Information security

[ follow ]
Information security
fromZDNET
1 hour ago

77% of IT managers say their AI agents are out of control - 5 ways to rein in yours

Only 23% of IT managers have complete control over AI agents, leading to security and productivity concerns.
Information security
fromnews.bitcoin.com
1 hour ago

Solana Readies Quantum Defense With 3-Step Roadmap and Falcon Implementation

Anza and Firedancer selected the Falcon post-quantum signature scheme for Solana, ensuring readiness against quantum threats without immediate migration needs.
#cybersecurity
Information security
fromSecurityWeek
15 hours ago

UNC6692 Uses Email Bombing, Social Engineering to Deploy 'Snow' Malware

A threat actor, UNC6692, impersonates IT support to deploy malware through phishing emails and malicious browser extensions.
Information security
fromThe Hacker News
10 hours ago

Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack

Checkmarx's investigation reveals a cybercriminal group published data from its GitHub repository on the dark web following a supply chain attack.
Information security
fromZDNET
1 day ago

Nearly half of cybersecurity pros want to quit - here's why

There's a significant mismatch between demand and rewards in cybersecurity, leading to dissatisfaction among professionals.
Information security
fromSecurityWeek
15 hours ago

UNC6692 Uses Email Bombing, Social Engineering to Deploy 'Snow' Malware

A threat actor, UNC6692, impersonates IT support to deploy malware through phishing emails and malicious browser extensions.
Information security
fromSecuritymagazine
1 day ago

Why Energy Infrastructure Is Cybersecurity's Next Frontier

The energy transition is expanding the cyberattack surface of critical infrastructure, creating new risks and challenges for cybersecurity.
Information security
fromTheregister
14 hours ago

Cybersecurity professional getting more work and less pay

Cybersecurity professionals faced significant pay stagnation in 2025, with 77% in the UK receiving no salary increase despite high demand for their roles.
Information security
fromThe Hacker News
10 hours ago

Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware

Dozens of malicious VS Code extensions linked to the GlassWorm campaign have been identified, posing risks to developers through cloned versions of legitimate tools.
Information security
fromThe Hacker News
10 hours ago

Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack

Checkmarx's investigation reveals a cybercriminal group published data from its GitHub repository on the dark web following a supply chain attack.
Information security
fromZDNET
1 day ago

Nearly half of cybersecurity pros want to quit - here's why

There's a significant mismatch between demand and rewards in cybersecurity, leading to dissatisfaction among professionals.
#ai-security
fromZDNET
4 days ago
Information security

How indirect prompt injection attacks on AI work - and 6 ways to shut them down

fromFortune
4 days ago
Information security

Security experts head to D.C. to debate standards for securing AI systems as Mythos raises the stakes | Fortune

Information security
fromSecurityWeek
14 hours ago

Malicious AI Prompt Injection Attacks Increasing, but Sophistication Still Low: Google

Google's research reveals an increase in indirect prompt injection attacks on AI, though their sophistication remains relatively low.
Information security
fromZDNET
4 days ago

How indirect prompt injection attacks on AI work - and 6 ways to shut them down

Indirect prompt injection attacks pose significant security risks to AI systems without requiring user interaction.
Information security
fromFortune
4 days ago

Security experts head to D.C. to debate standards for securing AI systems as Mythos raises the stakes | Fortune

AI systems are becoming attractive targets for adversaries, with vulnerabilities discovered faster than developers can respond.
#ai-in-cybersecurity
Information security
fromThe Hacker News
10 hours ago

Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren't Ready for the Remediation Side

AI systems like Claude Mythos can identify vulnerabilities quickly, but organizations struggle to remediate them effectively.
Information security
fromThe Hacker News
10 hours ago

Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren't Ready for the Remediation Side

AI systems like Claude Mythos can identify vulnerabilities quickly, but organizations struggle to remediate them effectively.
#malware
Information security
fromThe Hacker News
10 hours ago

Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More

New malware fast16 predates Stuxnet, targeting high-precision software to subtly alter calculations, potentially causing significant failures.
Information security
fromThe Hacker News
2 days ago

Researchers Uncover Pre-Stuxnet 'fast16' Malware Targeting Engineering Software

A new Lua-based malware, fast16, predates Stuxnet and targets high-precision calculation software for cyber sabotage.
Information security
fromSecurityWeek
3 days ago

Pre-Stuxnet Sabotage Malware 'Fast16' Linked to US-Iran Cyber Tensions

Fast16 is a Lua-based malware discovered by SentinelOne, predating Stuxnet, designed to tamper with high-precision software.
Information security
fromTheregister
3 days ago

CISA, NCSC issue Firestarter backdoor warning

Firestarter malware targets a US federal agency, maintaining persistent access to compromised devices, posing risks to government and critical infrastructure.
Information security
fromTheregister
3 days ago

Researchers find sabotage malware that may predate Stuxnet

Malware named fast16 aims to sabotage engineering and physics simulation software, predating Stuxnet and targeting high-precision tools.
Information security
fromInfoWorld
5 days ago

Malicious pgserve, automagik developer tools found in npm registry

Malicious npm packages aim to steal sensitive data and credentials, potentially leading to complete organizational takeovers.
Information security
fromThe Hacker News
10 hours ago

Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More

New malware fast16 predates Stuxnet, targeting high-precision software to subtly alter calculations, potentially causing significant failures.
Information security
fromThe Hacker News
2 days ago

Researchers Uncover Pre-Stuxnet 'fast16' Malware Targeting Engineering Software

A new Lua-based malware, fast16, predates Stuxnet and targets high-precision calculation software for cyber sabotage.
Information security
fromSecurityWeek
3 days ago

Pre-Stuxnet Sabotage Malware 'Fast16' Linked to US-Iran Cyber Tensions

Fast16 is a Lua-based malware discovered by SentinelOne, predating Stuxnet, designed to tamper with high-precision software.
Information security
fromTheregister
3 days ago

CISA, NCSC issue Firestarter backdoor warning

Firestarter malware targets a US federal agency, maintaining persistent access to compromised devices, posing risks to government and critical infrastructure.
Information security
fromTheregister
3 days ago

Researchers find sabotage malware that may predate Stuxnet

Malware named fast16 aims to sabotage engineering and physics simulation software, predating Stuxnet and targeting high-precision tools.
Information security
fromInfoWorld
5 days ago

Malicious pgserve, automagik developer tools found in npm registry

Malicious npm packages aim to steal sensitive data and credentials, potentially leading to complete organizational takeovers.
Information security
fromThe Hacker News
17 hours ago

Fake CAPTCHA IRSF Scam and 120 Keitaro Campaigns Drive Global SMS, Crypto Fraud

Telecommunications fraud campaign uses fake CAPTCHA to trick users into sending costly international text messages, generating illicit revenue for fraudsters.
#ai
fromInfoWorld
5 days ago
Information security

Claude Mythos signals a new era in AI-driven security, finding 271 flaws in Firefox

Information security
fromComputerworld
5 days ago

Claude Mythos signals a new era in AI-driven security, finding 271 flaws in Firefox

AI has exposed hundreds of vulnerabilities in Mozilla's Firefox browser, highlighting both cybersecurity advancements and dual-use risks.
Information security
fromSecurityWeek
4 days ago

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

AI systems can autonomously hack cloud environments, demonstrating advanced capabilities in executing sophisticated attacks without specific instructions.
Information security
fromTheregister
4 hours ago

Cursor-Opus agent snuffs out startup's production database

An AI coding agent deleted PocketOS's production database and backups in 9 seconds due to a credential mismatch and improper token permissions.
Information security
fromnews.bitcoin.com
4 days ago

From Scripts to Swarms: Why AI Is Breaking Traditional Sybil Defenses

AI agents will centralize identity management, enhancing security against Sybil attacks through advanced automation and dynamic behavior.
Information security
fromInfoWorld
5 days ago

Claude Mythos signals a new era in AI-driven security, finding 271 flaws in Firefox

AI has exposed hundreds of vulnerabilities in Mozilla's Firefox browser, highlighting both cybersecurity advancements and dual-use risks.
Information security
fromComputerworld
5 days ago

Claude Mythos signals a new era in AI-driven security, finding 271 flaws in Firefox

AI has exposed hundreds of vulnerabilities in Mozilla's Firefox browser, highlighting both cybersecurity advancements and dual-use risks.
Information security
fromSecurityWeek
4 days ago

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

AI systems can autonomously hack cloud environments, demonstrating advanced capabilities in executing sophisticated attacks without specific instructions.
#crowdstrike
Information security
from24/7 Wall St.
11 hours ago

Mizuho Upgrades CrowdStrike With a $520 Price Target: Is AI Security the Next Mega-Trade?

Mizuho upgraded CrowdStrike to Outperform, raising its price target to $520, citing strong demand and AI security growth potential.
Information security
from24/7 Wall St.
11 hours ago

Mizuho Upgrades CrowdStrike With a $520 Price Target: Is AI Security the Next Mega-Trade?

Mizuho upgraded CrowdStrike to Outperform, raising its price target to $520, citing strong demand and AI security growth potential.
Information security
fromTechRepublic
7 hours ago

Truecaller Faces New Pressure in India as Growth Matures - TechRepublic

Truecaller reached 500 million monthly active users but faces growth challenges in India due to increased competition and changing user needs.
Information security
fromSecurityWeek
16 hours ago

Easily Exploitable 'Pack2TheRoot' Linux Vulnerability Leads to Root Access

A high-severity vulnerability in PackageKit allows unprivileged users to install packages with root privileges, tracked as CVE-2026-41651.
Information security
fromTechCrunch
9 hours ago

Hacker who allegedly carried out cyberattacks for China is extradited to U.S. | TechCrunch

Xu Zewei, accused of cyberattacks for the Chinese government, has been extradited to the U.S. and is now in detention in Houston, Texas.
fromFuturism
1 day ago

Ransomware Negotiator Pleads Guilty to Deploying Ransomware Himself

Angelo Martino, a Florida man, has pleaded guilty to conspiracy to commit ransomware attacks against at least five American companies, revealing a shocking betrayal of trust.
Information security
Information security
fromSecurityWeek
2 days ago

China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks

GopherWhisper is a newly identified APT using legitimate services for command-and-control communication and data exfiltration, primarily targeting a Mongolian government entity.
fromnews.bitcoin.com
2 days ago

Five Major DeFi Protocols Ask Arbitrum DAO to Free 30,765 ETH Locked After rsETH Bridge Bug

The KelpDAO rsETH Unichain-to-Ethereum bridge released 116,500 rsETH on Ethereum without a corresponding source-side burn, breaking the core bridge invariant that Ethereum-side locked rsETH should cover remote-chain minted supply.
Information security
#bitwarden
Information security
fromSecurityWeek
3 days ago

Bitwarden NPM Package Hit in Supply Chain Attack

The Bitwarden CLI NPM package was compromised, enabling credential theft through a malicious payload targeting various cloud services and GitHub repositories.
Information security
fromSecurityWeek
3 days ago

Bitwarden NPM Package Hit in Supply Chain Attack

The Bitwarden CLI NPM package was compromised, enabling credential theft through a malicious payload targeting various cloud services and GitHub repositories.
Information security
fromThe Hacker News
3 days ago

LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure

A high-severity SSRF vulnerability in LMDeploy is actively exploited, allowing attackers to access sensitive data and internal networks.
Information security
fromSecurityWeek
3 days ago

Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents

Agentic AI is transforming cybersecurity, presenting both opportunities for defenders and risks for attackers, necessitating a strategic response from the industry.
Information security
fromSecurityWeek
3 days ago

US Federal Agency's Cisco Firewall Infected With 'Firestarter' Backdoor

A US federal agency was infected with malware due to vulnerabilities in Cisco firewalls linked to a China-backed espionage campaign.
Information security
fromTheregister
3 days ago

Attackers could disable all of a city's public EV chargers

Rented IoT infrastructure prioritizes user convenience over security, exposing them to denial of service attacks and vulnerabilities.
Information security
fromTechzine Global
3 days ago

Agentic AI is reshaping the network - and it's time to upgrade

Wireless connectivity is essential for AI, transforming industries and requiring strategic management to address complexity and security risks.
Information security
fromSecurityWeek
3 days ago

Locked Shields 2026: 41 Nations Strengthen Cyber Resilience in World's Biggest Exercise

Locked Shields 2026 tested cyber defense capabilities of 4,000 participants from 41 nations against simulated cyberattacks on critical infrastructure.
Information security
fromFast Company
4 days ago

1Password sees AI as both threat and tool

AI presents both risks and opportunities for password management, requiring firms to balance security with the potential for careless app development.
Information security
fromIT Brew
4 days ago

Asking around: When does ransomware threat intelligence become noise?

Effective threat intelligence requires filtering information relevant to specific market segments to avoid overwhelming alerts.
Information security
fromInfoWorld
4 days ago

Offer customers passkeys by default, UK's NCSC tells enterprises

Passkeys are recommended as the primary authentication method due to their security against phishing and credential reuse.
Information security
fromThe Hacker News
4 days ago

Vercel Finds More Compromised Accounts in Context.ai-Linked Breach

Vercel identified additional compromised customer accounts linked to a security incident involving unauthorized access to its internal systems.
Information security
fromTechCrunch
4 days ago

Vercel says some of its customers' data was stolen prior to its recent hack | TechCrunch

Vercel experienced a data breach affecting customer accounts, with evidence of prior compromises suggesting broader security implications.
#artificial-intelligence
fromFortune
4 days ago
Information security

Former national cyber director: Anthropic's 'Mythos' AI can hack nearly anything and we aren't ready | Fortune

Information security
fromFortune
5 days ago

The Mythos meeting focused on the wrong AI risk to banks. Here's the one nobody is talking about | Fortune

Artificial intelligence is transforming fraud into a machine-driven, scalable threat, posing risks beyond traditional cyber attacks.
Information security
fromFortune
4 days ago

Former national cyber director: Anthropic's 'Mythos' AI can hack nearly anything and we aren't ready | Fortune

Mythos, Anthropic's advanced AI model, poses significant risks to critical infrastructure, necessitating urgent investment and collaboration to enhance cybersecurity.
Information security
fromFortune
5 days ago

The Mythos meeting focused on the wrong AI risk to banks. Here's the one nobody is talking about | Fortune

Artificial intelligence is transforming fraud into a machine-driven, scalable threat, posing risks beyond traditional cyber attacks.
Information security
fromnews.bitcoin.com
4 days ago

Beyond the Breach: Why rsETH's Depegging Demands a New Standard for Bridge Security

KelpDAO's rsETH depegged after a breach, highlighting the need for improved bridge security in collateral risk management.
Information security
fromForbes
4 days ago

How To Spot A Fake Candidate Before You Hire One

Deepfake technology is increasingly used in hiring fraud, posing significant challenges for recruiters and companies.
Information security
fromSecurityWeek
4 days ago

Recent Microsoft Defender Vulnerability Exploited as Zero-Day

A zero-day vulnerability in Microsoft Defender, tracked as CVE-2026-33825, allows privilege escalation through a flaw named BlueHammer.
Information security
fromTechCrunch
4 days ago

Surveillance vendors caught abusing access to telcos to track people's phone locations, researchers say | TechCrunch

Two spying campaigns exploit telecom infrastructure weaknesses to track individuals' locations, revealing ongoing vulnerabilities in global phone networks.
Information security
fromSecuritymagazine
5 days ago

NIST's New Prioritization Criteria for CVEs, Examined by Experts

NIST is changing its approach to handling cybersecurity vulnerabilities by prioritizing certain CVEs for immediate enrichment in the National Vulnerability Database.
fromSecuritymagazine
5 days ago

Operationally Ineffective: Putting CVEs in a Chokehold with Privilege Disruption

A Common Vulnerability Exposure (CVE) that cannot reach the privilege plane is operationally ineffective - even at a CVSS Score of 10. This should be a core philosophy that is embedded into the fabric of software engineering.
Information security
fromTheregister
4 days ago

Dev targeted by sophisticated job scam

Vujičić noted that he receives daily messages about job offers, with a personal record of eight in one day, indicating the prevalence of recruitment scams targeting crypto professionals.
Information security
Information security
fromArs Technica
4 days ago

Now, even ransomware is using post-quantum cryptography

Kyber's use of PQC key-exchange algorithms serves more as a marketing tactic than a practical security measure against imminent quantum threats.
Information security
fromTechRepublic
5 days ago

Microsoft Patch Still Leaves 1,300 SharePoint Servers Exposed

Over 1,300 internet-exposed Microsoft SharePoint servers remain unpatched against a spoofing flaw, CVE-2026-32201, posing significant security risks.
[ Load more ]