Information security

[ follow ]
Information security
fromForbes
44 minutes ago

Adapting Brand Protection Strategies In The Age Of AI And Deepfakes

AI and automation have industrialized brand abuse at scale, requiring brands to move beyond manual enforcement to technology-driven defense strategies that match attacker velocity and economics.
Information security
fromBusiness Insider
43 minutes ago

Online ads just became the internet's biggest malware machine, report says

Malicious ads surpassed email as the primary malware delivery channel in 2025, accounting for over 60% of campaigns, with programmatic advertising instances growing 45% year-over-year.
#api-security
Information security
fromTechzine Global
59 minutes ago

Misused Gemini API key results in sky-high AI costs for startup

A stolen Google Gemini API key resulted in an $82,000 bill for a small startup in two days, revealing significant financial risks when access credentials are compromised.
Information security
fromTheregister
14 hours ago

Dev stunned by $82K Gemini API key bill after theft

A developer's stolen Google Gemini API key resulted in $82,314 in unauthorized charges within 48 hours, while Google refused to waive costs citing shared responsibility, threatening the startup's survival.
Information security
fromTechzine Global
59 minutes ago

Misused Gemini API key results in sky-high AI costs for startup

A stolen Google Gemini API key resulted in an $82,000 bill for a small startup in two days, revealing significant financial risks when access credentials are compromised.
Information security
fromTheregister
14 hours ago

Dev stunned by $82K Gemini API key bill after theft

A developer's stolen Google Gemini API key resulted in $82,314 in unauthorized charges within 48 hours, while Google refused to waive costs citing shared responsibility, threatening the startup's survival.
fromDevOps.com
1 hour ago

Chainguard Expands Repository to Add More Secure Open Source Libraries - DevOps.com

Chainguard has rebuilt nearly one million unique versions of Java dependencies, including enterprise essentials such as Spring Boot, Jackson, Apache Commons, and Log4j, using the Chainguard Factory, an automated platform for creating software builds based on code originally found in open source software repositories.
Information security
#cybersecurity
Information security
fromTheregister
1 day ago

Businesses told to harden defenses amid Iran conflict risk

The UK's NCSC warns organizations of potential cyber threats from Middle East conflict escalation, with indirect threats almost certain for region-linked businesses.
Information security
fromTheregister
1 day ago

Businesses told to harden defenses amid Iran conflict risk

The UK's NCSC warns organizations of potential cyber threats from Middle East conflict escalation, with indirect threats almost certain for region-linked businesses.
Information security
fromThe Hacker News
4 hours ago

APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

Silver Dragon, an APT41-linked group, targets European and Southeast Asian government entities through server exploitation, phishing, and Cobalt Strike beacons since mid-2024.
Information security
fromSecuritymagazine
13 hours ago

Would You Trust an AI Pentester to Work Solo?

AI-powered pentesting excels at speed and pattern recognition but requires human guidance to validate contextual vulnerabilities and novel attack paths that matter most to organizations.
Information security
fromInfoWorld
13 hours ago

Angular releases patches for SSR security issues

Google's Angular team released two security updates for SSR vulnerabilities: a critical SSRF/header injection flaw and a moderate open redirect flaw, requiring immediate patching to prevent authorization header theft and phishing attacks.
Information security
fromSecurityWeek
4 hours ago

Critical FreeScout Vulnerability Leads to Full Server Compromise

A critical zero-click RCE vulnerability in FreeScout bypasses previous patches using zero-width space characters, enabling unauthenticated remote code execution through malicious emails.
fromThe Hacker News
7 hours ago

CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

A malicious unauthenticated actor may exploit this issue to execute arbitrary commands, which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress. The shortcoming was addressed, along with CVE-2026-22720, a stored cross-site scripting vulnerability, and CVE-2026-22721, a privilege escalation vulnerability that could result in administrative access.
Information security
fromSecurityWeek
6 hours ago

VMware Aria Operations Vulnerability Exploited in the Wild

A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress. CISA added CVE-2026-22719 to its Known Exploited Vulnerabilities (KEV) catalog on Tuesday, instructing federal agencies to address it by March 24.
Information security
Information security
fromTechzine Global
5 hours ago

Eurofiber and Colt want quantum-secure connections

Eurofiber and Colt Technology Services launched a quantum-secure fiber optic connection between Amsterdam, London, and Brussels to protect financial institutions from future quantum computer-based cyberattacks.
#6g-security
Information security
fromTheregister
23 hours ago

Western governments seek to lock down 6G before it exists

Western governments launched 6G Security and Resilience Principles to embed supply chain controls and cyber safeguards into next-generation mobile networks before standardization occurs.
Information security
fromTheregister
23 hours ago

Western governments seek to lock down 6G before it exists

Western governments launched 6G Security and Resilience Principles to embed supply chain controls and cyber safeguards into next-generation mobile networks before standardization occurs.
fromSilicon Canals
3 hours ago

A US government iPhone hacking tool has gone feral - and 42,000 devices are already infected - Silicon Canals

Google security researchers released a report detailing Coruna as a highly sophisticated iPhone hacking toolkit that reportedly exploits multiple distinct vulnerabilities in iOS and includes several complete attack chains capable of bypassing iPhone security defenses. The toolkit can silently install malware when users simply visit compromised websites - no clicks, no downloads, no user interaction required.
Information security
Information security
fromTheregister
1 day ago

Microsoft OAuth scams abuse redirects for malware delivery

Microsoft warns of ongoing OAuth abuse scams using phishing emails and URL redirects to deliver malware and compromise organizational devices, primarily targeting government and public-sector entities.
Information security
fromThe Hacker News
22 hours ago

Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries

Russian-speaking threat actors used CyberStrikeAI, a China-linked open-source AI security tool, to attack Fortinet FortiGate appliances, compromising over 600 devices across 55 countries.
Information security
fromFortune
1 day ago

Boards aren't ready for the AI age: What happens when your CEO gets deepfaked? | Fortune

Deepfake fraud losses tripled to $1.1 billion in 2025, with executives vulnerable to synthetic voice and video impersonation attacks targeting both financial theft and reputational damage.
Information security
fromTechzine Global
23 hours ago

DeepKeep maps attack surface for AI agents

DeepKeep's AI Agent Scanner identifies security risks in AI agents by mapping vulnerabilities, tool access, and data exposure across supported frameworks using OWASP standards.
Information security
fromTechCrunch
23 hours ago

Fig Security emerges from stealth with $38M to help security teams deal with change | TechCrunch

Fig Security monitors enterprise security stacks to ensure detection and response capabilities function properly despite complex tool interactions and system changes.
Information security
fromThe Hacker News
1 day ago

Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

Microsoft warns of phishing campaigns exploiting OAuth redirect mechanisms to bypass email and browser defenses, targeting government and public-sector organizations to deliver malware without stealing credentials.
Information security
fromFortune
1 day ago

Why investing in cybersecurity just became a 'must-have' for CFOs | Fortune

CFOs must treat vendor cyber risk as a material balance sheet risk, integrating resilience assessments and proactive risk quantification into enterprise frameworks amid heightened geopolitical threats.
Information security
fromSecurityWeek
23 hours ago

New 'AirSnitch' Attack Shows Wi-Fi Client Isolation Could be a False Sense of Security

Researchers discovered that client isolation in Wi-Fi networks can be bypassed on all tested routers due to missing standardization and inconsistent vendor implementations.
Information security
fromTechRepublic
20 hours ago

Chrome Extension Hijacked to Deliver Malware, Steal Crypto Wallets

QuickLens Chrome extension was compromised to deliver malware, steal cryptocurrency wallet data, and execute ClickFix attacks by stripping security headers and establishing command-and-control communications.
Information security
fromComputerworld
1 day ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
Information security
fromSecurityWeek
1 day ago

Vulnerability in MS-Agent AI Framework Can Allow Full System Compromise

CVE-2026-2256 in ModelScope MS-Agent framework allows arbitrary OS command execution through inadequate input sanitization in the Shell tool using regex-based blacklist filtering.
Information security
fromwww.bbc.com
1 day ago

Deepfake attack: 'Many people could have been cheated'

Deepfake technology has increased 3,000% over two years, enabling fraudsters to impersonate executives and manipulate financial markets and corporate security through AI-generated videos and audio.
Information security
fromTheregister
23 hours ago

Perplexity Comet browser hole was exploitable via cal invite

Perplexity's Comet browser had critical security vulnerabilities allowing attackers to steal local files and access password vaults through malicious calendar invitations until recently.
#iphone-security-vulnerabilities
Information security
fromNextgov.com
14 hours ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
Information security
fromTechCrunch
14 hours ago

A suite of government hacking tools targeting iPhones is now being used by cybercriminals | TechCrunch

Government-designed iPhone exploit kit Coruna leaked from surveillance vendor to cybercriminals, Russian espionage groups, and Chinese hackers, demonstrating how state-sponsored tools proliferate into criminal markets.
Information security
fromNextgov.com
14 hours ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
Information security
fromTechCrunch
14 hours ago

A suite of government hacking tools targeting iPhones is now being used by cybercriminals | TechCrunch

Government-designed iPhone exploit kit Coruna leaked from surveillance vendor to cybercriminals, Russian espionage groups, and Chinese hackers, demonstrating how state-sponsored tools proliferate into criminal markets.
Information security
fromThe Hacker News
1 day ago

SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains

SloppyLemming conducted attacks on Pakistani and Bangladeshi government and critical infrastructure using new malware families BurrowShell and a Rust-based keylogger between January 2025 and January 2026.
Information security
fromSecurityWeek
22 hours ago

Honeywell, Researcher Clash Over Impact of Building Controller Vulnerability

A researcher discovered that Honeywell's IQ4 building controller exposes unauthenticated web interfaces and allows remote administrator account creation, but Honeywell disputes the severity, claiming the vulnerability only exists during installation before the system becomes operational.
Information security
fromSecurityWeek
1 day ago

Android Update Patches Exploited Qualcomm Zero-Day

Google released Android security updates patching nearly 130 vulnerabilities, including an exploited zero-day in Qualcomm chipsets affecting over 200 devices through integer overflow in graphics components.
Information security
fromTechRepublic
6 days ago

Google Expands AI Scam Protection to Samsung Galaxy S26

Google expands AI-powered scam detection beyond Pixel phones to Samsung Galaxy S26 and other Android devices, with real-time call and message fraud analysis using on-device AI.
Information security
fromThe Hacker News
1 day ago

Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited

Google disclosed a high-severity Qualcomm Graphics component vulnerability (CVE-2026-21385) being exploited in Android devices, with March 2026 patches addressing 129 total vulnerabilities including critical remote code execution and privilege escalation flaws.
#chrome-security-vulnerability
Information security
fromZDNET
1 day ago

This high-severity Chrome Gemini vulnerability lets malicious extensions spy on your PC

A high-severity vulnerability in Chrome's Gemini feature allows malicious extensions to inject code, enabling attackers to spy on users, steal data, access webcams and microphones, and conduct phishing attacks.
fromThe Hacker News
1 day ago
Information security

New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

A patched Chrome vulnerability (CVE-2026-0628) allowed malicious extensions to escalate privileges and access local files, camera, microphone, and screenshots through insufficient WebView policy enforcement.
fromSecurityWeek
1 day ago
Information security

Vulnerability Allowed Hijacking Chrome's Gemini Live AI Assistant

A Chrome vulnerability allowed malicious extensions to hijack Gemini Live AI assistant and access sensitive user data through privileged browser access.
Information security
fromTheregister
1 day ago

Chrome AI panel became privilege escalator for extensions

A high-severity Chrome vulnerability allowed malicious extensions to hijack the Gemini Live AI panel and gain unauthorized access to system resources like cameras, microphones, and local files.
Information security
fromZDNET
1 day ago

This high-severity Chrome Gemini vulnerability lets malicious extensions spy on your PC

A high-severity vulnerability in Chrome's Gemini feature allows malicious extensions to inject code, enabling attackers to spy on users, steal data, access webcams and microphones, and conduct phishing attacks.
Information security
fromThe Hacker News
1 day ago

New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

A patched Chrome vulnerability (CVE-2026-0628) allowed malicious extensions to escalate privileges and access local files, camera, microphone, and screenshots through insufficient WebView policy enforcement.
Information security
fromSecurityWeek
1 day ago

Vulnerability Allowed Hijacking Chrome's Gemini Live AI Assistant

A Chrome vulnerability allowed malicious extensions to hijack Gemini Live AI assistant and access sensitive user data through privileged browser access.
Information security
fromThe Hacker News
22 hours ago

Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

Tier 1 SOC analysts process the highest alert volume with the least experience, creating a structural vulnerability where alert fatigue, decision fatigue, and cognitive overload directly undermine organizational security performance and increase incident costs.
fromSecurityWeek
17 hours ago

Iranian Strikes on Amazon Data Centers Highlight Industry's Vulnerability to Physical Disasters

These strikes have caused structural damage, disrupted power delivery to our infrastructure, and in some cases required fire suppression activities that resulted in additional water damage. AWS said in an update on its online dashboard regarding the Iranian drone strikes on its Middle East facilities.
Information security
Information security
from24/7 Wall St.
23 hours ago

The Cybersecurity ETF That Missed the Boom Entirely

Global X Cybersecurity ETF (BUG) underperforms despite structural growth in cybersecurity spending, returning -3% over five years while competitors and broader indices significantly outpaced it.
#cybersecurity-leadership
Information security
fromSecuritymagazine
1 day ago

Shawn Fallah - Top Cybersecurity Leaders 2026

Shawn Fallah leads HSI's Cyber and Operational Technology directorate, overseeing technical law enforcement systems and a $1.1 billion budget while advancing modern security infrastructure to counter emerging threats.
Information security
fromSecuritymagazine
1 day ago

Shawn Fallah - Top Cybersecurity Leaders 2026

Shawn Fallah leads HSI's Cyber and Operational Technology directorate, overseeing technical law enforcement systems and a $1.1 billion budget while advancing modern security infrastructure to counter emerging threats.
#cyber-warfare
fromSecurityWeek
1 day ago
Information security

Iran Cyber Front: Hacktivist Activity Rises, but State-Sponsored Attacks Stay Low

Information security
fromFortune
2 days ago

Cyber retaliation from Iran is a problem for U.S. companies - 'It's in the hands of a 19-year-old hacker in a Telegram room,' ex-NSA operative says | Fortune

Iranian cyber operatives compromised a popular prayer app to coordinate civil resistance during strikes, prompting regime loyalists to launch aggressive counter-attacks through decentralized hacker networks.
fromSecurityWeek
1 day ago
Information security

Iran Cyber Front: Hacktivist Activity Rises, but State-Sponsored Attacks Stay Low

Information security
fromFortune
2 days ago

Cyber retaliation from Iran is a problem for U.S. companies - 'It's in the hands of a 19-year-old hacker in a Telegram room,' ex-NSA operative says | Fortune

Iranian cyber operatives compromised a popular prayer app to coordinate civil resistance during strikes, prompting regime loyalists to launch aggressive counter-attacks through decentralized hacker networks.
Information security
fromNextgov.com
20 hours ago

CISA appoints new acting cyber chief after recent leadership shakeups

Chris Butera becomes CISA's acting executive assistant director for cybersecurity following leadership restructuring and workforce reductions at the agency.
Information security
fromThe Hacker News
19 hours ago

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Threat actors impersonate IT support via email and phone calls to deliver Havoc C2 framework for data exfiltration or ransomware attacks across multiple organizations.
fromThe Hacker News
1 day ago

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

It launches a headless Chrome instance - a browser that operates without a visible window - inside a Docker container, loads the brand's real website, and acts as a reverse proxy between the target and the legitimate site. Recipients are served genuine page content directly through the attacker's infrastructure, ensuring the phishing page is never out of date.
Information security
fromNextgov.com
19 hours ago

Why the convergence of AI and cybersecurity must be a top priority for the administration

AI is directly impacting blue team (defender) and red team (attacker) strategies, operations and tactics. Federal cybersecurity teams are increasingly relying on AI for anomaly detection, predictive threat intelligence and faster incident response. AI can flag suspicious behavior, such as access to sensitive systems from unusual locations, without depending on static rules.
Information security
Information security
fromThe Hacker News
1 day ago

Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More

Multiple attack vectors across network systems, cloud infrastructure, and AI platforms exploit access control gaps, exposed credentials, and trusted service misuse to target high-value sectors.
#ai-security-vulnerability
Information security
fromTechzine Global
2 days ago

Flaw in OpenClaw allows complete takeover of AI agent

A critical vulnerability in OpenClaw allowed arbitrary websites to hijack AI assistants through localhost WebSocket connections without user interaction or malicious plugins.
fromSecurityWeek
1 day ago
Information security

OpenClaw Vulnerability Allowed Websites to Hijack AI Agents

OpenClaw AI assistant vulnerability allowed attackers to hijack agents through malicious websites by exploiting localhost assumptions and rate limiter exemptions for loopback connections.
Information security
fromTechzine Global
2 days ago

Flaw in OpenClaw allows complete takeover of AI agent

A critical vulnerability in OpenClaw allowed arbitrary websites to hijack AI assistants through localhost WebSocket connections without user interaction or malicious plugins.
Information security
fromSecurityWeek
1 day ago

OpenClaw Vulnerability Allowed Websites to Hijack AI Agents

OpenClaw AI assistant vulnerability allowed attackers to hijack agents through malicious websites by exploiting localhost assumptions and rate limiter exemptions for loopback connections.
Information security
fromThe Hacker News
2 days ago

How to Protect Your SaaS from Bot Attacks with SafeLine WAF

SaaS applications face constant automated bot attacks that exploit business logic, appearing as legitimate growth while degrading performance; SafeLine WAF protects by inspecting traffic patterns and behavior before requests reach application code.
Information security
fromSecuritymagazine
2 days ago

Why Security Teams Can No Longer Ignore Recruitment Fraud

AI-powered recruitment fraud exploits human trust in hiring workflows, with job scams surging over 1,000% as attackers use deepfakes and impersonation to target vulnerable candidates and organizations during periods of labor market volatility.
Information security
fromThe Hacker News
2 days ago

APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday

Microsoft patched CVE-2026-21513, a high-severity MSHTML Framework vulnerability exploited as a zero-day by Russia-linked APT28, allowing attackers to bypass security features and achieve code execution through malicious files.
Information security
fromTheregister
1 day ago

Memory scalpers hunt scarce DRAM with bot blitz

Web scraping bots are systematically targeting DRAM inventory across e-commerce sites, submitting millions of requests to identify stock for resale at inflated prices, with operators increasingly using AI tools to enhance their scraping effectiveness.
Information security
fromNextgov.com
1 day ago

Intelligence firms watch for uptick in Iran cyber activity after US, Israel strikes

Tehran-linked hackers are escalating digital reconnaissance and preparing potentially disruptive cyber operations following recent U.S. and Israeli strikes on Iran.
Information security
fromTechRepublic
5 days ago

ChatGPT Criminals: AI Scams Target Dating and Legal Impersonators - TechRepublic

Generative AI enhances traditional scams by improving message quality, consistency, and scale, making romance fraud and professional impersonation harder to detect and easier to execute at volume.
Information security
fromThe Hacker News
2 days ago

North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT

North Korean threat actors deployed 26 malicious npm packages using steganography to hide command-and-control infrastructure in Pastebin essays, targeting developers with credential stealers and remote access trojans.
Information security
fromFortune
1 day ago

Iran doesn't need sci-fi AI to pose a serious cyber threat | Fortune

Iran, a sophisticated cyber power, may develop AI-powered attacks against U.S., Israeli, and Gulf State critical infrastructure as military tensions escalate and automated hacking tools become more prevalent.
Information security
fromSecurityWeek
2 days ago

North Korean APT Targets Air-Gapped Systems in Recent Campaign

APT37 deployed five new malicious tools in the Ruby Jumper campaign targeting air-gapped systems using USB-based data exfiltration and persistence mechanisms.
Information security
fromThe Hacker News
1 day ago

Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome

Google is developing Merkle Tree Certificates to secure HTTPS against quantum computing threats while maintaining current internet speed and performance.
Information security
fromSecurityWeek
2 days ago

Google Working Towards Quantum-Safe Chrome HTTPS Certificates

Google plans to enhance Chrome's HTTPS certificate resilience against quantum computers using Merkle Tree Certificates that reduce bandwidth while maintaining security and transparency.
Information security
fromNextgov.com
1 day ago

Fake DOD memo about 'compromised' apps shows swift spread of deceptive messaging

A fake U.S. Cyber Command memo falsely claiming apps were compromised and revealing servicemembers' locations circulated during military channels, but DOD confirmed it was not authentic.
fromDataBreaches.Net
2 days ago

CISA Releases New Guidance on Assembling Multi-Disciplinary Insider Threat Management Teams - DataBreaches.Net

CISA's guidance is intended to assist critical infrastructure stakeholders, which includes private sector entities across various sectors, with implementing an insider threat mitigation program that combines physical security, cybersecurity, personnel awareness, and community partnerships. Although framed for critical infrastructure, CISA's guidance is relevant to a broader range of organizations, including those outside of critical infrastructure sectors.
Information security
Information security
fromTheregister
2 days ago

Scammers target Dubai bank accounts amid Iran missile salvo

Cybercriminals impersonated Dubai Crisis Management to exploit missile attack victims, attempting SIM-swap attacks to access bank accounts using stolen UAE Pass and Emirates ID credentials.
Information security
fromTheregister
1 day ago

Israel hacks prayer app to push propaganda to Iran: report

Israel allegedly hacked the Iranian prayer app BadeSaba to distribute messages urging military members to oppose the regime, exploiting the app's 37 million users and their location data.
fromDataBreaches.Net
1 day ago

Wisconsin k-12 district hit by weeklong outage - DataBreaches.Net

A reported "cyber incident" left the Denmark School District in the Village of Denmark, Wisconsin, without internet access for five school days, forcing teachers and students to rely on paper-based workarounds, according to a local news report.
Information security
Information security
fromSecuritymagazine
2 days ago

Iranian Apps, Websites Hacked Following US-Israeli Strikes

Coordinated cyber operations against Iran caused significant internet disruption and compromised news websites and a major religious app with messages urging military surrender.
Information security
fromSecurityWeek
2 days ago

Nick Andersen Appointed Acting Director of CISA

Nick Andersen appointed acting director of CISA, replacing Madhu Gottumukkala who left after failing a polygraph test and uploading sensitive information to public ChatGPT.
#ai-security
Information security
fromThe Hacker News
3 days ago

ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket

OpenClaw fixed a high-severity vulnerability allowing malicious websites to hijack locally running AI agents through password brute-forcing and unauthorized device registration.
Information security
fromSecurityWeek
3 days ago

Hackers Weaponize Claude Code in Mexican Government Cyberattack

Attackers exploited Claude Code to compromise ten Mexican government bodies and a financial institution, exfiltrating 150GB of data affecting 195 million identities by bypassing AI safety guardrails through social engineering.
Information security
fromThe Hacker News
3 days ago

ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket

OpenClaw fixed a high-severity vulnerability allowing malicious websites to hijack locally running AI agents through password brute-forcing and unauthorized device registration.
fromTheregister
4 days ago

DEF CON hackers 'fed up with government,' Jake Braun says

Thinking back to Ben Franklin, we saw society moving in the right direction for the last 500 years because of our commitment to science, human rights, etc., and that seems to be at the very least slowing down, if not reversing. Braun said he blames government for this state of affairs - pointedly 'the inability of government to continue to make the progress we saw from the enlightenment.'
Information security
Information security
fromDataBreaches.Net
4 days ago

Court Refuses to Slice Up CiCi's Cyber Extortion Coverage - DataBreaches.Net

Insurers must draft cyber insurance policies with clear language to restrict coverage; ambiguous sublimit endorsements will be interpreted in favor of policyholders.
#data-breach
fromSecurityWeek
5 days ago

Critical Flaws Exposed Gardyn Smart Gardens to Remote Hacking

According to CISA, Gardyn products were affected by two critical and two high-severity vulnerabilities. One of the critical flaws, tracked as CVE-2025-29631, is a command injection issue that can be exploited to execute arbitrary OS commands on the targeted device. The second critical vulnerability, CVE-2025-1242, is related to the exposure of hardcoded admin credentials that can be used to gain full control of the Gardyn IoT Hub.
Information security
#freepbx-security
fromSecurityWeek
5 days ago

Juniper Networks PTX Routers Affected by Critical Vulnerability

The On-Box Anomaly detection framework should only be reachable by other internal processes over the internal routing instance, but not over an externally exposed port. With the ability to access and manipulate the service to execute code as root a remote attacker can take complete control of the device.
Information security
Information security
fromThe Hacker News
4 days ago

Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor

A malicious Go module impersonating legitimate golang.org/x/crypto harvests passwords, establishes SSH persistence, and deploys the Rekoobe Linux backdoor through namespace confusion attacks.
fromTechRepublic
4 days ago

5 Nations Alert: Critical Cisco Bug Used in Global Espionage Campaign

Cisco confirmed that attackers exploited the bug, tracked as CVE-2026-20127, to bypass authentication, gain privileged access, and quietly steal data. The discovery prompted a rare joint warning from authorities in the US, UK, Australia, Canada, and New Zealand.
Information security
Information security
fromSecurityWeek
4 days ago

In Other News: ATT&CK Advisory Council, Russian Cyberattacks Aid Missile Strikes, Predator Bypasses iOS Indicators

Predator spyware suppresses iOS indicators through kernel-level access, Russian cyberattacks on Ukraine's energy grid gather intelligence for missile targeting, and Treasury launches AI cybersecurity initiative for financial services.
Information security
fromTheregister
4 days ago

Suspected Nork intruders infecting US healthcare, education

North Korean-linked hackers deployed a new backdoor called Dohdoor to infect US education and healthcare institutions since December for financial gain.
fromDataBreaches.Net
5 days ago

Cisco says hackers have been exploiting a critical bug to break into big customer networks since 2023 - DataBreaches.Net

The bug, which has a maximum-rated vulnerability severity score of 10.0, allows hackers to remotely break into networks running its Catalyst SD-WAN products, which allow large companies and government agencies with multiple offices to connect their private networks over long distances.
Information security
Information security
fromThe Hacker News
5 days ago

Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

Threat actors distribute trojanized gaming utilities via browsers and chat platforms to deploy a multi-purpose RAT that establishes persistence through scheduled tasks and evades detection via Microsoft Defender exclusions.
Information security
fromThe Hacker News
5 days ago

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

North Korean threat actor ScarCruft deployed the Ruby Jumper campaign using malware families that abuse Zoho WorkDrive for C2 communications and removable media to compromise air-gapped networks.
Information security
fromTheregister
4 days ago

Double whammy: Steaelite RAT bundles data theft, ransomware

Steaelite, a new remote access trojan sold on cybercrime networks, enables double extortion attacks on Windows machines through ransomware, data theft, credential stealing, and live surveillance controlled via a centralized browser-based dashboard.
fromTheregister
4 days ago

Ransomware payments cratered in 2025 - attacks did not

Despite the relative stability in total payments, ransomware attacks surged across multiple vectors in 2025, with eCrime.ch data showing a 50 percent YoY increase in claimed ransomware victims, marking the most active year on record.
Information security
Information security
fromTechzine Global
5 days ago

Cyber resilience gap: High confidence, but reality lags behind

Organizations invest heavily in cyber resilience but remain vulnerable to external threats due to perimeter-focused strategies that neglect ecosystem-wide protection.
[ Load more ]