Information security

[ follow ]
Information security
fromTechzine Global
15 minutes ago

Microsoft ends year with patch for exploited zero day

Microsoft patched an actively exploited Windows zero-day (CVE-2025-62221) plus 56 vulnerabilities; AI-integrated tooling and other vendors' critical fixes increase urgency.
Information security
fromSecuritymagazine
8 hours ago

Should Organizations Block AI Browsers? Security Leaders Discuss

Agentic AI browsers introduce novel, systemic cybersecurity risks that can compromise many users; CISOs should block them to minimize enterprise exposure.
Information security
fromFast Company
52 minutes ago

'Urgent hiring need-no interview required.' How to spot and avoid fake recruiters from major companies

Fake recruiters impersonating major companies on job platforms scam applicants, stealing personal data and money and eroding trust in legitimate job opportunities.
#ai-browsers
fromZDNET
42 minutes ago
Information security

Gartner urges businesses to 'block all AI browsers' - what's behind the dire warning

fromZDNET
42 minutes ago
Information security

Gartner urges businesses to 'block all AI browsers' - what's behind the dire warning

Information security
fromIT Pro
52 minutes ago

Arctera Backup Exec 25.1 review: A smart business data protection solution with no hidden costs

Arctera Backup Exec 25.1 adds Windows Server 2025 and enhanced Microsoft 365 support, improved backup performance, new restore roles, and expanded malware scanning.
#react-server-components
fromInfoQ
8 hours ago
Information security

Patch Urgently - Critical Vulnerability CVE-2025-55182 in React Server Functions Actively Exploited

fromThe Hacker News
4 days ago
Information security

Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability

Two China-linked hacking groups quickly exploited React Server Components vulnerability CVE-2025-55182 (React2Shell), enabling unauthenticated remote code execution against affected React versions.
fromTechzine Global
5 days ago
Information security

Meta warns of critical vulnerability in React Server Components

A critical unauthenticated RCE in React Server Components (CVE-2025-55182) requires immediate updates to patched versions to prevent remote code execution.
fromInfoQ
8 hours ago
Information security

Patch Urgently - Critical Vulnerability CVE-2025-55182 in React Server Functions Actively Exploited

Information security
fromThe Hacker News
3 hours ago

Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws

Critical authentication-bypass and code-execution vulnerabilities fixed in Fortinet, Ivanti, and SAP products, including Fortinet SAML signature verification and Ivanti Endpoint Manager stored XSS.
Information security
fromInfoWorld
6 hours ago

GitHub Action Secrets aren't secret anymore: exposed PATs now a direct path into cloud environments

Exposed GitHub Personal Access Tokens enable attackers to access GitHub Action Secrets and pivot into cloud environments, compromising CSP credentials and infrastructure.
Information security
fromTheregister
9 hours ago

Patch Tuesday: Microsoft EoP, NotePad++, Ivanti, Fortinet

Patch the exploited Windows Cloud Files Mini Filter Driver zero-day (CVE-2025-62221) immediately; also prioritize Ivanti, Fortinet, Notepad++, and the two publicly known Microsoft RCE flaws.
Information security
fromThe Hacker News
1 day ago

Researchers Find Malicious VS Code, Go, npm, and Rust Packages Stealing Developer Data

Malicious VS Code extensions infected developer machines with stealer malware that captures screens, credentials, and exfiltrates data to an attacker-controlled server.
Information security
fromThe Hacker News
22 hours ago

STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware

STAC6565 (Gold Blade/RedCurl) targeted Canadian organizations, combining data theft and selective ransomware operations using custom tools such as QWCrypt and RedLoader.
Information security
fromComputerWeekly.com
12 hours ago

Microsoft patched over 1,100 CVEs in 2025 | Computer Weekly

A Windows Cloud Files Mini Filter Driver use-after-free vulnerability (CVE-2025-62221) is being actively exploited and can enable SYSTEM privilege escalation.
#react2shell
#ransomware
Information security
fromZero Day Initiative
13 hours ago

Zero Day Initiative - The December 2025 Security Update Review

Adobe released five bulletins addressing 139 CVEs—mostly XSS in Experience Manager—with Critical DOM-based XSS and a priority-1 ColdFusion fix; Microsoft released 56 Windows CVEs.
fromBleepingComputer
13 hours ago

North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks

A new malware implant called EtherRAT, deployed in a recent React2Shell attack, runs five separate Linux persistence mechanisms and leverages Ethereum smart contracts for communication with the attacker. Researchers at cloud security company Sysdig believe that the malware aligns with North Korea's tools used in Contagious Interview campaigns. They recovered EtherRAT from a compromised Next.js application just two days after the disclosure of the critical React2Shell vulnerability tracked as CVE-2025-55182.
Information security
fromThe Hacker News
17 hours ago

Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading

The threat actor known as Storm-0249 is likely shifting from its role as an initial access broker to adopt a combination of more advanced tactics like domain spoofing, DLL side-loading, and fileless PowerShell execution to facilitate ransomware attacks. "These methods allow them to bypass defenses, infiltrate networks, maintain persistence, and operate undetected, raising serious concerns for security teams," ReliaQuest said in a report shared with The Hacker News.
Information security
#prompt-injection
fromIT Pro
22 hours ago
Information security

NCSC issues urgent warning over growing AI prompt injection risks - here's what you need to know

fromIT Pro
22 hours ago
Information security

NCSC issues urgent warning over growing AI prompt injection risks - here's what you need to know

Information security
fromThe Hacker News
15 hours ago

Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure

Multiple distinct threat clusters use CastleLoader and associated CastleBot/CastleRAT tools, indicating a malware-as-a-service model and broad malware distribution.
fromNew Relic
20 hours ago

New Relic Security RX is now Generally Available

Security RX App treats application security as a runtime reality, not a static to-do list. Gone are the days of sifting through thousands of alerts for vulnerabilities in code that is not even in production: Security RX Focus on what matters first: Automatically filter out vulnerabilities in libraries sitting in a repo undeployed, so you can easily fix what's live first.
Information security
#zero-trust
#cybersecurity
fromIT Pro
19 hours ago
Information security

Cyber budget cuts are slowing down, but that doesn't mean there's light on the horizon for security teams

fromIT Pro
19 hours ago
Information security

Cyber budget cuts are slowing down, but that doesn't mean there's light on the horizon for security teams

Information security
fromComputerWeekly.com
20 hours ago

Why bug bounty schemes have not led to secure software | Computer Weekly

Software companies need legal liability for insecure code because bug bounties create exploitative, speculative labor and leave many security researchers underpaid and legally exposed.
Information security
fromwww.housingwire.com
23 hours ago

From resilience to antifragility: Rethinking cybersecurity for real estate and mortgage professionals

Cybersecurity must move beyond resilience to antifragility, using stress and incidents to strengthen systems, learn, and improve defenses.
Information security
fromZDNET
17 hours ago

Scammers are poisoning AI search results to steer you straight into their traps - here's how

Cybercriminals manipulate public web content to insert scam phone numbers so AI chatbots and LLM systems recommend fraudulent contact numbers to users.
Information security
fromTheregister
22 hours ago

UK finally vows to look at 35-year-old Computer Misuse Act

Portugal enacted legal protections for security researchers, increasing pressure on the UK to amend its 1990 Computer Misuse Act to safeguard vulnerability research.
Information security
fromComputerWeekly.com
17 hours ago

Are we mistaking regulation for resilience? | Computer Weekly

UK organisations face heavy compliance obligations and weak regulatory enforcement, causing fragile national cyber resilience and declining board-level cyber accountability.
Information security
fromTheregister
17 hours ago

'Botnets in physical form' are top humanoid robot risk

AI-infused humanoid robots present severe security risks; unsecured robots could be wormable physical botnets, requiring immediate built-in security and a new security industry.
Information security
fromSecuritymagazine
1 day ago

The New Real-Time Crime Center in an Age of Agentic AI

Agentic AI must be integrated into real-time crime centers to overcome siloed technologies and improve incident detection, coordination, and response.
Information security
fromTechCrunch
14 hours ago

Truecaller now lets users protect households from scam calls | TechCrunch

Truecaller launched Family Protection, a household-level scam protection letting one administrator manage scam controls for up to five family members.
Information security
fromThe Hacker News
1 day ago

Sneeit WordPress RCE Exploited in the Wild While ICTBroadcast Bug Fuels Frost Botnet Attacks

A critical RCE (CVE-2025-6389) in Sneeit Framework WordPress plugin (≤8.3) is actively exploited; update to 8.4 to mitigate.
Information security
fromTechRepublic
5 days ago

Microsoft Silently Fixes 8-Year Windows Security Flaw - TechRepublic

A long-standing Windows .LNK vulnerability (CVE-2025-9491) allowed hidden malicious commands and was exploited by multiple state-backed groups for nearly eight years.
#apache-tika
fromInfoWorld
1 day ago
Information security

Apache Tika hit by critical vulnerability thought to be patched months ago

fromInfoWorld
1 day ago
Information security

Apache Tika hit by critical vulnerability thought to be patched months ago

Information security
fromThe Hacker News
1 day ago

How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year?

Holiday shopping peaks concentrate automated credential-stuffing and account-takeover attacks that monetize stored payment tokens while third-party credentials enlarge breach impact.
#brickstorm
fromIT Pro
1 day ago
Information security

Chinese hackers are using 'stealthy and resilient' Brickstorm malware to target VMware servers and hide in networks for months at a time

fromNextgov.com
5 days ago
Information security

China is using advanced 'Brickstorm' malware against government and IT orgs, US assesses

fromIT Pro
1 day ago
Information security

Chinese hackers are using 'stealthy and resilient' Brickstorm malware to target VMware servers and hide in networks for months at a time

fromNextgov.com
5 days ago
Information security

China is using advanced 'Brickstorm' malware against government and IT orgs, US assesses

fromTechzine Global
1 day ago

Hackers exploit Palo Alto and SonicWall VPN login portals

Researchers at GreyNoise have identified a large-scale, ongoing campaign of login attempts targeting Palo Alto Networks and SonicWall VPN environments. According to the company, this is a coordinated attack in which the same tooling has been used over several months and across varying infrastructure. The campaign came to light after GreyNoise observed a spike on December 2 of more than 7,000 IP addresses attempting to log in to Palo Alto GlobalProtect portals.
Information security
Information security
fromComputerworld
1 day ago

You can't secure what you can't see: the data challenge

Rapidly growing data volumes and GenAI-driven generation increase breach risk; AI-driven DSPM is essential for discovering, classifying, and protecting sensitive data across environments.
#android-malware
#data-breach
Information security
fromTechCrunch
1 day ago

Google details security measures for Chrome's agentic features | TechCrunch

Chrome will use observer models, user consent, a Gemini-based critic, Agent Origin Sets, and URL checks to constrain agentic actions and reduce security risks.
Information security
fromInfoQ
2 days ago

BellSoft Unveils Hardened Java Images

BellSoft's Hardened Images significantly reduce container vulnerabilities and resource use by combining Java runtime optimisation, OS hardening, and proactive CVE remediation.
Information security
fromTechzine Global
1 day ago

NinjaOne launches remote access solution with a focus on security

NinjaOne Remote delivers integrated, security-first remote access for IT teams and MSPs across major OSes, supporting SOC 2, ISO 27001, GDPR, and NIS2 compliance.
Information security
fromFast Company
1 day ago

Every business is a snowflake

AI enables attackers to conduct large-scale, automated cyberattacks, forcing organizations to shift from reactive detection to preemptive deterrence and prevention.
Information security
fromIT Pro
1 day ago

AWS CISO Amy Herzog thinks AI agents will be a 'boon' for cyber professionals - and teams at Amazon are already seeing huge gains

Amazon's cybersecurity teams use AI agents to automate CVE analysis and related tasks, reducing manual toil and enabling deeper human-focused security work.
Information security
fromSecuritymagazine
2 days ago

Balancing Security with Tenant Privacy

Integrated smarthome-focused security design with user-storyboarded tenant access solved visualization and crowd-safety challenges for two Nashville multifamily buildings (2020–2024).
fromThe Atlantic
1 day ago

The Mystery of Mohammad Tajik

In December 2011, the CIA lost control of a stealth drone near the Iranian city of Kashmar, about 140 miles from the Afghanistan border, and it wound up in the regime's possession. On state television, the Iranian military displayed the boomerang-shaped craft like a trophy. Triumphant banners beneath its 30-foot wings said, in Farsi, THE US CAN'T MESS WITH US and WE'LL CRUSH AMERICA UNDERFOOT.
Information security
Information security
fromThe Hacker News
3 days ago

Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks

AI-powered IDEs have chained vulnerabilities that enable prompt injection, abuse of auto-approved tools, and weaponization of legitimate IDE features for data exfiltration and RCE.
Information security
fromZDNET
3 days ago

Your smart home is at risk - 6 ways to protect your devices from attack

Smart home security improves significantly with strong passwords, multi-factor authentication, firmware updates, secure Wi‑Fi, and researching device brands before purchase.
Information security
fromTheregister
3 days ago

Death to one-time text codes: Passkeys are the new hotness

Phishing-resistant multifactor authentication, such as passkeys and hardware-backed methods, is essential because SMS/email OTPs are vulnerable to phishing.
fromMail Online
3 days ago

Venezuela's secret war plan against the US exposed: 'Hail Mary' threat

Knight, who has over 25 years of experience in online security, revealed these have likely already begun, and warned people need to be extra vigilant as tensions rise. He admitted America has a huge advantage over Venezuela with its capabilities, and is understood to already be hitting assets like air defenses and security apparatus. But he warned hackers could unleash a wave of phishing links, fake emails and false profiles to impact ordinary Americans.
Information security
fromInfoQ
4 days ago

JFrog Unveils "Shadow AI Detection" to Tackle Hidden AI Risks in Enterprise Software Supply Chains

JFrog today expanded its Software Supply Chain Platform with a new feature called Shadow AI Detection, designed to give enterprises visibility and control over the often-unmanaged AI models and API calls creeping into their development pipelines.
Information security
Information security
fromThe Hacker News
5 days ago

JPCERT Confirms Active Command Injection Attacks on Array AG Gateways

A command injection flaw in Array Networks DesktopDirect (ArrayOS ≤9.4.5.8) has been exploited since Aug 2025 to drop web shells; update to 9.4.5.9.
fromComputerWeekly.com
4 days ago

Cyber teams on alert as React2Shell exploitation spreads | Computer Weekly

Maintained by Meta, React is an open source resource designed to enable developers to build user interfaces (UIs) for both native and web applications. The vulnerability in question, assigned CVE-2025-55182 and dubbed React2Shell by the cyber community, is a critically-scored pre-authentication RCE flaw in versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 of React Server Components that exploits a flaw in how they decode payloads sent to React Function Endpoints.
Information security
#cloudflare
fromwww.itpro.com
4 days ago
Information security

Cloudflare faces fresh disruption, as major websites including LinkedIn, Canva, and Downdetector show error messages

fromwww.itpro.com
4 days ago
Information security

Cloudflare faces fresh disruption, as major websites including LinkedIn, Canva, and Downdetector show error messages

fromThe Hacker News
4 days ago

Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails

Please check my email and complete all my recent organization tasks.
Information security
fromTheregister
4 days ago

Novel clickjacking attack relies on CSS and SVG

Security researcher Lyra Rebane has devised a novel clickjacking attack that relies on Scalable Vector Graphics (SVG) and Cascading Style Sheets (CSS). Rebane demonstrated the technique at BSides Tallinn in October and has now published a summary of her approach. The attack, which has yet to be fully mitigated, relies on the fact that SVG filters can leak information across origins, in violation of the web's same-origin policy.
Information security
Information security
fromInfoWorld
4 days ago

AI in CI/CD pipelines can be tricked into behaving badly

AI agents in CI/CD pipelines can be manipulated via crafted GitHub issue or pull request text to execute high-privilege commands and disclose secrets.
fromTheregister
4 days ago

Asus supplier hacked by Everest gang, loses 1 TB of data

In a post on its dark web leak site, seen by The Register, Everest said: "Files contain this information and much more: Binary segmentation modules, Source code & patches, RAM dumps & memory logs, AI models & weights, OEM internal tools & firmware, Test videos, Calibration & dual-camera data, Image datasets, Crash logs & debug reports, Evaluation & performance reports, HDR, fusion, post processing data, Test APKs, experimental apps, Scripts & automation, Small config binary calibration files."
Information security
Information security
fromIT Pro
5 days ago

The most prominent infostealers and how businesses can protect against them

Infostealers increasingly harvest credentials that enable major breaches and ransomware, with strains like Stealerium and Lumma driving widespread, adaptable, multi-vector attacks.
Information security
fromComputerWeekly.com
4 days ago

Cloudflare fixes second outage in a month | Computer Weekly

Cloudflare briefly lost Dashboard and API availability due to a WAF parsing change deployed to mitigate a critical React Server Components RCE (React2Shell) vulnerability, now resolved.
Information security
fromTravel + Leisure
4 days ago

The TSA Warns About 'Juice Jacking'-Here's How Travelers Can Stay Safe

Public USB charging stations present a theoretically possible but unconfirmed risk; modern devices and awareness reduce threat, while deceptive USB-C cables may pose greater danger.
fromComputerworld
4 days ago

Insecure use of Signal app part of wider Department of Defense problem, suggests Senate report

In short, while there was no evidence that unsanctioned app use is routine or normalized, it is likely that enough staff are using them to make a serious breach possible at some point. The report concludes that one of the reasons staff have taken to these messaging apps was that they lack convenient alternatives. It recommends developing approved apps to remove this need,
Information security
fromTechzine Global
4 days ago

Veeam and HPE strengthen collaboration for data protection

The two companies are presenting five innovations for data resilience, ranging from backup for HPE Morpheus VM Essentials to improved storage efficiency with HPE StoreOnce. Veeam and HPE are focused on simplifying data protection in hybrid cloud environments. Trust, resilience, and availability are key areas of focus. The strengthened collaboration aims to give companies more control over their data, regardless of where it is located.
Information security
Information security
from24/7 Wall St.
4 days ago

Rubrik Crushes Expectations Again. Here's What We're Watching

Rubrik achieved profitability and strong growth with EPS beat, revenue up 48% year-over-year, and substantial free cash flow improvement.
Information security
fromInfoWorld
5 days ago

A proactive defense against npm supply chain attacks

Widespread reliance on npm packages creates persistent, large-scale security risk as malicious packages can compromise thousands of downstream applications.
Information security
fromInfoWorld
6 days ago

Developers urged to immediately upgrade React, Next.js

React 19's RSC Flight protocol contains a critical deserialization vulnerability enabling remote code execution; immediate upgrade and patching are required.
Information security
fromThe Hacker News
5 days ago

Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China

Silver Fox conducts a false-flag SEO poisoning campaign using Microsoft Teams lures to deliver ValleyRAT while embedding Cyrillic elements to mislead attribution and target Chinese-speaking users.
Information security
fromThe Hacker News
5 days ago

5 Threats That Reshaped Web Security This Year [2025]

AI-powered 'vibe coding' produced functional but widely exploitable code, undermining traditional web security and requiring fundamentally new defensive approaches.
fromTheregister
5 days ago

Microsoft fixes Windows shortcut flaw exploited for years

Researchers at Trend Micro said in March that nearly a thousand malicious .lnk samples dating back to 2017 exploited this weakness across a mix of state-sponsored and cybercriminal campaigns worldwide. "Our analysis revealed that 11 state-sponsored groups from North Korea, Iran, Russia, and China have employed ZDI-CAN-25373 in operations primarily motivated by cyber espionage and data theft," it said at the time.
Information security
fromComputerWeekly.com
5 days ago

From trust to turbulence: Cyber's road ahead in 2026 | Computer Weekly

In 2025, trust became the most exploited surface in modern computing. For decades, cyber security has centered on vulnerabilities, software bugs, misconfigured systems and weak network protections. Recent incidents in cyber security marked a clear turning point, as attackers no longer needed to rely solely on traditional techniques. This shift wasn't subtle. Instead, it emerged across nearly every major incident: supply chain breaches leveraging trusted platforms, credential abuse across federated identity systems,
Information security
Information security
fromZDNET
5 days ago

Your Android phone may be in critical danger - update it ASAP

Google released the December 2025 Android security update fixing 107 vulnerabilities, including critical kernel and framework flaws, with two vulnerabilities possibly already exploited.
fromTheregister
5 days ago

Aisuru botnet turns was a terabit-scale internet stress test

Aisuru is a relative newcomer to the botnet scene. It was first spotted in 2024, but it has quickly grown into a Mirai-class monster built from hijacked routers, cameras, and other bargain-basement IoT gear. Despite its humble parts, it punches far above its weight, firing off multi-terabit, multibillion-packet-per-second DDoS blasts that make earlier Mirai variants look almost low-key by comparison.
Information security
fromComputerWeekly.com
5 days ago

Constrained budgets left security teams short-handed in 2025 | Computer Weekly

After a torrid 2024, the wider macroeconomic conditions affecting cyber security professionals showed signs of levelling off in 2025, with reports of budget cuts and layoffs to cyber teams dropping slightly this year after surging in the prior period. However, constrained budgets remain a key driver behind the ongoing cyber skills shortage. This is according to the annual Cybersecurity workforce study produced by cyber professional association ISC2, which polled over 16,000 security professionals to produce this year's report.
Information security
Information security
fromSecuritymagazine
6 days ago

After Email Hacking, University Targeted By Another Breach

University of Pennsylvania suffered a November breach of Oracle E-Business Suite servers exposing personal data of individuals across states, including 1,488 Maine residents.
[ Load more ]