Information security

[ follow ]
#password-managers
fromThe Hacker News
9 minutes ago

Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens

Cybersecurity researchers disclosed they have detected a case of an information stealer infection successfully exfiltrating a victim's OpenClaw (formerly Clawdbot and Moltbot) configuration environment. "This finding marks a significant milestone in the evolution of infostealer behavior: the transition from stealing browser credentials to harvesting the 'souls' and identities of personal AI [artificial intelligence] agents," Hudson Rock said. Alon Gal, CTO of Hudson Rock, told The Hacker News that the stealer was likely a variant of Vidar based on the infection details.
Information security
#ai-security
fromSilicon Canals
1 hour ago

Trafficmind Expands Global Anycast Network for Performance-Critical and Regulated Workloads - Silicon Canals

The Osaka deployment adds 100 Gbps of edge capacity and is hosted within carrier-neutral facilities operated by Equinix. This increases regional proximity, resilience, and throughput for customers serving users in Japan and nearby markets, while maintaining consistent traffic handling and security enforcement. As organizations scale across regions, maintaining low latency, stable availability, and clear operational control has become increasingly complex.
Information security
#chrome
#clickfix
Information security
fromThe Hacker News
7 hours ago

New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft

ZeroDayRAT is a commercial mobile spyware platform enabling real-time surveillance, data exfiltration, and financial theft on Android and iOS via a seller-provided builder and control panel.
Information security
fromSecuritymagazine
19 hours ago

The Olympics Are Going Mobile - Your Security Strategy Has to Follow

Mobile devices are the main cyberattack target at Milano‑Cortina 2026, with fake ticketing, fraudulent apps, malvertising, and disruptions to payments and streaming.
fromSecuritymagazine
19 hours ago

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Organizations traditionally approach security risk through a narrow lens, often equating "security" primarily with cybersecurity. While cybersecurity is critically important, it represents only one subset of a much broader security landscape. Cybersecurity focuses on the protection of technologies that collect, store, process and transmit data. By contrast, security-related risk encompasses all forms of loss arising from the failure to protect organizational assets.
Information security
Information security
fromTechRepublic
2 hours ago

Fake 'Antivirus' App Spreads Android Malware, Steals Banking Credentials - TechRepublic

A fake Android antivirus app named TrustBastion hosted on Hugging Face installs spyware, steals credentials, screenshots, and lock-screen PINs via scareware updates.
fromBusiness Matters
1 day ago

What Happens to Business Technology When It Reaches End of Life?

Most businesses, which includes modern ones, invest heavily in technology, but they rarely plan for its eventual and inevitable exit strategy. Generally speaking, companies spend millions on the latest hardware while overlooking the critical phase when those assets reach their end. This lack of planning creates a massive gap in the operational lifecycle of many otherwise successful global organizations. Decisions made at the end of a device's life carry real business risks that can impact the bottom line financially and environmentally speaking.
Information security
fromSocial Media Explorer
10 hours ago

What Does The US Military Check Service Members' Social Media Accounts For? - Social Media Explorer

Commanders and security personnel review posts to identify potential threats to operational security, assess character and judgment, and ensure service members uphold the standards expected of those in uniform. Understanding what triggers military scrutiny can help service members navigate social media responsibly while avoiding career-damaging mistakes. Military regulations explicitly permit commanders to review publicly accessible social media accounts when mission requirements or security concerns justify it.
Information security
fromTheregister
19 hours ago

Infosec exec sold eight zero-day exploit kits to Russia: DoJ

That changed last week when the US Department of Justice published a sentencing memorandum [PDF] that frames Williams' conduct as a betrayal of his employer and the US government, and the cause of significant harm to US national security. Williams "made it possible for the Russian Broker to arm its clients with powerful cyber exploits that could be used against any manner of victim, civilian or military around the world," the DoJ said.
Information security
#data-breach
fromDataBreaches.Net
3 days ago
Information security

South Korea blames Coupang data breach on management failure, not sophisticated attack - DataBreaches.Net

fromDataBreaches.Net
3 days ago
Information security

South Korea blames Coupang data breach on management failure, not sophisticated attack - DataBreaches.Net

fromDataBreaches.Net
2 days ago

New "Kurd Hackers Forum" Focuses on Middle Eastern Data Breaches and Leaks - DataBreaches.Net

Reza abasi notes that there is a new forum called the "Kurd Hacker Forum" that focuses on databreaches in Iran, Syria, and Turkey. The domain was registered January 28, 2026. The forum, which is on the clear net, looks like it has the same format as the classic BreachForums, with the same types of sections and subsections. The threads in the forum are either in English or Kurdish languages.
Information security
Information security
fromwww.theguardian.com
1 day ago

Brushing fraud: Britons told to beware of mystery parcels as new scam soars

Unexpected cheap parcels can be part of brushing fraud where criminals use stolen delivery details to post fake verified reviews and boost their online credibility.
Information security
fromeLearning Industry
1 day ago

The Future Of eLearning: How Cloud-Based Access Control Supports Distributed Campuses

Cloud-based access control systems provide faster, scalable, centralized security and compliance for hybrid eLearning campuses compared to vulnerable, slow-to-update legacy on-site systems.
Information security
fromTechCrunch
2 days ago

Indian pharmacy chain giant exposed customer data and internal systems | TechCrunch

A security lapse allowed outsiders full administrative control of DavaIndia Pharmacy's platform, exposing customer orders and sensitive drug-control functions.
#chrome-extensions
Information security
fromFuturism
2 days ago

Microsoft Added AI to Notepad and It Created a Security Failure Because the AI Was Stupidly Easy for Hackers to Trick

Forced AI integration across Windows and core Microsoft software is increasing instability and security vulnerabilities, exemplified by a Notepad remote code execution zero-day and privacy risks.
Information security
fromComputerworld
2 days ago

AI will likely shut down critical infrastructure on its own, no attackers required

Misconfigured AI controlling cyber-physical systems can unintentionally shut down national critical infrastructure in a G20 country by 2028.
#shadow-ai
fromFast Company
2 days ago

The 'zombie internet' has arrived-and it has devastating consequences for advertising, social media, and the human web

The platform made headlines for being the first social media site expressly for AI agents, not humans. But for me, its significance goes way beyond that. Moltbook is a harbinger-the first real sign that a new type of internet is upon us. No, not a dead internet. Something much more epochal: a zombie internet that could have devastating consequences for advertising, social media, and the human web in the years ahead. Or perhaps it could be our salvation.
Information security
#romance-scams
fromFortune
2 days ago
Information security

A widow lost $39,000, her house, and six dogs after a scam. 'If the story wasn't so horrible, people wouldn't pay attention.' | Fortune

fromFortune
2 days ago
Information security

A widow lost $39,000, her house, and six dogs after a scam. 'If the story wasn't so horrible, people wouldn't pay attention.' | Fortune

Information security
fromSecurityWeek
3 days ago

CISA Warns of Exploited SolarWinds, Notepad++, Microsoft Vulnerabilities

CISA warns multiple newly disclosed vulnerabilities in SolarWinds, Notepad++, and Apple have been exploited in the wild and are added to its KEV list.
Information security
fromThe Hacker News
3 days ago

Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability

Critical BeyondTrust RCE CVE-2026-1731 is being actively exploited; apply provided RS and PRA patches immediately to prevent unauthorized access and data exfiltration.
Information security
fromSecurityWeek
3 days ago

In Other News: Google Looks at AI Abuse, Trump Pauses China Bans, Disney's $2.7M Fine

Threat actors increasingly use AI across attack stages while critical infrastructure faces authentication and vulnerability gaps, prompting government responses and legal action.
Information security
fromTheregister
3 days ago

Critical Microsoft bug from 2024 under exploitation

A 9.8-rated SQL injection in Microsoft Configuration Manager, patched Oct 2024, is actively exploited and requires immediate patching.
#ransomware
fromSecurityWeek
3 days ago

BeyondTrust Vulnerability Targeted by Hackers Within 24 Hours of PoC Release

BeyondTrust announced patches for CVE-2026-1731 on February 6, the same day Hacktron AI, whose researchers discovered the issue in late January, warned that roughly 11,000 instances had been exposed to the internet, including approximately 8,500 on-prem deployments that may have been vulnerable to attacks. "Given that BeyondTrust Remote Support and Privileged Remote Access are widely deployed in enterprise environments for remote access and privileged session management, the potential blast radius of this vulnerability is significant," Hacktron said.
Information security
#defense-industrial-base
fromSecurityWeek
4 days ago
Information security

Hacktivists, State Actors, Cybercriminals Target Global Defense Industry, Google Warns

fromSecurityWeek
4 days ago
Information security

Hacktivists, State Actors, Cybercriminals Target Global Defense Industry, Google Warns

#patch-tuesday
fromComputerworld
2 days ago
Information security

February's Patch Tuesday release fixes 59 flaws, including 6 being exploited

February Patch Tuesday fixes 59 CVEs; six actively exploited flaws require immediate patching with CISA enforcement by March 3; two April enforcement changes are scheduled.
fromThe Hacker News
5 days ago
Information security

Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

Vendors released critical security patches across Microsoft, Adobe, SAP, and Intel TDX, addressing actively exploited zero-days, code-injection, authorization flaws, and multiple other vulnerabilities.
Information security
fromThe Hacker News
3 days ago

Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

A Russian-affiliated actor uses CANFAIL malware and LLM-generated phishing lures to target Ukrainian defense, energy, aerospace, and related organizations.
fromSecurityWeek
3 days ago

China Revives Tianfu Cup Hacking Contest Under Increased Secrecy

Tianfu Cup was launched as an alternative to the Zero Day Initiative's Pwn2Own competition, which regularly pays out more than $1 million to white hat hackers who demonstrate critical vulnerabilities in consumer and enterprise hardware and software, industrial control systems, and automotive products. Tianfu Cup made headlines in 2021, when participants earned a total of $1.9 million for exploits targeting Windows, Ubuntu, iOS, Microsoft Exchange, Chrome, Safari, Adobe Reader, Asus routers, and various virtualization products.
Information security
fromSecurityWeek
3 days ago

Chrome 145 Patches 11 Vulnerabilities

Google on Tuesday announced the release of Chrome 145 to the stable channel with fixes for 11 vulnerabilities, including three high-severity bugs. First in line is CVE-2026-2313, a high-severity use-after-free issue in CSS that earned the reporting researchers an $8,000 bug bounty reward. The two other high-severity defects, tracked as CVE-2026-2314 and CVE-2026-2315, were found and reported by Google and are described as a heap buffer overflow in Codecs and an inappropriate implementation in WebGPU, respectively.
Information security
Information security
fromTechzine Global
3 days ago

Major hack of Dutch telco Odido was a classic case of social engineering

Phishing and phone-based social engineering allowed attackers to bypass MFA, access Odido's Salesforce accounts, and scrape up to 6.2 million customer records.
fromThe Hacker News
3 days ago

UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

"This threat actor seems to have been active since 2019, although they have not necessarily used VoidLink over the duration of their activity," researchers Nick Biasini, Aaron Boyd, Asheer Malhotra, and Vitor Ventura said. "UAT-9921 uses compromised hosts to install VoidLink command-and-control (C2), which are then used to launch scanning activities both internal and external to the network."
Information security
Information security
fromThe Hacker News
3 days ago

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

CL Suite Chrome extension exfiltrates Meta Business Suite and Facebook Business Manager TOTP seeds, 2FA codes, contact lists, and analytics to attacker-controlled servers.
fromComputerworld
3 days ago

Four new reasons why Windows LNK files cannot be trusted

The number of ways that Windows shortcut (.LNK) files can be abused just keeps growing: A cybersecurity researcher has documented four new techniques to trick Windows users into running malicious actions through innocent-looking shortcuts. Wietze Beukema demonstrated how to spoof the visible LNK destination, hide command-line arguments, and execute a different program than the one shown to the user, potentially offering attackers new vectors for phishing, USB-borne attacks, or initial access operations.
Information security
Information security
fromSecurityWeek
3 days ago

Dutch Carrier Odido Discloses Data Breach Impacting 6 Million

Odido data breach exposed names, contact details, dates of birth, customer and bank account numbers, and passport/driver's license information for about 6.2 million customers.
Information security
fromTechzine Global
3 days ago

Check Point acquires security startups Cyclops, Cyata, and Rotate

Check Point acquired three cybersecurity startups for about $150 million to expand capabilities in security data analytics, AI-agent controls, and MSP-focused risk management.
Information security
fromTheregister
3 days ago

Enforcing piracy policy earned helpdesk worker death threats

A desktop-support technician reported a colleague for widespread software piracy, leading to threats and later the former colleague committing murder.
Information security
fromInfoQ
3 days ago

Teleport Launches Agentic Identity Framework to Secure AI Agents Across Enterprise Infrastructure

Enterprises must treat autonomous AI agents as cryptographically secured identities, replacing static credentials with ephemeral, zero-trust identities to reduce risk and ensure secure agent deployments.
fromSecuritymagazine
3 days ago

Plenty of Associations, But Not Enough Association

I belong to six professional organizations. Or maybe it's 13, 19, 26, or 47. I can't be sure. The ones where I pay dues or volunteer I know well: ASIS International, the Life Safety Alliance, Chartered Security Professionals, and a couple of others. Then come the niche and industry-specific associations like the International Council of Shopping Centers, public-private partnerships such as OSAC and Infragard, and the countless ASIS Communities.
Information security
#microsoft-security-updates
fromTechRepublic
4 days ago
Information security

Microsoft's February Patch Tuesday Fixes 6 Zero-Days Under Attack

Microsoft released patches for 58 vulnerabilities, including six actively exploited zero-days affecting Windows, Office, and Remote Desktop components.
fromThe Hacker News
5 days ago
Information security

Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days

Microsoft released patches for 59 vulnerabilities, including six actively exploited flaws, with several rated Critical or Important across Windows, Office, and Edge.
Information security
fromThe Hacker News
4 days ago

ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories

Attackers increasingly exploit trusted tools, simple entry points, and overlooked exposures to maintain persistent, value-driven access across cybercrime and espionage.
Information security
fromTheregister
4 days ago

Supply chain breaches fuel cybercrime cycle, report says

Cybercriminals are industrializing supply chain attacks into a self-reinforcing ecosystem combining package compromise, credential theft, identity attacks, and ransomware.
Information security
fromThe Hacker News
4 days ago

Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

North Korea-linked Lazarus Group used fake recruitment campaigns to distribute malicious npm and PyPI packages embedded via dependencies in coding-assessment repositories.
Information security
fromThe Hacker News
4 days ago

83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure

A single PROSPERO-hosted IP (193.24.123[.]42) was responsible for roughly 83% of observed exploitation attempts targeting critical Ivanti EPMM vulnerabilities, using automated tooling.
Information security
fromTheregister
3 days ago

Ransomware crews abuse bossware to blend into networks

Threat actors are abusing legitimate employee monitoring and RMM software to hide in corporate networks and attempt ransomware deployment.
Information security
fromThe Hacker News
4 days ago

First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

A malicious Outlook add-in hijacked an abandoned add-in's domain, served a fake Microsoft login, and stole over 4,000 credentials in a supply chain takeover.
fromThe Hacker News
4 days ago

Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial intelligence (AI) model Gemini to conduct reconnaissance on its targets, as various hacking groups continue to weaponize the tool for accelerating various phases of the cyber attack life cycle, enabling information operations, and even conducting model extraction attacks. "The group used Gemini to synthesize OSINT and profile high-value targets to support campaign planning and reconnaissance,"
Information security
Information security
fromTechzine Global
4 days ago

Lumma Stealer back despite previous police action

Lumma Stealer infections are increasing, using ClickFix social-engineering and memory-only CastleLoader to deploy credential-stealing malware that exfiltrates passwords, wallets, and system data.
fromTheregister
4 days ago

Google: China's APT31 used Gemini to plan US cyberattacks

A Chinese government hacking group that has been sanctioned for targeting America's critical infrastructure used Google's AI chatbot, Gemini, to auto-analyze vulnerabilities and plan cyberattacks against US organizations, the company says. While there's no indication that any of these attacks were successful, "APT groups like this continue to experiment with adopting AI to support semi-autonomous offensive operations," Google Threat Intelligence Group chief analyst John Hultquist told The Register. "We anticipate that China-based actors in particular will continue to build agentic approaches for cyber offensive scale."
Information security
Information security
fromComputerworld
3 days ago

'Dead' Outlook add-in hijacked to phish 4,000 Microsoft Office Store users

Microsoft-signed add-ins can be hijacked via orphaned subdomains, allowing attackers to serve phishing content and gain permissions like reading and modifying user emails.
Information security
fromThe Hacker News
4 days ago

The CTEM Divide: Why 84% of Security Programs Are Falling Behind

Organizations implementing CTEM achieve markedly better visibility, higher solution adoption, and stronger threat awareness, creating a growing performance gap between adopters and non-adopters.
Information security
fromSecurityWeek
4 days ago

Microsoft to Enable 'Windows Baseline Security' With New Runtime Integrity Safeguards

Windows Baseline Security Mode will enable runtime integrity safeguards by default, allowing only properly signed apps, drivers, and services to run while permitting administrator overrides.
Information security
fromwww.socialmediatoday.com
4 days ago

Google Says That Scam Tactics Are Evolving Through AI Usage

AI tools dramatically enhance attackers' productivity, enabling more convincing phishing, model-extraction corporate espionage, and nation-state use for technical research and targeted campaigns.
Information security
fromTechzine Global
4 days ago

Google sees increase in AI abuse by cybercriminals

Malicious actors are actively integrating generative AI into attacks, using model distillation, AI-assisted phishing, and automated code generation to increase efficiency and evade detection.
Information security
fromBitcoin Magazine
4 days ago

Bitcoin Advances Toward Quantum Resistance With BIP 360

BIP 360 proposes Pay-to-Merkle-Root (P2MR) to reduce quantum vulnerability while maintaining Tapscript compatibility and enabling future post-quantum signature upgrades.
Information security
fromDevOps.com
4 days ago

Secure DevOps at Scale: Integrating SRE, DevSecOps and Compliance - DevOps.com

Integrate security into DevOps and SRE to automate compliance and resilience within cloud-native SaaS pipelines from the start.
fromComputerworld
4 days ago

11 steps to smarter Google account security

While you're thinking about third-party add-ons for your computer and phone, take a moment to review everything you have installed on both fronts and consider how many of those programs you actually still use. The fewer cracked windows you allow on your Google account, the better - and if you aren't even using something, there's no reason to keep it connected.
Information security
Information security
fromTechCrunch
4 days ago

Hacker linked to Epstein removed from Black Hat cyber conference website | TechCrunch

Vincenzo Iozzo has been removed from Black Hat and Code Blue review boards amid revelations linking him to Jeffrey Epstein in DOJ-released documents.
fromTechzine Global
4 days ago

Palo Alto completes $25 billion acquisition of CyberArk

Palo Alto Networks has officially completed its $25 billion acquisition of CyberArk. Identity security will now become a core pillar of Palo Alto's platform offering. The deal, announced in July 2025, was completed faster than expected due to German approval. The acquisition adds more than 10,000 CyberArk customers to Palo Alto's customer base. These organizations use the platform for identity security, with a focus on Privileged Access Management. The offering focuses on securing human, machine, and AI identities.
Information security
Information security
fromSecurityWeek
5 days ago

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, Phoenix Contact

Multiple industrial control and OT vendors released Patch Tuesday advisories for critical and high-severity vulnerabilities affecting ICS/OT products, with patches and mitigations provided.
Information security
fromTechCrunch
4 days ago

Microsoft says hackers are exploiting critical zero-day bugs to target Windows and Office users | TechCrunch

Microsoft released fixes for actively exploited Windows and Office zero-day vulnerabilities that enable one-click remote code execution and malware installation.
fromSecurityWeek
5 days ago

Ivanti Patches Endpoint Manager Vulnerabilities Disclosed in October 2025

Ivanti on Tuesday announced patches for over a dozen vulnerabilities in Endpoint Manager (EPM), including issues that were first disclosed in October 2025. In a new advisory, the company warns of a high-severity bug and a medium-severity flaw resolved in EPM, both of which could be exploited remotely. Tracked as CVE-2026-1603, the high-severity weakness is described as an authentication bypass leading to the exposure of credential data.
Information security
Information security
fromComputerWeekly.com
5 days ago

The world's default productivity tool is becoming a national security liability | Computer Weekly

Dependence on a default productivity platform concentrates systemic risk as state-backed groups like APT28 rapidly weaponize Office vulnerabilities, turning spreadsheets into tools of cyber warfare.
Information security
fromTechRepublic
4 days ago

Microsoft Patches Windows Flaw Causing VPN Disruptions

A patched RasMan vulnerability (CVE-2026-215) allowed local attackers to crash Windows Remote Access Connection Manager, disrupting VPN and remote access services.
Information security
fromTechzine Global
5 days ago

Microsoft reports six actively exploited zero days in Patch Tuesday

Microsoft fixed 58 vulnerabilities in February 2026, including six zero-days actively exploited before patches, with privilege escalation the largest category.
Information security
fromComputerworld
5 days ago

Windows shortcut files targeted by ransomware gang Global Group

Phishing campaigns now weaponize Windows .lnk shortcut files to silently deploy Global Group ransomware via 'Your document' email attachments.
fromThe Hacker News
5 days ago

SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits

"The toolset blends stealth helpers with legacy-era Linux exploitation: Alongside log cleaners (utmp/wtmp/lastlog tampering) and rootkit-class artifacts, the actor keeps a large back-catalog of Linux 2.6.x-era exploits (2009-2010 CVEs)," cybersecurity company Flare said. "These are low value against modern stacks, but remain effective against 'forgotten' infrastructure and long-tail legacy environments." SSHStalker combines IRC botnet mechanics with an automated mass-compromise operation that uses an SSH scanner and other readily available scanners to co-opt susceptible systems into a network and enroll them in IRC channels.
Information security
fromThe Hacker News
5 days ago

APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities

Indian defense sector and government-aligned organizations have been targeted by multiple campaigns that are designed to compromise Windows and Linux environments with remote access trojans capable of stealing sensitive data and ensuring continued access to infected machines. The campaigns are characterized by the use of malware families like Geta RAT, Ares RAT, and DeskRAT, which are often attributed to Pakistan-aligned threat clusters tracked as SideCopy and APT36 (aka Transparent Tribe).
Information security
Information security
fromComputerWeekly.com
4 days ago

CVE volumes may plausibly reach 100,000 this year | Computer Weekly

Disclosed CVEs may exceed 50,000 in 2026, with realistic scenarios reaching 70,000–100,000 and an urgent need to scale and prioritise vulnerability response.
Information security
fromTheregister
5 days ago

Infosec researchers mull curious case of Telnet ancient flaw

Tier-1 transit operators likely applied port 23 filtering after advance warning of a critical GNU InetUtils telnetd flaw (CVE-2026-24061), collapsing Telnet traffic.
fromThe Hacker News
5 days ago

North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from Windows and macOS systems with the ultimate goal of facilitating financial theft. "The intrusion relied on a social engineering scheme involving a compromised Telegram account, a fake Zoom meeting, a ClickFix infection vector, and reported usage of AI-generated video to deceive the victim," Google Mandiant researchers Ross Inman and Adrian Hernandez said.
Information security
Information security
fromTheregister
5 days ago

Notepad's new Markdown powers served with a side of RCE

Notepad's Markdown support contains a vulnerability (CVE-2026-20841) that can achieve remote code execution when users open a malicious Markdown file and click a link.
fromArs Technica
4 days ago

Once-hobbled Lumma Stealer is back with lures that are hard to resist

A core part of the resurgence is the use of CastleLoader, a separate piece of malware that's installed initially. It runs solely in memory, making it much harder to detect than malware that resides on a hard drive. Its code is heavily obfuscated, making it hard to spot its malice even when malware scanners can see it. CastleLoader also provides a flexible and full-featured command-and-control communication mechanism that users can customize to meet their specific needs.
Information security
fromTheregister
5 days ago

Claude add-on turns Google Calendar into malware courier

Claude Desktop Extensions, recently renamed MCP Bundles, are packaged applications that extend the capabilities of Claude Desktop using the Model Context Protocol, a standard way to give generative AI models access to other software and data. Stored as .dxt files (with Anthropic transitioning the format to .mcpb), they are ZIP archives that package a local MCP server alongside a manifest.json file describing the extension's capabilities.
Information security
fromThe Verge
5 days ago

Microsoft fixes Notepad flaw that could trick users into clicking malicious Markdown links

Microsoft has fixed a serious security vulnerability affecting Markdown files in Notepad. In the company's Tuesday patch notes, Microsoft says a bad actor could carry out a remote code execution attack by tricking users "into clicking a malicious link inside a Markdown file opened in Notepad," as reported earlier by The Register. Clicking the link would "launch unverified protocols," allowing attackers to remotely load and execute malicious files on a victim's computer, according to the patch notes.
Information security
Information security
fromTheregister
5 days ago

Payroll pirates conned the help desk, stole employee's pay

Attackers used compromised shared-mailbox credentials and a help-desk MFA reset via social engineering to divert a physician's salary into the attacker's account.
Information security
fromSecurityWeek
5 days ago

Google-Intel Security Audit Reveals Severe TDX Vulnerability Allowing Full Compromise

Google and Intel's joint review of Intel TDX uncovered five vulnerabilities and 35 bugs, leading to patches for privilege escalation and information disclosure issues.
Information security
fromThe Hacker News
5 days ago

Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments

Exposed intentionally vulnerable training applications in active cloud accounts can provide attackers an initial foothold to access and compromise broader cloud infrastructure.
[ Load more ]