Information security

[ follow ]
#solarwinds-whd
fromSecurityWeek
5 hours ago
Information security

Recent SolarWinds Flaws Potentially Exploited as Zero-Days

Attackers exploited vulnerabilities in internet-exposed SolarWinds Web Help Desk to gain access, deploy RMM tools, and maintain persistence using virtual machines and DLL sideloading.
fromThe Hacker News
2 hours ago
Information security

SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers

Threat actors exploited internet-exposed SolarWinds Web Help Desk instances to achieve unauthenticated remote code execution, move laterally, and access high-value assets.
Information security
fromSecurityWeek
5 hours ago

Recent SolarWinds Flaws Potentially Exploited as Zero-Days

Attackers exploited vulnerabilities in internet-exposed SolarWinds Web Help Desk to gain access, deploy RMM tools, and maintain persistence using virtual machines and DLL sideloading.
#ransomware
Information security
fromThe Hacker News
4 hours ago

Weekly Recap: AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More

Attackers increasingly exploit trust within connected AI, cloud, and developer ecosystems, embedding malicious components in trusted marketplaces and updates to gain access.
fromThe Hacker News
9 hours ago

BeyondTrust Fixes Critical Pre-Auth RCE Vulnerability in Remote Support and PRA

"BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability," the company said in an advisory released February 6, 2026. "By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user." The vulnerability, categorized as an operating system command injection, has been assigned the CVE identifier CVE-2026-1731.
Information security
Information security
fromThe Hacker News
6 hours ago

Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

Bloody Wolf uses spear-phishing to deploy NetSupport RAT in Uzbekistan and Russia, targeting finance, manufacturing, and IT for financial gain and possible espionage.
Information security
fromThe Hacker News
8 hours ago

TeamPCP Worm Exploits Cloud Infrastructure to Build Criminal Infrastructure

A worm-driven TeamPCP campaign exploited exposed cloud-native services and React2Shell to build malicious infrastructure for data theft, extortion, ransomware, and crypto mining.
#openclaw
Information security
fromTechzine Global
2 hours ago

BeyondTrust Remote Support has a critical vulnerability

Unauthenticated remote-code-execution vulnerability in BeyondTrust Remote Support and Privileged Remote Access enables full system compromise; affected versions require urgent patching or upgrades.
Information security
fromSecurityWeek
4 hours ago

Cybersecurity M&A Roundup: 34 Deals Announced in January 2026

Major cybersecurity consolidation occurred in January 2026, with 34 announced deals including CrowdStrike acquiring SGNL and Seraphic, and several strategic identity, GRC, and MSSP transactions.
#ddos
fromIrish Independent
3 hours ago
Information security

Warning issued to Irish 'dodgy box' owners following large-scale cyber attacks on everyday streaming devices

fromIrish Independent
3 hours ago
Information security

Warning issued to Irish 'dodgy box' owners following large-scale cyber attacks on everyday streaming devices

fromSecurityWeek
9 hours ago

New Paper and Tool Help Security Teams Move Beyond Blind Reliance on CISA's KEV Catalog

The KEV list is useful but largely misunderstood. KEVology explains what it is, and how best to use it. CISA's KEV Catalog, more commonly known as the KEV list, emerged with the issue of BOD 22-01 in November 2021. This catalog, currently a list of just over 1,500 vulnerabilities known to have been exploited in the wild, suggests a high value prioritization source for vulnerability remediation within industry.
Information security
Information security
fromDevOps.com
4 days ago

Survey Surfaces More Focus on Software Security Testing and API Security - DevOps.com

Many enterprises plan to increase spending on software security testing, API security, and application security as AI-driven code growth strains DevSecOps capacity.
Information security
fromTheregister
6 hours ago

How the GNU C Compiler became the Clippy of cryptography

Modern compilers optimize away security protections, causing constant-time and other defensive code to fail and reintroducing side-channel vulnerabilities.
Information security
fromTechCrunch
1 hour ago

Exclusive: Hacktivist scrapes over 500,000 stalkerware customers' payment records

More than 536,000 customer payment records from Struktura's stalkerware services were scraped, exposing emails, partial card details, and purchased surveillance app subscriptions.
#cybersecurity
Information security
fromTechzine Global
5 hours ago

ISO 27001 inspires confidence, but it is only the beginning

ISO 27001 requires organizations to establish, implement, and continuously improve an ISMS to identify, assess, and mitigate information security risks, with external audits.
#third-party-risk
Information security
fromThe Hacker News
5 hours ago

How Top CISOs Solve Burnout and Speed up MTTR without Extra Hiring

Providing sandbox-first, evidence-driven automation reduces MTTR, escalations, and burnout while preserving SLAs without hiring or stacking tools.
Information security
fromTechRepublic
3 days ago

Cybersecurity ROI in APAC: Why Boards Still Have Questions

Rising APAC cybersecurity budgets face board skepticism because increased spending has not demonstrated measurable risk reduction or clear financial ROI.
Information security
fromSecuritymagazine
18 hours ago

Product Spotlight on Analytics

Taelor Sutherland is Associate Editor at Security magazine covering enterprise security, coordinating digital content, and holding a BA in English Literature from Agnes Scott College.
Information security
fromTheregister
19 hours ago

Senator doesn't trust telcos on Salt Typhoon mitigations

OpenClaw now scans ClawHub skills with VirusTotal across 70+ engines for malware and blocklists, but signature-based scanning cannot stop prompt injection or language-driven attacks; telco breach scrutiny continues.
Information security
fromTechRepublic
4 months ago

Security Breaches Found in AI-Powered Repair Tool Wondershare RepairIt

Wondershare RepairIt stored user files unencrypted in cloud storage and hardcoded permissive access tokens, enabling attackers to tamper AI models and execute supply chain attacks.
#edge-devices
Information security
fromTechRepublic
5 months ago

Workday Hit by Social Engineering Attack, Third-Party Data Exposed

A social engineering attack gave attackers access to a third-party CRM, exposing business contact details while Workday's customer tenants and stored data remained uncompromised.
Information security
fromTechRepublic
5 months ago

'Widespread Data Theft' Impacts Salesforce-Salesloft Drift Users

UNC6395 used compromised Salesloft–Drift OAuth tokens to access Salesforce, extract customer records and credentials via targeted database queries, and export sensitive data.
Information security
fromTechRepublic
5 months ago

This 'Lethal Trifecta' Can Trick AI Browsers Into Stealing Your Data

AI-enabled browsers that combine web access, account access, and external communication can be exploited to steal accounts via hidden instructions in webpages.
Information security
fromSecurityWeek
3 days ago

Critical SmarterMail Vulnerability Exploited in Ransomware Attacks

Critical unauthenticated RCE (CVE-2026-24423) in SmarterMail's ConnectToHub API is actively exploited; update to build 9511 to patch and mitigate ransomware attacks.
Information security
fromSecurityWeek
3 days ago

In Other News: Record DDoS, Epstein's Hacker, ESET Product Vulnerabilities

Multiple significant cybersecurity developments include conviction for theft of Google's AI trade secrets, high-severity ESET patches, and a record 31.4 Tbps DDoS attack.
#cisa
fromNextgov.com
3 days ago
Information security

CISA orders agencies to patch and replace end-of-life devices, citing active exploitation

fromNextgov.com
3 days ago
Information security

CISA orders agencies to patch and replace end-of-life devices, citing active exploitation

Information security
fromThe Hacker News
3 days ago

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Attackers compromised dYdX client packages on npm and PyPI to distribute malicious releases that steal wallet credentials and install a remote access trojan.
#cyber-espionage
Information security
fromArs Technica
2 days ago

Malicious packages for dYdX cryptocurrency exchange empties user wallets

Compromised dYdX accounts distributed malicious npm and PyPI packages containing credential theft and a RAT that executes remote Python code from a C2 server.
Information security
fromComputerworld
3 days ago

Pretend Disk Format: PDFs harbor new dangers

Phishing emails link to IPFS-hosted virtual hard disks containing WSF files disguised as PDFs that install AsyncRAT, enabling remote control of company computers.
Information security
fromTechzine Global
3 days ago

Security vulnerability in TeamViewer bypassed permission checks

TeamViewer patched a high-risk access-control bypass (CVE-2026-23572) that allowed authenticated users to gain system access without local approval; update to 15.74.5+ immediately.
Information security
fromTechCrunch
3 days ago

China's Salt Typhoon hackers broke into Norwegian companies | TechCrunch

Chinese-backed hacking group Salt Typhoon breached multiple Norwegian organizations, exploiting vulnerable network devices to conduct espionage.
#dknife
#substack
fromFast Company
3 days ago

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

Meanwhile, the actual threat landscape evolved in an entirely different direction. Today's attackers aren't sitting at keyboards manually typing password guesses. They're running offline brute force attacks with dedicated GPU rigs that can attempt 100 billion passwords per second against hashing algorithms like MD5 or SHA-1. At that speed, your clever substitution of "@" for "a" buys you microseconds of additional security.
Information security
Information security
fromSecurityWeek
3 days ago

Living off the AI: The Next Evolution of Attacker Tradecraft

AI assistants and MCP-connected agents create new attack surfaces that allow attackers to misuse sanctioned workflows, enabling low-skill actors to exfiltrate data and execute code.
fromTheregister
3 days ago

DDoS deluge: Brit biz battered by record botnet blitz

Cloudflare says DDoS crews ended 2025 by pushing traffic floods to new extremes, while Britain made an unwelcome leap of 36 places to become the world's sixth-most targeted location. The Q4 stats confirm it was a lively year for traffic floods, with Cloudflare claiming it had to swat away 47.1 million DDoS attacks, more than double 2024's count. Momentum picked up toward the end of the year, as Q4 volumes jumped 31 percent from the prior quarter and 58 percent over 2024.
Information security
Information security
fromDEV Community
3 days ago

I Let Claude Write 60 Functions. 65-75% Had Security Vulnerabilities.

AI code generation models produce insecure code by default, with no statistically significant difference among the tested models.
Information security
fromSecurityWeek
3 days ago

Flickr Security Incident Tied to Third-Party Email System

Flickr experienced a third-party email service vulnerability that may have exposed users' names, email addresses, usernames, account types, IP addresses, locations, and activity data.
fromSecuritymagazine
3 days ago

Epstein File Data Security Update: Raw Code Found in Emails

After a recent release of files related to Jeffrey Epstein exposed victim information, credentials and other sensitive data, new reports suggest the Department of Justice (DOJ) did not adequately redact all files, as select blacked-out documents contain raw email data. This discovery was made by Mahmoud Al-Qudsi, Founder of NeoSmart Technologies, a private software research and development firm. Al-Qudsi detailed his findings in a blog post, stating he'd come across it by accident.
Information security
fromTechzine Global
3 days ago

To protect browsers as the digital frontline, Zscaler buys SquareX

The common denominator of advanced attacks revolves around ever more difficult detection. Although Endpoint Detection & Response (EDR) can pick up multiple signals, the browser remains a blind spot. Zscaler has also come to this conclusion and has acquired SquareX to keep an eye on browser usage via a lightweight extension. In doing so, Zscaler is following the same philosophy as CrowdStrike: acquire a promising Browser Detection & Response (BDR) player to expand its own portfolio.
Information security
fromFortune
2 days ago

Anthropic's newest model excels at finding security vulnerabilities, but raises cybersecurity risks | Fortune

According to a report from the company's Frontier Red Team, during testing, Opus 4.6 identified over 500 previously unknown zero-day vulnerabilities-flaws that are unknown to people who wrote the software, or the party responsible for patching or fixing it-across open-source software libraries. Notably, the model was not explicitly told to search for the security flaws, but rather it detected and flagged the issues on its own.
Information security
Information security
fromTheregister
3 days ago

Flickr emails users about data breach, pins it on 3rd party

Flickr suffered a February 5 data breach via a third-party email provider, exposing users' PII including names, emails, usernames, IPs, locations, and activity.
fromTechRepublic
2 days ago

Microsoft Starts Testing Built-In Sysmon Monitoring in Windows 11

Sysmon has long been part of Microsoft's Sysinternals toolkit, widely used by security teams to track detailed system activity and spot suspicious behavior. Until now, it had to be downloaded and installed separately. With this update, Sysmon is becoming a built-in Windows feature. "Windows now brings Sysmon functionality natively to Windows," the company wrote. "Sysmon functionality allows you to capture system events that can help with threat detection, and you can use custom configuration files to filter the events you want to monitor."
Information security
fromSecuritymagazine
3 days ago

Five Top Tips for Building a Strong Security Culture

Building security into the framework of an organization prevents security from being seen as a barrier to daily activities. If an employee feels as if a security measure is inhibiting them from completing their daily tasks, they're far more likely to find a way around that measure. This can range from propping open a door to using the same easy-to-remember password for every account.
Information security
Information security
fromSecurityWeek
3 days ago

Zscaler Acquires Browser Security Firm SquareX

Zscaler acquired SquareX to convert standard browsers into enterprise-grade secure browsers via a Browser Detection and Response extension, extending Zero Trust to unmanaged devices.
fromInfoQ
3 days ago

LinkedIn Leverages GitHub Actions, CodeQL, and Semgrep for Code Scanning

LinkedIn has redesigned its static application security testing pipeline (SAST) to provide consistent, enforceable code scanning across a GitHub-based, multi-repository development environment. The initiative was a result of the company's shift-left strategy by delivering fast, reliable, and actionable security feedback directly in pull requests, strengthening the security of LinkedIn's code and infrastructure and helping protect members and customers.
Information security
fromBoston.com
3 days ago

Man pleads guilty to Snapchat hacking targeting Northeastern students

Between 2020 and 2021, Svara would advertise on internet forums, including Reddit, that he could "get into girls snap accounts" for others and provide content "for you or trade," prosecutors said. Using personal information, he would try to gain access to women's Snapchat accounts before posing as a representative of Snap Inc. to obtain security codes sent to the women. He texted more than 4,500 women for the codes, which approximately 570 women provided, prosecutors said.
Information security
Information security
fromAlleywatch
2 days ago

ORION Security Raises $32M for its AI-Powered Platform That Prevents Data Leaks Without Policies

ORION Security replaces manual DLP rules with AI agents that analyze full context to block genuinely risky transfers, reducing false positives by 96%.
Information security
fromTechzine Global
3 days ago

BICS and Anapaya deliver new secure SCION networks worldwide

BICS and Anapaya will deploy SCION worldwide to give organizations direct control over data traffic and enable secure, compliant cross-border connectivity.
fromSilicon Canals
3 days ago

7 things burglars look for that signal no one is home that most people do without thinking - Silicon Canals

According to former burglar turned security consultant Michael Fraser, who spent years breaking into homes before turning his life around, these seemingly innocent habits are exactly what professionals look for. "Most people have no idea they're broadcasting an empty house," he told me during a recent interview. "They think they're being careful, but they're actually creating a roadmap." After speaking with several security experts and reformed burglars, I discovered that the things we do without thinking often create the perfect opportunity for break-ins.
Information security
Information security
fromDefector
3 days ago

This Week In Delicious Scams; Or, I Yam Not What You Think I Yam | Defector

Certain plants produce berry-like bulbils that mimic edible fruit to attract animals, facilitating asexual propagation and deceptive dispersal.
fromBitcoin Magazine
3 days ago

Strategy ($MSTR) To Lead Bitcoin Quantum Defense, Says Saylor

Strategy's ($MSTR) Executive Chairman Michael Saylor said on the company's fourth-quarter 2025 earnings call that Strategy will initiate a Bitcoin Security Program. The effort is meant to coordinate with the global cyber, crypto, and Bitcoin security community. In the call, Saylor framed quantum computing as a long-term engineering challenge rather than an immediate danger. He said the technology is likely more than a decade away from posing a serious risk to Bitcoin's cryptography.
Information security
Information security
fromArs Technica
4 days ago

Microsoft releases urgent Office patch. Russian-state hackers pounce.

Russian-state hackers weaponized Microsoft Office vulnerability CVE-2026-21509 within 48 hours to deploy encrypted, fileless in-memory backdoors against diplomatic, maritime, and transport organizations.
Information security
fromSecurityWeek
4 days ago

Cisco, F5 Patch High-Severity Vulnerabilities

Multiple critical vulnerabilities in Cisco and F5 products allow remote DoS, arbitrary file upload leading to root command execution, and privilege escalation; patches released.
Information security
fromThe Hacker News
4 days ago

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

Attackers increasingly use stealthy, industrialized techniques—compromised developer workflows, cloud access, and automated frameworks—to scale impact while reducing visible entry signals.
Information security
fromThe Hacker News
4 days ago

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

Active campaign hijacks NGINX and Baota-managed web traffic by injecting malicious NGINX configurations to proxy requests through attacker-controlled servers.
Information security
fromSecurityWeek
4 days ago

Cyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries

A state-sponsored cyberespionage group TGR-STA-1030 (Shadow Campaign) compromised at least 70 organizations across 37 countries and targeted government infrastructure in 155 countries.
#n8n
fromTechRepublic
3 days ago

Chrome Vulnerabilities Allow Code Execution, Browser Crashes

Google has released a Chrome security update addressing two high-severity vulnerabilities that could allow attackers to execute arbitrary code or cause browser crashes. The issues affect core browser components and may be triggered when users visit specially crafted websites. One of the vulnerabilities, CVE-2026-1861, allows "... a remote attacker to potentially exploit heap corruption via a crafted HTML page," NIST said in its reporting.
Information security
fromSecurityWeek
4 days ago

VS Code Configs Expose GitHub Codespaces to Attacks

It allows developers to test code, review pull requests, and more, but also exposes them to attacks via repository-defined configuration files, Orca says. "Codespaces is essentially VS Code running in the cloud, backed by Ubuntu containers, with built-in GitHub authentication and repository integration. This means any VS Code feature that touches execution, secrets, or extensions can potentially be abused when attackers control the repository content," the cybersecurity firm notes.
Information security
Information security
fromZero Day Initiative
4 days ago

Zero Day Initiative - CVE-2025-6978: Arbitrary Code Execution in the Arista NG Firewall

Arista NG Firewall's runTroubleshooting() fails to properly validate inputs, enabling command injection by passing unsanitized environment variables to network-troubleshooting.sh.
Information security
fromSecurityWeek
4 days ago

SystemBC Infects 10,000 Devices After Defying Law Enforcement Takedown

SystemBC malware persists after takedown, controls over 10,000 machines as SOCKS5 proxy botnet, targeting hosting providers worldwide.
Information security
fromThe Hacker News
4 days ago

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

Infy, an Iranian state-backed threat group, paused C2 operations during Iran's nationwide internet blackout and reestablished new C2 infrastructure immediately before connectivity was restored.
Information security
fromSecuritymagazine
4 days ago

How to Protect Organizations During the Winter Olympics, According to CISOs

Cybercriminals will exploit the Winter Olympics via phishing, impersonation, API misuse, compromised credentials, and trusted-access abuse while security teams prioritize availability.
Information security
fromSecuritymagazine
4 days ago

Healthcare Cybersecurity Is in Crisis - These Proven Controls Could Be the Cure

Healthcare cybersecurity crisis: breaches doubled in 2025, average losses exceeded $2M; prioritize anti-fraud training, regulatory compliance, and targeted investments to reduce material risk.
fromTechzine Global
4 days ago

Attackers exploit LLMs to gain admin rights in AWS

Security researchers at Sysdig warn that attackers can quickly take over AWS environments using large language models. Their latest analysis shows that AI is already being used to automate cloud attacks, accelerate them, and make them harder to detect. The Sysdig Threat Research Team bases these conclusions on an attack that began on November 28, 2025. In this case, an attacker gained initial access and escalated to full administrator rights within an AWS account in less than ten minutes.
Information security
fromTheregister
4 days ago

Betterment breach scope pegged at 1.4M users

Betterment, which offers automated investment and financial planning services, first disclosed the breach in January after detecting unauthorized access to certain internal systems on January 9. Betterment said the hacker gained entry through a social engineering scheme that relied on impersonation to infiltrate third-party marketing and operations tools, then used that access to send customers a fraudulent cryptocurrency promotion disguised as an official company message.
Information security
fromAxios
4 days ago

Anthropic's newest AI model uncovered 500 zero-day software flaws in testing

Before its debut, Anthropic's frontier red team tested Opus 4.6 in a sandboxed environment to see how well it could find bugs in open-source code. The team gave the Claude model everything it needed to do the job - access to Python and vulnerability analysis tools, including classic debuggers and fuzzers - but no specific instructions or specialized knowledge. Claude found more than 500 previously unknown zero-day vulnerabilities in open-source code using just its "out-of-the-box" capabilities,
Information security
Information security
fromSecurityWeek
4 days ago

Researchers Expose Network of 150 Cloned Law Firm Websites in AI-Powered Scam Campaign

Over 150 coordinated cloned law-firm websites impersonate firms to re-victimize fraud victims by offering free asset recovery and evading takedowns.
Information security
fromZDNET
4 days ago

Kali Linux vs. Parrot OS: Which security-forward distro is right for you?

Kali Linux and Parrot OS are free, Debian-based distributions focused on penetration testing; Parrot OS also offers a general-purpose edition.
[ Load more ]