Information security

[ follow ]
Information security
fromThe Hacker News
1 hour ago

Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders

Attackers are collecting encrypted data today to decrypt later using quantum computers, requiring organizations to adopt quantum-resistant encryption now to protect long-term sensitive data.
Information security
fromTechzine Global
3 hours ago

Cisco details further vulnerabilities in Catalyst SD-WAN Manager

Cisco disclosed five vulnerabilities in Catalyst SD-WAN Manager with CVSS scores ranging from medium to critical, two actively exploited, requiring immediate patching with no workarounds available.
Information security
fromThe Hacker News
1 hour ago

ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More

AuraStealer malware infrastructure revealed with 48 C2 domains using .shop and .cfd extensions, routed through Cloudflare, distributed via ClickFix with subscription pricing of $295-$585 monthly.
Information security
fromSecurityWeek
3 hours ago

Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild

Cisco warns of active exploitation of two Catalyst SD-WAN vulnerabilities allowing information disclosure and arbitrary file overwrite with privilege escalation capabilities.
#zero-day-vulnerabilities
Information security
fromThe Hacker News
3 days ago

Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More

Multiple attack vectors across network systems, cloud infrastructure, and AI platforms exploit access control gaps, exposed credentials, and trusted service misuse to target high-value sectors.
Information security
fromThe Hacker News
3 days ago

Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More

Multiple attack vectors across network systems, cloud infrastructure, and AI platforms exploit access control gaps, exposed credentials, and trusted service misuse to target high-value sectors.
#phishing-as-a-service
Information security
fromThe Hacker News
7 hours ago

Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks

Law enforcement and security companies dismantled Tycoon 2FA, a major phishing-as-a-service toolkit that facilitated credential harvesting attacks affecting nearly 100,000 organizations globally.
fromThe Hacker News
3 hours ago

Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware

Dust Specter used randomly generated URI paths for command-and-control (C2) communication with checksum values appended to the URI paths to ensure that these requests originated from an actual infected system. The C2 server also utilized geofencing techniques and User-Agent verification.
Information security
Information security
fromSecuritymagazine
15 hours ago

The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering

Hackers exploit DLL side-loading on trusted platforms like LinkedIn to deliver malware through seemingly legitimate file attachments, bypassing traditional security defenses and compromising entire corporate networks.
Information security
fromThe Hacker News
3 hours ago

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Many Windows authentication paths bypass MFA protections, allowing attackers to compromise networks using valid credentials despite MFA deployment on cloud applications.
Information security
fromThe Hacker News
4 hours ago

APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine

Russian state-sponsored APT28 deployed two new malware families, BadPaw and MeowMeow, targeting Ukrainian entities through phishing emails with Ukrainian-language lures about border crossing appeals.
Information security
fromTheregister
15 hours ago

'Hundreds' of Iranian hacking attempts hit IP cameras

Iranian hacking crews have targeted surveillance cameras in Israel and Middle Eastern countries since February 28, exploiting vulnerabilities in Hikvision and Dahua cameras as potential preparation for physical attacks.
Information security
fromThe Hacker News
7 hours ago

FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials

Law enforcement dismantled LeakBase, a major cybercriminal forum with 142,000 members that traded stolen data and hacking tools, seizing all content and accounts for evidence.
fromSecurityWeek
6 hours ago

Cisco Patches Critical Vulnerabilities in Enterprise Networking Products

This vulnerability is due to an improper system process that is created at boot time. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute a variety of scripts and commands that allow root access to the device.
Information security
fromSecurityWeek
11 hours ago

Nation-State iOS Exploit Kit 'Coruna' Found Powering Global Attacks

Coruna is powerful and sophisticated in both purpose and design. But it is not effective against the latest versions of iOS. The easiest defense is to ensure your iPhone is running iOS 17.3 or newer. In instances where an update is not possible, it is recommended that Lockdown Mode be enabled for enhanced security.
Information security
Information security
fromZDNET
4 hours ago

The biggest AI threats come from within - 12 ways to defend your organization

AI simultaneously strengthens cybersecurity defenses and empowers cybercriminals, creating an ongoing arms race between defenders and attackers.
Information security
fromBusiness Matters
1 day ago

7 Data Privacy Risks Leaders Miss in 2026

Organizations overlook seven critical privacy risks in 2026 that bypass security awareness, including public WiFi interception, malicious browser extensions, shadow AI tools, unencrypted messaging, credential reuse, unmanaged personal devices, and data retention gaps.
Information security
fromThe Hacker News
1 day ago

APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

Silver Dragon, an APT41-linked group, targets European and Southeast Asian government entities through server exploitation, phishing, and Cobalt Strike beacons since mid-2024.
Information security
fromSecuritymagazine
1 day ago

Would You Trust an AI Pentester to Work Solo?

AI-powered pentesting excels at speed and pattern recognition but requires human guidance to validate contextual vulnerabilities and novel attack paths that matter most to organizations.
Information security
fromComputerWeekly.com
23 hours ago

Tycoon2FA phishing platform dismantled in major operation | Computer Weekly

Europol-led operation dismantled Tycoon2FA, a phishing service with 2,000 subscribers that bypassed multifactor authentication by intercepting credentials and session cookies across 24,000 domains.
Information security
fromComputerWeekly.com
22 hours ago

Zero-day in Android phone chips under active attack | Computer Weekly

A zero-day memory corruption vulnerability in Qualcomm chipsets affecting over 200 Android devices is actively exploited in the wild, requiring immediate security updates.
Information security
fromForbes
1 day ago

Adapting Brand Protection Strategies In The Age Of AI And Deepfakes

AI and automation have industrialized brand abuse at scale, requiring brands to move beyond manual enforcement to technology-driven defense strategies that match attacker velocity and economics.
Information security
fromMail Online
21 hours ago

Warning to iPhone users over hacking tool tied to government spyware

Coruna spyware targets iPhones running iOS versions from 2019 to late 2023, exploiting over 20 vulnerabilities to steal sensitive data without user awareness.
Information security
fromTheregister
1 day ago

Kaspersky: No signs Coruna iPhone exploit kit made by US

Kaspersky disputes claims that the Coruna iPhone exploit kit shares authorship with a 2023 operation targeting Russian diplomats, stating no evidence of code reuse exists between them.
Information security
fromComputerworld
1 day ago

Iranian cyberattacks fail to materialize but threat remains acute

Iranian cyber groups will likely escalate from current low-level activity to destructive wiper attacks despite a temporary lull following US-Israeli military operations.
#malware-distribution
Information security
fromBusiness Insider
1 day ago

Online ads just became the internet's biggest malware machine, report says

Malicious ads surpassed email as the primary malware delivery channel in 2025, accounting for over 60% of campaigns, with programmatic advertising instances growing 45% year-over-year.
Information security
fromBusiness Insider
1 day ago

Online ads just became the internet's biggest malware machine, report says

Malicious ads surpassed email as the primary malware delivery channel in 2025, accounting for over 60% of campaigns, with programmatic advertising instances growing 45% year-over-year.
Information security
fromInfoWorld
1 day ago

Angular releases patches for SSR security issues

Google's Angular team released two security updates for SSR vulnerabilities: a critical SSRF/header injection flaw and a moderate open redirect flaw, requiring immediate patching to prevent authorization header theft and phishing attacks.
Information security
fromSecurityWeek
1 day ago

Critical FreeScout Vulnerability Leads to Full Server Compromise

A critical zero-click RCE vulnerability in FreeScout bypasses previous patches using zero-width space characters, enabling unauthenticated remote code execution through malicious emails.
Information security
from24/7 Wall St.
17 hours ago

Why Cybersecurity ETF CIBR Belongs in Every Retirement Portfolio Right Now

CIBR tracks cybersecurity companies but has underperformed the broader market over the past five years due to valuation compression in high-growth tech names.
fromThe Hacker News
1 day ago

CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

A malicious unauthenticated actor may exploit this issue to execute arbitrary commands, which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress. The shortcoming was addressed, along with CVE-2026-22720, a stored cross-site scripting vulnerability, and CVE-2026-22721, a privilege escalation vulnerability that could result in administrative access.
Information security
fromSecurityWeek
1 day ago

VMware Aria Operations Vulnerability Exploited in the Wild

A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress. CISA added CVE-2026-22719 to its Known Exploited Vulnerabilities (KEV) catalog on Tuesday, instructing federal agencies to address it by March 24.
Information security
#api-security
Information security
fromTechzine Global
1 day ago

Misused Gemini API key results in sky-high AI costs for startup

A stolen Google Gemini API key resulted in an $82,000 bill for a small startup in two days, revealing significant financial risks when access credentials are compromised.
Information security
fromTheregister
1 day ago

Dev stunned by $82K Gemini API key bill after theft

A developer's stolen Google Gemini API key resulted in $82,314 in unauthorized charges within 48 hours, while Google refused to waive costs citing shared responsibility, threatening the startup's survival.
Information security
fromTechzine Global
1 day ago

Misused Gemini API key results in sky-high AI costs for startup

A stolen Google Gemini API key resulted in an $82,000 bill for a small startup in two days, revealing significant financial risks when access credentials are compromised.
Information security
fromTheregister
1 day ago

Dev stunned by $82K Gemini API key bill after theft

A developer's stolen Google Gemini API key resulted in $82,314 in unauthorized charges within 48 hours, while Google refused to waive costs citing shared responsibility, threatening the startup's survival.
fromThe Hacker News
21 hours ago

149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict

The hacktivist threat in the Middle East is highly lopsided, with two groups, Keymous+ and DieNet, driving nearly 70% of all attack activity between February 28 and March 2. In all, a total of 149 hacktivist DDoS claims were recorded targeting 110 distinct organizations across 16 countries. The attacks were carried out by 12 different groups, including Keymous+, DieNet, and NoName057(16), which accounted for 74.6% of all activity.
Information security
fromDevOps.com
1 day ago

Chainguard Expands Repository to Add More Secure Open Source Libraries - DevOps.com

Chainguard has rebuilt nearly one million unique versions of Java dependencies, including enterprise essentials such as Spring Boot, Jackson, Apache Commons, and Log4j, using the Chainguard Factory, an automated platform for creating software builds based on code originally found in open source software repositories.
Information security
#cyberattacks
Information security
fromSecuritymagazine
1 day ago

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

U.S. cyber defenders should expect retaliatory cyberattacks from Iranian state actors and hacktivists targeting critical infrastructure, financial services, healthcare, and media outlets within the next 30 days.
Information security
fromNextgov.com
23 hours ago

Iran-linked hacktivists could target governments, experts warn

Iranian regime-aligned hacktivists may escalate cyberattacks against U.S. state and local government targets, financial services, and energy sectors in retaliation for military operations.
Information security
fromSecuritymagazine
1 day ago

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

U.S. cyber defenders should expect retaliatory cyberattacks from Iranian state actors and hacktivists targeting critical infrastructure, financial services, healthcare, and media outlets within the next 30 days.
Information security
fromNextgov.com
23 hours ago

Iran-linked hacktivists could target governments, experts warn

Iranian regime-aligned hacktivists may escalate cyberattacks against U.S. state and local government targets, financial services, and energy sectors in retaliation for military operations.
Information security
fromDataBreaches.Net
1 day ago

Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit - DataBreaches.Net

The Coruna exploit kit targeting iOS 13.0-17.2.1 contains 23 exploits across five chains, proliferating among surveillance vendors, Russian espionage groups, and Chinese financially motivated actors throughout 2025.
Information security
fromTechzine Global
1 day ago

Eurofiber and Colt want quantum-secure connections

Eurofiber and Colt Technology Services launched a quantum-secure fiber optic connection between Amsterdam, London, and Brussels to protect financial institutions from future quantum computer-based cyberattacks.
#6g-security
Information security
fromTheregister
2 days ago

Western governments seek to lock down 6G before it exists

Western governments launched 6G Security and Resilience Principles to embed supply chain controls and cyber safeguards into next-generation mobile networks before standardization occurs.
Information security
fromTheregister
2 days ago

Western governments seek to lock down 6G before it exists

Western governments launched 6G Security and Resilience Principles to embed supply chain controls and cyber safeguards into next-generation mobile networks before standardization occurs.
Information security
fromTechRepublic
21 hours ago

Perplexity AI Browser Flaw Could Let Calendar Invites Access Local Files

A security vulnerability in Perplexity's Comet browser allowed attackers to access local files through hidden instructions in routine content like calendar invitations, exposing risks in AI browser agents that autonomously execute actions while authenticated.
fromSilicon Canals
1 day ago

A US government iPhone hacking tool has gone feral - and 42,000 devices are already infected - Silicon Canals

Google security researchers released a report detailing Coruna as a highly sophisticated iPhone hacking toolkit that reportedly exploits multiple distinct vulnerabilities in iOS and includes several complete attack chains capable of bypassing iPhone security defenses. The toolkit can silently install malware when users simply visit compromised websites - no clicks, no downloads, no user interaction required.
Information security
#cybersecurity
fromTechCrunch
20 hours ago

U.S. and EU police shut down LeakBase, a site accused of sharing stolen passwords and hacking tools | TechCrunch

LeakBase has been operating since 2021, the authorities said, and had a continuously maintained archive of hacked databases, including hundreds of millions of account credentials, credit card numbers, and banking account and routing information.
Information security
Information security
fromTheregister
2 days ago

Microsoft OAuth scams abuse redirects for malware delivery

Microsoft warns of ongoing OAuth abuse scams using phishing emails and URL redirects to deliver malware and compromise organizational devices, primarily targeting government and public-sector entities.
Information security
fromThe Hacker News
2 days ago

Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries

Russian-speaking threat actors used CyberStrikeAI, a China-linked open-source AI security tool, to attack Fortinet FortiGate appliances, compromising over 600 devices across 55 countries.
Information security
fromFortune
2 days ago

Boards aren't ready for the AI age: What happens when your CEO gets deepfaked? | Fortune

Deepfake fraud losses tripled to $1.1 billion in 2025, with executives vulnerable to synthetic voice and video impersonation attacks targeting both financial theft and reputational damage.
Information security
fromTechzine Global
2 days ago

DeepKeep maps attack surface for AI agents

DeepKeep's AI Agent Scanner identifies security risks in AI agents by mapping vulnerabilities, tool access, and data exposure across supported frameworks using OWASP standards.
Information security
fromTechCrunch
2 days ago

Fig Security emerges from stealth with $38M to help security teams deal with change | TechCrunch

Fig Security monitors enterprise security stacks to ensure detection and response capabilities function properly despite complex tool interactions and system changes.
Information security
fromThe Hacker News
2 days ago

Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

Microsoft warns of phishing campaigns exploiting OAuth redirect mechanisms to bypass email and browser defenses, targeting government and public-sector organizations to deliver malware without stealing credentials.
Information security
fromFortune
2 days ago

Why investing in cybersecurity just became a 'must-have' for CFOs | Fortune

CFOs must treat vendor cyber risk as a material balance sheet risk, integrating resilience assessments and proactive risk quantification into enterprise frameworks amid heightened geopolitical threats.
Information security
fromSecurityWeek
2 days ago

New 'AirSnitch' Attack Shows Wi-Fi Client Isolation Could be a False Sense of Security

Researchers discovered that client isolation in Wi-Fi networks can be bypassed on all tested routers due to missing standardization and inconsistent vendor implementations.
Information security
fromTechRepublic
1 day ago

Chrome Extension Hijacked to Deliver Malware, Steal Crypto Wallets

QuickLens Chrome extension was compromised to deliver malware, steal cryptocurrency wallet data, and execute ClickFix attacks by stripping security headers and establishing command-and-control communications.
Information security
fromComputerworld
2 days ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
Information security
fromSecurityWeek
2 days ago

Vulnerability in MS-Agent AI Framework Can Allow Full System Compromise

CVE-2026-2256 in ModelScope MS-Agent framework allows arbitrary OS command execution through inadequate input sanitization in the Shell tool using regex-based blacklist filtering.
Information security
fromwww.bbc.com
2 days ago

Deepfake attack: 'Many people could have been cheated'

Deepfake technology has increased 3,000% over two years, enabling fraudsters to impersonate executives and manipulate financial markets and corporate security through AI-generated videos and audio.
Information security
fromTheregister
2 days ago

Perplexity Comet browser hole was exploitable via cal invite

Perplexity's Comet browser had critical security vulnerabilities allowing attackers to steal local files and access password vaults through malicious calendar invitations until recently.
#iphone-security-vulnerabilities
Information security
fromNextgov.com
1 day ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
Information security
fromTechCrunch
1 day ago

A suite of government hacking tools targeting iPhones is now being used by cybercriminals | TechCrunch

Government-designed iPhone exploit kit Coruna leaked from surveillance vendor to cybercriminals, Russian espionage groups, and Chinese hackers, demonstrating how state-sponsored tools proliferate into criminal markets.
Information security
fromNextgov.com
1 day ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
Information security
fromTechCrunch
1 day ago

A suite of government hacking tools targeting iPhones is now being used by cybercriminals | TechCrunch

Government-designed iPhone exploit kit Coruna leaked from surveillance vendor to cybercriminals, Russian espionage groups, and Chinese hackers, demonstrating how state-sponsored tools proliferate into criminal markets.
Information security
fromThe Hacker News
2 days ago

SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains

SloppyLemming conducted attacks on Pakistani and Bangladeshi government and critical infrastructure using new malware families BurrowShell and a Rust-based keylogger between January 2025 and January 2026.
Information security
fromSecurityWeek
2 days ago

Honeywell, Researcher Clash Over Impact of Building Controller Vulnerability

A researcher discovered that Honeywell's IQ4 building controller exposes unauthenticated web interfaces and allows remote administrator account creation, but Honeywell disputes the severity, claiming the vulnerability only exists during installation before the system becomes operational.
Information security
fromSecurityWeek
2 days ago

Android Update Patches Exploited Qualcomm Zero-Day

Google released Android security updates patching nearly 130 vulnerabilities, including an exploited zero-day in Qualcomm chipsets affecting over 200 devices through integer overflow in graphics components.
Information security
fromTechRepublic
1 week ago

Google Expands AI Scam Protection to Samsung Galaxy S26

Google expands AI-powered scam detection beyond Pixel phones to Samsung Galaxy S26 and other Android devices, with real-time call and message fraud analysis using on-device AI.
Information security
fromThe Hacker News
2 days ago

Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited

Google disclosed a high-severity Qualcomm Graphics component vulnerability (CVE-2026-21385) being exploited in Android devices, with March 2026 patches addressing 129 total vulnerabilities including critical remote code execution and privilege escalation flaws.
#chrome-security-vulnerability
Information security
fromZDNET
3 days ago

This high-severity Chrome Gemini vulnerability lets malicious extensions spy on your PC

A high-severity vulnerability in Chrome's Gemini feature allows malicious extensions to inject code, enabling attackers to spy on users, steal data, access webcams and microphones, and conduct phishing attacks.
Information security
fromTheregister
2 days ago

Chrome AI panel became privilege escalator for extensions

A high-severity Chrome vulnerability allowed malicious extensions to hijack the Gemini Live AI panel and gain unauthorized access to system resources like cameras, microphones, and local files.
Information security
fromZDNET
3 days ago

This high-severity Chrome Gemini vulnerability lets malicious extensions spy on your PC

A high-severity vulnerability in Chrome's Gemini feature allows malicious extensions to inject code, enabling attackers to spy on users, steal data, access webcams and microphones, and conduct phishing attacks.
Information security
fromThe Hacker News
2 days ago

New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

A patched Chrome vulnerability (CVE-2026-0628) allowed malicious extensions to escalate privileges and access local files, camera, microphone, and screenshots through insufficient WebView policy enforcement.
Information security
fromThe Hacker News
2 days ago

Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

Tier 1 SOC analysts process the highest alert volume with the least experience, creating a structural vulnerability where alert fatigue, decision fatigue, and cognitive overload directly undermine organizational security performance and increase incident costs.
fromSecurityWeek
1 day ago

Iranian Strikes on Amazon Data Centers Highlight Industry's Vulnerability to Physical Disasters

These strikes have caused structural damage, disrupted power delivery to our infrastructure, and in some cases required fire suppression activities that resulted in additional water damage. AWS said in an update on its online dashboard regarding the Iranian drone strikes on its Middle East facilities.
Information security
Information security
from24/7 Wall St.
2 days ago

The Cybersecurity ETF That Missed the Boom Entirely

Global X Cybersecurity ETF (BUG) underperforms despite structural growth in cybersecurity spending, returning -3% over five years while competitors and broader indices significantly outpaced it.
#cybersecurity-leadership
Information security
fromSecuritymagazine
2 days ago

Shawn Fallah - Top Cybersecurity Leaders 2026

Shawn Fallah leads HSI's Cyber and Operational Technology directorate, overseeing technical law enforcement systems and a $1.1 billion budget while advancing modern security infrastructure to counter emerging threats.
Information security
fromSecuritymagazine
2 days ago

Shawn Fallah - Top Cybersecurity Leaders 2026

Shawn Fallah leads HSI's Cyber and Operational Technology directorate, overseeing technical law enforcement systems and a $1.1 billion budget while advancing modern security infrastructure to counter emerging threats.
#cyber-warfare
Information security
fromNextgov.com
1 day ago

CISA appoints new acting cyber chief after recent leadership shakeups

Chris Butera becomes CISA's acting executive assistant director for cybersecurity following leadership restructuring and workforce reductions at the agency.
Information security
fromThe Hacker News
1 day ago

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Threat actors impersonate IT support via email and phone calls to deliver Havoc C2 framework for data exfiltration or ransomware attacks across multiple organizations.
fromThe Hacker News
2 days ago

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

It launches a headless Chrome instance - a browser that operates without a visible window - inside a Docker container, loads the brand's real website, and acts as a reverse proxy between the target and the legitimate site. Recipients are served genuine page content directly through the attacker's infrastructure, ensuring the phishing page is never out of date.
Information security
fromNextgov.com
1 day ago

Why the convergence of AI and cybersecurity must be a top priority for the administration

AI is directly impacting blue team (defender) and red team (attacker) strategies, operations and tactics. Federal cybersecurity teams are increasingly relying on AI for anomaly detection, predictive threat intelligence and faster incident response. AI can flag suspicious behavior, such as access to sensitive systems from unusual locations, without depending on static rules.
Information security
#ai-security-vulnerability
Information security
fromTechzine Global
3 days ago

Flaw in OpenClaw allows complete takeover of AI agent

A critical vulnerability in OpenClaw allowed arbitrary websites to hijack AI assistants through localhost WebSocket connections without user interaction or malicious plugins.
fromSecurityWeek
3 days ago
Information security

OpenClaw Vulnerability Allowed Websites to Hijack AI Agents

OpenClaw AI assistant vulnerability allowed attackers to hijack agents through malicious websites by exploiting localhost assumptions and rate limiter exemptions for loopback connections.
Information security
fromTechzine Global
3 days ago

Flaw in OpenClaw allows complete takeover of AI agent

A critical vulnerability in OpenClaw allowed arbitrary websites to hijack AI assistants through localhost WebSocket connections without user interaction or malicious plugins.
Information security
fromSecurityWeek
3 days ago

OpenClaw Vulnerability Allowed Websites to Hijack AI Agents

OpenClaw AI assistant vulnerability allowed attackers to hijack agents through malicious websites by exploiting localhost assumptions and rate limiter exemptions for loopback connections.
Information security
fromThe Hacker News
3 days ago

How to Protect Your SaaS from Bot Attacks with SafeLine WAF

SaaS applications face constant automated bot attacks that exploit business logic, appearing as legitimate growth while degrading performance; SafeLine WAF protects by inspecting traffic patterns and behavior before requests reach application code.
Information security
fromSecuritymagazine
3 days ago

Why Security Teams Can No Longer Ignore Recruitment Fraud

AI-powered recruitment fraud exploits human trust in hiring workflows, with job scams surging over 1,000% as attackers use deepfakes and impersonation to target vulnerable candidates and organizations during periods of labor market volatility.
Information security
fromThe Hacker News
3 days ago

APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday

Microsoft patched CVE-2026-21513, a high-severity MSHTML Framework vulnerability exploited as a zero-day by Russia-linked APT28, allowing attackers to bypass security features and achieve code execution through malicious files.
Information security
fromTheregister
3 days ago

Memory scalpers hunt scarce DRAM with bot blitz

Web scraping bots are systematically targeting DRAM inventory across e-commerce sites, submitting millions of requests to identify stock for resale at inflated prices, with operators increasingly using AI tools to enhance their scraping effectiveness.
Information security
fromNextgov.com
2 days ago

Intelligence firms watch for uptick in Iran cyber activity after US, Israel strikes

Tehran-linked hackers are escalating digital reconnaissance and preparing potentially disruptive cyber operations following recent U.S. and Israeli strikes on Iran.
Information security
fromTechRepublic
6 days ago

ChatGPT Criminals: AI Scams Target Dating and Legal Impersonators - TechRepublic

Generative AI enhances traditional scams by improving message quality, consistency, and scale, making romance fraud and professional impersonation harder to detect and easier to execute at volume.
Information security
fromThe Hacker News
3 days ago

North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT

North Korean threat actors deployed 26 malicious npm packages using steganography to hide command-and-control infrastructure in Pastebin essays, targeting developers with credential stealers and remote access trojans.
[ Load more ]