Information security

[ follow ]
Information security
fromTheregister
36 minutes ago

Windows App breaks logins with first 2026 security patch

January 13, 2026 Windows security update causes credential prompt failures in the Windows App, breaking Azure Virtual Desktop and Windows 365 connections.
fromWIRED
1 hour ago

Former CISA Director Jen Easterly Will Lead RSA Conference

The organization puts on the prominent annual gathering of cybersecurity experts, vendors, and researchers that started in 1991 as a small cryptography event hosted by the corporate security giant RSA. RSAC is now a separate company with events and initiatives throughout the year, but its conference in San Francisco is still its flagship offering with tens of thousands of attendees each spring.
Information security
#npm
fromInfoWorld
6 hours ago
Information security

From typos to takeovers: Inside the industrialization of npm supply chain attacks

Attackers shifted to credential-driven npm supply-chain intrusions exploiting CI systems, maintainers, and DevOps weaknesses to gain persistent distribution access.
fromThe Hacker News
2 days ago
Information security

n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens

Malicious npm packages posing as n8n integrations stole OAuth tokens by prompting account links and exfiltrating credentials to attacker-controlled servers.
fromInfoWorld
6 hours ago
Information security

From typos to takeovers: Inside the industrialization of npm supply chain attacks

Information security
fromThe Hacker News
4 hours ago

Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud

Microsoft and law enforcement dismantled RedVDS, a subscription service providing disposable RDPs that enabled roughly $40 million in reported fraud losses.
Information security
fromArs Technica
16 hours ago

A single click mounted a covert, multistage attack against Copilot

Microsoft fixed a Copilot vulnerability that let a single-click URL exfiltrate Copilot chat data and bypass enterprise endpoint security.
Information security
fromThe Hacker News
4 hours ago

Palo Alto Fixes GlobalProtect DoS Flaw That Can Crash Firewalls Without Login

High-severity DoS vulnerability CVE-2026-0227 in GlobalProtect Gateway/Portal allows unauthenticated attackers to force PAN-OS firewalls into maintenance mode; updates required.
Information security
fromSecuritymagazine
14 hours ago

What You Need to Know About the New LinkedIn Phishing Scheme

Attackers post LinkedIn-style comments claiming account restrictions to trick users into clicking lnkd.in links that lead to credential-harvesting pages.
Information security
fromThe Hacker News
2 hours ago

4 Outdated Habits Destroying Your SOC's MTTR in 2026

Modern SOCs must replace manual sample review with automated, cloud-based sandboxes to reduce MTTR, alleviate alert fatigue, and enable faster, deeper incident response.
fromSecuritymagazine
14 hours ago

Security's New Year's Resolution: Building Up the Next Generation

So much of the industry is based on experience and not education. You can learn all the lessons yourself, but it will take a lot longer. Learning from people who have seen enough things to have a strong intuition can help you be better and faster. In part, this is because the field is always changing. As bad actors constantly improve their techniques, the defenders must respond.
Information security
Information security
fromThe Hacker News
1 day ago

PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces

Russian-linked Void Blizzard deployed Python backdoor PLUGGYAPE via Signal and WhatsApp charity lures, using PyInstaller executables, base64 paste C2s, WebSocket and MQTT.
#microsoft-patch-tuesday
fromThe Hacker News
1 day ago
Information security

Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited

Microsoft released January 2026 security updates addressing 114 vulnerabilities, including an actively exploited Desktop Window Manager information-disclosure flaw CVE-2026-20805.
fromComputerWeekly.com
1 day ago
Information security

Microsoft patches 112 CVEs on first Patch Tuesday of 2026 | Computer Weekly

Microsoft released patches for 112 CVEs on January 2026 Patch Tuesday, including multiple zero-days and eight critical vulnerabilities.
Information security
fromTheregister
1 day ago

Windows info-disclosure 0-day bug gets a fix and CISA alert

A Windows ALPC memory-leak vulnerability (CVE-2026-20805) is actively exploited and requires immediate patching, with U.S. federal agencies mandated to fix by Feb 3.
#data-breach
fromTechCrunch
2 days ago
Information security

Fintech firm Betterment confirms data breach after hackers send fake crypto scam notification to users | TechCrunch

fromEngadget
4 days ago
Information security

An Instagram data breach reportedly exposed the personal info of 17.5 million users

fromTechCrunch
2 days ago
Information security

Fintech firm Betterment confirms data breach after hackers send fake crypto scam notification to users | TechCrunch

fromEngadget
4 days ago
Information security

An Instagram data breach reportedly exposed the personal info of 17.5 million users

Information security
fromThe Hacker News
1 day ago

Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware

Malware campaign exploits DLL side-loading in GitKraken's ahost.exe by pairing a malicious libcares-2.dll to bypass signatures and deliver multiple trojans and stealers.
Information security
fromZDNET
23 hours ago

Your Copilot data can be hijacked with a single click - here's how

Reprompt allows attackers to exfiltrate sensitive Copilot data via a single click that injects prompts through the 'q' URL parameter and bypasses security controls.
#linux-malware
fromThe Hacker News
1 day ago

New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification

Research analyzing 4,700 leading websites reveals that 64% of third-party applications now access sensitive data without business justification, up from 51% in 2024. Government sector malicious activity spiked from 2% to 12.9%, while 1 in 7 Education sites show active compromise. Specific offenders: Google Tag Manager (8% of violations), Shopify (5%), Facebook Pixel (4%).
Information security
fromTechCrunch
23 hours ago

Exclusive: US cargo tech company publicly exposed its shipping systems and customer data to the web

For the past year, security researchers have been urging the global shipping industry to shore up their cyber defenses after a spate of cargo thefts were linked to hackers. The researchers say they have seen elaborate hacks targeting logistics companies to hijack and redirect large amounts of their customers' products into the hands of criminals, in what has become an alarming collusion between hackers and real-life organized crime gangs.
Information security
fromThe Hacker News
18 hours ago

Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers

The Black Lotus Labs team at Lumen Technologies said it null-routed traffic to more than 550 command-and-control (C2) nodes associated with the AISURU/Kimwolf botnet since early October 2025. AISURU and its Android counterpart, Kimwolf, have emerged as some of the biggest botnets in recent times, capable of directing enslaved devices to participate in distributed denial-of-service (DDoS) attacks and relay malicious traffic for residential proxy services.
Information security
Information security
fromComputerWeekly.com
21 hours ago

Microsoft DCU uses UK courts to hunt down cyber criminals | Computer Weekly

Microsoft's Digital Crimes Unit disrupted the RedVDS cybercrime-as-a-service network, seizing domains and coordinating international law enforcement to halt large-scale fraud.
Information security
fromWIRED
19 hours ago

AI's Hacking Skills Are Approaching an 'Inflection Point'

Advances in AI enable models to discover complex software vulnerabilities, increasing both defensive detection and malicious exploitation risks.
Information security
fromTheregister
1 day ago

DeadLock ransomware uses smart contracts to evade defenders

DeadLock ransomware uses Polygon smart contracts and decentralized messaging wrappers to rotate proxy URLs and evade detection while relying on encryption-only extortion.
#ai-security
Information security
fromTechzine Global
1 day ago

CrowdStrike acquires browser security company Seraphic

CrowdStrike is acquiring Seraphic Security to add browser-native technology that secures existing browsers, reducing implementation burden and aligning with identity-endpoint-access strategy.
fromTechzine Global
1 day ago

Dell PowerStore 4.3 supports 30TB QLC drives and enhanced cybersecurity

The new version combines lower costs with improved cybersecurity and offers up to 2 petabytes of storage in a 2U rack space. Companies are struggling with explosive data growth, increasing cyber threats, and limited budgets. Dell Technologies is responding to this with PowerStore 4.3, a platform that addresses storage challenges without compromising performance or security. The latest version brings innovations that double storage density and reduce energy costs.
Information security
Information security
fromAlleywatch
23 hours ago

Teleskope Raises $25M to Address Enterprise Data Security with Agentic Automation

Teleskope provides an agentic data security platform that autonomously discovers, classifies, and remediates sensitive data, embedding a 24/7 security team and reducing alerts and costs.
fromTheregister
1 day ago

Microsoft finally ends extended updates for ancient Windows

January 13 marked another milestone for legacy systems, as support for the software - codenamed Longhorn Server - expired for customers that bought Microsoft Premium Assurance (PA). Extended support ended for Windows Server 2008 on January 14, 2020. It was possible to keep the lights on until January 10, 2023, via Extended Security Updates. A fourth year came courtesy of Azure, which took the code to January 9, 2024, but that was it for anyone without PA.
Information security
Information security
fromThe Hacker News
2 days ago

What Should We Learn From How Attackers Leveraged AI in 2025?

Attackers focus on proven entry points like supply-chain and phishing while using AI and long-game tactics to scale, automate, and enable one-person operations.
Information security
fromZero Day Initiative
1 day ago

Zero Day Initiative - The January 2026 Security Update Review

Adobe released 11 bulletins fixing 25 CVEs across multiple products with ColdFusion as Priority 1; Microsoft released 112 Windows CVEs for January 2026.
Information security
fromThe Hacker News
2 days ago

New Malware Campaign Delivers Remcos RAT Through Multi-Stage Windows Attack

SHADOW#REACTOR uses obfuscated VBS, PowerShell fragment fetching, .NET Reactor reflective loading, and MSBuild LOLBin to deploy Remcos RAT for covert persistent access.
fromThe Hacker News
1 day ago

Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages

Silent Push said it discovered the campaign after analyzing a suspicious domain linked to a now-sanctioned bulletproof hosting provider Stark Industries (and its parent company PQ.Hosting), which has since rebranded to THE[.]Hosting, under the control of the Dutch entity WorkTitans B.V., is a sanctions evasion measure. The domain in question, cdn-cookie[.]com, has been found to host highly obfuscated JavaScript payloads (e.g., "recorder.js" or "tab-gtm.js") that are loaded by web shops to facilitate credit card skimming.
Information security
fromThe Hacker News
2 days ago

ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonation

ServiceNow has disclosed details of a now-patched critical security flaw impacting its ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform arbitrary actions as that user. The vulnerability, tracked as CVE-2025-12420, carries a CVSS score of 9.3 out of 10.0 "This issue [...] could enable an unauthenticated user to impersonate another user and perform the operations that the impersonated user is entitled to perform," the company said in an advisory released Monday.
Information security
#gogs
fromSecuritymagazine
2 days ago

Target's Source Code Confirmed Stolen: Why Does This Matter?

On Jan. 12., BleepingComputer reported that multiple repositories appeared on Gitea, apparently containing parts of internal code and developer documentation belonging to the major retailer Target . As of today, Jan. 13, multiple employees of the retailer have confirmed the leaked materials are authentic. As of current reports, the threat actor behind this incident is unknown. Likewise, it is unclear whether this exposure is due to a leakage, a breach or an insider's action.
Information security
fromSecuritymagazine
2 days ago

Security Leaders Discuss FBI Warning: North Korea Exploiting QR Codes

Attackers place malicious QR codes in high-traffic areas, often disguised as legitimate promotional materials or utility services. Physical mail containing QR codes purporting to be from legitimate services, particularly effective for package delivery and financial service scams. While QR codes represent a small percentage, their unique evasion capabilities and growing adoption rates make them vectors with huge latent potential.
Information security
fromThe Hacker News
1 day ago

Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool

Cybersecurity researchers have disclosed details of a malicious Google Chrome extension that's capable of stealing API keys associated with MEXC, a centralized cryptocurrency exchange (CEX) available in over 170 countries, while masquerading as a tool to automate trading on the platform. The extension, named MEXC API Automator (ID: pppdfgkfdemgfknfnhpkibbkabhghhfh), has 29 downloads and is still available on the Chrome Web Store as of writing. It was first published on September 1, 2025, by a developer named "jorjortan142."
Information security
fromComputerWeekly.com
1 day ago

'Dual-channel' attacks are the new face of BEC in 2026 | Computer Weekly

So-called 'dual-channel' attacks using multiple methods of communication either simultaneously or in sequence are becoming more prevalent as digital fraudsters seek out new ways to defeat cyber protections against business email compromise (BEC) scams, according to new data from security services supplier LevelBlue. BEC attacks - which spoof trusted entities, often c-suite executives, then use their identities to convince victims to transfer money into the attackers' pockets - have long been a bugbear for enterprise defenders.
Information security
Information security
fromThe Hacker News
2 days ago

[Webinar] Securing Agentic AI: From MCPs and Tool Access to Shadow API Key Sprawl

Agentic AI that can execute code expands attack surface through Machine Control Protocols; securing MCPs, APIs, and shadow keys is essential to prevent automation-driven breaches.
Information security
fromComputerWeekly.com
2 days ago

How one IT chief shifted the needle on a reactive IT strategy | Computer Weekly

Norsk Global overhauled outdated IT infrastructure to improve resiliency, reduce costs, and enable operational continuity, customer API availability, and future innovation.
#ucp
fromInfoWorld
2 days ago
Information security

Google's Universal Commerce Protocol aims to simplify life for shopping bots... and devs

fromInfoWorld
2 days ago
Information security

Google's Universal Commerce Protocol aims to simplify life for shopping bots... and devs

Information security
fromDataBreaches.Net
1 day ago

Antwerp's AZ Monica hospital hit by cyber attack - DataBreaches.Net

A cyber attack forced AZ Monica hospital to shut servers, cancel over 70 operations, postpone non-urgent care, and reduce emergency services while police investigate.
Information security
fromTechzine Global
2 days ago

Mandiant security tool AuraInspector prevents Salesforce problems

AuraInspector finds Aura-framework misconfigurations in Salesforce Experience Cloud that allow unauthorized access to sensitive backend data and reveals a GraphQL bypass to extract records.
Information security
fromTheregister
2 days ago

Dutch cops cuff alleged AVCheck malware kingpin in Amsterdam

A 33-year-old Dutchman suspected of operating AVCheck, a major malware-testing platform, was arrested at Schiphol and had data storage devices seized.
Information security
fromMedium
2 weeks ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Strong encryption, especially AES-256-GCM, is essential as the last line of defense to protect sensitive personal data against modern cyber threats.
Information security
fromTheregister
2 days ago

Mandiant plugs Salesforce leaks with open source tool

AuraInspector detects Salesforce Aura access-control misconfigurations that can expose sensitive data and automates read-only tests plus remediation suggestions.
from24/7 Wall St.
1 day ago

Cybersecurity Can Be The Next Mega Trend Thanks To AI

Any industry that revolves around AI in some way has seen a boost in the stock market, and cybersecurity may be one of the most promising opportunities. As AI efforts expand, companies will have more data that they must safeguard from hackers. Cybersecurity stocks have been long-term winners thanks to their annual recurring revenue models and how valuable they are for companies. The value of cybersecurity firms should continue to rise as AI makes their services more essential.
Information security
Information security
fromFast Company
1 day ago

4 cybersecurity trends for business resilience in 2026

Organizational resilience is weakening as accelerating change and offensive AI increase complexity risk, requiring prioritized recovery capabilities and identity security investments.
Information security
fromwww.housingwire.com
2 days ago

Reducing risk: The importance of administrative access responsibilities

Clearly defined and strictly managed administrative access reduces cybersecurity risk while preserving operational efficiency in real estate, title insurance, and mortgage systems.
fromZDNET
2 days ago

That handy-looking router USB port can cause problems - here's what PC experts use instead

But here's the truth: I don't recommend using it. Having a USB port on the router sounds convenient, but there are a few problems. The fact is that USB ports on routers aren't secure. Many of them operate on outdated protocols, creating vulnerabilities that can be exploited by bad actors. This doesn't mean the entire router is compromised, but the USB port can be a weak link. Using it is not a risk worth taking, especially when safer alternatives are available.
Information security
Information security
fromDataBreaches.Net
1 day ago

NY: Southold Laserfiche access remains suspended after cyberattack - DataBreaches.Net

Southold's Laserfiche online records system remains suspended over six weeks after a Nov. 24 cyberattack, with public access withheld until $500,000 security upgrades are completed.
Information security
fromTheregister
2 days ago

Developer writes script to throw AI out of Windows

Developers released a PowerShell script, Remove Windows AI, to strip AI features from Windows 11 to enhance user privacy, security, and experience.
fromMedium
2 weeks ago

Where DFIR Fits in NIST's Cyber AI Profile

The National Institute of Standards and Technology (NIST) recently released NIST IR 8596, the Initial Preliminary Draft of the Cybersecurity Framework Profile for Artificial Intelligence (Cyber AI Profile). The document establishes a structured approach for managing cybersecurity risk related to AI systems and the use of AI in cyber defense, organised around three focus areas: Securing AI System Components (Secure), Conducting AI-Enabled Cyber Defense (Defend), and Thwarting AI-Enabled Cyber Attacks (Thwart).
Information security
Information security
fromDataBreaches.Net
1 day ago

Tennessee man to plead guilty to hacking US Supreme Court filing system - DataBreaches.Net

A 24-year-old Springfield, Tennessee resident will plead guilty to repeatedly hacking the U.S. Supreme Court's electronic document filing system.
Information security
fromTechzine Global
1 day ago

Acronis launches Archival Storage for long-term data protection

Acronis Archival Storage provides MSPs S3-compatible, compliant, cost-predictable long-term object storage integrated with Acronis Cyber Protect Cloud.
fromBusiness Matters
3 days ago

When Do Online Casinos Verify Players? A Clear Guide to KYC Triggers and Timelines

Not all online casinos handle verification in the same way. Some operators apply full identity checks at registration, requiring documents before gameplay begins. Others allow players to register and play immediately, postponing verification until certain thresholds are met. This distinction is central to how modern casino platforms are structured. Many newer operators rely on payment-based identification, automated risk scoring, and transaction monitoring rather than immediate document uploads.
Information security
fromMedium
2 weeks ago

Linux Permissions Unleashed: A Deep Dive into Access Control Lists (ACLs)

We have already discussed in the previous two articles about file and folder permissions along with special permissions that are supported in linux. The permissions are effective for many scenarios. But what happens when you need more granularity? How do you grant write access to a file to just one specific user who isn't the owner and isn't in the owning group?
Information security
Information security
fromThe Hacker News
3 days ago

Weekly Recap: AI Automation Exploits, Telecom Espionage, Prompt Poaching & More

Small security oversights in widely used tools enable attackers to execute remote code and scale compromises rapidly, exemplified by n8n CVE‑2026‑21858.
fromThe Verge
1 day ago

Verizon gets FCC permission to end 60-day phone unlocking rule

Following this decision, Verizon must follow a looser set of guidelines set by the CTIA wireless trade group, which says carriers should only unlock a customer's postpaid phone after their contract is up, when they finish paying off the device, or following the payment of an early termination fee. Meanwhile, the CTIA's code says carriers should unlock prepaid phones "no later than one year after initial activation."
Information security
Information security
fromThe Hacker News
3 days ago

GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials

GoBruteforcer compromises crypto and blockchain project servers to build a botnet that brute-forces FTP, MySQL, PostgreSQL, and phpMyAdmin credentials.
Information security
fromDataBreaches.Net
3 days ago

CrazyHunter ransomware escalates with advanced intrusion tactics, six Taiwan healthcare victims confirmed - DataBreaches.Net

CrazyHunter ransomware, a Go-based Prince fork, has rapidly evolved with advanced intrusion and evasion capabilities, targeting Taiwanese healthcare providers and leaking stolen data.
#phishing
fromTechzine Global
3 days ago

Microsoft is making Teams more secure starting today: here's what's changing

Starting today, Microsoft is making it more difficult for cyber attackers to infiltrate organizations via Teams. A new update now blocks dangerous file types and malicious URLs, unless companies explicitly change the default settings. The new features were already known, but will activate automatically today for organizations that have not tampered with the default settings. Companies with customized configurations will not notice the change; their settings will remain intact.
Information security
fromTheregister
3 days ago

Latest BreachForums reboot spills data on 325K users

The allegedly stolen user data was later posted to shinyhunte[.]rs, alongside a message from a self-described cyber outlaw calling himself "James," who appeared keen to make sure his handiwork didn't go unnoticed. Have I Been Pwned's listing of the incident shows that the breach occurred before law enforcement's October 2025 takedown of the BreachForums domain, and that the leak comprised roughly 324,000 unique email addresses, usernames, and Argon2-hashed passwords, pulled from public posts, private messages, and other forum records.
Information security
fromThe Hacker News
3 days ago

Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraud

At least since 2016, Chinese-speaking criminal groups have erected industrial-scale scam centers across Southeast Asia, creating special economic zones that are devoted to fraudulent investment and impersonation operations. These compounds are host to thousands of people who are lured with the promise of high-paying jobs, only to have their passports and be forced to conduct scams under the threat of violence. INTERPOL has characterized these networks as human trafficking-fuelled fraud on an industrial scale.
Information security
fromComputerWeekly.com
2 days ago

Business leaders see AI risks and fraud outpacing ransomware, says WEF | Computer Weekly

Midway through a decade that is coming to be defined by the runaway acceleration of technological change, the threat of ransomware attacks seems to be dropping down the agenda in boardrooms around the world, with C-suite executives more concerned about growing risks arising from artificial intelligence (AI) vulnerabilities, cyber-enabled fraud and phishing attacks, disruption to supply chains, and exploitation of software vulnerabilities.
Information security
Information security
fromZero Day Initiative
2 days ago

Zero Day Initiative - The Alpitronic HYC50 Hardware Teardown for Pwn2Own Automotive 2026

Alpitronic HYC50 is a well-documented, mature EV charger with exploitable physical debug and manufacturing interfaces and custom development units requiring hardware inspection before power-up.
Information security
fromTechzine Global
3 days ago

From vulnerability whack-a-mole to strategic risk operations

Shift security from counting vulnerabilities to strategic risk operations that prioritize exposure, value at risk, and measurable business outcomes.
#instagram
fromTechCrunch
3 days ago
Information security

Instagram says there's been 'no breach' despite password reset requests | TechCrunch

fromTechCrunch
3 days ago
Information security

Instagram says there's been 'no breach' despite password reset requests | TechCrunch

fromTechzine Global
3 days ago

6 predictions for the AI economy: 2026's new rules of cybersecurity

2026 will mark the inflection point where the global economy transitions from "AI-assisted" to "AI-native." We won't just adopt new tools, we'll build a new economic reality: The AI Economy. Autonomous AI agents, entities with the ability to reason, act and remember, will define this new era. We'll delegate key tasks to these agents, from triaging alerts in the security operations center (SOC) to building financial models for corporate strategy.
Information security
Information security
fromTechzine Global
3 days ago

Microsoft closes vulnerability in Edge, version 144 coming soon

Microsoft released Edge 143.0.3650.139 to fix a serious Chromium vulnerability CVE-2026-0628, improving browser security and stability.
Information security
fromEngadget
2 days ago

India is proposing another far-reaching security rule for smartphones

India proposes smartphone security rules requiring source-code access, pre-update notifications, logging, and app restrictions, prompting industry backlash over privacy and proprietary risks.
Information security
fromTheregister
2 days ago

DRAM shortage may drive firewall prices higher: analysts

Global DRAM shortages are driving up firewall hardware costs and pressuring vendor margins for major security appliance makers into 2026.
Information security
fromSecuritymagazine
3 days ago

The Identity Theft Risk Profile of NBA and NFL Draft Prospects

Up-and-coming NBA and NFL draft prospects face measurable identity theft risk, with a substantial share of applications flagged by SentiLink as high-risk.
fromComputerworld
3 days ago

Should there be a financial penalty for ignoring IT?

To all employees, this company takes data protection very seriously. It has a material impact on our operations. The CIO and IT Director are in charge of those policies. If one of them comes to your business unit and gives you an instruction, take it as seriously as you would instructions from any other C-level, including myself. As of this date, know this: If you disregard or otherwise violate any IT instruction, you better pray that they are wrong.
Information security
fromTravel + Leisure
3 days ago

TSA Is Expanding Touchless ID to 45 More Airports-Here's Where You'll See It in 2026

The Transportation Security Administration (TSA) will expand a touchless identification process for members of its TSA PreCheck program during airport screening to dozens of new airports this year. The TSA PreCheck Touchless ID line has been popping up at large airports across the country and is currently available at 20 different locations. But this year, the agency confirmed to Travel + Leisure it will expand the program to 45 new airports from Boston to San Diego and beyond.
Information security
fromBusiness Matters
6 days ago

The Power Couple of 2026: Why Modern Businesses Pair Managed IT with Automated Scanning

As we move further into 2026, the "cloud-first" approach has become the global standard. However, this shift has also introduced a paradox: while the cloud makes scaling easier, it makes security more complex. For modern enterprises, staying ahead of sophisticated, AI-driven threats requires a dual-layered strategy. The most successful organizations today are winning by combining the operational excellence of cloud managed IT services with the proactive precision of a high-performance Vulnerability Scanner.
Information security
Information security
fromInfoQ
4 days ago

AWS Introduces VPC Encryption Controls to Enforce Encryption in Transit

AWS VPC encryption controls let customers detect, enforce, and exclude encryption for intra- and inter-VPC traffic to meet regulatory and compliance requirements.
Information security
fromThe Hacker News
5 days ago

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

Iran-affiliated MuddyWater deploys a Rust-based implant called RustyWater (RUSTRIC) via spear-phishing Word macros to target diplomatic, maritime, financial, and telecom sectors.
Information security
fromComputerworld
5 days ago

Trend Micro patches critical flaws in its Apex Central software

A vulnerability in Apex Central's management server lets remote attackers cause the server to load and execute a malicious DLL without authentication.
Information security
fromInfoQ
5 days ago

MongoBleed Vulnerability Allows Attackers to Read Data From MongoDB's Heap Memory

A zlib decompression flaw (CVE-2025-14847, MongoBleed) allows unauthenticated remote attackers to leak uninitialized memory and exfiltrate credentials from exposed MongoDB servers.
Information security
fromWIRED
5 days ago

Security News This Week: ICE Can Now Spy on Every Phone in Your Neighborhood

An ICE-related shooting, rising protest policing antagonism, and Grok's AI-generated explicit imagery fuel urgent concerns about public safety, platform abuse, and digital privacy.
Information security
fromEngadget
5 days ago

How to change location with a VPN

A VPN replaces a device's real IP with a server's IP and geolocation, enabling access to region-restricted online content and privacy benefits.
Information security
fromThe Hacker News
5 days ago

Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations

APT28 (BlueDelta) conducted targeted credential-harvesting phishing campaigns against Turkish energy/nuclear contacts, European think tank staff, and organizations in North Macedonia and Uzbekistan.
[ Load more ]