Information security

[ follow ]
fromTechzine Global
1 hour ago

Go developer questions effectiveness of Dependabot

Dependabot sounded the alarm on a large scale. Thousands of repositories automatically received pull requests and warnings, including a high vulnerability score and signals about possible compatibility issues. According to Valsorda, this shows that the tool mainly checks whether a dependency is present, without analyzing whether the vulnerable code is actually accessible within a project.
Information security
#data-breach
Information security
fromTheregister
2 days ago

Attacker gets into France's DB listing all bank accounts

A January breach exposed 1.2 million French bank account records, while attackers actively exploit two critical Ivanti EPMM zero-days targeting unpatched systems worldwide.
Information security
fromTheregister
4 days ago

ShinyHunters demands $1.5M not to leak Wynn Resorts data

Wynn Resorts experienced a data breach; ShinyHunters claims theft of over 800,000 employee records including Social Security numbers and personal details.
fromSecurityWeek
44 minutes ago

Ex-US Defense Contractor Executive Jailed for Selling Exploits to Russia

Peter Williams stole a U.S. defense contractor's trade secrets about highly sensitive cyber capabilities and sold them to a broker whose clients include the Russian government, putting our national security and countless potential victims at risk.
Information security
Information security
fromSecurityWeek
1 hour ago

SecurityWeek Report: 426 Cybersecurity M&A Deals Announced in 2025

The cybersecurity M&A market rebounded in 2025 with 426 deals, a 5% increase from 2024, reflecting strategic consolidation and increased globalization with higher deal values and complexity.
fromReadWrite
1 hour ago

Second lawsuit targets Wynn data breach claims

We have learned that an unauthorized third party acquired certain employee data. Upon discovery, we immediately activated our incident response protocols and launched a thorough investigation with the help of external cybersecurity experts. The unauthorized third party has stated that the stolen data has been deleted. We are monitoring and to date have not seen any evidence that the data has been published or otherwise misused.
Information security
Information security
fromThe Hacker News
5 hours ago

SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution

SolarWinds released patches for four critical remote code execution vulnerabilities in Serv-U file transfer software, all rated 9.1 CVSS severity, requiring administrative privileges for exploitation.
Information security
fromThe Hacker News
7 hours ago

CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability

CISA added CVE-2026-25108, an OS command injection vulnerability in FileZen, to its Known Exploited Vulnerabilities catalog due to active exploitation evidence.
#supply-chain-attack
fromInfoWorld
2 hours ago
Information security

Microsoft warns of jobthemed repo lures targeting developers with multistage backdoors

fromInfoWorld
2 hours ago
Information security

Microsoft warns of jobthemed repo lures targeting developers with multistage backdoors

fromSecurityWeek
5 hours ago

Ad Tech Company Optimizely Targeted in Cyberattack

The threat actor gained access to Optimizely's systems through a sophisticated voice-phishing attack, but was unable to escalate privileges, install software, or create any backdoors in the Optimizely environment. The incident was confined to certain internal business systems including Zendesk, records in our Salesforce CRM, and a limited set of internal documents used for back-office operations.
Information security
#cybersecurity
Information security
fromSecurityWeek
3 hours ago

Astelia Raises $35 Million for Exposure Management

Astelia raised $35 million to expand its AI-powered exposure management platform that identifies and prioritizes critical vulnerabilities through attack-path modeling and real-world exploitation analysis.
Information security
fromThe Hacker News
1 hour ago

Manual Processes Are Putting National Security at Risk

Over half of national security organizations rely on manual sensitive data transfers, creating critical security vulnerabilities that adversaries actively exploit in contested operational environments.
Information security
fromTheregister
7 hours ago

Threat intelligence supply chain is full of weak links

China's ban on foreign security software threatens the global threat intelligence ecosystem by risking data fragmentation and weakening international cybersecurity collaboration.
#ai-security
Information security
fromSecuritymagazine
13 hours ago

From the Outside In: A Smarter Approach to Vendor Access

Organizations should shift from employee-centric access control to perimeter-focused security strategies to better manage risks from external vendors, contractors, and temporary workers.
Information security
fromThe Hacker News
2 days ago

Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More

Critical zero-day in Dell RecoverPoint for VMs (CVE-2026-22769) is actively exploited, enabling root access and backdoor deployment via hard-coded Tomcat credentials.
Information security
fromSecurityWeek
2 days ago

Recent RoundCube Webmail Vulnerability Exploited in Attacks

Two RoundCube Webmail vulnerabilities (CVE-2025-49113 and CVE-2025-68461) are being actively exploited; organizations must apply available patches immediately.
Information security
fromThe Hacker News
2 days ago

Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens

SANDWORM_MODE supply-chain worm uses malicious npm packages to harvest credentials and crypto keys, propagate via stolen identities, and target AI coding assistants.
#fortigate
Information security
fromTechzine Global
2 days ago

Why cyberattacks don't require advanced hacking

Poor cyber hygiene, weak identity security, overdue IT maintenance, and incomplete logging make organizations vulnerable to financially motivated attacks such as ransomware and email fraud.
Information security
fromSecuritymagazine
2 days ago

Human-related security risks rose 90% in 2025

Human-related cybersecurity incidents surged 90% in 2025, driven by email-based attacks, employee mistakes, insider threats, and increasing AI and deepfake exploitation.
fromDevOps.com
6 days ago

Checkmarx Extends Vulnerability Detection to AI Coding Tool from AWS - DevOps.com

Rather than relying completely on scans that are run as code is moving through a continuous integration/continuous delivery (CI/CD) pipeline, Checkmarx Developer Assist can eliminate 90% of vulnerabilities before they enter the DevOps workflow, said Kinsbruner. That's critical because the first generation of AI coding tools are creating more vulnerabilities that, unless discovered and remediated, are actually making applications less secure than ever, he added.
Information security
fromSecurityWeek
2 days ago

Romanian Hacker Pleads Guilty to Selling Access to US State Network

The man, Catalin Dragomir, 45, of Constanta, Romania, obtained access to the computer network in June 2021. The hacker allegedly advertised admin access to the state's emergency management department, negotiated a $3,000 sale in Bitcoin, and accessed the network several times to prove the legitimacy of his claim. According to court documents, Dragomir provided a prospective buyer with samples of personal identifying information extracted from the compromised network, including an employee's login information, name, email address, and Social Security number.
Information security
Information security
fromSecurityWeek
2 days ago

Autonomous AI Agents Provide New Class of Supply Chain Attack

Agentic AI can enable active agent-to-agent attacks that harvest private keys and launder funds through malicious 'skills' promoted across agent marketplaces and social platforms.
Information security
fromThe Hacker News
2 days ago

How Exposed Endpoints Increase Risk Across LLM Infrastructure

Exposed LLM endpoints with excessive permissions and long-lived credentials create a critical attack surface enabling cybercriminals to access systems, identities, and secrets.
fromTheregister
2 days ago

Work experience kids sent manager to Ctrl-Alt-Del hell

This week, meet a reader we'll Regomize as "Curt" who once worked as IT security manager at a company where the helpdesk manager routinely ignored company policy by not logging out of his PC. The machine sat there ready for use, instead of reverting to a password-protected screensaver that could only be dispelled by pressing Ctrl-Alt-Del to spawn a login dialog.
Information security
#password-security
Information security
fromCointelegraph
2 days ago

How Pig-Butchering Crypto Scams Turn Trust Into a Financial Weapon

Pig-butchering scams build long-term emotional trust to coerce victims into fraudulent crypto investments, extracting funds over time through staged profits and blocked withdrawals.
Information security
fromSecuritymagazine
2 days ago

41% of Organizations Have Hired a Fake Candidate

AI-enabled identity attacks surged in 2025—deepfakes, impersonation, and synthetic identities are frequent while many organizations overestimate defenses and underprioritize deepfake-resistant IAM.
fromTechzine Global
2 days ago

Support for Windows Server 2016 is coming to an end

Microsoft is warning organizations about the impending end of support for several Windows products from 2016. These include Windows Server 2016, Windows 10 Enterprise 2016 LTSB, and Windows IoT Enterprise LTSB 2016. According to Microsoft, these products are approaching the final stage of their lifecycle, which has direct consequences for organizations that still depend on this software. The lifecycle documentation on Microsoft Learn shows that Windows Server 2016 has not received regular support since January 2022 and is now fully in the extended support phase.
Information security
Information security
fromInfoQ
1 day ago

Building a Least-Privilege AI Agent Gateway for Infrastructure Automation with MCP, OPA, and Ephemeral Runners

Enforce external governance, policy-as-code authorization, observability, and short-lived isolated execution runners to limit AI agents' access and contain the blast radius of autonomous operations.
Information security
fromTheregister
2 days ago

Suspected Anonymous members cuffed in Spain over DDoS attack

Four self‑proclaimed Anonymous Fénix members were arrested in Spain for carrying out DDoS attacks on public authorities after the 2024 DANA floods.
Information security
fromTravel + Leisure
1 day ago

This New Travel Con Is So Real Looking It's Tricking Even the Most 'Scam Aware' Travelers-Here's How to Stay Safe

Urgent, personalized texts impersonating airlines or hotels trick travelers into clicking counterfeit links or calling scammers to steal login, payment, and travel-identifying information.
fromDataBreaches.Net
2 days ago

The hospitality sector continues to be lucrative targets - DataBreaches.Net

Choice Hotels International disclosed a breach affecting franchisees and applicants. Its notification letter states that a "skilled person used social engineering" to gain access on January 14, 2026 to an application that contained records regarding franchisees and franchise applicants. The access occurred even though access required multifactor authentication (MFA). The information involved included names and Social Security numbers. There is no indication that any guest data was involved. No gang has publicly claimed responsibility for the attack as yet.
Information security
#cve-2026-1731
Information security
fromThe Hacker News
4 days ago

CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

Two actively exploited Roundcube vulnerabilities (CVE-2025-49113, CVE-2025-68461) enable remote code execution and XSS; federal agencies must remediate by March 13, 2026.
Information security
fromThe Hacker News
3 days ago

AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries

A Russian-speaking financially motivated actor used commercial generative AI to compromise 600+ FortiGate devices in 55 countries by exploiting exposed management ports and weak credentials.
fromInfoWorld
4 days ago

Compromised npm package silently installs OpenClaw on developer machines

Researchers have discovered that a compromised npm publish token pushed an update for the widely-used Cline command line interface (CLI) containing a malicious postinstall script. That script installs the wildly popular, but increasingly condemned, agentic application OpenClaw on the unsuspecting user's machine. This can be extremely dangerous, as OpenClaw has broad system access and deep integrations with messaging platforms including WhatsApp, Telegram, Slack, Discord, iMessage, Teams, and others.
Information security
fromDataBreaches.Net
4 days ago

Update Chrome now: Zero-day bug allows code execution via malicious webpages - DataBreaches.Net

Google has issued a patch for a high‑severity Chrome zero‑day, tracked as CVE‑2026‑2441, a memory bug in how the browser handles certain font features that attackers are already exploiting. CVE-2026-2441 has the questionable honor of being the first Chrome zero-day of 2026. Google considered it serious enough to issue a separate update of the stable channel for it, rather than wait for the next major release.
Information security
Information security
fromSecurityWeek
4 days ago

Critical Grandstream Phone Vulnerability Exposes Calls to Interception

A stack-based buffer overflow (CVE-2026-2329) in Grandstream GXP1600 phones enables unauthenticated remote root code execution, allowing call interception and credential extraction.
Information security
fromDataBreaches.Net
4 days ago

Discord's age verification data has a frontend leak -- now what? - DataBreaches.Net

Frontend components tied to Persona used in Discord's age verification were exposed on the open web, revealing verification flow structure and increasing compliance pressure.
Information security
fromDataBreaches.Net
4 days ago

This is how you do it: Dentist speaks out after practice hit by cyber attack - DataBreaches.Net

A dental practice's computer system was hacked, sending fraudulent invoice emails; the breach was quickly detected, halted by IT, and appears to have originated overseas.
fromWIRED
4 days ago

Password Managers Share a Hidden Weakness

An FBI informant helped run the Incognito dark web market and allegedly approved the sale of fentanyl-laced pills, including those from a dealer linked to a confirmed death, WIRED reported this week. Meanwhile, Jeffrey Epstein's ties to Customs and Border Protection officers sparked a Department of Justice probe. Documents say that CBP officers in the US Virgin Islands were still friendly with Epstein years after his 2008 conviction, illustrating the infamous sex offender's tactics for cultivating allies.
Information security
Information security
fromKotaku
3 days ago

Hackers Raise The Alarm About Discord's Recent Age-Verification Partner - Kotaku

Persona's weak security enabled hackers to access biometric data and revealed extensive surveillance, including facial scanning against watchlists, raising privacy and government-collaboration concerns.
#archivetoday
fromTheregister
5 days ago

CISA gives feds 3 days to patch actively exploited Dell bug

Uncle Sam's cyber defenders have given federal agencies just three days to patch a maximum-severity Dell bug that's been under active exploitation since at least mid-2024. CISA this week added the flaw, tracked as CVE-2026-22769, to its Known Exploited Vulnerabilities catalog, ordering civilian agencies to secure affected systems by February 21 - giving them just three days to get fixes in place.
Information security
fromSecurityWeek
4 days ago

In Other News: Ransomware Shuts US Clinics, ICS Vulnerability Surge, European Parliament Bans AI

Axonius has laid off approximately 40 employees, representing less than 4% of its global staff, with the majority of cuts in marketing and sales. Co-founder Dean Sysman has stepped down from his role as CEO to become executive chairman, with company president Joe Diamond appointed as interim CEO. The workforce adjustment aims to refine the company's organizational structure and improve operational efficiency as it prepares for a potential IPO.
Information security
Information security
fromTechzine Global
5 days ago

Microsoft closes Teams leak that allowed access without authentication

A critical improper access control vulnerability in Microsoft Teams allowed unauthenticated attackers to obtain network information; Microsoft resolved it server-side with no user action required.
Information security
fromThe Hacker News
4 days ago

ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT RAT

MIMICRAT is a sophisticated, previously undocumented RAT delivered via a ClickFix campaign using compromised legitimate sites, multi-stage PowerShell ETW/AMSI bypass, and HTTPS C2.
Information security
fromThe Hacker News
4 days ago

Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems

Unauthorized npm update to Cline CLI (cline@2.3.0) installed OpenClaw via a postinstall script, affecting about 4,000 downloads during an eight-hour window on Feb 17, 2026.
Information security
fromSecurityWeek
5 days ago

Chip Testing Giant Advantest Hit by Ransomware

Advantest detected a February 15 ransomware intrusion that may have affected parts of its network; investigation is ongoing and potential data impact is under review.
Information security
fromComputerworld
5 days ago

New phishing campaign tricks employees into bypassing Microsoft 365 MFA

Attackers trick employees into registering a hacker-controlled device via OAuth device authorization, granting persistent access to Microsoft accounts and bypassing MFA.
Information security
fromTheregister
5 days ago

RAT disguised as an RMM costs crims $300 a month

Criminals created a fake RMM vendor, TrustConnect, selling a RAT as a subscription and using a fake website plus an EV code-signing certificate to bypass security.
#atm-jackpotting
fromZDNET
5 days ago

Phone acting weird? 5 red flags that could point to hackers

Your mobile phone is a treasure trove of personal and confidential information. That's why it's a prime target for hackers who want to compromise or steal your data. Through malicious apps and websites, phishing attacks, and other threats, an attacker can gain control of your device through spyware. But how can you tell if your phone has been hacked or tapped?
Information security
Information security
fromSecurityWeek
5 days ago

PromptSpy Android Malware Abuses Gemini AI at Runtime for Persistence

PromptSpy uses Google's Gemini generative AI and Android Accessibility Services to control devices, persist in recent apps, and block uninstallation.
Information security
fromThe Hacker News
5 days ago

Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026

Identity security posture—password hygiene, privileged access, and MFA coverage—now strongly determines cyber underwriting and insurance costs.
Information security
fromTechCrunch
4 days ago

Ukrainian man jailed for identity theft that helped North Koreans get jobs at US companies | TechCrunch

A Ukrainian was sentenced to five years for running an identity theft network that placed North Korean workers in U.S. jobs, funneling wages to Pyongyang.
Information security
fromDataBreaches.Net
5 days ago

A single compromised account gave hackers access to 1.2 million French banking records - DataBreaches.Net

Stolen credentials from one government official allowed attackers to access France's FICOBA database, exposing over 1.2 million bank accounts and sensitive financial data.
fromSecurityWeek
4 days ago

NIST's Quantum Breakthrough: Single Photons Produced on a Chip

NIST has developed a chip that reliably emits a single photon on demand. This ability will improve the efficiency of QKD (quantum key distribution) as we prepare for the arrival of quantum computers. Quantum computers will upend current cryptology by using Shor's algorithm to rapidly negate the current public/private key secure encryption methods. This has largely been solved by NIST's post quantum cryptology (PQC) algorithms.
Information security
Information security
fromFortune
4 days ago

AI can now hunt software bugs on its own. Anthropic is turning that into a security tool. | Fortune

Claude Code Security uses Anthropic's Opus 4.6 AI to review entire codebases, detect high-severity vulnerabilities, rate severity, and suggest fixes for developer approval.
fromTheregister
4 days ago

PayPal app code error leaked personal info

PayPal has notified about 100 customers that their personal information was exposed online during a code change gone awry, and in a few of these cases, people saw unauthorized transactions on their accounts. All of these customers have been fully refunded, according to a PayPal spokesperson. "When there is a potential exposure of customer information, PayPal is required to notify affected customers," the spokesperson told The Register. "In this case, PayPal's systems were not compromised. As such, we contacted the approximately 100 customers who were potentially impacted to provide awareness on this matter."
Information security
Information security
fromTechzine Global
5 days ago

Kyndryl launches integrated Cyber Defense Operations Center

Kyndryl opened a Cyber Defense Operations Center in Bengaluru consolidating network and security operations to deliver integrated monitoring, threat detection, incident response and performance management.
Information security
fromBusiness Matters
6 days ago

Detecting Configuration Drift: Continuous Controls vs. Point-in-Time Snapshots

Continuous controls monitoring (CCM) is required to detect and remediate configuration drift in rapidly changing cloud environments before risks persist unnoticed.
fromTheregister
5 days ago

Ex-Google engineers accused of swiping chip security secrets

Two former Google engineers and a third alleged accomplice are facing federal charges after prosecutors accused them of swiping sensitive chip and security technology secrets and then trying to cover their tracks when the scheme began to unravel. According to the Department of Justice, sisters Samaneh and Soroor Ghandali, both former Google employees, along with Mohammadjavad Khosravi, who worked at another unnamed technology company, have been charged with conspiracy, theft of trade secrets, and obstruction of justice.
Information security
fromLogRocket Blog
5 days ago

How to design 2FA: Comparing methods, user flows, and recovery strategies - LogRocket Blog

2FA or two-factor authentication is a specific type of multi-factor authentication. As the name suggests, 2FA requires two distinct forms of user verification factors to access a specific protected, registered user-only software system. In the past, software teams used only a one-factor authentication strategy with users' passwords, but nowadays, with growing security concerns and user authentication evolution, every digital product uses 2FA with password-based authentication, starting from simple SMS OTPs (One Time Tokens) to futuristic AI-powered adaptive 2FA methods and high-security hardware keys.
Information security
Information security
fromEngadget
5 days ago

Google Play used AI to help block 1.75 million bad apps in 2025

Google used AI to block 1.75 million policy-violating apps in 2025, reduced threats and strengthened Play Protect protections across billions of devices.
Information security
fromFuturism
4 days ago

Lockheed Martin F-35s Can Be Jailbroken Like $80 Million iPhones, European Military Chief Says

A Dutch official claims F-35s can be 'jailbroken' like phones, implying potential European ability to modify or maintain aircraft software independent of US updates.
Information security
fromSecurityWeek
6 days ago

Ivanti Exploitation Surges as Zero-Day Attacks Traced Back to July 2025

Exploitation of two patched Ivanti EPMM critical vulnerabilities (CVE-2026-1281, CVE-2026-1340) has surged, enabling remote unauthenticated code execution and full MDM compromise.
#windows-admin-center
fromThe Hacker News
6 days ago

CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware

The campaign exploits recent geopolitical developments to lure victims into opening malicious .LNK files disguised as protest-related images or videos, researchers Subhajeet Singha, Eliad Kimhy, and Darrel Virtusio said in a report published this week. These files are bundled with authentic media and a Farsi-language report providing updates from 'the rebellious cities of Iran.' This pro- protest framing appears to be intended to increase credibility and to attract Farsi-speaking Iranians seeking protest-related information.
Information security
Information security
fromZero Day Initiative
5 days ago

Zero Day Initiative - CVE-2026-20841: Arbitrary Code Execution in the Windows Notepad

Remote code execution in Windows Notepad via improper validation of Markdown links can allow arbitrary command execution when a user opens a malicious file.
Information security
fromThe Hacker News
6 days ago

From Exposure to Exploitation: How AI Collapses Your Response Window

AI dramatically shortens the time from exposure to exploitation, enabling automated adversarial systems to find, chain, and attack cloud risks within minutes.
#moldova
fromTheregister
6 days ago

NHS strategy: Write password on whiteboard, hope for best

We've excised the text, but suffice it to say that the whiteboard contains usernames and passwords for system access. It's a change from a Post-it note stuck to the screen, but it's no less likely to make a security professional shriek in horror. After all, not only is the account exposed, but anyone can use it, which renders an access log somewhat redundant.
Information security
Information security
fromArs Technica
5 days ago

OpenClaw security fears lead Meta, other AI firms to restrict its use

OpenClaw poses significant security risks; organizations must restrict access, mitigate exposures immediately, and test in controlled environments to identify vulnerabilities.
[ Load more ]