Information security

[ follow ]
#github
Information security
fromTheregister
1 hour ago

Wiz hands GitHub AI-aided bug report that isn't total slop

Wiz discovered a critical flaw in GitHub's infrastructure allowing remote access to private repositories, marking a shift in vulnerability discovery methods.
Information security
fromInfoWorld
2 hours ago

Critical GitHub RCE bug exposed millions of repositories

GitHub patched a critical vulnerability in GitHub Enterprise Server, but 88% of instances remained exposed at public disclosure.
Information security
fromSecurityWeek
7 hours ago

Critical GitHub Vulnerability Exposed Millions of Repositories

A critical vulnerability in GitHub allowed remote code execution, exposing millions of repositories, but was quickly addressed by the company.
Information security
fromThe Verge
4 hours ago

GitHub rushed to fix a critical vulnerability in less than six hours

GitHub fixed a critical vulnerability in under six hours, preventing potential access to millions of repositories.
Information security
fromTheregister
1 hour ago

Wiz hands GitHub AI-aided bug report that isn't total slop

Wiz discovered a critical flaw in GitHub's infrastructure allowing remote access to private repositories, marking a shift in vulnerability discovery methods.
Information security
fromInfoWorld
2 hours ago

Critical GitHub RCE bug exposed millions of repositories

GitHub patched a critical vulnerability in GitHub Enterprise Server, but 88% of instances remained exposed at public disclosure.
Information security
fromSecurityWeek
7 hours ago

Critical GitHub Vulnerability Exposed Millions of Repositories

A critical vulnerability in GitHub allowed remote code execution, exposing millions of repositories, but was quickly addressed by the company.
Information security
fromThe Verge
4 hours ago

GitHub rushed to fix a critical vulnerability in less than six hours

GitHub fixed a critical vulnerability in under six hours, preventing potential access to millions of repositories.
Information security
fromSecurityWeek
1 hour ago

Fresh LiteLLM Vulnerability Exploited Shortly After Disclosure

A critical SQL injection vulnerability in LiteLLM was exploited shortly after disclosure, allowing unauthorized access to sensitive database information.
fromArs Technica
3 hours ago

Why a recent supply-chain attack singled out security firms Checkmarx and Bitwarden

Current evidence indicates that this data originated from Checkmarx's GitHub repositories, and that access to those repositories was facilitated through the initial supply chain attack of March 23, 2023.
Information security
Information security
fromTechCrunch
56 minutes ago

Sri Lanka discloses another missing payment, days after hackers stole $2.5M from its finance ministry | TechCrunch

Sri Lanka is investigating missing payments and cyber thefts linked to hackers targeting its financial systems.
#malware
Information security
fromInfoWorld
12 hours ago

More fake extensions linked to GlassWorm found in Open VSX code marketplace

73 new fraudulent extensions have been added to the Open VSX marketplace, continuing supply chain attacks that download GlassWorm malware.
Information security
fromThe Hacker News
1 day ago

Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More

New malware fast16 predates Stuxnet, targeting high-precision software to subtly alter calculations, potentially causing significant failures.
Information security
fromThe Hacker News
4 days ago

Researchers Uncover Pre-Stuxnet 'fast16' Malware Targeting Engineering Software

A new Lua-based malware, fast16, predates Stuxnet and targets high-precision calculation software for cyber sabotage.
Information security
fromSecurityWeek
4 days ago

Pre-Stuxnet Sabotage Malware 'Fast16' Linked to US-Iran Cyber Tensions

Fast16 is a Lua-based malware discovered by SentinelOne, predating Stuxnet, designed to tamper with high-precision software.
Information security
fromTheregister
4 days ago

CISA, NCSC issue Firestarter backdoor warning

Firestarter malware targets a US federal agency, maintaining persistent access to compromised devices, posing risks to government and critical infrastructure.
Information security
fromTheregister
5 days ago

Researchers find sabotage malware that may predate Stuxnet

Malware named fast16 aims to sabotage engineering and physics simulation software, predating Stuxnet and targeting high-precision tools.
Information security
fromThe Hacker News
8 hours ago

LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure

A critical SQL injection vulnerability in BerriAI's LiteLLM package is actively exploited within 36 hours of disclosure, allowing unauthorized database access.
#ai-agents
Information security
fromWIRED
1 day ago

The Race Is on to Keep AI Agents From Running Wild With Your Credit Cards

The FIDO Alliance is developing standards to secure AI agent transactions against digital security threats.
fromZDNET
1 day ago
Information security

77% of IT managers say their AI agents are out of control - 5 ways to rein in yours

Information security
fromWIRED
1 day ago

The Race Is on to Keep AI Agents From Running Wild With Your Credit Cards

The FIDO Alliance is developing standards to secure AI agent transactions against digital security threats.
Information security
fromZDNET
1 day ago

77% of IT managers say their AI agents are out of control - 5 ways to rein in yours

Only 23% of IT managers have complete control over AI agents, leading to security and productivity concerns.
#cybersecurity
Information security
fromThe Hacker News
23 hours ago

VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi

VECT 2.0 acts as a wiper, permanently destroying files instead of encrypting them, making recovery impossible even for victims who pay the ransom.
Information security
fromSecurityWeek
1 day ago

Alleged Chinese State Hacker Extradited to US

Xu Zewei, a Chinese national, was extradited to the US for cyberattacks linked to a state-sponsored APT group targeting US universities.
Information security
fromThe Hacker News
4 hours ago

CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV

CISA added two vulnerabilities to its KEV catalog due to active exploitation, impacting ConnectWise ScreenConnect and Microsoft Windows.
Information security
fromThe Hacker News
19 hours ago

Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push

A critical vulnerability in GitHub allows remote code execution via a single 'git push' command due to improper input sanitization.
Information security
fromComputerWeekly.com
1 day ago

Are tech leaders risking a cyber resourcing crisis? | Computer Weekly

Cybersecurity professionals face low pay rises and high job dissatisfaction, risking a talent crisis despite the growing demand for their skills.
Information security
fromThe Hacker News
23 hours ago

VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi

VECT 2.0 acts as a wiper, permanently destroying files instead of encrypting them, making recovery impossible even for victims who pay the ransom.
#checkmarx
Information security
fromSecurityWeek
4 hours ago

Chrome 147, Firefox 150 Security Updates Rolling Out

Google and Mozilla released security updates for Chrome and Firefox, addressing multiple memory safety vulnerabilities and critical flaws.
Information security
fromSecuritymagazine
14 hours ago

Protecting U.S. Critical Infrastructure as Global Tensions Rise

Geopolitical tensions necessitate enhanced security measures for critical infrastructure to mitigate indirect threats and improve situational awareness.
Information security
fromInfoQ
1 day ago

CodeGuardian: A Model Context Protocol Server for AI-Assisted Code Quality Analysis and Security Scanning

Invoking security tools via an LLM and MCP reduces developer friction and context switching.
Information security
fromSecurityWeek
2 days ago

Incomplete Windows Patch Opens Door to Zero-Click Attacks

Incomplete patching of Windows vulnerabilities led to new zero-click attack vectors, enabling credential theft without user interaction.
#microsoft
Information security
fromThe Hacker News
1 day ago

Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202

Microsoft acknowledged active exploitation of a high-severity security flaw in Windows Shell, now patched, allowing unauthorized access to sensitive information.
Information security
fromThe Hacker News
1 day ago

Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202

Microsoft acknowledged active exploitation of a high-severity security flaw in Windows Shell, now patched, allowing unauthorized access to sensitive information.
#ai
Information security
fromTheregister
1 day ago

Cursor-Opus agent snuffs out startup's production database

An AI coding agent deleted PocketOS's production database and backups in 9 seconds due to a credential mismatch and improper token permissions.
Information security
fromTheregister
1 day ago

Cursor-Opus agent snuffs out startup's production database

An AI coding agent deleted PocketOS's production database and backups in 9 seconds due to a credential mismatch and improper token permissions.
#agentic-ai
Information security
fromSecurityWeek
22 hours ago

The Mythos Moment: Enterprises Must Fight Agents with Agents

Agentic AI poses significant cyber risks by autonomously identifying and exploiting software vulnerabilities, necessitating advanced defensive measures.
Information security
fromSecurityWeek
5 days ago

Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents

Agentic AI is transforming cybersecurity, presenting both opportunities for defenders and risks for attackers, necessitating a strategic response from the industry.
Information security
fromSecurityWeek
22 hours ago

The Mythos Moment: Enterprises Must Fight Agents with Agents

Agentic AI poses significant cyber risks by autonomously identifying and exploiting software vulnerabilities, necessitating advanced defensive measures.
Information security
fromSecurityWeek
5 days ago

Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents

Agentic AI is transforming cybersecurity, presenting both opportunities for defenders and risks for attackers, necessitating a strategic response from the industry.
Information security
fromTechzine Global
1 day ago

Malicious Python package poses new supply chain threat

The open-source package elementary-data was compromised, leading to the publication of a malicious version that stole sensitive user credentials.
#ransomware
Information security
fromFuturism
2 days ago

Ransomware Negotiator Pleads Guilty to Deploying Ransomware Himself

A ransomware negotiator conspired with hackers, betraying clients and facilitating attacks against multiple companies.
Information security
fromFuturism
2 days ago

Ransomware Negotiator Pleads Guilty to Deploying Ransomware Himself

A ransomware negotiator conspired with hackers, betraying clients and facilitating attacks against multiple companies.
Information security
fromSecurityWeek
1 day ago

Sevii Launches Cyber Swarm Defense to Make Agentic AI Security Costs Predictable

Predictable budgets and on-demand defensive agentic AI can now be aligned despite historical incompatibility.
Information security
fromnews.bitcoin.com
1 day ago

Zetachain Pauses Mainnet After GatewayZEVM Contract Exploit Targets Protocol Wallets

Zetachain paused its mainnet after a vulnerability in the GatewayZEVM smart contract was exploited, affecting internal team wallets but not user funds.
Information security
fromThe Hacker News
1 day ago

Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover

AI agents in Microsoft Entra ID can lead to privilege escalation and identity takeover attacks due to a security flaw in the Agent ID Administrator role.
Information security
fromSecurityWeek
1 day ago

Dozens of Open VSX Extension Clones Linked to GlassWorm Malware

Over 70 extensions in the Open VSX marketplace are likely linked to GlassWorm malware, designed to steal sensitive information and deploy malware.
Information security
fromTheregister
19 hours ago

Don't pay VECT a ransom - your big files are likely gone

Organizations affected by Trivy and LiteLLM compromises that paid Vect likely received little data recovery, according to Check Point Research.
Information security
fromFortune
1 day ago

Ten years after Ethereum's DAO disaster, it's time to try again | Fortune

The DAO Moratorium warned of critical vulnerabilities in Ethereum's DAO, exposing nearly $200 million to hackers.
Information security
fromnews.bitcoin.com
1 day ago

Solana Readies Quantum Defense With 3-Step Roadmap and Falcon Implementation

Anza and Firedancer selected the Falcon post-quantum signature scheme for Solana, ensuring readiness against quantum threats without immediate migration needs.
Information security
fromSecurityWeek
1 day ago

Electric Motorcycles and Scooters Face Hacking Risks to Security and Rider Safety

Electric motorcycles from Zero Motorcycles and scooters from Yadea have vulnerabilities that could impact physical security and safety.
fromSecuritymagazine
1 day ago

2025 Saw Fewer Healthcare Breaches Than 2024

The report revealed that 74% of the analyzed organizations either lacked a DMARC policy entirely or had it set to monitor-only mode, which does not block spoofed emails.
Information security
#ai-security
fromSecurityWeek
2 days ago
Information security

Malicious AI Prompt Injection Attacks Increasing, but Sophistication Still Low: Google

fromZDNET
5 days ago
Information security

How indirect prompt injection attacks on AI work - and 6 ways to shut them down

Information security
fromSecurityWeek
2 days ago

Malicious AI Prompt Injection Attacks Increasing, but Sophistication Still Low: Google

Google's research reveals an increase in indirect prompt injection attacks on AI, though their sophistication remains relatively low.
Information security
fromZDNET
5 days ago

How indirect prompt injection attacks on AI work - and 6 ways to shut them down

Indirect prompt injection attacks pose significant security risks to AI systems without requiring user interaction.
#ai-in-cybersecurity
Information security
fromThe Hacker News
1 day ago

Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren't Ready for the Remediation Side

AI systems like Claude Mythos can identify vulnerabilities quickly, but organizations struggle to remediate them effectively.
Information security
fromThe Hacker News
1 day ago

Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren't Ready for the Remediation Side

AI systems like Claude Mythos can identify vulnerabilities quickly, but organizations struggle to remediate them effectively.
Information security
fromThe Hacker News
2 days ago

Fake CAPTCHA IRSF Scam and 120 Keitaro Campaigns Drive Global SMS, Crypto Fraud

Telecommunications fraud campaign uses fake CAPTCHA to trick users into sending costly international text messages, generating illicit revenue for fraudsters.
Information security
fromSecurityWeek
2 days ago

OpenSSH Flaw Allowing Full Root Shell Access Lurked for 15 Years

OpenSSH versions have a vulnerability allowing root access via certificate misconfiguration, undetectable by log-based systems.
#crowdstrike
Information security
from24/7 Wall St.
1 day ago

Mizuho Upgrades CrowdStrike With a $520 Price Target: Is AI Security the Next Mega-Trade?

Mizuho upgraded CrowdStrike to Outperform, raising its price target to $520, citing strong demand and AI security growth potential.
Information security
from24/7 Wall St.
1 day ago

Mizuho Upgrades CrowdStrike With a $520 Price Target: Is AI Security the Next Mega-Trade?

Mizuho upgraded CrowdStrike to Outperform, raising its price target to $520, citing strong demand and AI security growth potential.
Information security
fromTechRepublic
1 day ago

Truecaller Faces New Pressure in India as Growth Matures - TechRepublic

Truecaller reached 500 million monthly active users but faces growth challenges in India due to increased competition and changing user needs.
Information security
fromSecurityWeek
2 days ago

Easily Exploitable 'Pack2TheRoot' Linux Vulnerability Leads to Root Access

A high-severity vulnerability in PackageKit allows unprivileged users to install packages with root privileges, tracked as CVE-2026-41651.
Information security
fromTechCrunch
1 day ago

Hacker who allegedly carried out cyberattacks for China is extradited to U.S. | TechCrunch

Xu Zewei, accused of cyberattacks for the Chinese government, has been extradited to the U.S. and is now in detention in Houston, Texas.
Information security
fromSecurityWeek
4 days ago

China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks

GopherWhisper is a newly identified APT using legitimate services for command-and-control communication and data exfiltration, primarily targeting a Mongolian government entity.
Information security
fromSecurityWeek
5 days ago

Bitwarden NPM Package Hit in Supply Chain Attack

The Bitwarden CLI NPM package was compromised, enabling credential theft through a malicious payload targeting various cloud services and GitHub repositories.
Information security
fromThe Hacker News
5 days ago

LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure

A high-severity SSRF vulnerability in LMDeploy is actively exploited, allowing attackers to access sensitive data and internal networks.
Information security
fromSecurityWeek
5 days ago

US Federal Agency's Cisco Firewall Infected With 'Firestarter' Backdoor

A US federal agency was infected with malware due to vulnerabilities in Cisco firewalls linked to a China-backed espionage campaign.
Information security
fromTheregister
5 days ago

Attackers could disable all of a city's public EV chargers

Rented IoT infrastructure prioritizes user convenience over security, exposing them to denial of service attacks and vulnerabilities.
Information security
fromTechzine Global
5 days ago

Agentic AI is reshaping the network - and it's time to upgrade

Wireless connectivity is essential for AI, transforming industries and requiring strategic management to address complexity and security risks.
[ Load more ]