Information security

[ follow ]
#phishing
Information security
fromTechRepublic
10 hours ago

Microsoft 365 Under Siege: Phishing Campaign Bypasses MFA Across 5 Countries

A sophisticated phishing campaign exploiting Microsoft 365 accounts has affected over 340 organizations across five countries using a legitimate OAuth feature.
Information security
fromTechRepublic
10 hours ago

Microsoft 365 Under Siege: Phishing Campaign Bypasses MFA Across 5 Countries

A sophisticated phishing campaign exploiting Microsoft 365 accounts has affected over 340 organizations across five countries using a legitimate OAuth feature.
Information security
fromThe Hacker News
2 days ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Information security
fromThe Hacker News
15 hours ago

ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories

A sophisticated malware campaign targets Web3 support teams using deceptive links to deliver malicious executables and establish persistent communication with threat actors.
#ai-security
Information security
fromTechRepublic
14 hours ago

The Next Billion Users Won't Be Human: Securing the Agentic Enterprise

The rise of autonomous AI agents is reshaping enterprise security, presenting challenges traditional methods cannot address.
Information security
fromFast Company
2 days ago

This Microsoft security team stress-tests AI for its worst-case scenarios

AI products face probing for weaknesses, leading to risks like mental illness, cybercrime, and evolving bypass techniques.
Information security
fromTechRepublic
14 hours ago

The Next Billion Users Won't Be Human: Securing the Agentic Enterprise

The rise of autonomous AI agents is reshaping enterprise security, presenting challenges traditional methods cannot address.
Information security
fromFast Company
2 days ago

This Microsoft security team stress-tests AI for its worst-case scenarios

AI products face probing for weaknesses, leading to risks like mental illness, cybercrime, and evolving bypass techniques.
#cybersecurity
fromTechCrunch
15 hours ago
Information security

A major hacking tool has leaked online, putting millions of iPhones at risk. Here's what you need to know | TechCrunch

Information security
fromSecurityWeek
20 hours ago

Dell and HP Roll Out Quantum-Resistant Device Security and AI-Era Cyber Resilience

HP and Dell Technologies announced new security features to enhance hardware protections against physical attacks and quantum-computing threats.
Information security
fromSecurityWeek
16 hours ago

Chinese Hackers Caught Deep Within Telecom Backbone Infrastructure

A China-linked threat actor has deployed kernel implants and backdoors in global telecom infrastructure for long-term espionage.
Information security
fromTechCrunch
15 hours ago

A major hacking tool has leaked online, putting millions of iPhones at risk. Here's what you need to know | TechCrunch

Cyberattacks targeting Apple customers have emerged, utilizing hacking tools Coruna and DarkSword to steal data from iPhones and iPads.
Information security
fromThe Hacker News
11 hours ago

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

A China-nexus threat actor has embedded itself in telecom networks for espionage, utilizing stealthy access mechanisms and advanced malware tools.
Information security
fromSecurityWeek
20 hours ago

Dell and HP Roll Out Quantum-Resistant Device Security and AI-Era Cyber Resilience

HP and Dell Technologies announced new security features to enhance hardware protections against physical attacks and quantum-computing threats.
fromTechRepublic
14 hours ago
Information security

TP-Link Fixes Bug That Lets Hackers Take Over Routers Without a Password

TP-Link patched critical vulnerabilities in Archer NX routers that allowed unauthorized firmware installation and network manipulation.
Information security
fromSecurityWeek
15 hours ago

BIND Updates Patch High-Severity Vulnerabilities

ISC released BIND 9 updates to fix four vulnerabilities, including two high-severity bugs that can lead to memory leaks and high CPU consumption.
#post-quantum-cryptography
Information security
fromComputerWeekly.com
1 day ago

Google targets 2029 for post-quantum cyber readiness | Computer Weekly

Google plans to migrate to post-quantum cryptography by 2029, accelerating its timeline due to advancements in quantum technology and emerging security threats.
Information security
fromComputerWeekly.com
1 day ago

Google targets 2029 for post-quantum cyber readiness | Computer Weekly

Google plans to migrate to post-quantum cryptography by 2029, accelerating its timeline due to advancements in quantum technology and emerging security threats.
#cisco
fromSecurityWeek
16 hours ago
Information security

Cisco Patches Multiple Vulnerabilities in IOS Software

Cisco released patches for high- and medium-severity vulnerabilities in IOS and IOS XE, primarily to prevent denial-of-service conditions.
Information security
fromSecurityWeek
16 hours ago

Cisco Patches Multiple Vulnerabilities in IOS Software

Cisco released patches for high- and medium-severity vulnerabilities in IOS and IOS XE, primarily to prevent denial-of-service conditions.
#ai
Information security
fromNextgov.com
10 hours ago

ODNI is building a framework to boost spy agencies' AI adoption

The Office of the Director of National Intelligence is enhancing AI adoption for cybersecurity within the intelligence community as part of a modernization effort.
Information security
fromTechzine Global
1 day ago

Fujitsu brings AI and social issues together

Fujitsu leverages AI to address social issues in healthcare, marine ecosystems, and cybersecurity through data-driven decision-making and digital twin technology.
Information security
fromZDNET
2 days ago

How Claude Code's new auto mode prevents AI coding disasters - without slowing you down

Claude's auto mode enhances safety by reducing permission prompts while maintaining control over risky commands.
Information security
fromNextgov.com
10 hours ago

ODNI is building a framework to boost spy agencies' AI adoption

The Office of the Director of National Intelligence is enhancing AI adoption for cybersecurity within the intelligence community as part of a modernization effort.
Information security
fromTechzine Global
1 day ago

Fujitsu brings AI and social issues together

Fujitsu leverages AI to address social issues in healthcare, marine ecosystems, and cybersecurity through data-driven decision-making and digital twin technology.
Information security
fromZDNET
2 days ago

How Claude Code's new auto mode prevents AI coding disasters - without slowing you down

Claude's auto mode enhances safety by reducing permission prompts while maintaining control over risky commands.
fromComputerworld
12 hours ago

Enterprise laptops adopt Intel's new Core Ultra Series 3 chips

Users of systems running on the new chips will see over 30% faster performance, up to 80% better graphics, and up to 4x AI performance compared to four-year-old systems.
Information security
Information security
fromThe Hacker News
17 hours ago

Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks

Coruna exploit kit is an evolved version of the Operation Triangulation exploit, targeting iOS devices with multiple vulnerabilities.
#databricks
Information security
fromInfoWorld
16 hours ago

Databricks pitches Lakewatch as a cheaper SIEM - but is it really?

Translating benefits into buy-in from CIOs and CISOs may be challenging for Databricks despite its intent and acquisitions.
Information security
fromTechCrunch
2 days ago

Databricks bought two startups to underpin its new AI security product | TechCrunch

Databricks is launching Lakewatch, a new AI-powered security product, following acquisitions of Antimatter and SiftD.ai to enhance its capabilities.
Information security
fromInfoWorld
16 hours ago

Databricks pitches Lakewatch as a cheaper SIEM - but is it really?

Translating benefits into buy-in from CIOs and CISOs may be challenging for Databricks despite its intent and acquisitions.
Information security
fromTechCrunch
2 days ago

Databricks bought two startups to underpin its new AI security product | TechCrunch

Databricks is launching Lakewatch, a new AI-powered security product, following acquisitions of Antimatter and SiftD.ai to enhance its capabilities.
Information security
fromTNW | Offers
1 day ago

Team password manager costs $1.50 & just added the features businesses actually need

Stolen credentials are a major security risk; using a password manager like Passpack can mitigate this threat effectively.
Information security
fromInfoWorld
1 day ago

PyPI warns developers after LiteLLM malware found stealing cloud and CI/CD credentials

Compromised LiteLLM packages executed a three-stage payload targeting sensitive data in cloud environments before being removed from PyPI.
Information security
fromTechRepublic
1 day ago

Nearly 7M Email Addresses Exposed in Crunchyroll Third-Party Breach

Crunchyroll was breached through a third-party vendor, compromising user data and internal systems via a support agent's account.
Information security
fromComputerWeekly.com
1 day ago

Platformisation or platform theatre? Navigating cyber consolidation | Computer Weekly

Consolidation in enterprise security is necessary but can introduce risks like single points of failure and integration issues.
Information security
fromTheregister
1 day ago

Scammers have virtual smartphones on speed dial for fraud

Cloud phones are increasingly exploited by cybercriminals for authorized push payment fraud due to their legitimate appearance and ease of use.
Information security
fromSecurityWeek
1 day ago

From Trivy to Broad OSS Compromise: TeamPCP Hits Docker Hub, VS Code, PyPI

TeamPCP hacking group expanded its attacks to multiple platforms, exploiting vulnerabilities and compromising credentials for malicious purposes.
Information security
fromTechRepublic
1 day ago

Inside RSA 2026: Security Leaders Grapple With AI's Growing Role and Risks

The RSA Conference 2026 emphasizes the rise of AI in cybersecurity and the critical need for governance and trust in AI systems.
Information security
fromComputerWeekly.com
1 day ago

US government launches Bureau of Emerging Threats | Computer Weekly

The US government has launched a Bureau of Emerging Threats to address national security risks from cyber attacks, space weaponization, and emerging technologies.
#ransomware
Information security
fromThe Hacker News
1 day ago

Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks

A Russian national was sentenced to two years for managing a botnet used in ransomware attacks against U.S. companies.
Information security
fromSecurityWeek
1 day ago

US Prisons Russian Access Broker for Aiding Ransomware Attacks

Aleksei Volkov was sentenced to 81 months in prison for his role in ransomware attacks causing over $9 million in losses.
Information security
fromSecuritymagazine
3 days ago

Security Leaders Share Thoughts on Foster City Cyberattack

Foster City declared a state of emergency due to a ransomware attack, highlighting vulnerabilities in municipal IT infrastructure and the need for better funding and security.
Information security
fromThe Hacker News
1 day ago

Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks

A Russian national was sentenced to two years for managing a botnet used in ransomware attacks against U.S. companies.
Information security
fromSecurityWeek
1 day ago

US Prisons Russian Access Broker for Aiding Ransomware Attacks

Aleksei Volkov was sentenced to 81 months in prison for his role in ransomware attacks causing over $9 million in losses.
Information security
fromSecuritymagazine
3 days ago

Security Leaders Share Thoughts on Foster City Cyberattack

Foster City declared a state of emergency due to a ransomware attack, highlighting vulnerabilities in municipal IT infrastructure and the need for better funding and security.
#cybercrime
Information security
fromNextgov.com
1 day ago

European officials highlight private sector help in major cybercrime takedowns

Private sector partners play a crucial role in cybercrime takedowns, aiding law enforcement in disrupting criminal activities and infrastructure.
Information security
fromNextgov.com
1 day ago

European officials highlight private sector help in major cybercrime takedowns

Private sector partners play a crucial role in cybercrime takedowns, aiding law enforcement in disrupting criminal activities and infrastructure.
Information security
fromNextgov.com
2 days ago

New NSA director pushes for more intel-sharing with allies in internal meeting

Gen. Josh Rudd emphasizes enhanced intelligence-sharing with allies and a focus on foreign adversaries like Russia and China.
#ai-agents
fromThe Hacker News
2 days ago
Information security

5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents

Gartner's Market Guide for Guardian Agents highlights the rapid adoption of AI agents and the associated governance risks.
Information security
fromZDNET
3 days ago

1 in 2 security leaders say they're not ready for AI attacks - 4 actions to take now

AI-powered cybercrime is a significant and growing threat to businesses, with many feeling unprotected.
#citrix
Information security
fromSecurityWeek
2 days ago

Critical Citrix NetScaler Vulnerability Poised for Exploitation, Security Firms Warn

Citrix released critical patches for vulnerabilities in NetScaler ADC and Gateway, addressing memory leaks and session mixup issues.
Information security
fromThe Hacker News
2 days ago

Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks

Citrix released security updates for critical vulnerabilities in NetScaler ADC and Gateway that could leak sensitive data.
Information security
fromSecurityWeek
2 days ago

Critical Citrix NetScaler Vulnerability Poised for Exploitation, Security Firms Warn

Citrix released critical patches for vulnerabilities in NetScaler ADC and Gateway, addressing memory leaks and session mixup issues.
Information security
fromThe Hacker News
2 days ago

Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks

Citrix released security updates for critical vulnerabilities in NetScaler ADC and Gateway that could leak sensitive data.
Information security
fromThe Hacker News
2 days ago

Tax Search Ads Deliver ScreenConnect Malware Using Huawei Driver to Disable EDR

A malvertising campaign targets U.S. individuals searching for tax documents, delivering rogue installers that blind security programs using BYOVD techniques.
Information security
fromComputerWeekly.com
2 days ago

Cyber pros must grasp the vibe coding nettle, says NCSC chief | Computer Weekly

Cyber security professionals must develop safeguards for AI-enhanced software generation to prevent vulnerabilities and cyber attacks.
Information security
fromTechRepublic
2 days ago

New 'DarkSword' Leak Puts Millions of iPhones at Risk After Initial Attack

The leaked DarkSword exploit kit poses a significant threat to outdated iPhones, making attacks easier for less experienced hackers.
#ai-safety
Information security
fromTechCrunch
2 days ago

OpenAI adds open source tools to help developers build for teen safety | TechCrunch

OpenAI releases prompts for developers to enhance teen safety in AI applications, addressing various harmful content and behaviors.
Information security
fromTechCrunch
2 days ago

OpenAI adds open source tools to help developers build for teen safety | TechCrunch

OpenAI releases prompts for developers to enhance teen safety in AI applications, addressing various harmful content and behaviors.
Information security
fromTechzine Global
2 days ago

HPE embeds security in network further with SRX400 and AI governance

HPE aims to deeply integrate security into networks with the new SRX400 Series Firewalls and updates to enhance cyber resilience.
#cyberattack
Information security
fromSecurityWeek
2 days ago

Stryker Says Malicious File Found During Probe Into Iran-Linked Attack

Stryker identified a malicious file used in a cyberattack by the Iran-linked group Handala, disrupting operations but finding no evidence of malware or ransomware.
Information security
fromSecurityWeek
2 days ago

Stryker Says Malicious File Found During Probe Into Iran-Linked Attack

Stryker identified a malicious file used in a cyberattack by the Iran-linked group Handala, disrupting operations but finding no evidence of malware or ransomware.
Information security
fromTechzine Global
2 days ago

Palo Alto Networks launches Prisma Browser for Business

Palo Alto Networks launches Prisma Browser for Business, a secure browser designed for SMBs to protect against cyber threats and enhance productivity.
fromSecurityWeek
2 days ago

Chrome 146 Update Patches High-Severity Vulnerabilities

The first vulnerability, CVE-2026-4673, is a heap buffer overflow issue in WebAudio that earned the reporting researcher a $7,000 bug bounty reward. Google has yet to determine the bounty amount for CVE-2026-4677, another bug reported by the same researcher.
Information security
fromArs Technica
2 days ago

Self-propagating malware poisons open source software and wipes Iran-based machines

CanisterWorm, as Aikido has named the malware, targets organizations' CI/CD pipelines used for rapid development and deployment of software. Every developer or CI pipeline that installs this package and has an npm token accessible becomes an unwitting propagation vector.
Information security
Information security
fromTechzine Global
2 days ago

Databricks launches Lakewatch: agentic SIEM on the Lakehouse

Lakewatch is an open SIEM platform that consolidates security, IT, and business data, enabling rapid threat detection and response using AI agents.
fromSecurityWeek
2 days ago

Poland Faced a Surge in Cyberattacks in 2025, Including a Major Assault on the Energy Sector

"We've been waging a war in cyberspace for many years now. The number of incidents and attacks has been increasing significantly and radically year after year."
Information security
Information security
fromTheregister
3 days ago

Lightning-fast exploits mean patch fast, says Cisco Talos

Strengthening MFA policies and enhancing anti-phishing training are critical as attackers exploit vulnerabilities rapidly and effectively.
Information security
fromTechzine Global
3 days ago

Oracle releases emergency patch for serious vulnerability

A critical vulnerability in Oracle Identity Manager and Oracle Web Services Manager allows remote code execution without authentication, posing severe risks.
[ Load more ]