Information security

[ follow ]
#fortinet
fromThe Hacker News
3 days ago
Information security

Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls

Fortinet confirms active exploitation bypassing FortiCloud SSO patches on fully-patched FortiGate devices, enabling unauthenticated SSO bypass, persistence creation, VPN access changes, and configuration exfiltration.
fromThe Hacker News
4 days ago
Information security

Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations

Automated attackers exploit Fortinet SSO vulnerabilities (CVE-2025-59718, CVE-2025-59719) to create accounts, enable VPN access, and exfiltrate firewall configurations.
fromTheregister
1 hour ago

ESET: Russia likely behind Poland power grid attack

Russia was probably behind the failed attempts to compromise the systems of Poland's power companies in December, cybersecurity researchers claim. ESET attributed the attack with "medium" confidence to Russia's GRU-run Sandworm unit, after it investigated the attack and its use of wiper malware. The attackers, believed to be state-backed, deployed DynoWiper malware on Poland's national energy systems. Energy minister Milosz Motyka said they attempted to disrupt communication between renewable hardware and power distribution operators, but were unsuccessful.
Information security
fromSecurityWeek
1 hour ago

'Stanley' Malware Toolkit Enables Phishing via Website Spoofing

Stanley MaaS creates Chrome extensions that keep the address bar showing legitimate URLs while delivering attacker-controlled phishing content.
Information security
fromThe Hacker News
1 hour ago

Winning Against AI-Based Attacks Requires a Combined Defensive Approach

Offensive AI and novel evasion techniques enable adversaries to autonomously generate, conceal, and adapt malware to bypass legacy endpoint defenses like EDR and AV.
#data-breach
fromDataBreaches.Net
2 days ago
Information security

Call-On-Doc allegedly had a breach affecting more than 1 million patients. They've yet to comment. - DataBreaches.Net

fromDataBreaches.Net
2 days ago
Information security

Call-On-Doc allegedly had a breach affecting more than 1 million patients. They've yet to comment. - DataBreaches.Net

Information security
fromTheregister
1 hour ago

Windows 11 boot failures tied to January tied to Jan updates

January 2026 Windows 11 security updates are causing a limited number of physical devices to enter a boot loop with an UNMOUNTABLE_BOOT_VOLUME stop code.
#vmware-vcenter
fromSecurityWeek
7 hours ago
Information security

2024 VMware Flaw Now in Attackers' Crosshairs

CVE-2024-37079, a critical DCERPC out-of-bounds write in VMware vCenter (CVSS 9.8), is being exploited in the wild; apply June 2024 patches immediately.
fromTheregister
2 days ago
Information security

Critical VMware vCenter Server bug under attack

Critical VMware vCenter Server vulnerability CVE-2024-37079 allows remote code execution via DCERPC and is being exploited in the wild despite Broadcom patches.
Information security
fromThe Hacker News
3 hours ago

Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers

North Korean Konni uses AI-generated PowerShell malware and spear-phishing to target blockchain developers, expand geographically, and deliver EndRAT via disguised links and insecure WordPress sites.
fromTheregister
13 hours ago

Automotive systems get pwned at Pwn2Own Automotive 2026

infosec in brief T'was a dark few days for automotive software systems last week, as the third annual Pwn2Own Automotive competition uncovered 76 unique zero-day vulnerabilities in targets ranging from Tesla infotainment to EV chargers. A record 73 entries were included in this year's competition at Automotive World in Tokyo, and, while not all were successful, Trend Micro's Zero Day Initiative still ended up paying out more than $1 million to successful competitors. For those unfamiliar with the structure of a Pwn2Own competition, ethical hackers and security experts enter with plans to perform a certain exploit, which they must do in a limited time.
Information security
fromSecurityWeek
4 hours ago

Russian Sandworm Hackers Blamed for Cyberattack on Polish Power Grid

Russia-linked Sandworm APT used DynoWiper in a December 2025 cyberattack against Poland's power grid; attack was halted before causing outages.
#phishing
fromZDNET
3 days ago
Information security

1Password's new anti-phishing feature adds a crucial layer of protection - how it works

AI tools let criminals build realistic phishing websites, boosting credential theft risk; 1Password warns when passwords are pasted into fake sites to reduce attacks.
fromEngadget
3 days ago
Information security

1Password adds an extra layer of phishing protection

1Password's browser extension warns users before pasting credentials into websites not linked to saved logins, preventing accidental credential theft from phishing sites.
fromZDNET
3 days ago
Information security

1Password's new anti-phishing feature adds a crucial layer of protection - how it works

#ransomware
Information security
fromZDNET
10 hours ago

Microsoft said my Windows 10 PC no longer supported updates - but this software saved it

Third-party micropatch service 0patch can provide targeted security fixes to keep Windows 10 systems protected after Microsoft ends official support and ESU.
Information security
fromInfoWorld
2 hours ago

Why your AI agents need a trust layer before it's too late

Agentic AI requires a DNS-like trust infrastructure to authenticate and verify agents before autonomy causes systemic failures.
fromTechRepublic
5 days ago

EU's New Cybersecurity Act Could Ban High-Risk Suppliers - TechRepublic

Yesterday (Jan. 20), the Commission unveiled its revised Cybersecurity Act proposal after months of behind-the-scenes negotiations that reportedly caused substantial friction between officials and member states. This sweeping update introduces measures to identify and potentially exclude "high-risk" third countries and companies from Europe's critical digital infrastructure across 18 essential sectors, including energy systems. As cybersecurity threats continue rising since the original Act took effect seven years ago, the EU is essentially drawing new battle lines in the global tech landscape.
Information security
fromInfoQ
1 day ago

Two Missing Characters: How a Regex Flaw Exposed AWS GitHub Repos to Supply-Chain Risk

Wiz Security's research team identified that a subset of repositories configured regular expressions for AWS CodeBuild webhook filters intended to limit trusted actor IDs, but these filters were insufficient, allowing a predictably acquired actor ID to gain administrative permissions. The four affected repositories that put the AWS Console supply chain at risk were the AWS SDK for JavaScript v3, the general-purpose cryptographic library aws-lc, amazon-corretto-crypto-provider, and awslabs/open-data-registry, a repository of publicly available datasets accessible from AWS resources.
Information security
fromZDNET
1 day ago

10 ways AI can inflict unprecedented damage in 2026

Weaponized AI will become widespread in 2026, enabling stealthy, agentic attacks that demand cybersecurity teams rapidly upskill to manage novel AI-driven threats.
Information security
fromMedium
3 weeks ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Strong encryption, especially AES-256-GCM, provides robust, reliable protection for sensitive personal data against unauthorized access and modern cyber threats.
Information security
fromBleepingComputer
20 hours ago

New Android malware uses AI to click on hidden browser ads

Android click-fraud trojans use TensorFlow.js ML to visually detect ad elements and perform automated taps via hidden WebView or streamed control, evading DOM-based defenses.
fromMedium
3 weeks ago

Where DFIR Fits in NIST's Cyber AI Profile

The National Institute of Standards and Technology (NIST) recently released NIST IR 8596, the Initial Preliminary Draft of the Cybersecurity Framework Profile for Artificial Intelligence (Cyber AI Profile). The document establishes a structured approach for managing cybersecurity risk related to AI systems and the use of AI in cyber defense, organised around three focus areas: Securing AI System Components (Secure), Conducting AI-Enabled Cyber Defense (Defend), and Thwarting AI-Enabled Cyber Attacks (Thwart).
Information security
fromMedium
3 weeks ago

Securing Microservice Communication with Istio and Envoy Sidecars

Istio with Envoy sidecars delivers a service mesh that secures, controls, and observes microservice traffic across Kubernetes without changing application code.
Information security
fromeLearning Industry
23 hours ago

Does Your Mandatory Training Change Behavior Or Just Get Completed?

Mandatory training should shift from compliance checklists to capability-building that prepares employees to apply policies confidently in real, complex workplace situations.
fromMedium
3 weeks ago

Linux Permissions Unleashed: A Deep Dive into Access Control Lists (ACLs)

We have already discussed in the previous two articles about file and folder permissions along with special permissions that are supported in linux. The permissions are effective for many scenarios. But what happens when you need more granularity? How do you grant write access to a file to just one specific user who isn't the owner and isn't in the owning group? How do you allow two different groups read access, but only one of them write access?
Information security
fromArs Technica
1 day ago

Wiper malware targeted Poland energy grid, but failed to knock out electricity

Poland's electric grid was targeted by wiper malware likely deployed by Russia-aligned Sandworm, aiming to disrupt communications between renewables and power operators but failing.
Information security
fromArs Technica
6 years ago

New clues show how Russia's grid hackers aimed for physical destruction

Russian hackers aimed to cause lasting physical destruction to Ukrainian power-grid equipment by using malware designed to damage hardware during recovery, not a brief outage.
Information security
fromThe Hacker News
2 days ago

New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector

Sandworm used a previously undocumented wiper called DynoWiper in an unsuccessful late-December 2025 attempt to disrupt Poland's energy infrastructure.
Information security
fromThe Hacker News
2 days ago

CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog

CVE-2024-37079 is a critical heap overflow in VMware vCenter Server being actively exploited and requires immediate patching.
Information security
fromDataBreaches.Net
2 days ago

ShinyHunters claim to be behind SSO-account data theft attacks - DataBreaches.Net

Voice phishing targeting Okta, Microsoft, and Google SSO lets attackers bypass MFA, access corporate SaaS platforms, and steal company data for extortion.
Information security
fromSecurityWeek
2 days ago

Nike Probing Potential Security Incident as Hackers Threaten to Leak Data

Nike is investigating a potential cybersecurity incident after WorldLeaks listed Nike as a victim and threatened to publish alleged stolen data unless paid.
from24/7 Wall St.
1 day ago

CrowdStrike (NASDAQ: CRWD) Stock Price Prediction and Forecast 2025-2030 (Feb 2025)

A U.S. judge recently dismissed a shareholder lawsuit that accused cybersecurity company CrowdStrike Holdings Inc. ( NASDAQ: CRWD) of making false statements about its software testing before the 2024 global outage. Also, it has announced its intent to acquire Seraphic and SGNL, as well as new strategic partnership with Nord Security. The share price is 6.3% lower than a month ago and down 3.9% from six months ago, underperforming the Nasdaq in both time frames.
Information security
Information security
fromThe Verge
1 day ago

Gmail's spam filter and automatic sorting are broken

Gmail is displaying warnings that messages haven't been scanned for spam or harmful software; users should exercise extra caution while engineers investigate.
fromPCMAG
12 years ago

'SkyJack' Software Finds and Hijacks Drones

is a drone engineered to autonomously seek out, hack, and wirelessly take over other drones within wifi distance, creating an army of zombie drones under your control.
Information security
Information security
fromTheregister
2 days ago

CISA won't attend infosec industry's biggest conference

CISA will not participate in the RSA Conference, citing a return to statutory mission, stakeholder review, and stewardship of taxpayer dollars amid political controversy.
Information security
fromwww.scientificamerican.com
1 day ago

How digital forensics could prove what's real in the age of deepfakes

Cryptographic hashing and careful forensic handling verify digital-evidence integrity and prevent unnoticed tampering when evaluating AI-generated or manipulated media.
Information security
fromThe Hacker News
2 days ago

CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities

CISA added four actively exploited vulnerabilities to its KEV catalog, including high-severity remote file inclusion, authentication bypass, access-control, and npm supply-chain compromise.
Information security
fromTechzine Global
3 days ago

Misuse of VS Code tasks poses risk to developers

VS Code tasks.json can automatically run commands when a folder is opened, enabling supply-chain attacks that execute malicious, persistent code across platforms.
fromSecuritymagazine
3 days ago

Security Vendors, Fortune 500 Companies Exposed and Exploited

Research from Pentera Labs reveals evidence of active exploitation in customer-managed business cloud environments, particularly within Fortune 500 companies and cybersecurity vendors. This exploitation is targeting training applications utilized by said organizations. These are applications typically deployed for security demos and training, including OWASP Juice Shop, DVWA and Hackazon. The research discovered thousands of systems exposed, with several hosted on enterprise infrastructure using Azure, AWS and GCP cloud platforms.
Information security
Information security
fromThe Hacker News
3 days ago

Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms

Multi‑stage AitM phishing and BEC campaign weaponizes SharePoint and trusted internal accounts to persist via inbox rules and propagate large‑scale internal and external phishing.
#cybersecurity
fromDataBreaches.Net
3 days ago
Information security

NL: Police warned about security hole used by Russian hackers in major theft of police data - DataBreaches.Net

fromDataBreaches.Net
3 days ago
Information security

NL: Police warned about security hole used by Russian hackers in major theft of police data - DataBreaches.Net

Information security
fromArs Technica
3 days ago

Overrun with AI slop, cURL scraps bug bounties to ensure "intact mental health"

cURL is ending its vulnerability reward program due to overwhelming low-quality, largely AI-generated bug reports that strain its small maintainer team.
#okta
Information security
fromTheregister
2 days ago

AI-powered cyberattack kits are 'just a matter of time'

Cybercriminals will soon chain AI tools into automated, end-to-end attack toolkits, forcing CISOs to prepare for large-scale, automated cyberattacks.
#credentials-leak
fromWIRED
3 days ago
Information security

149 Million Usernames and Passwords Exposed by Unsecured Database

fromWIRED
3 days ago
Information security

149 Million Usernames and Passwords Exposed by Unsecured Database

Information security
fromTechzine Global
2 days ago

149 million login details leaked via unsecured database

A publicly accessible database exposed 149 million usernames and passwords across email, social, financial, government, and streaming services, likely harvested by infostealer malware.
fromSearch Engine Roundtable
3 days ago

How To Secure Your Google Ads Accounts Amongst The Account Hijacks

To start, having your Google Ads account hijacked can be devastating, and it is just that much worse on the agency level. Your budgets can be spent, your bank accounts can be depleted, and your account history and reputation can be ruined. All of this can also lead to losing advertising clients and maybe worse. We covered some of this in our November story.
Information security
fromDataBreaches.Net
2 days ago

ShinyHunters group opens new dark web leak site, claims responsibility for OKTA vishing campaign - DataBreaches.Net

BIG - ShinyHunters confirmed to me that they are behind the recent Okta vishing campaign and have published alleged data from three major victims ( Crunchbase, SoundCloud, and Betterment) on their new blog, stating more are coming. 🔽
Information security
Information security
fromZDNET
3 days ago

Windows 11 hit by bevy of bugs to kick off 2026 - here's the roundup

Microsoft's January Patch Tuesday fixed many vulnerabilities but introduced multiple Windows bugs, some patched and some still unresolved.
fromTheregister
3 days ago

Tech support detective solved crime by checking the carpark

"A floor manager responsible for production asked me to fix his PC, which was so slow he could literally make a coffee in the time between double-clicking an icon and having the program open," Parker told On Call. The manager's PC was only a year old and ran Windows XP, a combo that at the time of this tale should have made for decent performance.
Information security
Information security
fromThe Verge
3 days ago

The TikTok deal is done, finally

USDS Joint Venture will secure U.S. user data, apps, and algorithm in Oracle's U.S. cloud with audited cybersecurity, software assurance, and trust-and-safety controls.
fromSecuritymagazine
3 days ago

The Inaugural Ed Chandler Security Innovation Award Presented to ADRM

Last year, the security consulting community reached a new milestone: the introduction of the Ed Chandler Security Innovation Award. The award, presented for the very first time at CONSULT 2025 and co-sponsored by SecuritySpecifiers and Security magazine, honors the life, legacy and influence of Edmonds (Ed) Chandler Jr. The inaugural award is designed to recognize the innovation that advances both the practice and impact of security consulting.
Information security
Information security
fromZDNET
2 days ago

No, the IRS didn't text or email you - 3 ways to protect yourself from scams

Messages claiming you're due a tax refund are scams aiming to steal bank or Social Security numbers; report them and delete without responding.
Information security
fromFortune
3 days ago

America hacked Venezuela's grid to literally turn off the lights on Jan. 3. It could happen here, too | Fortune

State-level and supply-chain cyberattacks target industrial control systems, enabling sabotage or pre-positioning; proactive hunting, secure-by-design, and zero-trust defenses are essential.
Information security
fromThe Hacker News
3 days ago

ThreatsDay Bulletin: Pixel Zero-Click, Redis RCE, China C2s, RAT Ads, Crypto Scams & 15+ Stories

Attackers increasingly exploit trusted systems and workflows, using scale, patience, and minimal friction to gain control without novel techniques.
Information security
fromInfoWorld
4 days ago

GitLab 2FA login protection bypass lets attackers take over accounts

A critical 2FA bypass (CVE-2026-0723) in GitLab Community and Enterprise requires immediate patching to prevent account compromise and supply-chain attacks.
Information security
fromTheregister
3 days ago

Phishing attacks abuse SharePoint, target energy orgs

Attackers used SharePoint-based phishing to steal credentials, compromise energy-sector email accounts, and send hundreds of phishing messages from hijacked inboxes.
Information security
fromTechzine Global
3 days ago

Skeleton Key campaign exploits trusted RMM tools

Attackers hijack legitimate remote monitoring and management (RMM) tools, using stolen credentials and signed enterprise software to maintain stealthy persistent backdoors.
#cve-2026-20045
Information security
fromThe Hacker News
4 days ago

SmarterMail Auth Bypass Exploited in the Wild Two Days After Patch Release

An authentication bypass in SmarterMail allows unauthenticated users to reset any system administrator password via /api/v1/auth/force-reset-password, enabling potential full system compromise.
#cve-2026-24061
Information security
fromZero Day Initiative
4 days ago

Zero Day Initiative - Pwn2Own Automotive 2026 - Day Two Results

Julien Cohen-Scali chained an authentication bypass and privilege escalation on Phoenix Contact CHARX SEC-3150, earning $20,000 and 4 Master of Pwn points; Autocrypt failed to demonstrate a Grizzl‑E exploit in time.
Information security
fromComputerworld
3 days ago

Critical Cisco UC bug actively exploited

Critical RCE vulnerability CVE-2026-20045 affects Cisco Unified Communications products, is actively exploited, and patches have been released; CISA added it to its exploited vulnerabilities catalog.
Information security
fromThe Hacker News
3 days ago

New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack

Osiris is a new ransomware family using POORTRY vulnerable driver in a BYOVD attack to disable security, perform per-file hybrid encryption, and exfiltrate data.
Information security
fromTheregister
3 days ago

Crims hit the easy button for IT helpdesk scams

Custom voice-phishing kits sold on dark-web channels enable attackers to spoof authentication flows, intercept credentials and MFA codes, and orchestrate live helpdesk social-engineering.
Information security
fromTheregister
3 days ago

FortiGate firewalls hit by silent SSO attacks & config theft

Attackers are bypassing SSO to reconfigure FortiGate firewalls, create backdoor admins, export configurations, and exfiltrate sensitive credentials using authentication bypass vulnerabilities.
Information security
fromTheregister
3 days ago

BoE: UK finservs still lacking on basic cybersecurity

UK 2025 cybersecurity review finds financial firms and FMIs still lack basic safeguards: weak access controls, poor patching, misconfigurations, insufficient detection, and poor security culture.
Information security
fromDataBreaches.Net
3 days ago

Zendesk ticket systems hijacked in massive global spam wave - DataBreaches.Net

Unsecured Zendesk support forms are being abused to send massive volumes of confusing confirmation emails, causing recipients worldwide to receive hundreds of alarming messages.
Information security
fromThe Hacker News
4 days ago

Malicious PyPI Package Impersonates SymPy, Deploys XMRig Miner on Linux Hosts

A malicious PyPI package impersonating SymPy installs an XMRig cryptocurrency miner on Linux by downloading and executing ELF payloads in memory.
Information security
fromTechzine Global
3 days ago

Check Point launches AI-driven Exposure Management

Check Point Exposure Management centralizes exposure data, prioritizes real-world risks, and automates secure remediation across network, endpoint, cloud, email, and identity layers.
Information security
fromwww.bleepingcomputer.com
3 days ago

Why Active Directory password resets are surging in hybrid work

Hybrid work turned routine password resets into widespread productivity and security problems by increasing lockouts, remote troubleshooting complexity, and helpdesk workload.
Information security
fromTechzine Global
4 days ago

Secure networking: the foundation for the AI era

Organizations must modernize and simplify networks, strengthen security, and automate to maintain resilience against increasingly sophisticated, fast-moving cyberattacks and AI-driven pressure.
Information security
fromSecuritymagazine
4 days ago

What Security Leaders Could Expect in 2026

AI-driven autonomous systems and expanding poly-threat environments will create accountability, identity, and risk-management challenges for organizations in 2026.
fromTechCrunch
3 days ago

Under Armour says it's 'aware' of data breach claims after 72M customer records were posted online | TechCrunch

aware of claims that an unauthorized third party obtained certain data.
Information security
Information security
fromTechCrunch
3 days ago

Microsoft 365 hit by outage, preventing access to emails and files | TechCrunch

A Microsoft cloud outage in North America blocks enterprise access to email, files, Teams meetings, and administrator security dashboards.
fromSecuritymagazine
4 days ago

What Background Checks Miss: The Human Layer Behind Modern Screening

Over the past few years, while applying for security and risk-related roles, I noticed a pattern that surprised me: many background screening vendors only asked for a few years of employment history, minimal address information, minimal educational verification, and returned results within one or two days. In contrast, I also noticed that industries with higher regulatory standards, such as finance and transportation, conduct far deeper checks that can span from weeks to months.
Information security
Information security
fromTechzine Global
3 days ago

Keyfactor and IBM accelerate quantum-secure transition

A joint Keyfactor–IBM solution automates discovery and modernization of cryptographic assets to achieve quantum-safe, policy-driven PKI and crypto governance.
Information security
fromDataBreaches.Net
3 days ago

Kazakhstan Considers Criminal Liability for Mass Leaks of Personal Data - DataBreaches.Net

Kazakhstan will tighten penalties for personal data breaches, adding criminal liability for mass leaks and substantially increasing administrative fines.
Information security
fromBitcoin Magazine
3 days ago

Coinbase Forms Quantum Computing Advisory Board

Coinbase created an Independent Advisory Board to assess quantum computing risks to blockchain security and guide industry-wide post-quantum preparedness.
Information security
fromThe Hacker News
5 days ago

CERT/CC Warns binary-parser Bug Allows Node.js Privilege-Level Code Execution

A lack of sanitization in binary-parser versions before 2.3.0 can allow attacker-controlled input to be compiled into runtime code, enabling arbitrary JavaScript execution.
Information security
fromThe Hacker News
4 days ago

Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws

Critical Zoom MMR command-injection allows remote code execution; GitLab patches multiple high-severity flaws enabling DoS and 2FA bypass—update immediately.
Information security
fromThe Hacker News
5 days ago

Chainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs

Critical Chainlit (ChainLeak) vulnerabilities enable arbitrary file reads and SSRF, risking cloud API key exposure, sensitive file theft, privilege escalation, and lateral movement.
Information security
fromThe Hacker News
4 days ago

North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews

North Korean-linked PurpleBravo targeted 3,136 IPs and 20 organizations across sectors and regions using malicious developer tools and job-seeker lures.
[ Load more ]