Information security

[ follow ]
#data-breach
fromDataBreaches.Net
7 hours ago
Information security

Loan applications, drivers licences, personal data of 440k Aussies exposed after hacker hits Sydney finance tech company youX - DataBreaches.Net

fromDataBreaches.Net
7 hours ago
Information security

Loan applications, drivers licences, personal data of 440k Aussies exposed after hacker hits Sydney finance tech company youX - DataBreaches.Net

Information security
fromFortune
2 hours ago

AI can now hunt software bugs on its own. Anthropic is turning that into a security tool. | Fortune

Claude Code Security uses Anthropic's Opus 4.6 AI to review entire codebases, detect high-severity vulnerabilities, rate severity, and suggest fixes for developer approval.
Information security
fromFuturism
3 hours ago

Lockheed Martin F-35s Can Be Jailbroken Like $80 Million iPhones, European Military Chief Says

A Dutch official claims F-35s can be 'jailbroken' like phones, implying potential European ability to modify or maintain aircraft software independent of US updates.
Information security
fromArs Technica
2 hours ago

Wikipedia bans Archive.today after site executed DDoS and altered web captures

English Wikipedia blacklisted Archive.today after the site was used to direct a DDoS attack and altered archived pages, making it unreliable.
#cve-2026-1731
fromThe Hacker News
4 hours ago
Information security

BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration

Critical CVE-2026-1731 in BeyondTrust Remote Support/Privileged Remote Access permits OS command execution as the site user, enabling web shells, backdoors, and malware deployment.
fromSecurityWeek
8 hours ago
Information security

BeyondTrust Vulnerability Exploited in Ransomware Attacks

Critical BeyondTrust vulnerability CVE-2026-1731 is being exploited in ransomware attacks, prompting a CISA KEV update and observed malicious activity across multiple sectors and countries.
#cve-2026-22769
fromSecurityWeek
5 hours ago

In Other News: Ransomware Shuts US Clinics, ICS Vulnerability Surge, European Parliament Bans AI

Axonius has laid off approximately 40 employees, representing less than 4% of its global staff, with the majority of cuts in marketing and sales. Co-founder Dean Sysman has stepped down from his role as CEO to become executive chairman, with company president Joe Diamond appointed as interim CEO. The workforce adjustment aims to refine the company's organizational structure and improve operational efficiency as it prepares for a potential IPO.
Information security
Information security
fromTechzine Global
9 hours ago

Microsoft closes Teams leak that allowed access without authentication

A critical improper access control vulnerability in Microsoft Teams allowed unauthenticated attackers to obtain network information; Microsoft resolved it server-side with no user action required.
Information security
fromThe Hacker News
7 hours ago

ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT RAT

MIMICRAT is a sophisticated, previously undocumented RAT delivered via a ClickFix campaign using compromised legitimate sites, multi-stage PowerShell ETW/AMSI bypass, and HTTPS C2.
Information security
fromThe Hacker News
6 hours ago

Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems

Unauthorized npm update to Cline CLI (cline@2.3.0) installed OpenClaw via a postinstall script, affecting about 4,000 downloads during an eight-hour window on Feb 17, 2026.
#ransomware
Information security
fromComputerworld
20 hours ago

New phishing campaign tricks employees into bypassing Microsoft 365 MFA

Attackers trick employees into registering a hacker-controlled device via OAuth device authorization, granting persistent access to Microsoft accounts and bypassing MFA.
Information security
fromTheregister
21 hours ago

RAT disguised as an RMM costs crims $300 a month

Criminals created a fake RMM vendor, TrustConnect, selling a RAT as a subscription and using a fake website plus an EV code-signing certificate to bypass security.
#atm-jackpotting
fromSecuritymagazine
21 hours ago

The 25 Most Vulnerable Passwords of 2026

The methodology involved assessing Comparitech's Most Common Password report and NordPass's Top 200 Most Common Passwords list, then leveraging KeywordTool to determine search volumes to find the 25 most common passwords based on global popularity. According to the research, higher search volumes could suggest higher public interest, which could lead to higher password usage. Therefore, this places those passwords at a greater risk of being hacked.
Information security
fromZDNET
20 hours ago

Phone acting weird? 5 red flags that could point to hackers

Your mobile phone is a treasure trove of personal and confidential information. That's why it's a prime target for hackers who want to compromise or steal your data. Through malicious apps and websites, phishing attacks, and other threats, an attacker can gain control of your device through spyware. But how can you tell if your phone has been hacked or tapped?
Information security
#android-malware
Information security
fromThe Hacker News
9 hours ago

Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026

Identity security posture—password hygiene, privileged access, and MFA coverage—now strongly determines cyber underwriting and insurance costs.
Information security
fromTechCrunch
3 hours ago

Ukrainian man jailed for identity theft that helped North Koreans get jobs at US companies | TechCrunch

A Ukrainian was sentenced to five years for running an identity theft network that placed North Korean workers in U.S. jobs, funneling wages to Pyongyang.
Information security
fromDataBreaches.Net
7 hours ago

A single compromised account gave hackers access to 1.2 million French banking records - DataBreaches.Net

Stolen credentials from one government official allowed attackers to access France's FICOBA database, exposing over 1.2 million bank accounts and sensitive financial data.
fromSecurityWeek
5 hours ago

NIST's Quantum Breakthrough: Single Photons Produced on a Chip

NIST has developed a chip that reliably emits a single photon on demand. This ability will improve the efficiency of QKD (quantum key distribution) as we prepare for the arrival of quantum computers. Quantum computers will upend current cryptology by using Shor's algorithm to rapidly negate the current public/private key secure encryption methods. This has largely been solved by NIST's post quantum cryptology (PQC) algorithms.
Information security
Information security
fromTechzine Global
10 hours ago

Kyndryl launches integrated Cyber Defense Operations Center

Kyndryl opened a Cyber Defense Operations Center in Bengaluru consolidating network and security operations to deliver integrated monitoring, threat detection, incident response and performance management.
Information security
fromBusiness Matters
1 day ago

Detecting Configuration Drift: Continuous Controls vs. Point-in-Time Snapshots

Continuous controls monitoring (CCM) is required to detect and remediate configuration drift in rapidly changing cloud environments before risks persist unnoticed.
fromTheregister
10 hours ago

Ex-Google engineers accused of swiping chip security secrets

Two former Google engineers and a third alleged accomplice are facing federal charges after prosecutors accused them of swiping sensitive chip and security technology secrets and then trying to cover their tracks when the scheme began to unravel. According to the Department of Justice, sisters Samaneh and Soroor Ghandali, both former Google employees, along with Mohammadjavad Khosravi, who worked at another unnamed technology company, have been charged with conspiracy, theft of trade secrets, and obstruction of justice.
Information security
fromLogRocket Blog
1 day ago

How to design 2FA: Comparing methods, user flows, and recovery strategies - LogRocket Blog

2FA or two-factor authentication is a specific type of multi-factor authentication. As the name suggests, 2FA requires two distinct forms of user verification factors to access a specific protected, registered user-only software system. In the past, software teams used only a one-factor authentication strategy with users' passwords, but nowadays, with growing security concerns and user authentication evolution, every digital product uses 2FA with password-based authentication, starting from simple SMS OTPs (One Time Tokens) to futuristic AI-powered adaptive 2FA methods and high-security hardware keys.
Information security
Information security
fromEngadget
10 hours ago

Google Play used AI to help block 1.75 million bad apps in 2025

Google used AI to block 1.75 million policy-violating apps in 2025, reduced threats and strengthened Play Protect protections across billions of devices.
Information security
fromSecurityWeek
1 day ago

Ivanti Exploitation Surges as Zero-Day Attacks Traced Back to July 2025

Exploitation of two patched Ivanti EPMM critical vulnerabilities (CVE-2026-1281, CVE-2026-1340) has surged, enabling remote unauthenticated code execution and full MDM compromise.
#windows-admin-center
fromThe Hacker News
1 day ago
Information security

Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center

A high-severity privilege escalation vulnerability (CVE-2026-26119) in Windows Admin Center allows attackers to gain the rights of the running user and risks domain compromise.
fromTechRepublic
1 day ago
Information security

Microsoft: Critical Windows Admin Center Flaw Allows Privilege Escalation

A Windows Admin Center authentication flaw (CVE-2026-26119) lets authorized users escalate privileges across networks, potentially granting widespread administrative control.
fromThe Hacker News
1 day ago

CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware

The campaign exploits recent geopolitical developments to lure victims into opening malicious .LNK files disguised as protest-related images or videos, researchers Subhajeet Singha, Eliad Kimhy, and Darrel Virtusio said in a report published this week. These files are bundled with authentic media and a Farsi-language report providing updates from 'the rebellious cities of Iran.' This pro- protest framing appears to be intended to increase credibility and to attract Farsi-speaking Iranians seeking protest-related information.
Information security
Information security
fromZero Day Initiative
23 hours ago

Zero Day Initiative - CVE-2026-20841: Arbitrary Code Execution in the Windows Notepad

Remote code execution in Windows Notepad via improper validation of Markdown links can allow arbitrary command execution when a user opens a malicious file.
Information security
fromThe Hacker News
1 day ago

From Exposure to Exploitation: How AI Collapses Your Response Window

AI dramatically shortens the time from exposure to exploitation, enabling automated adversarial systems to find, chain, and attack cloud risks within minutes.
#moldova
fromDataBreaches.Net
1 day ago
Information security

Leaked Data Raises Questions About Hackers' Claims and Moldova's Prior Denial - DataBreaches.Net

fromDataBreaches.Net
1 day ago
Information security

Leaked Data Raises Questions About Hackers' Claims and Moldova's Prior Denial - DataBreaches.Net

fromTheregister
1 day ago

NHS strategy: Write password on whiteboard, hope for best

We've excised the text, but suffice it to say that the whiteboard contains usernames and passwords for system access. It's a change from a Post-it note stuck to the screen, but it's no less likely to make a security professional shriek in horror. After all, not only is the account exposed, but anyone can use it, which renders an access log somewhat redundant.
Information security
#openclaw
Information security
fromTechCrunch
1 day ago

Exclusive: Bug in student admissions website exposed children's personal information

Ravenna Hub exposed students' and parents' personal data via an IDOR vulnerability; VentureEd fixed the bug but declined to commit to notifying users.
fromZDNET
1 day ago

Half of all cyberattacks start in your browser: 10 essential tips for staying safe

Web browsers are among the top targets for today's cybercriminals, playing a role in nearly half of all security incidents, new research reveals. According to Palo Alto Networks' 2026 Global Incident Response report, an analysis of 750 major cyber incidents recorded last year across 50 countries found that, in total, 48% of cybercrime events involved browser activity. Individuals trying to connect to the web, including business employees, are exposed to cyberthreats on a daily basis.
Information security
Information security
fromNextgov.com
1 day ago

Chinese telecom hackers likely holding stolen data 'in perpetuity' for later attempts, FBI official says

Chinese state-backed Salt Typhoon likely retains stolen telecom data indefinitely for surveillance, future exploitation, and aggregation with other exfiltrated information.
Information security
fromCointelegraph
1 day ago

Why Address Poisoning Works Without Stealing Private Keys

Address poisoning steals funds by manipulating transaction history and exploiting users copying lookalike addresses, not by stealing private keys.
Information security
fromSecurityWeek
1 day ago

Venice Security Emerges From Stealth With $33M Funding for Privileged Access Management

Venice Security raised $33 million to launch an adaptive privileged access management platform providing just-in-time access and immediate revocation across hybrid enterprise environments.
fromSecuritymagazine
1 day ago

Why Traditional Upskilling Strategies Fall Short in Cybersecurity

Hoang: My background sits at the intersection of enterprise IT, data protection, and cybersecurity. I've spent much of my career working with CIOs and CISOs on resilience - how organizations protect, recover, and govern their most critical data in the face of cyber threats, outages, and operational risk. Today, as CIO at Commvault, I see security not as a standalone function, but as a core business capability.
Information security
Information security
fromThe Hacker News
1 day ago

Fake IPTV Apps Spread Massiv Android Malware Targeting Mobile Banking Users

Massiv is an Android trojan that enables device takeover and credential theft via overlays, screen streaming, keylogging, SMS interception, and remote control for financial fraud.
#generative-ai
fromFast Company
1 day ago
Information security

Google's threat intel chief explains why AI is now both the weapon and the target

fromFast Company
1 day ago
Information security

Google's threat intel chief explains why AI is now both the weapon and the target

Information security
fromTechCrunch
23 hours ago

Google says its AI systems helped deter Play Store malware in 2025 | TechCrunch

In 2025 fewer malicious apps targeted Google Play as stronger AI-driven defenses, developer verification, and over 10,000 safety checks reduced policy violations and banned accounts.
#cybercrime
Information security
fromInfoWorld
1 day ago

What happens when you add AI to SAST

AI agents with multi-modal analysis in SAST dramatically reduce false positives and false negatives inherent in traditional and rules-based SAST tools.
fromTechzine Global
1 day ago

Abstract innovates in SIEM with 'composable' architecture

We had already heard of 'next-gen SIEM'. This is a system that replaces traditional rule-based logging with automatic recognition of complex threats. It was designed to reduce noise on the line for SecOps personnel by reducing the number of false positives. However, according to Abstract CEO and co-founder Colby DeRodeff, this was only the beginning. He believes that a real 'reset' is needed, in the form of an 'AI-Gen Composable SIEM'.
Information security
#cisa-kev
fromThe Hacker News
2 days ago
Information security

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

CISA added four actively exploited high-severity vulnerabilities to its KEV catalog, including Chrome use-after-free, TeamT5 arbitrary upload, Zimbra SSRF, and Windows ActiveX RCE.
fromComputerWeekly.com
2 days ago
Information security

Flaws in Google, Microsoft products added to Cisa catalogue | Computer Weekly

Chromium zero-day and a 2008 Windows Video ActiveX RCE were added to CISA's KEV list, prompting remediation by 10 March 2026.
Information security
fromSecurityWeek
2 days ago

CISA: Hackers Exploiting Vulnerability in Product of Taiwan Security Firm TeamT5

A high-severity arbitrary file-upload vulnerability (CVE-2024-7694) in TeamT5's ThreatSonar Anti-Ransomware has been exploited in the wild and added to CISA's KEV catalog.
Information security
fromInfoWorld
2 days ago

Flaws in four popular VS Code extensions left 128 million installs open to attack

Critical and high-severity vulnerabilities in four widely used VS Code extensions exposed developers to file theft, remote code execution, and local network reconnaissance.
#vs-code-extensions
#notepad
Information security
fromThe Hacker News
2 days ago

Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution

Unauthenticated stack-based buffer overflow (CVE-2026-2329) in Grandstream GXP1600 VoIP phones' /cgi-bin/api.values.get allows remote root code execution via malicious request parameter.
Information security
fromSecurityWeek
2 days ago

Vulnerabilities in Popular PDF Platforms Allowed Account Takeover, Data Exfiltration

Critical and high-severity vulnerabilities were found in Apryse and Foxit PDF platforms that could enable account takeover, data exfiltration, and remote code execution.
fromThe Hacker News
2 days ago

3 Ways to Start Your Intelligent Workflow Program

Security, IT, and engineering teams today are under relentless pressure to accelerate outcomes, cut operational drag, and unlock the full potential of AI and automation. But simply investing in tools isn't enough. 88% of AI proofs-of-concept never make it to production, even though 70% of workers cite freeing time for high-value work as the primary AI automation motivation. Real impact comes from intelligent workflows that combine automation, AI-driven decisioning, and human ingenuity into seamless processes that work across teams and systems.
Information security
Information security
fromSecurityWeek
2 days ago

Cogent Security Raises $42 Million for AI-Driven Vulnerability Management

Cogent Security raised $42M Series A to build autonomous AI agents that automate vulnerability investigation, prioritization, and remediation across environments.
fromSecurityWeek
2 days ago

New Keenadu Android Malware Found on Thousands of Devices

Researchers at Kaspersky have analyzed a recently discovered Android malware that enables its operators to remotely control compromised devices. Dubbed Keenadu, the backdoor has been found in the firmware of various Android device brands, particularly tablets. While in some cases the malware appears to have been injected into the firmware during development, it has also been delivered to devices via OTA firmware updates.
Information security
fromTechRepublic
2 days ago

Substack Breach May Have Leaked Nearly 700,000 User Details Online

On February 3rd, we identified evidence of a problem with our systems that allowed an unauthorized third party to access limited user data without permission, including email addresses, phone numbers, and other internal metadata,
Information security
#cybersecurity
fromTechCrunch
2 days ago

Microsoft says Office bug exposed customers' confidential emails to Copilot AI | TechCrunch

Microsoft has confirmed that a bug allowed its Copilot AI to summarize customers' confidential emails for weeks without permission. The bug, first reported by Bleeping Computer, allowed Copilot Chat to read and outline the contents of emails since January, even if customers had data loss prevention policies to prevent ingesting their sensitive information into Microsoft's large language model. Copilot Chat allows paying Microsoft 365 customers to use the AI-powered chat feature in its Office software products, including Word, Excel, and PowerPoint.
Information security
Information security
fromFortune
2 days ago

Exclusive: Bain and Greylock bet $42 million that AI agents can finally fix cybersecurity's messiest bottleneck | Fortune

AI-driven agents can reduce the vulnerability-to-remediation bottleneck by prioritizing and automating fixes to address critical software vulnerabilities at enterprise scale.
Information security
fromHarvard Business Review
2 days ago

Cybersecurity Requires Collective Resilience

Rapid recovery depended on leaders quickly assessing scope and risk, validating mitigations, and coordinating communications after the CrowdStrike patch disrupted Windows endpoints worldwide.
Information security
fromWIRED
2 days ago

A Vast Trove of Exposed Social Security Numbers May Put Millions at Risk of Identity Theft

A publicly exposed database held roughly 3 billion emails/passwords and 2.7 billion Social Security–number records, likely aggregated from multiple historic breaches.
Information security
fromSecurityWeek
2 days ago

Palo Alto Networks to Acquire Koi in Reported $400 Million Transaction

Palo Alto Networks is acquiring Koi to enhance AI-aware endpoint security and integrate agentic protections into its Prisma AIRS and Cortex XDR platforms.
Information security
fromTheregister
2 days ago

Copilot Chat bug bypasses DLP on 'Confidential' email

Microsoft 365 Copilot Chat summarized emails labeled "confidential" despite configured sensitivity labels and DLP policies, exposing protected email content.
Information security
fromTechCrunch
2 days ago

This former Microsoft PM thinks she can unseat CyberArk in 18 months | TechCrunch

Venice provides identity and access management across cloud and on-premises environments, securing credentials for AI-driven non-human agents and raising $20M in Series A funding.
[ Load more ]