of the total. The group operates via a franchise-like Ransomware-as-a-Service model: affiliates arrange initial access, while the core operators manage negotiations and publications of the leaked data.
Information security
fromArs Technica
2 days ago

Feds take notice of iOS vulnerabilities exploited under mysterious circumstances

How this proliferation occurred is unclear, but suggests an active market for 'second hand' zero-day exploits. Beyond these identified exploits, multiple threat actors have now acquired advanced exploitation techniques that can be re-used and modified with newly identified vulnerabilities.
Information security
Information security
fromSecuritymagazine
3 days ago

World Cup Safety and Security Is About More than Just Crime

The 2026 World Cup requires seamless interagency coordination and next-generation technologies like drones and AI to manage unprecedented security risks across 11 cities.
fromTheregister
3 days ago

Iranian news claims AWS drone strikes were deliberate

The attacks are part of the IRGC's recent operations against Amazon data centres in Dubai and other strategic centres in the region. Amazon and Microsoft in these operations has dealt a serious blow to the enemy's technological and information infrastructure.
Information security
Information security
fromBusiness Insider
3 days ago

Here's how private credit bosses are defending their software bets as markets scrutinize Blue Owl

Private credit firms face a reputational crisis over software loan exposure as AI threatens software-as-a-service companies, with Blue Owl experiencing record redemptions and industry leaders defending their portfolios.
fromComputerworld
3 days ago

FBI wiretap system tapped by hackers

The FBI identified and addressed suspicious activities on FBI networks, and we have leveraged all technical capabilities to respond.
Information security
fromSecurityWeek
3 days ago

Rockwell Vulnerability Allowing Remote ICS Hacking Exploited in Attacks

The vulnerability, related to an insufficiently protected cryptographic key, could allow a remote, unauthenticated attacker to bypass verification and connect to a targeted controller by mimicking an engineering workstation. In a real-world industrial environment, the vulnerability could allow remote attackers to manipulate PLC logic and disrupt manufacturing processes, or even cause physical damage to equipment.
Information security
Information security
fromSecurityWeek
3 days ago

James 'Aaron' Bishop Tapped to Serve as New Pentagon CISO

James Bishop assumes the role of Deputy Chief Information Officer for Cybersecurity and Chief Information Security Officer at the Department of Defense, bringing experience from the Air Force, Microsoft, and SAIC.
Information security
fromTheregister
3 days ago

Cisco warns of two more SD-WAN bugs under active attack

Cisco confirms active exploitation of two new vulnerabilities in Catalyst SD-WAN Manager, requiring immediate patching to prevent file overwriting and privilege escalation attacks.
Information security
fromThe Hacker News
3 days ago

Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor

Iranian state-sponsored hacking group MuddyWater infiltrated U.S. and Israeli networks across banks, airports, and defense contractors using previously unknown backdoors Dindoor and Fakeset.
Information security
fromComputerworld
2 days ago

ClickFix attackers using new tactic to evade detection, says Microsoft

Threat actors exploit Windows Terminal to deliver ClickFix phishing attacks, bypassing traditional Run command defenses and security awareness training through malicious PowerShell commands.
Information security
fromThe Hacker News
3 days ago

Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India

Transparent Tribe uses AI-powered tools to generate high-volume, disposable malware in obscure programming languages, leveraging legitimate services for command and control to evade detection.
Information security
fromTheregister
3 days ago

Microsoft spots ClickFix scam spreading Lumma infostealer

A new ClickFix scam variant tricks Windows users into pasting malware commands into Windows Terminal, deploying the Lumma credential-stealing infostealer to compromise browser vaults.
#data-breach
Information security
fromLawSites
5 days ago

LexisNexis Says Data Breach Has Been Cointained; Hackers Claim Access to Government and Law Firm User Data

Hackers exploited an unpatched React vulnerability to breach LexisNexis servers, accessing millions of records including sensitive government employee data and plaintext credentials.
Information security
fromLawSites
5 days ago

LexisNexis Says Data Breach Has Been Cointained; Hackers Claim Access to Government and Law Firm User Data

Hackers exploited an unpatched React vulnerability to breach LexisNexis servers, accessing millions of records including sensitive government employee data and plaintext credentials.
Information security
fromThe Hacker News
3 days ago

Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT

A multi-stage malware campaign called VOID#GEIST uses obfuscated batch scripts to deliver encrypted RAT payloads including XWorm, AsyncRAT, and Xeno RAT through fileless execution techniques.
fromPCWorld
3 days ago

Phishing scammers weaponize ICE ragebait

The email seen by at least some customers of the Emma email platform was a phishing scam. Hackers hoped to inspire instant panic with the words, 'As part of our commitment to supporting U.S. Immigration and Customs Enforcement (ICE), we will be adding a Support ICE donation button to the footer of every email sent through our platform.'
Information security
#cybersecurity-breach
Information security
fromSecuritymagazine
4 days ago

The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering

Hackers exploit DLL side-loading on trusted platforms like LinkedIn to deliver malware through seemingly legitimate file attachments, bypassing traditional security defenses and compromising entire corporate networks.
Information security
fromThe Hacker News
4 days ago

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Many Windows authentication paths bypass MFA protections, allowing attackers to compromise networks using valid credentials despite MFA deployment on cloud applications.
Information security
fromenglish.elpais.com
4 days ago

John Martinis, winner of 2025 Nobel Prize in Physics: I wouldn't want quantum computing to be known for breaking the internet'

Quantum computers will break current encryption within this decade, requiring immediate transition to quantum-safe cryptography to protect digital infrastructure and global economy.
#cisco-catalyst-sd-wan-manager
Information security
fromTechzine Global
4 days ago

Cisco details further vulnerabilities in Catalyst SD-WAN Manager

Cisco disclosed five vulnerabilities in Catalyst SD-WAN Manager with CVSS scores ranging from medium to critical, two actively exploited, requiring immediate patching with no workarounds available.
Information security
fromTechzine Global
4 days ago

Cisco details further vulnerabilities in Catalyst SD-WAN Manager

Cisco disclosed five vulnerabilities in Catalyst SD-WAN Manager with CVSS scores ranging from medium to critical, two actively exploited, requiring immediate patching with no workarounds available.
Information security
fromThe Hacker News
4 days ago

APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine

Russian state-sponsored APT28 deployed two new malware families, BadPaw and MeowMeow, targeting Ukrainian entities through phishing emails with Ukrainian-language lures about border crossing appeals.
Information security
fromThe Hacker News
4 days ago

ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More

AuraStealer malware infrastructure revealed with 48 C2 domains using .shop and .cfd extensions, routed through Cloudflare, distributed via ClickFix with subscription pricing of $295-$585 monthly.
Information security
fromTheregister
3 days ago

Iran intelligence backdoored US bank, airport networks

Iranian MOIS-linked MuddyWater cyber crew embedded in US and international networks since February, including banks, software firms, and airports, with increased activity following US-Israeli military strikes.
Information security
fromZDNET
4 days ago

The average tax scam victim loses $1,020 - and they're younger than you'd think

Tax scams are increasingly sophisticated and widespread, with 82% of Americans concerned about tax fraud, 23% having fallen victim, and average losses reaching $1,020.
Information security
fromComputerworld
3 days ago

The Coruna exploit: Why iPhone users should be concerned

Coruna is a sophisticated nation-state malware toolkit exploiting 23 vulnerabilities across five chains to steal data, cryptocurrency, and personal information while respecting Apple's Lockdown Mode.
Information security
fromTheregister
4 days ago

'Hundreds' of Iranian hacking attempts hit IP cameras

Iranian hacking crews have targeted surveillance cameras in Israel and Middle Eastern countries since February 28, exploiting vulnerabilities in Hikvision and Dahua cameras as potential preparation for physical attacks.
fromPrivacy International
3 days ago

Dual-use tech: the Thales example

Thales S.A. is a French defence and security company specialising in electrical components. Its products range from radar systems, aircraft electronics, drones, missiles and satellites, to sensors, ID cards, e-Gates, biometric databases and cryptographic tools. The company emerged in the 1890s as a French subsidiary of the forerunner of US conglomerate General Electric.
Information security
Information security
fromThe Hacker News
4 days ago

FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials

Law enforcement dismantled LeakBase, a major cybercriminal forum with 142,000 members that traded stolen data and hacking tools, seizing all content and accounts for evidence.
fromSecurityWeek
4 days ago

Cisco Patches Critical Vulnerabilities in Enterprise Networking Products

This vulnerability is due to an improper system process that is created at boot time. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute a variety of scripts and commands that allow root access to the device.
Information security
Information security
fromMail Online
3 days ago

Iran targets critical US infrastructure as Middle East war spirals

Iran-linked APT group Seedworm infiltrated US critical infrastructure including banks, airports, and defense contractors, installing backdoors for persistent access and potential future attacks.
Information security
fromTechRepublic
3 days ago

Hackers Used New Exploit Kit to Compromise Thousands of iPhones

Coruna, a sophisticated iOS exploit framework containing 23 vulnerabilities across five exploit chains, compromised thousands of iPhones in 2025 and circulated across multiple threat actor ecosystems for surveillance, espionage, and financial crime.
fromThe Hacker News
4 days ago

Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware

Dust Specter used randomly generated URI paths for command-and-control (C2) communication with checksum values appended to the URI paths to ensure that these requests originated from an actual infected system. The C2 server also utilized geofencing techniques and User-Agent verification.
Information security
Information security
fromNextgov.com
3 days ago

FBI is probing 'suspicious' breach into bureau networks

The FBI is investigating suspicious activities on its networks, potentially involving systems used for court-ordered wiretapping requests.
Information security
fromZDNET
4 days ago

The biggest AI threats come from within - 12 ways to defend your organization

AI simultaneously strengthens cybersecurity defenses and empowers cybercriminals, creating an ongoing arms race between defenders and attackers.
fromTechCrunch
3 days ago

FYI: Impersonators are (still) targeting companies with fake TechCrunch outreach | TechCrunch

Impostors are impersonating our reporters to extract sensitive business information from unsuspecting targets. In several cases we know about, scammers have adopted the identity of actual staff members, crafting what looks like a standard media inquiry about a company's products and requesting an introductory call.
Information security
Information security
fromBusiness Matters
5 days ago

7 Data Privacy Risks Leaders Miss in 2026

Organizations overlook seven critical privacy risks in 2026 that bypass security awareness, including public WiFi interception, malicious browser extensions, shadow AI tools, unencrypted messaging, credential reuse, unmanaged personal devices, and data retention gaps.
Information security
fromThe Hacker News
5 days ago

APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

Silver Dragon, an APT41-linked group, targets European and Southeast Asian government entities through server exploitation, phishing, and Cobalt Strike beacons since mid-2024.
Information security
fromSecuritymagazine
5 days ago

Would You Trust an AI Pentester to Work Solo?

AI-powered pentesting excels at speed and pattern recognition but requires human guidance to validate contextual vulnerabilities and novel attack paths that matter most to organizations.
Information security
fromComputerWeekly.com
5 days ago

Tycoon2FA phishing platform dismantled in major operation | Computer Weekly

Europol-led operation dismantled Tycoon2FA, a phishing service with 2,000 subscribers that bypassed multifactor authentication by intercepting credentials and session cookies across 24,000 domains.
[ Load more ]