Information security

[ follow ]
Information security
fromTheregister
2 hours ago

Scammers have virtual smartphones on speed dial for fraud

Cloud phones are increasingly exploited by cybercriminals for authorized push payment fraud due to their legitimate appearance and ease of use.
#ai-security
fromDevOps.com
1 week ago
Information security

Arcjet Extends Runtime Policy Engine to Block Malicious Prompts - DevOps.com

Information security
fromFast Company
1 day ago

This Microsoft security team stress-tests AI for its worst-case scenarios

AI products face probing for weaknesses, leading to risks like mental illness, cybercrime, and evolving bypass techniques.
Information security
fromDevOps.com
1 week ago

Arcjet Extends Runtime Policy Engine to Block Malicious Prompts - DevOps.com

Arcjet introduces a prompt injection protection capability to block risky prompts before they reach AI models in applications.
Information security
fromTechzine Global
2 days ago

Microsoft Secures AI Agents with Defender, Entra, and Purview

Microsoft introduces new features to secure AI agents, emphasizing the need for a dedicated security layer for their management and protection.
Information security
fromTechRepublic
5 hours ago

Inside RSA 2026: Security Leaders Grapple With AI's Growing Role and Risks

The RSA Conference 2026 emphasizes the rise of AI in cybersecurity and the critical need for governance and trust in AI systems.
Information security
fromComputerWeekly.com
4 hours ago

Google targets 2029 for post-quantum cyber readiness | Computer Weekly

Google plans to migrate to post-quantum cryptography by 2029, accelerating its timeline due to advancements in quantum technology and emerging security threats.
#cybersecurity
Information security
fromThe Hacker News
10 hours ago

The Kill Chain Is Obsolete When Your AI Agent Is the Threat

A state-sponsored threat actor used an AI coding agent for autonomous cyber espionage, raising concerns about compromised AI agents within environments.
Information security
fromThe Hacker News
10 hours ago

Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse

An active device code phishing campaign targets Microsoft 365 identities across over 340 organizations in multiple countries, utilizing various deceptive techniques.
Information security
fromNextgov.com
9 hours ago

Ex-NSA leaders say Americans are becoming 'numb' to cyber threats

American society is increasingly apathetic to cyberattacks, lacking a strong strategy to deter foreign adversaries and their hackers.
Information security
fromTheregister
3 hours ago

Jen Easterly, cybersecurity's 'relentless optimist'

Cybersecurity and AI are now inseparable, reshaping the digital ecosystem and emphasizing community collaboration for a secure digital world.
Information security
fromThe Hacker News
10 hours ago

The Kill Chain Is Obsolete When Your AI Agent Is the Threat

A state-sponsored threat actor used an AI coding agent for autonomous cyber espionage, raising concerns about compromised AI agents within environments.
Information security
fromThe Hacker News
10 hours ago

Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse

An active device code phishing campaign targets Microsoft 365 identities across over 340 organizations in multiple countries, utilizing various deceptive techniques.
Information security
fromNextgov.com
9 hours ago

Ex-NSA leaders say Americans are becoming 'numb' to cyber threats

American society is increasingly apathetic to cyberattacks, lacking a strong strategy to deter foreign adversaries and their hackers.
Information security
fromComputerWeekly.com
1 hour ago

US government launches Bureau of Emerging Threats | Computer Weekly

The US government has launched a Bureau of Emerging Threats to address national security risks from cyber attacks, space weaponization, and emerging technologies.
#ransomware
Information security
fromSecuritymagazine
1 day ago

Security Leaders Share Thoughts on Foster City Cyberattack

Foster City declared a state of emergency due to a ransomware attack, highlighting vulnerabilities in municipal IT infrastructure and the need for better funding and security.
Information security
fromTheregister
2 days ago

Chip tester shrugged off ransomware - then came the leak

Trio-Tech International reversed its initial assessment of a ransomware attack, now considering it a material cybersecurity event after data was disclosed.
Information security
fromSecuritymagazine
1 day ago

Security Leaders Share Thoughts on Foster City Cyberattack

Foster City declared a state of emergency due to a ransomware attack, highlighting vulnerabilities in municipal IT infrastructure and the need for better funding and security.
Information security
fromTheregister
2 days ago

Chip tester shrugged off ransomware - then came the leak

Trio-Tech International reversed its initial assessment of a ransomware attack, now considering it a material cybersecurity event after data was disclosed.
#cybercrime
Information security
fromNextgov.com
15 minutes ago

European officials highlight private sector help in major cybercrime takedowns

Private sector partners play a crucial role in cybercrime takedowns, aiding law enforcement in disrupting criminal activities and infrastructure.
Information security
fromNextgov.com
15 minutes ago

European officials highlight private sector help in major cybercrime takedowns

Private sector partners play a crucial role in cybercrime takedowns, aiding law enforcement in disrupting criminal activities and infrastructure.
#microsoft
fromTheregister
2 days ago
Information security

Microsoft releases emergency fix for account internet error

Microsoft released an out-of-band update to fix bugs from a recent Windows patch, addressing a Microsoft account issue causing login errors.
Information security
fromTheregister
2 days ago

Microsoft releases emergency fix for account internet error

Microsoft released an out-of-band update to fix bugs from a recent Windows patch, addressing a Microsoft account issue causing login errors.
Information security
fromTNW | Offers
15 hours ago

Team password manager costs $1.50 & just added the features businesses actually need

Stolen credentials are a major security risk; using a password manager like Passpack can mitigate this threat effectively.
Information security
fromInfoWorld
11 hours ago

PyPI warns developers after LiteLLM malware found stealing cloud and CI/CD credentials

Compromised LiteLLM packages executed a three-stage payload targeting sensitive data in cloud environments before being removed from PyPI.
Information security
fromTechRepublic
9 hours ago

Nearly 7M Email Addresses Exposed in Crunchyroll Third-Party Breach

Crunchyroll was breached through a third-party vendor, compromising user data and internal systems via a support agent's account.
Information security
fromComputerWeekly.com
5 hours ago

Platformisation or platform theatre? Navigating cyber consolidation | Computer Weekly

Consolidation in enterprise security is necessary but can introduce risks like single points of failure and integration issues.
Information security
fromSecurityWeek
11 hours ago

From Trivy to Broad OSS Compromise: TeamPCP Hits Docker Hub, VS Code, PyPI

TeamPCP hacking group expanded its attacks to multiple platforms, exploiting vulnerabilities and compromising credentials for malicious purposes.
#ai
Information security
fromTechzine Global
17 hours ago

Fujitsu brings AI and social issues together

Fujitsu leverages AI to address social issues in healthcare, marine ecosystems, and cybersecurity through data-driven decision-making and digital twin technology.
Information security
fromZDNET
1 day ago

How Claude Code's new auto mode prevents AI coding disasters - without slowing you down

Claude's auto mode enhances safety by reducing permission prompts while maintaining control over risky commands.
Information security
fromTechzine Global
17 hours ago

Fujitsu brings AI and social issues together

Fujitsu leverages AI to address social issues in healthcare, marine ecosystems, and cybersecurity through data-driven decision-making and digital twin technology.
Information security
fromZDNET
1 day ago

How Claude Code's new auto mode prevents AI coding disasters - without slowing you down

Claude's auto mode enhances safety by reducing permission prompts while maintaining control over risky commands.
Information security
fromNextgov.com
22 hours ago

New NSA director pushes for more intel-sharing with allies in internal meeting

Gen. Josh Rudd emphasizes enhanced intelligence-sharing with allies and a focus on foreign adversaries like Russia and China.
#ai-agents
fromThe Hacker News
1 day ago
Information security

5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents

Gartner's Market Guide for Guardian Agents highlights the rapid adoption of AI agents and the associated governance risks.
Information security
fromThe Hacker News
1 day ago

5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents

Gartner's Market Guide for Guardian Agents highlights the rapid adoption of AI agents and the associated governance risks.
Information security
fromZDNET
1 day ago

1 in 2 security leaders say they're not ready for AI attacks - 4 actions to take now

AI-powered cybercrime is a significant and growing threat to businesses, with many feeling unprotected.
#citrix
Information security
fromSecurityWeek
1 day ago

Critical Citrix NetScaler Vulnerability Poised for Exploitation, Security Firms Warn

Citrix released critical patches for vulnerabilities in NetScaler ADC and Gateway, addressing memory leaks and session mixup issues.
Information security
fromThe Hacker News
1 day ago

Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks

Citrix released security updates for critical vulnerabilities in NetScaler ADC and Gateway that could leak sensitive data.
Information security
fromSecurityWeek
1 day ago

Critical Citrix NetScaler Vulnerability Poised for Exploitation, Security Firms Warn

Citrix released critical patches for vulnerabilities in NetScaler ADC and Gateway, addressing memory leaks and session mixup issues.
Information security
fromThe Hacker News
1 day ago

Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks

Citrix released security updates for critical vulnerabilities in NetScaler ADC and Gateway that could leak sensitive data.
Information security
fromThe Hacker News
1 day ago

Tax Search Ads Deliver ScreenConnect Malware Using Huawei Driver to Disable EDR

A malvertising campaign targets U.S. individuals searching for tax documents, delivering rogue installers that blind security programs using BYOVD techniques.
#phishing
Information security
fromThe Hacker News
1 day ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Information security
fromThe Hacker News
1 day ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Information security
fromComputerWeekly.com
1 day ago

Cyber pros must grasp the vibe coding nettle, says NCSC chief | Computer Weekly

Cyber security professionals must develop safeguards for AI-enhanced software generation to prevent vulnerabilities and cyber attacks.
Information security
fromTechRepublic
1 day ago

New 'DarkSword' Leak Puts Millions of iPhones at Risk After Initial Attack

The leaked DarkSword exploit kit poses a significant threat to outdated iPhones, making attacks easier for less experienced hackers.
#ai-safety
Information security
fromTechCrunch
1 day ago

OpenAI adds open source tools to help developers build for teen safety | TechCrunch

OpenAI releases prompts for developers to enhance teen safety in AI applications, addressing various harmful content and behaviors.
Information security
fromTechCrunch
1 day ago

OpenAI adds open source tools to help developers build for teen safety | TechCrunch

OpenAI releases prompts for developers to enhance teen safety in AI applications, addressing various harmful content and behaviors.
Information security
fromTechzine Global
1 day ago

HPE embeds security in network further with SRX400 and AI governance

HPE aims to deeply integrate security into networks with the new SRX400 Series Firewalls and updates to enhance cyber resilience.
#cyberattack
Information security
fromSecurityWeek
1 day ago

Stryker Says Malicious File Found During Probe Into Iran-Linked Attack

Stryker identified a malicious file used in a cyberattack by the Iran-linked group Handala, disrupting operations but finding no evidence of malware or ransomware.
Information security
fromSFGATE
2 days ago

Dayslong cyberattack continues to paralyze Bay Area city

Foster City is experiencing a prolonged cyberattack, leading to a state of emergency and significant disruption of government services.
Information security
fromSecurityWeek
1 day ago

Stryker Says Malicious File Found During Probe Into Iran-Linked Attack

Stryker identified a malicious file used in a cyberattack by the Iran-linked group Handala, disrupting operations but finding no evidence of malware or ransomware.
Information security
fromSFGATE
2 days ago

Dayslong cyberattack continues to paralyze Bay Area city

Foster City is experiencing a prolonged cyberattack, leading to a state of emergency and significant disruption of government services.
Information security
fromTechzine Global
1 day ago

Palo Alto Networks launches Prisma Browser for Business

Palo Alto Networks launches Prisma Browser for Business, a secure browser designed for SMBs to protect against cyber threats and enhance productivity.
fromSecurityWeek
1 day ago

Chrome 146 Update Patches High-Severity Vulnerabilities

The first vulnerability, CVE-2026-4673, is a heap buffer overflow issue in WebAudio that earned the reporting researcher a $7,000 bug bounty reward. Google has yet to determine the bounty amount for CVE-2026-4677, another bug reported by the same researcher.
Information security
fromArs Technica
1 day ago

Self-propagating malware poisons open source software and wipes Iran-based machines

CanisterWorm, as Aikido has named the malware, targets organizations' CI/CD pipelines used for rapid development and deployment of software. Every developer or CI pipeline that installs this package and has an npm token accessible becomes an unwitting propagation vector.
Information security
Information security
fromTechzine Global
1 day ago

Databricks launches Lakewatch: agentic SIEM on the Lakehouse

Lakewatch is an open SIEM platform that consolidates security, IT, and business data, enabling rapid threat detection and response using AI agents.
fromTechCrunch
1 day ago

Databricks bought two startups to underpin its new AI security product | TechCrunch

Lakewatch leverages Databricks' data storage capabilities to perform essential SIEM tasks, such as threat detection and investigation, enhanced by AI agents from Anthropic's Claude.
Information security
fromSecurityWeek
1 day ago

Poland Faced a Surge in Cyberattacks in 2025, Including a Major Assault on the Energy Sector

"We've been waging a war in cyberspace for many years now. The number of incidents and attacks has been increasing significantly and radically year after year."
Information security
Information security
fromTheregister
2 days ago

Lightning-fast exploits mean patch fast, says Cisco Talos

Strengthening MFA policies and enhancing anti-phishing training are critical as attackers exploit vulnerabilities rapidly and effectively.
#oracle
Information security
fromTechzine Global
2 days ago

Oracle releases emergency patch for serious vulnerability

A critical vulnerability in Oracle Identity Manager and Oracle Web Services Manager allows remote code execution without authentication, posing severe risks.
Information security
fromSecurityWeek
2 days ago

Oracle Releases Emergency Patch for Critical Identity Manager Vulnerability

Oracle issued critical patches for vulnerabilities in Identity Manager and Web Services Manager, allowing remote code execution by unauthenticated attackers.
Information security
fromReadWrite
2 days ago

The CISO Struggle: How AI is Changing the Data Security Landscape

Generative AI adoption is rapid, but security governance is lagging, creating significant risks for organizations.
Information security
fromThe Hacker News
2 days ago

We Found Eight Attack Vectors Inside AWS Bedrock. Here's What Attackers Can Do with Them

AWS Bedrock's connectivity makes it powerful but also exposes it to multiple attack vectors that can compromise enterprise data.
Information security
fromInfoQ
2 days ago

Architecting Portable Systems on Open Standards for Digital Sovereignty

Digital sovereignty involves having a valid 'Plan B' for critical systems to avoid reliance on single vendors.
Information security
fromSecurityWeek
2 days ago

QNAP Patches Four Vulnerabilities Exploited at Pwn2Own

QNAP released patches for multiple vulnerabilities, including four critical issues demonstrated at Pwn2Own 2025 affecting SD-WAN routers.
Information security
fromTechRepublic
2 days ago

Windows 11 Patch Triggers Sign-In Failures Across Microsoft Apps

Windows 11 users face sign-in issues due to a bug from the March 2026 update, affecting personal Microsoft accounts and various services.
Information security
fromTechCrunch
2 days ago

FBI says Iranian hackers are using Telegram to steal data in malware attacks | TechCrunch

Iranian government hackers exploit Telegram to steal data from dissidents and journalists through malware disguised as legitimate apps.
fromComputerworld
2 days ago

Chrome encryption bypass discovered: New malware steals passwords and cookies

The bypass requires neither privilege escalation nor code injection, making it a stealthier approach compared to alternative ABE bypass methods.
Information security
[ Load more ]