Information security

[ follow ]
Information security
fromDataBreaches.Net
2 days ago

Pen testers accused of 'blackmail' after reporting Eurostar chatbot flaws - DataBreaches.Net

Pen Test Partners found four flaws in Eurostar's public AI chatbot enabling HTML injection and system-prompt leakage; the researchers were accused of blackmail.
fromDataBreaches.Net
4 days ago

Justice Department Announces Seizure of Stolen-Password Database Used in Bank Account Takeover Fraud - DataBreaches.Net

While the fraudulent advertisements appeared to send users to the websites of legitimate banks, victims were in fact redirected to fake bank websites controlled by the criminals. When victims entered their login credentials to access their bank accounts, the criminals harvested those credentials through a malicious software program embedded in the fake website. The criminals then used those bank credentials on the corresponding legitimate bank websites to access victims' bank accounts and drain their funds.
Information security
fromDataBreaches.Net
2 days ago

Conde Nast gets hacked, and DataBreaches gets "played" - Christmas lump of coal edition - DataBreaches.Net

DataBreaches engages with cybercriminals and researchers, sometimes withholding reports to avoid extortion pressure, while occasionally publishing leaks when personal information is exposed.
Information security
fromDataBreaches.Net
3 days ago

Industry Continues to Push Back on HIPAA Security Rule Overhaul - DataBreaches.Net

Healthcare organizations oppose HHS’s proposed HIPAA Security Rule updates due to new financial burdens and unrealistic implementation deadlines.
Information security
fromThe Hacker News
23 hours ago

New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory

A zlib-related length-handling bug in MongoDB (CVE-2025-14847) can let unauthenticated clients read uninitialized heap memory; update recommended.
fromTheregister
19 hours ago

SSL Santa greets Victoria visitors with a borked update

In this case, the victim is one of the digital advertising screens so beloved of public spaces these days. Rather than having a human paste up posters regularly, these things allow seamless content updates to delight passing travelers until, of course, the bork fairy pays a visit. This example of the fairy's evil work can be found at one of the station's entrances and is both an example of an unhappy update and the infamous Progress Bar of Lies.
Information security
fromThe Mercury News
10 hours ago

Fired Stanford researcher gets probation for altering cancer data with insults like 'doctor too stupid'

Notably, for the seven years since her arrest, Ms. Mangi has complied with her conditions of release. She is 70 years old and has lived at the same address for the past 28 years,
Information security
Information security
fromThe Hacker News
1 day ago

Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection

LangChain Core has a critical serialization injection vulnerability (CVE-2025-68664, CVSS 9.3) that allows attackers to instantiate objects and exfiltrate secrets via 'lc' keys.
Information security
fromChannelPro
1 day ago

When everything connects, everything's at risk

The proliferation and interconnection of IoT and OT devices enlarge attack surfaces, enabling lateral movement that exposes critical systems and demands improved detection and containment.
Information security
fromThe Hacker News
1 day ago

China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware

Evasive Panda used DNS poisoning and adversary-in-the-middle techniques to deliver the MgBot backdoor to targets in Türkiye, China, and India between 2022 and 2024.
fromThe Hacker News
1 day ago

Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code

Trust Wallet is urging users to update its Google Chrome extension to the latest version following what it described as a "security incident" that led to the loss of approximately $7 million. The issue, the multi‑chain, non‑custodial cryptocurrency wallet service said, impacts version 2.68. The extension has about one million users, according to the Chrome Web Store listing. Users are advised to update to version 2.69 as soon as possible.
Information security
#ai-security
fromTechCrunch
1 day ago
Information security

The 9 top cybersecurity startups from Disrupt Startup Battlefield | TechCrunch

fromTechCrunch
1 day ago
Information security

The 9 top cybersecurity startups from Disrupt Startup Battlefield | TechCrunch

Information security
fromTheregister
1 day ago

Tabletop exercises look a little different this year

Run tabletop cyber-incident exercises that account for AI-accelerated attacks and defenders' AI use to ensure rapid detection, containment, and organizational resilience.
#cybersecurity
fromTechCrunch
1 day ago
Information security

These are the cybersecurity stories we were jealous of in 2025 | TechCrunch

fromThe Hacker News
2 days ago
Information security

ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories

fromTechzine Global
4 days ago
Information security

ServiceNow buys security firm Armis for $7.75 billion

ServiceNow will acquire Armis for $7.75 billion to integrate exposure management and extend proactive cybersecurity across IT, IoT, and OT environments.
fromenglish.elpais.com
4 days ago
Information security

The story of the Malaga virus: The code that haunted Google's cybersecurity center director for 30 years

Bernardo Quintero traced his cybersecurity career to solving a mysterious early-1990s Malaga computer virus, later founding Hispasec and VirusTotal.
fromTechCrunch
1 day ago
Information security

These are the cybersecurity stories we were jealous of in 2025 | TechCrunch

fromThe Hacker News
2 days ago
Information security

ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories

Information security
fromTheregister
1 day ago

Remedio CEO: If you don't think like a hacker, you won't win

AI that mimics hacker thinking enables proactive defense of corporate networks by anticipating attacker methods and automating offensive-style security testing.
Information security
fromThe Hacker News
2 days ago

CISA Flags Actively Exploited Digiever NVR Vulnerability Allowing Remote Code Execution

Unpatched command-injection vulnerability CVE-2023-52163 in Digiever DS-2105 Pro NVRs is being actively exploited to deploy botnets; mitigate or discontinue use.
Information security
fromAxios
2 days ago

Why hackers love the holidays

Attackers exploit reduced holiday security staffing to carry out phishing, ransomware, and data theft, so organizations must harden defenses before holidays.
Information security
fromThe Hacker News
2 days ago

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

CVE-2020-12812 allows LDAP users with 2FA on FortiGate SSL VPN to bypass second-factor authentication when username case mismatches under specific configurations.
Information security
fromThe Hacker News
2 days ago

LastPass 2022 Breach Led to Years-Long Cryptocurrency Thefts, TRM Labs Finds

Weak master passwords from the 2022 LastPass vault backups enabled criminals to decrypt vaults and drain cryptocurrency through Russian-linked infrastructure as late as 2025.
#malware
Information security
fromTheregister
3 days ago

Pen testers accused of 'blackmail' over Eurostar AI flaws

Eurostar's AI chatbot had four vulnerabilities enabling HTML injection and prompt leakage; researchers who reported them were accused of "blackmail" by Eurostar's security head.
Information security
fromTheregister
3 days ago

US shutters phisherfolk's $14.6M password-hoarding platform

Law enforcement shut down web3adspanels.org, a platform used to store stolen banking credentials from SEO-poisoning campaigns that enabled account takeovers and millions in losses.
fromComputerWeekly.com
3 days ago

Top 10 cyber crime stories of 2025 | Computer Weekly

Once again threat actors kept cyber pros on their toes in 2025 in a never-ending cat-and-mouse game. But amid the noise, there were some notable stories and incidents affecting household names in the UK - the likes of Marks & Spencer, Co-op, and Jaguar Land Rover - meaning that 2025 will undoubtedly live long in the memory. Here are Computer Weekly's top cyber crime stories of 2025
Information security
Information security
fromThe Hacker News
3 days ago

Attacks are Evolving: 3 Ways to Protect Your Business in 2026

In 2025 cybercriminals shifted focus to small and medium-sized businesses, exploiting their limited defenses and repeatedly breaching SMBs to compensate for smaller paydays.
Information security
fromThe Hacker News
3 days ago

New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper

A new MacSync macOS information stealer variant uses a code-signed, notarized Swift installer in a DMG to bypass Gatekeeper and deliver its payload.
Information security
fromEngadget
3 days ago

Pro-Russian hacker group claims responsibility for DDoS attack on French postal service

Noname057 claimed responsibility for a December 22 DDoS attack that crippled La Poste's central systems, disrupting package tracking and banking services.
Information security
fromThe Hacker News
3 days ago

Nomani Investment Scam Surges 62% Using AI Deepfake Ads on Social Media

Nomani investment scam rose 62%, expanded across social platforms, used AI deepfakes and malvertising to steal funds and extract additional fees and personal data.
fromSecuritymagazine
4 days ago

CISA Releases Guide for Stadium and Arena Security

The Cybersecurity and Infrastructure Security Agency (CISA) published a guide detailing venue security and disruption management. In this guide, venue owners and operators can review fundamental strategies to mitigate repercussions of possible disruptions to the critical lifeline sectors of: Communications Energy Transportation Water and Wastewater Systems While this guide serves as a broad catalog for support, it is not comprehensive. Security leaders in the event security space are encouraged to leverage the provided resources and consider them in the context of their venue's unique needs.
Information security
Information security
fromwww.mercurynews.com
3 days ago

Consumer tip: Watch out for this package delivery' scam

Scammers send fake package notifications urging clicks or payments to install malware or steal personal and financial information—verify delivery status only through carriers' official channels.
from24/7 Wall St.
3 days ago

CrowdStrike (NASDAQ: CRWD) Stock Price Prediction and Forecast 2025-2030 (Jan 2025)

Investors are concerned with future stock performance over the next one, five, or 10 years. While most Wall Street analysts will calculate 12-month forward projections, it is clear that nobody has a consistent crystal ball, and plenty of unforeseen circumstances can render even near-term projections irrelevant. 24/7 Wall St. aims to present some further-looking insights based on CrowdStrike's own numbers, along with business and market development information that may be of help with your own research.
Information security
fromBusiness Matters
6 days ago

The Role of IT Support in Business Continuity

Robust IT systems support uninterrupted operations through resilience, security, and proactive monitoring. CIOs report that 87% of digital-first businesses rely on automated failover systems to reduce service disruption. Continuous monitoring helps detect failures before they impact users. Recovery plans activate system redundancies and restore functions with minimal input. Automated backup schedules and patch management prevent gaps in continuity. IT managers emphasise the role of configuration management and centralised monitoring tools.
Information security
Information security
fromZacks
3 days ago

Pardon Our Interruption

Enable JavaScript and cookies and disable or configure blocking plugins to avoid being mistaken for a bot and to regain website access.
Information security
fromChannelPro
3 days ago

Keeper Security expands federal bench with latest senior hires

Keeper Security appointed Shannon Vaughn and Benjamin Parrish to federal leadership to strengthen identity security and advance zero-trust modernization across government agencies.
Information security
fromThe Hacker News
4 days ago

Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances

Critical RCE vulnerability CVE-2025-68613 in n8n can allow authenticated users to execute arbitrary code; apply patches immediately or restrict workflow editing.
#data-breach
fromTechCrunch
4 days ago
Information security

US insurance giant Aflac says hackers stole personal and health data of 22.6 million | TechCrunch

fromTechCrunch
4 days ago
Information security

US insurance giant Aflac says hackers stole personal and health data of 22.6 million | TechCrunch

#chrome-extension-malware
#prompt-injection
fromFortune
4 days ago
Information security

OpenAI says AI browsers like ChatGPT Atlas may never be fully secure from hackers-and experts say the risks are 'a feature not a bug' | Fortune

fromFortune
4 days ago
Information security

OpenAI says AI browsers like ChatGPT Atlas may never be fully secure from hackers-and experts say the risks are 'a feature not a bug' | Fortune

Information security
fromChannelPro
4 days ago

Why MSSPs must train smarter

MSSPs excel at detection and forensics but lack preventive and offensive skills, risking a reactive-only posture; embedding CTEM and capability development is essential.
Information security
fromTechCrunch
4 days ago

France's postal and banking services disrupted by suspected DDoS attack | TechCrunch

La Poste's online and banking systems were knocked offline by a suspected DDoS attack causing major network disruption and unavailability of web and mobile services.
Information security
fromThe Hacker News
4 days ago

U.S. DoJ Seizes Fraud Domain Behind $14.6 Million Bank Account Takeover Scheme

DoJ seized web3adspanels.org used to host stolen bank credentials and facilitate bank account takeover fraud via fake search ads, causing millions in losses.
Information security
fromwww.bbc.com
5 days ago

Amazon says over 1,800 North Koreans blocked from applying for jobs

Amazon blocked over 1,800 suspected North Korean job applications that used stolen or fake identities to funnel wages back to fund regime programs.
fromComputerWeekly.com
4 days ago

Top 10 end user computing stories of 2025 | Computer Weekly

The biggest event of 2025 in the PC market has been the end of support for Windows 10. It was positioned as the last major release of the Windows operating system, which would be kept updated by over-the-air Windows updates. But when Windows 11 was launched in 2021, Microsoft set the date for the end of support for Windows 10 - October 5, 2025.
Information security
Information security
fromTechCrunch
4 days ago

Exclusive: Inside Uzbekistan's nationwide license plate surveillance system

A nationwide Uzbek license-plate surveillance system was left publicly accessible, exposing vehicle and occupant tracking data and revealing significant privacy and security risks.
Information security
fromNextgov.com
4 days ago

When data defense becomes national defense

Securing data systems is essential to national security because AI-enabled infrastructure depends on trustworthy data and resilient data pipelines.
fromTechCrunch
4 days ago

Hackers stole over $2.7 billion in crypto in 2025, data shows | TechCrunch

Cybercriminals stole $2.7 billion in crypto this year, a new record for crypto-stealing hacks, according to blockchain monitoring firms. Once again, in 2025, there were dozens of crypto heists hitting several cryptocurrency exchanges and other web3 and decentralized finance (DeFi) projects. The biggest hack by far was the breach at Dubai-based crypto exchange Bybit, where hackers stole around $1.4 billion in crypto.
Information security
fromWIRED
4 days ago

Chinese Crypto Scammers on Telegram Are Fueling the Biggest Darknet Markets Ever

When black markets for drugs, guns, and all manner of contraband first sprang up on the dark web more than a decade ago, it seemed that cryptocurrency and the technical sophistication of the anonymity software Tor were the keys to carrying out billions of dollars worth of untouchable, illicit transactions online. Now, all of that looks a bit passé. In 2025, all it takes to get away with tens of billions of dollars in black-market crypto deals is a messaging platform willing to host scammers and human traffickers, enough persistence to relaunch channels and accounts on that service when they're occasionally banned, and fluency in Chinese.
Information security
fromThe Verge
4 days ago

Dozens of Flock AI camera feeds were just out there

I watched a man leave his house in the morning in New York," Jordan says in his video.
Information security
fromThe Hacker News
5 days ago

Weekly Recap: Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More

Cyber threats last week showed how attackers no longer need big hacks to cause big damage. They're going after the everyday tools we trust most - firewalls, browser add-ons, and even smart TVs - turning small cracks into serious breaches. The real danger now isn't just one major attack, but hundreds of quiet ones using the software and devices already inside our networks. Each trusted system can become an entry point if it's left unpatched or overlooked.
Information security
Information security
fromThe Hacker News
5 days ago

Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens

A malicious npm package named 'lotusbail' functions as a WhatsApp API while stealing authentication tokens, messages, contacts, media, and creating persistent account access.
fromTheregister
5 days ago

Poisoned WhatsApp API package steals messages and accounts

In addition to working as advertised, the secret-stealing library, which is a fork of the legitimate @whiskeysockets/baileys package, uses WebSocket to communicate with WhatsApp. However, this means that every WhatsApp communication passes through the socket wrapper, allowing it to capture your credentials when you log in and intercept messages as they are sent and received. "All your WhatsApp authentication tokens, every message sent or received, complete contact lists, media files - everything that passes through the API gets duplicated and prepared for exfiltration," Admoni wrote.
Information security
Information security
fromTheregister
5 days ago

Spy turned startup CEO: 'The WannaCry of AI will happen'

AI has accelerated vulnerability weaponization so attackers exploit bugs faster than vendors patch them, producing a negative time-to-exploit and enabling widespread LLM-assisted weaponization.
fromThe Hacker News
6 days ago

Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale

"Previously, users received 'pure' Trojan APKs that acted as malware immediately upon installation," Group-IB said in an analysis published last week. "Now, adversaries increasingly deploy droppers disguised as legitimate applications. The dropper looks harmless on the surface but contains a built-in malicious payload, which is deployed locally after installation - even without an active internet connection."
Information security
fromNextgov.com
5 days ago

Three moves that can jumpstart cyber modernization - even wthout a full budget

Let's be honest: most agencies don't have a blank check to invest in cybersecurity modernization. But that doesn't mean they're stuck. You don't need a full rip-and-replace to make meaningful progress; you need clarity, urgency and smart prioritization. Whether you're working with a full budget or a shoestring one, there are moves you can make today that will strengthen your defenses tomorrow.
Information security
Information security
fromZDNET
5 days ago

TSA's plea: Don't make these airport Wi-Fi and public charging mistakes this holiday

Public USB chargers and unsecured airport Wi‑Fi can expose devices to juice‑jacking and data interception; use power-only cables, power banks, data blockers, and VPNs.
Information security
fromSecuritymagazine
6 days ago

Product Spotlight: 2025 Year in Review

Integrated security platforms unify access control, audio, video, and emergency response permissions to streamline school, retail, and healthcare operations and improve responder coordination.
Information security
fromTechzine Global
5 days ago

Docker removes paywall for hardened images

Docker is releasing Docker Hardened Images as free, Apache 2.0–licensed, Debian/Alpine-based pre-secured container images accessible to developers, teams, and organizations without license fees.
Information security
fromChannelPro
5 days ago

How to MFA everywhere

Online identity equals the proofs systems accept, and inconsistent MFA allows attackers to impersonate users; MSPs can unify and strengthen identity protections.
fromTechzine Global
5 days ago

SailPoint integrates with CrowdStrike Falcon for faster threat response

SailPoint has announced new integrations with the CrowdStrike Falcon platform to connect identity governance with endpoint security. The integrations enable shared data and automated workflows between identity and security systems to help organisations respond faster to identity-based threats. The integrations connect SailPoint's Identity Security Cloud with multiple Falcon platform components, including Falcon Next-Gen Identity Security, Falcon Next-Gen SIEM, and Falcon Fusion SOAR, now part of CrowdStrike Charlotte AI.
Information security
Information security
fromTheregister
6 days ago

South Korea to require face scans to buy a SIM

South Korea will require facial-recognition verification for new mobile subscribers to prevent account registration with stolen data and reduce phone-based scams.
Information security
fromThe Hacker News
1 week ago

Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence

Iranian APT Infy (Prince of Persia) remains active and is conducting widespread campaigns using updated Foudre and Tonnerre malware with DGA-based C2.
Information security
fromTheregister
6 days ago

Google sends Dark Web Report to its dead services graveyard

Google is ending its Dark Web Report because it provided limited actionable guidance and will instead prioritize clearer, practical account-protection tools and resources.
fromFuturism
6 days ago

Police Warn of Robot Crime Wave

But what would happen if such a technology were to land in the hands of terrorists and criminals, who aren't beholden to the norms of modern warfare at all? In a new report, pan-European police agency Europol's Innovation Lab has imagined a not-so-distant future in which criminals could hijack autonomous vehicles, drones, and humanoid robots to sow chaos - and how law enforcement will have to step up as a result.
Information security
Information security
fromWIRED
1 week ago

Hackers Stole Millions of PornHub Users' Data for Extortion

US border and law-enforcement agencies are expanding surveillance capabilities while AI tools enable sophisticated scams and a major breach exposed PornHub user data.
fromTech Times
1 week ago

Remote Work Security Solutions: Behavioral Access Control Enhances Workforce Protection

Traditional password-based protection is no longer sufficient, prompting organizations to adopt behavioral access control systems that continuously analyze user actions for anomalies. These platforms monitor keystrokes, mouse activity, application usage, and network patterns to detect suspicious behavior in real time. By combining machine learning, biometric verification, and zero-trust principles, companies enhance workforce protection while minimizing the risk of account compromise.
Information security
Information security
fromWIRED
1 week ago

7 Useful Tips for Anyone Connecting to Public Wi-Fi

Maximize public Wi‑Fi performance and safety by minimizing background processes, positioning near routers, preferring wired connections, and using protections like a VPN.
Information security
fromwww.theregister.com
1 week ago

HPE OneView RCE bug scores a perfect 10

A critical unauthenticated remote code execution vulnerability (CVE-2025-37164) in HPE OneView allows attackers centralized control; customers must upgrade or apply hotfix immediately.
Information security
fromInfoWorld
1 week ago

React2Shell is the Log4j moment for front end development

A Flight protocol validation failure in React Server Components and Next.js (React2Shell, CVE-2025-55182) enables unauthenticated remote code execution and rapid ransomware deployment.
Information security
fromTechzine Global
1 week ago

HPE OneView requires patch for vulnerability with highest CVE score

Hewlett Packard Enterprise OneView had a critical unauthenticated remote code execution vulnerability (CVE-2025-37164) fixed in version 11.00 with hotfixes for older releases.
#watchguard
fromTheregister
1 week ago
Information security

Critical-rated WatchGuard Firebox flaw under active attack

A critical unauthenticated remote code execution vulnerability (CVE-2025-32978) in WatchGuard Firebox IKE service is being actively exploited; apply firmware updates immediately.
fromThe Hacker News
1 week ago
Information security

WatchGuard Warns of Active Exploitation of Critical Fireware OS VPN Vulnerability

WatchGuard fixed a critical out-of-bounds write vulnerability (CVE-2025-14733) in Fireware OS that enabled remote unauthenticated code execution and was actively exploited.
Information security
fromThe Hacker News
1 week ago

Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers

UNK_AcademicFlare used device-code phishing to steal Microsoft 365 credentials and conduct account takeovers targeting government, think tanks, higher education, and transportation since September 2025.
Information security
fromTechCrunch
1 week ago

Hundreds of Cisco customers are vulnerable to new Chinese hacking campaign, researchers say | TechCrunch

Chinese government-backed hackers are exploiting a zero-day (CVE-2025-20393) in Cisco Secure Email Gateway and related products, targeting enterprise customers.
Information security
fromTechCrunch
1 week ago

Hacks, thefts and disruption: The worst data breaches of 2025 | TechCrunch

2025 featured unprecedented cyberattacks: massive U.S. government data exfiltration by DOGE, state-sponsored intrusions, and widespread ransomware extortion against corporations.
fromThe Hacker News
1 week ago

New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards

UEFI and IOMMU are designed to enforce a security foundation and prevent peripherals from performing unauthorized memory accesses, effectively ensuring that DMA-capable devices can manipulate or inspect system memory before the operating system is loaded. The vulnerability, discovered by Nick Peterson and Mohamed Al-Sharifi of Riot Games in certain UEFI implementations, has to do with a discrepancy in the DMA protection status. While the firmware indicates that DMA protection is active, it fails to configure and enable the IOMMU during the critical boot phase.
Information security
fromNextgov.com
1 week ago

The cyberwarfare landscape is changing - here's how to prepare

Even incidents like the Colonial Pipeline ransomware attack, which showed us how the cyber world and our physical lives intersect, stopped far short of societal disruption. However, the threat of cyberwar has been building, influenced by advancements in AI and increased presence of actors in U.S. systems and telecommunication networks. A military conflict could escalate these attacks to scale, crippling critical infrastructure and public safety systems like power grids, transportation networks and emergency response, even disrupting military communications and undermining response.
Information security
Information security
fromThe Hacker News
1 week ago

Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks

Nigerian authorities arrested the alleged RaccoonO365 developer after collaboration with Microsoft and the FBI for credential-harvesting phishing operations.
Information security
fromTechzine Global
1 week ago

Microsoft patches bug causing multiple Message Queuing errors

December 2025 Windows security updates changed MSMQ permissions, causing MSMQ and IIS application failures until an out-of-band fix (KB5074976) is applied.
fromThe Hacker News
1 week ago

Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware

The campaign "uses CountLoader as the initial tool in a multistage attack for access, evasion, and delivery of additional malware families," Cyderes Howler Cell Threat Intelligence team said in an analysis. CountLoader was previously documented by both Fortinet and Silent Push, detailing the loader's ability to push payloads like Cobalt Strike, AdaptixC2, PureHVNC RAT, Amatera Stealer, and PureMiner. The loader has been detected in the wild since at least June 2025.
Information security
Information security
fromArs Technica
1 week ago

Riot Games is making an anti-cheat change that could be rough on older PCs

Vanguard may block high-rank players until motherboard BIOS updates are installed to mitigate a chipset firmware vulnerability affecting multiple Intel and AMD motherboard families.
Information security
fromHarvard Business Review
1 week ago

6 Cybersecurity Predictions for the AI Economy in 2026 - SPONSOR CONTENT FROM PALO ALTO NETWORKS

Autonomous AI agents will drive an AI-native economy, requiring proactive security and trustworthy data and identity to manage new insider and quantum risks.
fromAzure DevOps Blog
1 week ago

Work item linking for Advanced Security alerts now available - Azure DevOps Blog

Security vulnerabilities don't fix themselves. Someone needs to track them, prioritize them, and actually ship the fix. If you've ever tried to manage security alerts alongside your regular sprint work, though, you know the friction: you're looking at an alert in one tab, switching to your backlog in another, trying to remember which vulnerability you were supposed to file a bug for.
Information security
fromwww.theguardian.com
1 week ago

The Com: the growing cybercrime network behind recent Pornhub hack

Ransomware hacks, data theft, crypto scams and sextortion cover a broad range of cybercrimes carried out by an equally varied list of assailants. But there is also an English-speaking criminal ecosystem carrying out these activities that defies conventional categorisation. Nonetheless, it does have a name: the Com. Short for community, the Com is a loose affiliation of cyber-criminals, largely native English language speakers typically aged from 16 to 25.
Information security
fromTheregister
1 week ago

Ten mistakes marred firewall upgrade at Australian telco

Technicians working on a firewall upgrade made at least ten mistakes, contributing to two deaths, according to a report on a September incident that saw Australian telco Optus unable to route calls to emergency services. As The Register reported at the time, Australia's equivalent of the USA's 911 and the UK's 999 and 112 emergency contact number is 000 - Triple Zero - and local law requires all telcos to route emergency calls to that number.
Information security
fromwww.npr.org
1 week ago

4 common scams to watch out for this holiday season

In a frenzy of last-minute gift shopping and travel bookings, we can be more anxious, more distracted and more vulnerable. "There's a lot of hustle and bustle during the holiday season, so there's a lot more opportunities for scammers to steal from us," says Amy Nofziger, senior director of Fraud Victim Support at the AARP Fraud Watch Network, a fraud prevention service.
Information security
fromZacks
1 week ago

Pardon Our Interruption

As you were browsing something about your browser made us think you were a bot. There are a few reasons this might happen: You've disabled JavaScript in your web browser. You're a power user moving through this website with super-human speed. You've disabled cookies in your web browser. A third-party browser plugin, such as Ghostery or NoScript, is preventing JavaScript from running.
Information security
fromwww.housingwire.com
1 week ago

AI-driven wire fraud schemes reshape real estate security in 2025

Criminals increasingly combine AI-driven deepfakes, improved timing, contextual realism, and human patience to execute sophisticated wire fraud against title transactions.
Information security
fromFortune
1 week ago

An AT&T exec manifested his C-suite position when he was earning his MBA: 'I literally came up with a plan to become a CISO' | Fortune

Execute a deliberate career plan, develop technical and leadership experience, and demonstrate cybersecurity's value to earn CISO roles across organizations.
Information security
fromBusiness Matters
1 week ago

Choosing Security Providers: A Strategic Guide for Businesses

Choose security partners with full SIA compliance, comprehensive insurance, experienced personnel, advanced technology, and proven operational standards to ensure effective protection.
fromTheregister
1 week ago

China turns on a vast and very rapid experimental network

As reported in Chinese state media, tests of the network saw it shift 72 terabytes of data in 1.6 hours, across a distance of around 1,000 km between a radio telescope in Guizhou province and a university in Hubei. We think that's almost 100 Gbit/s, an impressive feat for a sustained long-distance data transfer even if it took place in a controlled environment.
Information security
Information security
fromThe Verge
1 week ago

Google sues web scraper for sucking up search results 'at an astonishing scale'

SerpApi circumvents Google's SearchGuard by masking hundreds of millions of automated queries to appear as human users, thereby violating federal law.
[ Load more ]