Information security

[ follow ]
Information security
fromEntrepreneur
27 minutes ago

The Shocking Cost of Vendor Data Breaches | Entrepreneur

Digital supply-chain interdependencies create cascading vendor-related outages and breaches that require companies to manage supplier and third-party data risks proactively.
#sonicwall
Information security
fromThe Hacker News
6 hours ago

How CISOs Can Drive Effective AI Governance

CISOs must implement living AI governance that balances security and innovation, enabling safe, scalable AI adoption aligned with organizational risk tolerance and business priorities.
fromTechzine Global
9 hours ago

CrowdStrike launches AI tools for patching and threat intelligence

CrowdStrike claims that Falcon for IT Risk-based Patching solves this problem by bringing vulnerability management and patch implementation together within the Falcon console. It uses proprietary intelligence and AI models to determine which vulnerabilities are most likely to be exploited in practice. With features such as Patch Safety Scores and sensor intelligence, teams should be able to patch faster, more securely, and on a larger scale without disruption.
Information security
Information security
fromComputerworld
2 hours ago

Tool sprawl is dangerous, warns Apple MDM vendor Kandji

IT teams spend excessive time on maintenance, prioritizing better tool integration and automation to reduce security risks and free resources for strategic work.
#ransomware
Information security
fromIT Pro
8 hours ago

Cyber professionals are losing sleep over late night attacks

Attackers deliberately time incidents outside business hours, producing over half of security alerts after staff clock out and about 15% occurring on weekends.
#healthcare-data-breach
fromDataBreaches.Net
2 days ago
Information security

FBI 'aware' of Anchorage health clinic data breach as hackers claim 60K patients impacted - DataBreaches.Net

fromDataBreaches.Net
2 days ago
Information security

FBI 'aware' of Anchorage health clinic data breach as hackers claim 60K patients impacted - DataBreaches.Net

fromWIRED
3 hours ago

This Microsoft Entra ID Vulnerability Could Have Caused a Digital Catastrophe

Mollema has studied Entra ID security in depth and published multiple studies about weaknesses in the system, which was formerly known as Azure Active Directory. But while preparing to present at the Black Hat security conference in Las Vegas in July, Mollema discovered two vulnerabilities that he realized could be used to gain global administrator privileges-essentially god mode-and compromise every Entra ID directory, or what is known as a "tenant."
Information security
#data-breach
fromTechCrunch
1 day ago
Information security

VC firm Insight Partners says thousands of staff and limited partners had personal data stolen in a ransomware attack | TechCrunch

fromDataBreaches.Net
1 day ago
Information security

Tiffany discloses data breach involving gift cards - second breach disclosure in recent months - DataBreaches.Net

fromTechCrunch
1 day ago
Information security

VC firm Insight Partners says thousands of staff and limited partners had personal data stolen in a ransomware attack | TechCrunch

fromDataBreaches.Net
1 day ago
Information security

Tiffany discloses data breach involving gift cards - second breach disclosure in recent months - DataBreaches.Net

Information security
fromArs Technica
3 hours ago

How weak passwords and other failings led to catastrophic breach of Ascension

Kerberoasting of Active Directory enabled attackers to pivot from a compromised contractor laptop to Ascension's network, exposing millions of health records.
#phishing
fromDataBreaches.Net
7 hours ago
Information security

Microsoft seizes 338 websites to disrupt rapidly growing 'RaccoonO365' phishing service - DataBreaches.Net

fromwww.dw.com
1 day ago
Information security

Microsoft seizes websites linked to Nigeria-based phishing DW 09/17/2025

fromDataBreaches.Net
7 hours ago
Information security

Microsoft seizes 338 websites to disrupt rapidly growing 'RaccoonO365' phishing service - DataBreaches.Net

fromwww.dw.com
1 day ago
Information security

Microsoft seizes websites linked to Nigeria-based phishing DW 09/17/2025

#revengehotels
Information security
fromTechzine Global
10 hours ago

1.5 billion Salesforce records stolen according to ShinyHunters

ShinyHunters exfiltrated over 1.5 billion Salesforce records from 760 companies via compromised Salesloft OAuth tokens and used the data to extort victims.
fromThe Hacker News
6 hours ago

SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers

"SilentSync is capable of remote command execution, file exfiltration, and screen capturing," Zscaler ThreatLabz's Manisha Ramcharan Prajapati and Satyam Singh said. "SilentSync also extracts web browser data, including credentials, history, autofill data, and cookies from web browsers like Chrome, Brave, Edge, and Firefox." The packages, now no longer available for download from PyPI, are listed below. They were both uploaded by a user named "CondeTGAPIS."
Information security
Information security
fromSecurityWeek
3 hours ago

ChatGPT Deep Research Targeted in Server-Side Data Theft Attack

ShadowLeak is a server-side data exfiltration method targeting ChatGPT's Deep Research, enabling silent extraction of inbox data via attacker-controlled URLs without user interaction.
#npm
fromDevOps.com
1 hour ago
Information security

Shai-Hulud Attacks Shake Software Supply Chain Security Confidence - DevOps.com

fromDevOps.com
1 hour ago
Information security

Shai-Hulud Attacks Shake Software Supply Chain Security Confidence - DevOps.com

fromArs Technica
1 hour ago

New attack on ChatGPT research agent pilfers secrets from Gmail inboxes

Accordingly, OpenAI mitigated the prompt-injection technique ShadowLeak fell to-but only after Radware privately alerted the LLM maker to it. A proof-of-concept attack that Radware published embedded a prompt injection into an email sent to a Gmail account that Deep Research had been given access to. The injection included instructions to scan received emails related to a company's human resources department for the names and addresses of employees. Deep Research dutifully followed those instructions.
Information security
#cybercrime
#cyberattack
fromBusiness Matters
1 day ago
Information security

Cyberattacks 2025: Millions of UK users exposed in year of hacks - here's what it means for your data

fromTechCrunch
1 day ago
Information security

Jaguar Land Rover to pause production for third week due to cyberattack | TechCrunch

fromBusiness Matters
1 day ago
Information security

Cyberattacks 2025: Millions of UK users exposed in year of hacks - here's what it means for your data

fromTechCrunch
1 day ago
Information security

Jaguar Land Rover to pause production for third week due to cyberattack | TechCrunch

Information security
fromSecurityWeek
10 hours ago

Chrome 140 Update Patches Sixth Zero-Day of 2025

Chrome patched a V8 type-confusion zero-day (CVE-2025-10585) exploited in the wild and addressed multiple other engine vulnerabilities in an urgent update.
Information security
fromThe Hacker News
4 hours ago

CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader

CountLoader is a versatile malware loader used by Russian ransomware affiliates and IABs to deliver Cobalt Strike, AdaptixC2, PureHVNC RAT, and other post-exploitation tools.
#raccoono365
fromIT Pro
6 hours ago
Information security

Microsoft and Cloudflare just took down a major phishing operation

fromIT Pro
6 hours ago
Information security

Microsoft and Cloudflare just took down a major phishing operation

Information security
fromTheregister
15 hours ago

Microsoft starts streaming cloudy apps instead of desktops

Microsoft launches Windows 365 Cloud Apps public preview to stream individual apps on Frontline Cloud PCs, reducing need to load full virtual desktops.
Information security
fromIT Pro
10 hours ago

BreachForums founder resentenced to three years in prison

Conor Brian Fitzpatrick, alias Pompompurin, founder and admin of BreachForums, was resentenced to three years after his earlier sentence was overturned.
Information security
fromWIRED
7 hours ago

Cybercriminals Have a Weird New Way to Target You With Scam Texts

SMS blasters operate outside mobile networks, letting fake cell sites spoof sender IDs and bypass provider security to deliver scam messages.
fromComputerWeekly.com
4 hours ago

Plotting a path forward with VMware version 7 | Computer Weekly

October 2, 2025, marks the end of general support for VMware's version 7. After that, Broadcom won't release any new security patches or fixes, and you won't be able to log vendor support tickets for these versions. You'll still have access to previously published updates under the self-service policy (although this could change in time, but there won't be anything new coming.
Information security
#ta415
Information security
fromBusiness Matters
1 day ago

The Role of IT Support in Cyber Security Awareness Training

Effective cyber security awareness training led by IT support teams reduces human error, prevents breaches, and makes cyber safety second nature across organizations.
Information security
fromSecurityWeek
1 day ago

Virtual Event Today: Attack Surface Management Summit

Continuous discovery, inventory, classification, prioritization, and monitoring of expanding digital and cloud assets are essential to reduce and control enterprise attack surfaces.
Information security
fromDevOps.com
1 day ago

New in Syteca Release 7.21: Agentless Access, Sensitive Data Masking, and Smooth Session Playback - DevOps.com

Syteca 7.21 enhances insider risk reduction and data protection with real-time masking, web-based remote access, full-motion recording, and an intuitive user interface.
fromSecurityWeek
1 day ago

Scalekit Raises $5.5 Million to Secure AI Agent Authentication

Scalekit 's authentication stack, purpose-built for agentic apps, is tailored for Model Context Protocol (MCP) servers, allowing security teams to easily add an OAuth 2.1 authorization server. According to the startup, its solution enables developers to rapidly add an encrypted token vault, along with a tool-calling layer, so that AI agents can act on a user's behalf in popular services such as Gmail, HubSpot, Notion, and Slack.
Information security
Information security
fromTechzine Global
1 day ago

Wiz launches Incident Response service for cloud security crises

Wiz Incident Response provides forensic cloud investigation, rapid containment, and recovery integrated with Wiz Defend and Runtime Sensor to reduce cloud and AI attack impact.
#quantum-computing
Information security
fromSecuritymagazine
1 day ago

How AI and Virtual Operators Are Transforming Security Operations

AI-enabled virtual operators can automate routine SOC tasks under administrator control to augment human judgment, reduce alarm volume, and scale security operations.
Information security
fromNextgov.com
22 hours ago

Over 100 cyber professionals call for quick Kirsten Davies confirmation as DOD CIO

Over 100 cybersecurity professionals requested the Senate quickly confirm Kirsten Davies as Defense Department Chief Information Officer, citing her leadership and cybersecurity experience.
Information security
fromPCWorld
1 day ago

Protect your small business from remote working's biggest security nightmares

Small businesses must secure remote and hybrid work to protect employees, data, finances, and reputation from threats such as man-in-the-middle and phishing attacks.
Information security
fromSecuritymagazine
1 day ago

When Employees Help Hackers: How Threat Actors Bypass MFA

Criminals increasingly bypass MFA by tricking employees with sophisticated phishing, driving business email compromise and largely irretrievable wire fraud losses.
fromNextgov.com
23 hours ago

CISA wants more international involvement in cyber vulnerability catalog, official says

That's a great example of somebody we want to bring in closer into the fold, to say again, as a global community, how can we really take a better look - more holistic look - at CVEs and what it means for defenders worldwide?
Information security
fromIT Pro
1 day ago

Nearly 700,000 customers impacted after insider attack at US fintech firm

A US-based fintech firm has warned customers their data may have been exposed following an insider attack.
Information security
fromZDNET
1 day ago

Update your Samsung phone ASAP to patch this zero-day flaw exploited in the wild

Samsung has issued a patch to resolve a critical vulnerability impacting its Android smartphone users. All impacted phone models will receive the fix, which patches a vulnerability tracked as . The security flaw, issued a critical base score of 8.8 by Samsung Mobile (a CNA), is described as an "out-of-bounds write in libimagecodec.quram.so prior to SMR Sep-2025 Release 1 allows remote attackers to execute arbitrary code."
Information security
fromSecurityWeek
1 day ago

Decade-Old Pixie Dust Wi-Fi Hack Still Impacts Many Devices

The Pixie Dust hack involves an attacker who is in range of the targeted Wi-Fi network capturing the initial WPS handshake, which contains data that can then be cracked offline to obtain the WPS PIN. The attack leverages the fact that on some devices random numbers are generated using predictable or low-entropy methods. The attacker only needs seconds to capture the WPS handshake and the PIN can then be obtained offline within minutes or even seconds.
Information security
Information security
fromArs Technica
1 day ago

Trump admin says Social Security database wasn't "leaked, hacked, or shared"

A whistleblower alleged SSA placed a high-value asset containing data on over 450 million people in an uncontrolled AWS cloud environment, prompting an involuntary resignation.
Information security
fromTheregister
1 day ago

Ruh-roh. DDR5 memory vulnerable to new Rowhammer attack

A Rowhammer variant called Phoenix can corrupt and expose data on SK Hynix DDR5 modules, bypassing current protections and posing practical security risks.
#scattered-spider
Information security
fromSecurityWeek
1 day ago

Shai-Hulud Supply Chain Attack: Worm Used to Steal Secrets, 180+ NPM Packages Hit

A supply-chain attack named Shai-Hulud infected over 180 NPM packages with self-replicating malware that stole secrets and published them to public GitHub repositories.
Information security
fromZDNET
1 day ago

Why VPN use is set to explode worldwide - and three reasons that might apply to you

The global VPN market will grow from $48.7B in 2023 to $149.72B by 2030, driven by remote work, cloud deployments, and security needs.
Information security
fromSecurityWeek
1 day ago

RaccoonO365 Phishing Service Disrupted, Leader Identified

Microsoft and Cloudflare disrupted RaccoonO365, a phishing-as-a-service that stole thousands of Microsoft 365 credentials and targeted healthcare, prompting legal and technical takedowns.
Information security
fromTheregister
1 day ago

SSA rejects major DOGE whistleblower claims, silent on copy

DOGE allegedly created an unauthorized, unsecured live copy of SSA's Numident database stored outside SSA control and administered by DOGE employees.
fromDataBreaches.Net
21 hours ago

ShinyHunters claims 1.5 billion Salesforce records stolen in Drift hacks - DataBreaches.Net

The ShinyHunters extortion group claims to have stolen over 1.5 billion Salesforce records from 760 companies using compromised Salesloft Drift OAuth tokens. For the past year, the threat actors have been targeting Salesforce customers in data theft attacks using social engineering and malicious OAuth applications to breach Salesforce instances and download data. The stolen data is then used to extort companies into paying a ransom to prevent the data from being publicly leaked.
Information security
fromIT Pro
1 day ago

Jaguar Land Rover says IT disruption set to continue

Jaguar Land Rover (JLR) is extending its production shutdown for another week as it works to restore impacted systems following a cyber attack in late August.
Information security
Information security
fromTheregister
1 day ago

UEFI Secure Boot for Linux Arm64 - where do we stand?

UEFI with Secure Boot is standard on x86 and affected Linux booting; Microsoft's signed shim enabled Linux adoption and prompts evaluation of UEFI on Arm.
#cybersecurity
fromSecuritymagazine
2 days ago
Information security

Security Leaders Discuss Restaurant Brands International's Vulnerabilities

RBI systems exposed drive‑through audio and employee data due to basic security failures like hardcoded/default credentials.
fromSecurityWeek
2 days ago
Information security

Security Analytics Firm Vega Emerges From Stealth With $65M in Funding

Vega raised $65 million and launched an AI-driven security analytics and operations platform to replace inefficient SIEMs, founded by ex-8200 and Granulate veterans.
Information security
fromSecurityWeek
2 days ago

Ray Security Emerges From Stealth With $11M to Bring Real-Time, AI-Driven Data Protection

Ray Security uses AI to continuously monitor and predict corporate data use, applying real-time, dynamic protection while allowing enterprises to retain control over automated responses.
Information security
fromSecurityWeek
2 days ago

Neon Cyber Emerges from Stealth, Shining a Light into the Browser

Neon Cyber shifts cybersecurity focus from infrastructure to securing the workforce by deploying a browser extension that prevents browser-based phishing and AI-accelerated attacks.
Information security
fromComputerWeekly.com
2 days ago

Cyber leaders must make better use of risk experts | Computer Weekly

Clients must define clear, realistic cloud SLA requirements, conduct due diligence, and align SLAs with business objectives while managing—not eliminating—risk.
Information security
fromInfoWorld
2 days ago

Are cloud providers neglecting security to chase AI?

Rapid AI and hybrid cloud investments are fragmenting cloud security, eroding enterprise trust in cloud platforms' ability to protect systems.
Information security
fromThe Hacker News
2 days ago

Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover

Multiple critical Chaos Mesh vulnerabilities allow minimal in-cluster attackers to execute commands, disrupt services, steal tokens, and potentially achieve cluster-wide takeover.
Information security
fromTechzine Global
2 days ago

API attacks are skyrocketing: 40,000 incidents in six months

API attacks surged to over 40,000 incidents in H1 2025, with financial services and application-layer DDoS experiencing heavy, targeted automation and bot activity.
Information security
fromInfoQ
2 days ago

Linux Security Tools Bypassed by io_uring Rootkit Technique, ARMO Research Reveals

io_uring can enable full-featured rootkits to bypass traditional Linux runtime security tooling, allowing undetected command-and-control and I/O operations.
Information security
fromComputerworld
2 days ago

What is Apple's Memory Integrity Enforcement, and why does it matter?

MIE uses secure typed memory allocators, Enhanced Memory Tagging Extension in synchronous mode, and Tag Confidentiality Enforcement to prevent memory exploitation across Apple devices.
#china-cybersecurity
Information security
fromSecurityWeek
2 days ago

Endpoint Security Firm Remedio Raises $65 Million in First Funding Round

Remedio raised $65M to scale its AI-driven device security posture management and expand globally, targeting large enterprises and Fortune 500 customers.
Information security
fromSecurityWeek
1 day ago

Check Point to Acquire AI Security Firm Lakera

Check Point plans to acquire Lakera to provide end-to-end AI security for agentic AI, extending pre-deployment testing, runtime protection, and a Global Center of Excellence.
Information security
fromIT Pro
2 days ago

This DeepSeek-powered pen testing tool could be a Cobalt Strike successor - and hackers have downloaded it 10,000 times since July

Villager, developed by Cyberspike, automates sophisticated AI-native penetration attacks via PyPI using DeepSeek v3 and specialized toolsets.
Information security
fromwww.cnet.com
2 days ago

The VPN Market Is Booming Because We're Working Remotely and Worried About Privacy

Global VPN market will grow over 17% annually to $150 billion by 2030, driven by data-security concerns on public networks and rising remote/hybrid work.
Information security
fromTechzine Global
2 days ago

Rubrik and CrowdStrike expand identity security with rollback feature

Rubrik and CrowdStrike integrated detection with rollback recovery to detect identity attacks and restore identity systems to a secure, immutable state.
[ Load more ]