Information security

[ follow ]
Information security
fromSecurityWeek
11 minutes ago

Recent RoundCube Webmail Vulnerability Exploited in Attacks

Two RoundCube Webmail vulnerabilities (CVE-2025-49113 and CVE-2025-68461) are being actively exploited; organizations must apply available patches immediately.
fromDevOps.com
4 days ago

Checkmarx Extends Vulnerability Detection to AI Coding Tool from AWS - DevOps.com

Rather than relying completely on scans that are run as code is moving through a continuous integration/continuous delivery (CI/CD) pipeline, Checkmarx Developer Assist can eliminate 90% of vulnerabilities before they enter the DevOps workflow, said Kinsbruner. That's critical because the first generation of AI coding tools are creating more vulnerabilities that, unless discovered and remediated, are actually making applications less secure than ever, he added.
Information security
fromTechzine Global
2 hours ago

Claude can now scan for complex vulnerabilities, but who will find them?

The promise behind Claude Code Security is that overburdened security teams can have some of their work taken over by AI. According to Anthropic, existing analysis tools do not do enough because they do nothing more than go through lists of known vulnerabilities. AI can test the software for layered threats, such as exploits of the specific codebase that arise from its design.
Information security
#data-breach
Information security
fromDataBreaches.Net
2 days ago

San Jose slow to tell workers about data breach - DataBreaches.Net

A lost USB drive on Jan. 9 potentially exposed Social Security numbers and other private information of current and former San Jose city employees.
Information security
fromDataBreaches.Net
2 days ago

Loan applications, drivers licences, personal data of 440k Aussies exposed after hacker hits Sydney finance tech company youX - DataBreaches.Net

Hundreds of thousands of Australians had personal and financial data allegedly stolen from finance platform youX during a cyber security breach.
fromDataBreaches.Net
2 days ago
Information security

Loan applications, drivers licences, personal data of 440k Aussies exposed after hacker hits Sydney finance tech company youX - DataBreaches.Net

fromTheregister
3 hours ago

Work experience kids sent manager to Ctrl-Alt-Del hell

This week, meet a reader we'll Regomize as "Curt" who once worked as IT security manager at a company where the helpdesk manager routinely ignored company policy by not logging out of his PC. The machine sat there ready for use, instead of reverting to a password-protected screensaver that could only be dispelled by pressing Ctrl-Alt-Del to spawn a login dialog.
Information security
#password-security
Information security
fromCointelegraph
3 hours ago

How Pig-Butchering Crypto Scams Turn Trust Into a Financial Weapon

Pig-butchering scams build long-term emotional trust to coerce victims into fraudulent crypto investments, extracting funds over time through staged profits and blocked withdrawals.
Information security
fromSecuritymagazine
10 hours ago

Human-related security risks rose 90% in 2025

Human-related cybersecurity incidents surged 90% in 2025, driven by email-based attacks, employee mistakes, insider threats, and increasing AI and deepfake exploitation.
Information security
fromSecuritymagazine
10 hours ago

41% of Organizations Have Hired a Fake Candidate

AI-enabled identity attacks surged in 2025—deepfakes, impersonation, and synthetic identities are frequent while many organizations overestimate defenses and underprioritize deepfake-resistant IAM.
fromDataBreaches.Net
20 hours ago

The hospitality sector continues to be lucrative targets - DataBreaches.Net

Choice Hotels International disclosed a breach affecting franchisees and applicants. Its notification letter states that a "skilled person used social engineering" to gain access on January 14, 2026 to an application that contained records regarding franchisees and franchise applicants. The access occurred even though access required multifactor authentication (MFA). The information involved included names and Social Security numbers. There is no indication that any guest data was involved. No gang has publicly claimed responsibility for the attack as yet.
Information security
#cve-2026-1731
Information security
fromThe Hacker News
2 days ago

CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

Two actively exploited Roundcube vulnerabilities (CVE-2025-49113, CVE-2025-68461) enable remote code execution and XSS; federal agencies must remediate by March 13, 2026.
#generative-ai
fromInfoWorld
2 days ago

Compromised npm package silently installs OpenClaw on developer machines

Researchers have discovered that a compromised npm publish token pushed an update for the widely-used Cline command line interface (CLI) containing a malicious postinstall script. That script installs the wildly popular, but increasingly condemned, agentic application OpenClaw on the unsuspecting user's machine. This can be extremely dangerous, as OpenClaw has broad system access and deep integrations with messaging platforms including WhatsApp, Telegram, Slack, Discord, iMessage, Teams, and others.
Information security
fromDataBreaches.Net
1 day ago

Update Chrome now: Zero-day bug allows code execution via malicious webpages - DataBreaches.Net

Google has issued a patch for a high‑severity Chrome zero‑day, tracked as CVE‑2026‑2441, a memory bug in how the browser handles certain font features that attackers are already exploiting. CVE-2026-2441 has the questionable honor of being the first Chrome zero-day of 2026. Google considered it serious enough to issue a separate update of the stable channel for it, rather than wait for the next major release.
Information security
#voip
Information security
fromDataBreaches.Net
1 day ago

Discord's age verification data has a frontend leak -- now what? - DataBreaches.Net

Frontend components tied to Persona used in Discord's age verification were exposed on the open web, revealing verification flow structure and increasing compliance pressure.
Information security
fromDataBreaches.Net
1 day ago

This is how you do it: Dentist speaks out after practice hit by cyber attack - DataBreaches.Net

A dental practice's computer system was hacked, sending fraudulent invoice emails; the breach was quickly detected, halted by IT, and appears to have originated overseas.
fromWIRED
1 day ago

Password Managers Share a Hidden Weakness

An FBI informant helped run the Incognito dark web market and allegedly approved the sale of fentanyl-laced pills, including those from a dealer linked to a confirmed death, WIRED reported this week. Meanwhile, Jeffrey Epstein's ties to Customs and Border Protection officers sparked a Department of Justice probe. Documents say that CBP officers in the US Virgin Islands were still friendly with Epstein years after his 2008 conviction, illustrating the infamous sex offender's tactics for cultivating allies.
Information security
Information security
fromKotaku
1 day ago

Hackers Raise The Alarm About Discord's Recent Age-Verification Partner - Kotaku

Persona's weak security enabled hackers to access biometric data and revealed extensive surveillance, including facial scanning against watchlists, raising privacy and government-collaboration concerns.
#archivetoday
fromTechCrunch
1 day ago
Information security

Wikipedia blacklists Archive.today after alleged DDoS attack | TechCrunch

fromTechCrunch
1 day ago
Information security

Wikipedia blacklists Archive.today after alleged DDoS attack | TechCrunch

#cve-2026-22769
fromSecurityWeek
2 days ago

In Other News: Ransomware Shuts US Clinics, ICS Vulnerability Surge, European Parliament Bans AI

Axonius has laid off approximately 40 employees, representing less than 4% of its global staff, with the majority of cuts in marketing and sales. Co-founder Dean Sysman has stepped down from his role as CEO to become executive chairman, with company president Joe Diamond appointed as interim CEO. The workforce adjustment aims to refine the company's organizational structure and improve operational efficiency as it prepares for a potential IPO.
Information security
Information security
fromTechzine Global
2 days ago

Microsoft closes Teams leak that allowed access without authentication

A critical improper access control vulnerability in Microsoft Teams allowed unauthenticated attackers to obtain network information; Microsoft resolved it server-side with no user action required.
Information security
fromThe Hacker News
2 days ago

ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT RAT

MIMICRAT is a sophisticated, previously undocumented RAT delivered via a ClickFix campaign using compromised legitimate sites, multi-stage PowerShell ETW/AMSI bypass, and HTTPS C2.
Information security
fromThe Hacker News
2 days ago

Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems

Unauthorized npm update to Cline CLI (cline@2.3.0) installed OpenClaw via a postinstall script, affecting about 4,000 downloads during an eight-hour window on Feb 17, 2026.
#ransomware
Information security
fromComputerworld
3 days ago

New phishing campaign tricks employees into bypassing Microsoft 365 MFA

Attackers trick employees into registering a hacker-controlled device via OAuth device authorization, granting persistent access to Microsoft accounts and bypassing MFA.
Information security
fromTheregister
3 days ago

RAT disguised as an RMM costs crims $300 a month

Criminals created a fake RMM vendor, TrustConnect, selling a RAT as a subscription and using a fake website plus an EV code-signing certificate to bypass security.
#atm-jackpotting
fromZDNET
3 days ago

Phone acting weird? 5 red flags that could point to hackers

Your mobile phone is a treasure trove of personal and confidential information. That's why it's a prime target for hackers who want to compromise or steal your data. Through malicious apps and websites, phishing attacks, and other threats, an attacker can gain control of your device through spyware. But how can you tell if your phone has been hacked or tapped?
Information security
#android-malware
Information security
fromThe Hacker News
2 days ago

Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026

Identity security posture—password hygiene, privileged access, and MFA coverage—now strongly determines cyber underwriting and insurance costs.
Information security
fromTechCrunch
2 days ago

Ukrainian man jailed for identity theft that helped North Koreans get jobs at US companies | TechCrunch

A Ukrainian was sentenced to five years for running an identity theft network that placed North Korean workers in U.S. jobs, funneling wages to Pyongyang.
Information security
fromDataBreaches.Net
2 days ago

A single compromised account gave hackers access to 1.2 million French banking records - DataBreaches.Net

Stolen credentials from one government official allowed attackers to access France's FICOBA database, exposing over 1.2 million bank accounts and sensitive financial data.
fromSecurityWeek
2 days ago

NIST's Quantum Breakthrough: Single Photons Produced on a Chip

NIST has developed a chip that reliably emits a single photon on demand. This ability will improve the efficiency of QKD (quantum key distribution) as we prepare for the arrival of quantum computers. Quantum computers will upend current cryptology by using Shor's algorithm to rapidly negate the current public/private key secure encryption methods. This has largely been solved by NIST's post quantum cryptology (PQC) algorithms.
Information security
Information security
fromFortune
2 days ago

AI can now hunt software bugs on its own. Anthropic is turning that into a security tool. | Fortune

Claude Code Security uses Anthropic's Opus 4.6 AI to review entire codebases, detect high-severity vulnerabilities, rate severity, and suggest fixes for developer approval.
fromTheregister
2 days ago

PayPal app code error leaked personal info

PayPal has notified about 100 customers that their personal information was exposed online during a code change gone awry, and in a few of these cases, people saw unauthorized transactions on their accounts. All of these customers have been fully refunded, according to a PayPal spokesperson. "When there is a potential exposure of customer information, PayPal is required to notify affected customers," the spokesperson told The Register. "In this case, PayPal's systems were not compromised. As such, we contacted the approximately 100 customers who were potentially impacted to provide awareness on this matter."
Information security
Information security
fromTechzine Global
2 days ago

Kyndryl launches integrated Cyber Defense Operations Center

Kyndryl opened a Cyber Defense Operations Center in Bengaluru consolidating network and security operations to deliver integrated monitoring, threat detection, incident response and performance management.
Information security
fromBusiness Matters
4 days ago

Detecting Configuration Drift: Continuous Controls vs. Point-in-Time Snapshots

Continuous controls monitoring (CCM) is required to detect and remediate configuration drift in rapidly changing cloud environments before risks persist unnoticed.
fromTheregister
3 days ago

Ex-Google engineers accused of swiping chip security secrets

Two former Google engineers and a third alleged accomplice are facing federal charges after prosecutors accused them of swiping sensitive chip and security technology secrets and then trying to cover their tracks when the scheme began to unravel. According to the Department of Justice, sisters Samaneh and Soroor Ghandali, both former Google employees, along with Mohammadjavad Khosravi, who worked at another unnamed technology company, have been charged with conspiracy, theft of trade secrets, and obstruction of justice.
Information security
fromLogRocket Blog
3 days ago

How to design 2FA: Comparing methods, user flows, and recovery strategies - LogRocket Blog

2FA or two-factor authentication is a specific type of multi-factor authentication. As the name suggests, 2FA requires two distinct forms of user verification factors to access a specific protected, registered user-only software system. In the past, software teams used only a one-factor authentication strategy with users' passwords, but nowadays, with growing security concerns and user authentication evolution, every digital product uses 2FA with password-based authentication, starting from simple SMS OTPs (One Time Tokens) to futuristic AI-powered adaptive 2FA methods and high-security hardware keys.
Information security
Information security
fromEngadget
3 days ago

Google Play used AI to help block 1.75 million bad apps in 2025

Google used AI to block 1.75 million policy-violating apps in 2025, reduced threats and strengthened Play Protect protections across billions of devices.
Information security
fromFuturism
2 days ago

Lockheed Martin F-35s Can Be Jailbroken Like $80 Million iPhones, European Military Chief Says

A Dutch official claims F-35s can be 'jailbroken' like phones, implying potential European ability to modify or maintain aircraft software independent of US updates.
Information security
fromSecurityWeek
3 days ago

Ivanti Exploitation Surges as Zero-Day Attacks Traced Back to July 2025

Exploitation of two patched Ivanti EPMM critical vulnerabilities (CVE-2026-1281, CVE-2026-1340) has surged, enabling remote unauthenticated code execution and full MDM compromise.
#windows-admin-center
fromThe Hacker News
4 days ago

CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware

The campaign exploits recent geopolitical developments to lure victims into opening malicious .LNK files disguised as protest-related images or videos, researchers Subhajeet Singha, Eliad Kimhy, and Darrel Virtusio said in a report published this week. These files are bundled with authentic media and a Farsi-language report providing updates from 'the rebellious cities of Iran.' This pro- protest framing appears to be intended to increase credibility and to attract Farsi-speaking Iranians seeking protest-related information.
Information security
Information security
fromZero Day Initiative
3 days ago

Zero Day Initiative - CVE-2026-20841: Arbitrary Code Execution in the Windows Notepad

Remote code execution in Windows Notepad via improper validation of Markdown links can allow arbitrary command execution when a user opens a malicious file.
Information security
fromThe Hacker News
3 days ago

From Exposure to Exploitation: How AI Collapses Your Response Window

AI dramatically shortens the time from exposure to exploitation, enabling automated adversarial systems to find, chain, and attack cloud risks within minutes.
#moldova
fromTheregister
3 days ago

NHS strategy: Write password on whiteboard, hope for best

We've excised the text, but suffice it to say that the whiteboard contains usernames and passwords for system access. It's a change from a Post-it note stuck to the screen, but it's no less likely to make a security professional shriek in horror. After all, not only is the account exposed, but anyone can use it, which renders an access log somewhat redundant.
Information security
#openclaw
Information security
fromTechCrunch
3 days ago

Exclusive: Bug in student admissions website exposed children's personal information

Ravenna Hub exposed students' and parents' personal data via an IDOR vulnerability; VentureEd fixed the bug but declined to commit to notifying users.
fromZDNET
3 days ago

Half of all cyberattacks start in your browser: 10 essential tips for staying safe

Web browsers are among the top targets for today's cybercriminals, playing a role in nearly half of all security incidents, new research reveals. According to Palo Alto Networks' 2026 Global Incident Response report, an analysis of 750 major cyber incidents recorded last year across 50 countries found that, in total, 48% of cybercrime events involved browser activity. Individuals trying to connect to the web, including business employees, are exposed to cyberthreats on a daily basis.
Information security
Information security
fromNextgov.com
3 days ago

Chinese telecom hackers likely holding stolen data 'in perpetuity' for later attempts, FBI official says

Chinese state-backed Salt Typhoon likely retains stolen telecom data indefinitely for surveillance, future exploitation, and aggregation with other exfiltrated information.
Information security
fromCointelegraph
4 days ago

Why Address Poisoning Works Without Stealing Private Keys

Address poisoning steals funds by manipulating transaction history and exploiting users copying lookalike addresses, not by stealing private keys.
Information security
fromSecurityWeek
3 days ago

Venice Security Emerges From Stealth With $33M Funding for Privileged Access Management

Venice Security raised $33 million to launch an adaptive privileged access management platform providing just-in-time access and immediate revocation across hybrid enterprise environments.
fromSecuritymagazine
4 days ago

Why Traditional Upskilling Strategies Fall Short in Cybersecurity

Hoang: My background sits at the intersection of enterprise IT, data protection, and cybersecurity. I've spent much of my career working with CIOs and CISOs on resilience - how organizations protect, recover, and govern their most critical data in the face of cyber threats, outages, and operational risk. Today, as CIO at Commvault, I see security not as a standalone function, but as a core business capability.
Information security
Information security
fromThe Hacker News
4 days ago

Fake IPTV Apps Spread Massiv Android Malware Targeting Mobile Banking Users

Massiv is an Android trojan that enables device takeover and credential theft via overlays, screen streaming, keylogging, SMS interception, and remote control for financial fraud.
Information security
fromTechCrunch
3 days ago

Google says its AI systems helped deter Play Store malware in 2025 | TechCrunch

In 2025 fewer malicious apps targeted Google Play as stronger AI-driven defenses, developer verification, and over 10,000 safety checks reduced policy violations and banned accounts.
Information security
fromThe Hacker News
3 days ago

INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown

Operation Red Card 2.0: 651 arrests, $4.3 million recovered, cybercrime infrastructure disrupted across 16 African countries.
Information security
fromInfoWorld
4 days ago

What happens when you add AI to SAST

AI agents with multi-modal analysis in SAST dramatically reduce false positives and false negatives inherent in traditional and rules-based SAST tools.
fromTechzine Global
3 days ago

Abstract innovates in SIEM with 'composable' architecture

We had already heard of 'next-gen SIEM'. This is a system that replaces traditional rule-based logging with automatic recognition of complex threats. It was designed to reduce noise on the line for SecOps personnel by reducing the number of false positives. However, according to Abstract CEO and co-founder Colby DeRodeff, this was only the beginning. He believes that a real 'reset' is needed, in the form of an 'AI-Gen Composable SIEM'.
Information security
#cisa-kev
fromThe Hacker News
5 days ago
Information security

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

CISA added four actively exploited high-severity vulnerabilities to its KEV catalog, including Chrome use-after-free, TeamT5 arbitrary upload, Zimbra SSRF, and Windows ActiveX RCE.
fromComputerWeekly.com
4 days ago
Information security

Flaws in Google, Microsoft products added to Cisa catalogue | Computer Weekly

Chromium zero-day and a 2008 Windows Video ActiveX RCE were added to CISA's KEV list, prompting remediation by 10 March 2026.
Information security
fromSecurityWeek
5 days ago

CISA: Hackers Exploiting Vulnerability in Product of Taiwan Security Firm TeamT5

A high-severity arbitrary file-upload vulnerability (CVE-2024-7694) in TeamT5's ThreatSonar Anti-Ransomware has been exploited in the wild and added to CISA's KEV catalog.
Information security
fromInfoWorld
4 days ago

Flaws in four popular VS Code extensions left 128 million installs open to attack

Critical and high-severity vulnerabilities in four widely used VS Code extensions exposed developers to file theft, remote code execution, and local network reconnaissance.
#vs-code-extensions
Information security
fromSecurityWeek
4 days ago

Vulnerabilities in Popular PDF Platforms Allowed Account Takeover, Data Exfiltration

Critical and high-severity vulnerabilities were found in Apryse and Foxit PDF platforms that could enable account takeover, data exfiltration, and remote code execution.
[ Load more ]