Information security

[ follow ]
Information security
fromThe Hacker News
10 minutes ago

On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email

CVE-2026-42897 enables spoofing via cross-site scripting in on-premises Exchange Server, with active exploitation, mitigated by emergency service or EOMT.
Information security
fromSecurityWeek
42 minutes ago

Cisco Patches Another SD-WAN Zero-Day, the Sixth Exploited in 2026

Cisco released patches for CVE-2026-20182, an exploited SD-WAN authentication bypass that can grant remote attackers admin privileges via crafted packets.
Information security
fromThe Hacker News
1 hour ago

CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits

CVE-2026-20182 in Cisco Catalyst SD-WAN Controller enables unauthenticated remote authentication bypass and administrative access, added to CISA KEV with FCEB remediation by May 17, 2026.
Information security
fromtheregister
8 hours ago

Nobody believes the 'criminals and scumbags' who hacked Canvas really deleted stolen student data

Instructure claims stolen data was destroyed and no customers will be extorted, but ransomware researchers doubt deletion and warn further threats are likely.
fromnews.bitcoin.com
6 hours ago

Ripple's Schwartz Warns XRP Users to Stay Safe From Giveaway Scams

SCAM ALERT: There has been a huge escalation lately in airdrop and giveaway scams targetting XRPL users lately. Any such posts you see are likely scams. Ripple-linked fraud warnings in recent months have also covered phishing operations targeting XRP holders through fake verification requests and malicious wallet prompts. Some schemes encouraged users to connect wallets or submit sensitive recovery information through unofficial channels masquerading as trusted XRP resources.
Information security
Information security
fromSecurityWeek
21 hours ago

Hackers Targeted PraisonAI Vulnerability Hours After Disclosure

PraisonAI versions with authentication disabled by default allowed unauthenticated access to agent metadata and workflow execution endpoints.
#supply-chain-attacks
Information security
fromTechCrunch
14 hours ago

OpenAI says hackers stole some data after latest code security issue | TechCrunch

Hackers injected malicious updates into open source TanStack, compromising OpenAI employee devices and stealing limited credentials while not accessing user data or altering production systems.
Information security
fromThe Hacker News
2 days ago

Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages

TeamPCP modified npm and PyPI packages to run obfuscated environment profiling and credential stealing, exfiltrating data via external domains and GitHub token abuse.
Information security
fromTechCrunch
14 hours ago

OpenAI says hackers stole some data after latest code security issue | TechCrunch

Hackers injected malicious updates into open source TanStack, compromising OpenAI employee devices and stealing limited credentials while not accessing user data or altering production systems.
Information security
fromThe Hacker News
2 days ago

Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages

TeamPCP modified npm and PyPI packages to run obfuscated environment profiling and credential stealing, exfiltrating data via external domains and GitHub token abuse.
#ai-assisted-hacking
Information security
fromTechRepublic
11 hours ago

The First AI-Crafted Zero-Day Was Easy to Spot. The Next One May Not Be

AI-assisted zero-day exploitation has been confirmed, showing logic flaws can be found at scale and increasing supply-chain and containment risks.
Information security
fromTechRepublic
11 hours ago

The First AI-Crafted Zero-Day Was Easy to Spot. The Next One May Not Be

AI-assisted zero-day exploitation has been confirmed, showing logic flaws can be found at scale and increasing supply-chain and containment risks.
Information security
fromTechRepublic
2 days ago

Google Says Hackers Used AI to Build Zero-Day Exploit

A zero-day exploit with AI assistance targeted 2FA in an open-source web administration tool, but was disrupted before large-scale use.
Information security
fromThe Hacker News
19 hours ago

PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure

A missing authentication flaw in PraisonAI’s legacy Flask API server enables unauthenticated access to protected endpoints, allowing workflow triggering and quota consumption.
Information security
fromTNW | Openai
22 hours ago

OpenAI says no user data was touched in the TanStack npm worm

Malicious TanStack npm packages were published via the legitimate release pipeline after a hijacked GitHub Actions runner exfiltrated an OIDC token mid-build.
Information security
fromTechCrunch
17 hours ago

A spyware investigator exposed Russian government hackers trying to hijack Signal accounts | TechCrunch

Hackers impersonated Signal, warned of fake security threats, and used verification-code prompts to trick users into granting account access via attacker-controlled devices.
#ai-cybersecurity
Information security
fromSocial Media Explorer
1 day ago

AI Model "Claude Mythos" Raises New Questions About Cybersecurity and Machine Intelligence - Social Media Explorer

AI systems are rapidly advancing in cybersecurity tasks, creating dual-use risks by improving vulnerability discovery while potentially lowering barriers to cyberattacks.
Information security
fromAxios
18 hours ago

The next phase of AI cybersecurity still needs humans

Powerful AI security models rapidly discover many bugs and can chain low-severity issues into attack paths, increasing vulnerability volume and defender workload.
Information security
fromEntrepreneur
17 hours ago

Companies Only Have 3-5 Months to Outpace AI-Driven Cyberattacks Before They Become 'the New Norm,' Warns Top Tech Executive

Organizations have a three-to-five-month window to strengthen defenses before AI-driven exploits become routine.
Information security
fromNextgov.com
11 hours ago

NIST aims for summer release of AI cyber guidelines

NIST will release an AI-specific cybersecurity framework and control overlay guidance to mitigate AI-enabled threats while enabling safe, rapid AI adoption.
Information security
fromNextgov.com
14 hours ago

House Homeland panel gets briefing on Anthropic's Mythos

A congressional briefing demonstrated Anthropic’s Mythos AI hacking capabilities and emphasized urgent, responsible deployment of advanced U.S. models to patch vulnerabilities before adversaries exploit them.
Information security
fromTNW | Openai
2 days ago

OpenAI launches Daybreak to take on Anthropic's Mythos in cyber defence

Daybreak pairs GPT-5.5 variants with security partners to model threats, find vulnerabilities, generate patches, and validate fixes in enterprise codebases under controlled access.
Information security
fromSocial Media Explorer
1 day ago

AI Model "Claude Mythos" Raises New Questions About Cybersecurity and Machine Intelligence - Social Media Explorer

AI systems are rapidly advancing in cybersecurity tasks, creating dual-use risks by improving vulnerability discovery while potentially lowering barriers to cyberattacks.
Information security
fromAxios
18 hours ago

The next phase of AI cybersecurity still needs humans

Powerful AI security models rapidly discover many bugs and can chain low-severity issues into attack paths, increasing vulnerability volume and defender workload.
Information security
fromEntrepreneur
17 hours ago

Companies Only Have 3-5 Months to Outpace AI-Driven Cyberattacks Before They Become 'the New Norm,' Warns Top Tech Executive

Organizations have a three-to-five-month window to strengthen defenses before AI-driven exploits become routine.
Information security
fromNextgov.com
11 hours ago

NIST aims for summer release of AI cyber guidelines

NIST will release an AI-specific cybersecurity framework and control overlay guidance to mitigate AI-enabled threats while enabling safe, rapid AI adoption.
Information security
fromNextgov.com
14 hours ago

House Homeland panel gets briefing on Anthropic's Mythos

A congressional briefing demonstrated Anthropic’s Mythos AI hacking capabilities and emphasized urgent, responsible deployment of advanced U.S. models to patch vulnerabilities before adversaries exploit them.
Information security
fromTNW | Openai
2 days ago

OpenAI launches Daybreak to take on Anthropic's Mythos in cyber defence

Daybreak pairs GPT-5.5 variants with security partners to model threats, find vulnerabilities, generate patches, and validate fixes in enterprise codebases under controlled access.
Information security
fromtheregister
1 day ago

To gain root access at this company, all an intruder had to do was ask nicely

IT staff reset an account after a caller failed challenge questions, enabling unauthorized access through social engineering and weak password reset procedures.
Information security
fromSecurityWeek
17 hours ago

Enhancing Data Center Security Without Sacrificing Performance

Move security workloads from host CPUs to DPUs to eliminate hypervisor blind spots while preserving performance and enabling tamper-proof, line-speed enforcement.
Information security
fromThe Hacker News
12 hours ago

Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access

Cisco released updates for CVE-2026-20182, a maximum-severity authentication bypass in Catalyst SD-WAN Controller that enables unauthenticated remote admin access and NETCONF configuration changes.
Information security
fromThe Hacker News
13 hours ago

ThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories

Compromised sites and fake helpdesks enable modular persistence, encrypted proxy access, credential theft, privilege escalation, lateral movement, and data exfiltration.
#ransomware
Information security
fromSecuritymagazine
1 day ago

Foxconn Confirms Cyberattack, Security Experts Discuss

A Foxconn cyberattack disrupted North American facilities and involved alleged theft of 8TB of hardware and network data, creating long-term supply-chain and product-security risks.
Information security
fromTechzine Global
1 day ago

Foxconn attackers allegedly obtained Apple and Nvidia data

Foxconn confirmed a North American ransomware attack, with Nitrogen claiming theft of confidential data and Foxconn restarting affected factories.
Information security
fromSecuritymagazine
1 day ago

Foxconn Confirms Cyberattack, Security Experts Discuss

A Foxconn cyberattack disrupted North American facilities and involved alleged theft of 8TB of hardware and network data, creating long-term supply-chain and product-security risks.
Information security
fromTechzine Global
1 day ago

Foxconn attackers allegedly obtained Apple and Nvidia data

Foxconn confirmed a North American ransomware attack, with Nitrogen claiming theft of confidential data and Foxconn restarting affected factories.
Information security
fromSecuritymagazine
1 day ago

The Bench You'll Need in Three Years Depends on Decisions You Make Now

AI-native security tools automate entry-level tasks, shrinking the entry talent pipeline and creating a widening skills mismatch that will reduce hiring, provider quality, and bench strength.
Information security
fromThe Hacker News
1 day ago

18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE

NGINX Rift is a critical ngx_http_rewrite_module heap buffer overflow enabling remote code execution or denial-of-service via crafted requests.
Information security
fromThe Hacker News
19 hours ago

How AI Hallucinations Are Creating Real Security Risks

AI models can produce confident, incorrect outputs that exploit misplaced trust, creating security vulnerabilities in critical infrastructure and cybersecurity decisions.
Information security
fromSecurityWeek
18 hours ago

Chinese APTs Expand Targets, Update Backdoors in Recent Campaigns

Salt Typhoon expanded targeting and updated tools, exploiting Microsoft Exchange vulnerabilities to deploy web shells and Deed RAT, then moving laterally via RDP and Impacket.
Information security
fromEngadget
13 hours ago

The ChatGPT desktop app for Mac just got hit with a security breach - Engadget

A compromised open-source library led to limited credential exfiltration from code repositories, prompting a ChatGPT Mac update rollout and no evidence of user data access.
#linux-kernel
Information security
fromZDNET
18 hours ago

The third major Linux kernel flaw in two weeks has been found - thanks to AI

Fragnesia is a Linux kernel page-cache corruption flaw that lets unprivileged users gain reliable root access across major distributions.
Information security
fromtheregister
21 hours ago

Dirty Frag gets a sequel as Fragnesia hands Linux attackers root-level access

Fragnesia (CVE-2026-46300) enables unprivileged users to gain root by corrupting Linux page-cache memory via the XFRM ESP-in-TCP/IPsec path, with public exploit code available.
Information security
fromSecurityWeek
17 hours ago

New Linux Kernel Vulnerability Fragnesia Allows Root Privilege Escalation

Fragnesia (CVE-2026-46300) is a local kernel flaw enabling unprivileged attackers to overwrite files and gain root; patches are available and should be applied quickly.
Information security
fromZDNET
18 hours ago

The third major Linux kernel flaw in two weeks has been found - thanks to AI

Fragnesia is a Linux kernel page-cache corruption flaw that lets unprivileged users gain reliable root access across major distributions.
Information security
fromtheregister
21 hours ago

Dirty Frag gets a sequel as Fragnesia hands Linux attackers root-level access

Fragnesia (CVE-2026-46300) enables unprivileged users to gain root by corrupting Linux page-cache memory via the XFRM ESP-in-TCP/IPsec path, with public exploit code available.
Information security
fromSecurityWeek
17 hours ago

New Linux Kernel Vulnerability Fragnesia Allows Root Privilege Escalation

Fragnesia (CVE-2026-46300) is a local kernel flaw enabling unprivileged attackers to overwrite files and gain root; patches are available and should be applied quickly.
fromSecurityWeek
20 hours ago

F5 Patches Over 50 Vulnerabilities

The most severe of the resolved issues is CVE-2026-42945 (CVSS v4.0 score of 9.2), a denial-of-service (DoS) condition in NGINX's ngx_http_rewrite_module module. The bug allows an unauthenticated attacker to send crafted HTTP requests that, combined with certain conditions beyond the attacker's control, could trigger a heap buffer overflow and a restart. If Address Space Layout Randomization (ASLR) is disabled, the flaw can be exploited for code execution.
Information security
Information security
fromWIRED
21 hours ago

Your iPhone Gets Stolen. Then the Hacking Begins

Cybercrime services sell iPhone unlocking tools and phishing technology, enabling resale of unlocked, wiped devices and driving rapid growth in related phishing domains.
fromArs Technica
12 hours ago

Zero-day exploit completely defeats default Windows 11 BitLocker protections

A zero-day exploit circulating online allows people with physical access to a Windows 11 system to bypass default BitLocker protections and gain complete access to an encrypted drive within seconds. The exploit, named YellowKey, was published earlier this week by a researcher who goes by the alias Nightmare-Eclipse. It reliably bypasses default Windows 11 deployments of BitLocker, the full-volume encryption protection Microsoft provides to make disk contents off-limits to anyone without the decryption key, which is stored in a secured piece of hardware known as a trusted platform module (TPM).
Information security
Information security
fromSecurityWeek
22 hours ago

High-Severity Vulnerability Patched in VMware Fusion

VMware Fusion released an update to patch CVE-2026-41702, a TOCTOU SETUID flaw that can let local non-admin users escalate privileges to root.
#cyberattack
Information security
fromSecuritymagazine
1 day ago

Expert Insights on the West Pharmaceutical Ransomware Attack

West Pharmaceutical Services identified a cyberattack, confirmed data exfiltration, and restored enterprise systems while some global operations remained disrupted.
Information security
fromSecurityWeek
1 day ago

Foxconn Confirms North American Factories Hit by Cyberattack

Foxconn confirmed North American factories were hit by a cyberattack, with affected sites resuming normal production after response measures were activated.
Information security
fromSecuritymagazine
1 day ago

Expert Insights on the West Pharmaceutical Ransomware Attack

West Pharmaceutical Services identified a cyberattack, confirmed data exfiltration, and restored enterprise systems while some global operations remained disrupted.
Information security
fromSecurityWeek
1 day ago

Foxconn Confirms North American Factories Hit by Cyberattack

Foxconn confirmed North American factories were hit by a cyberattack, with affected sites resuming normal production after response measures were activated.
Information security
fromFortune
18 hours ago

North Korean operatives stole $2 billion last year-and financial firms are the next target | Fortune

North Korea-linked cyber groups stole over $2 billion in digital assets in 2025, using credential theft and laundering to fund military and nuclear programs.
Information security
fromThe Hacker News
16 hours ago

Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strike

Ghostwriter/FrostyNeighbor conducts persistent, adaptive cyber operations against Eastern European government targets using evolving malware, phishing, and credential abuse.
Information security
fromSecurityWeek
18 hours ago

Akamai to Acquire AI and Browser Security Firm LayerX for $205 Million

Akamai will acquire LayerX for about $205 million to add AI usage control and browser security capabilities to its Zero Trust portfolio.
Information security
fromSecurityWeek
1 day ago

Microsoft, Palo Alto Networks Find Many Vulnerabilities by Using AI on Their Own Code

Microsoft and Palo Alto Networks report significant vulnerability discoveries after enabling AI-driven scanning on their own code and product portfolios.
Information security
fromSecuritymagazine
2 days ago

What Security Leaders Say About the First AI-Developed Zero-Day Exploit

AI-generated zero-day exploitation has become operational, requiring stronger, phishing-resistant authentication and treating privileged access as a separate attack surface.
#ai-security
Information security
fromComputerworld
1 day ago

Microsoft's new AI system finds 16 Windows flaws, including four critical RCEs

MDASH will enter enterprise private preview in June, using AI agents to discover and help remediate Windows vulnerabilities, including critical remote code execution flaws.
Information security
fromComputerworld
1 day ago

Microsoft's new AI system finds 16 Windows flaws, including four critical RCEs

MDASH will enter enterprise private preview in June, using AI agents to discover and help remediate Windows vulnerabilities, including critical remote code execution flaws.
Information security
fromThe Hacker News
1 day ago

Microsoft's MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday

MDASH is a model-agnostic, multi-agent AI pipeline that discovers, validates, and proves exploitable vulnerabilities at scale in complex codebases.
Information security
fromSecurityWeek
1 day ago

Sweet Security Launches Agentic AI Red Teaming to Counter 'Mythos Moment'

Human security cannot match AI-assisted cyberattack speed and volume, requiring security programs that use environment-specific AI agents and continuous red teaming.
Information security
fromtheregister
1 day ago

Bug hunter tracks down three massive MCP flaws and one vendor won't fix theirs

Missing or faulty security validation in MCP servers enables SQL injection, metadata exfiltration, and potential takeover of internet-exposed database instances.
#cybersecurity
from24/7 Wall St.
1 day ago
Information security

AI Threats Are Accelerating and These 3 Cybersecurity Stocks Under $30 Are Built to Win

Information security
fromTechzine Global
2 days ago

Google: AI likely aided attackers to develop a zero-day

Generative AI is increasingly used to develop exploits, enabling attackers to bypass two-factor authentication and automate offensive workflows.
Information security
fromwww.bbc.com
2 days ago

Canvas hack: company pays criminals to delete students' stolen data

Instructure paid hackers to prevent publication of stolen Canvas data, returning it with digital confirmation of destruction and preventing extortion of affected customers.
Information security
fromBusiness Matters
3 days ago

Stryker hack shows cyber intelligence is more important than ever

A major medical device company’s devices were wiped after an Iran-linked ransomware attack, showing cyber threats can strike anytime and require urgent security priorities.
Information security
fromSecuritymagazine
2 days ago

Cybersecurity Is No Longer a Gatekeeper, But the Engine of Delivery Across Digital Economy

Cybersecurity is a top fast-growing skill and must be integrated into product delivery, since both protection gaps and misconfigured controls can cause outages, breaches, and lost trust.
Information security
from24/7 Wall St.
1 day ago

AI Threats Are Accelerating and These 3 Cybersecurity Stocks Under $30 Are Built to Win

Cybersecurity demand for AI workloads, identity control, and data pipeline protection is driving growth, while several stocks trade under $30 at compressed valuations.
Information security
fromSecurityWeek
1 day ago

Government to Scrutinize Instructure Over Canvas Disruption, Data Breach

Instructure faced repeated Canvas intrusions, exploited Free-For-Teacher issues, and is temporarily shutting accounts while the House Homeland Security Committee demands incident details.
Information security
fromTechzine Global
2 days ago

Google: AI likely aided attackers to develop a zero-day

Generative AI is increasingly used to develop exploits, enabling attackers to bypass two-factor authentication and automate offensive workflows.
Information security
fromwww.bbc.com
2 days ago

Canvas hack: company pays criminals to delete students' stolen data

Instructure paid hackers to prevent publication of stolen Canvas data, returning it with digital confirmation of destruction and preventing extortion of affected customers.
#microsoft-security-updates
fromThe Hacker News
1 day ago
Information security

Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws

Microsoft released patches for 138 vulnerabilities across its products, including critical Windows DNS and Azure flaws, with no publicly known active attacks reported.
Information security
fromZero Day Initiative
2 days ago

Zero Day Initiative - The May 2026 Security Update Review

Most Microsoft fixes address elevation of privilege, with several code execution paths requiring varying attacker access levels and one kernel issue enabling code execution via crafted NVMe-oF handshake messages.
Information security
fromThe Hacker News
1 day ago

Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws

Microsoft released patches for 138 vulnerabilities across its products, including critical Windows DNS and Azure flaws, with no publicly known active attacks reported.
Information security
fromZero Day Initiative
2 days ago

Zero Day Initiative - The May 2026 Security Update Review

Most Microsoft fixes address elevation of privilege, with several code execution paths requiring varying attacker access levels and one kernel issue enabling code execution via crafted NVMe-oF handshake messages.
Information security
fromwww.bbc.com
2 days ago

More than 70 million warnings sent to people seeking child abuse material

Over two years, 70 million CSAM warning messages were sent, with 700,000 accessing support resources, and most who seek help continued engaging.
Information security
fromtheregister
1 day ago

Mystery Microsoft bug leaker keeps the zero-days coming

YellowKey enables attackers with physical access to bypass BitLocker and gain unrestricted shell access, turning stolen laptops into potential breach events.
Information security
fromSecurityWeek
1 day ago

Fortinet, Ivanti Patch Critical Vulnerabilities

Fortinet and Ivanti released patches for 18 vulnerabilities, including three critical flaws enabling remote, unauthenticated code execution or file manipulation.
Information security
fromtheregister
1 day ago

Welcome to the vulnpocalypse, as vendors use AI to find bugs and patches multiply like rabbits

AI-based code scanning is rapidly increasing vulnerability discovery, driving more patches and greater administrative workload while raising risks if patches break systems.
#microsoft-patch-tuesday
Information security
fromSecurityWeek
1 day ago

Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening Enterprises

CVE-2026-40361 is a zero-click Outlook remote code execution flaw requiring patching to protect enterprise inboxes.
Information security
fromTechzine Global
1 day ago

Microsoft patches 137 vulnerabilities and deploys AI scanner

Microsoft’s May Patch Tuesday fixes 137 vulnerabilities, including 30 critical, with AI-driven detection and an internal MDASH scanning environment accelerating discovery and patching.
Information security
fromComputerWeekly.com
2 days ago

Microsoft releases rare zero-day free Patch Tuesday update | Computer Weekly

May 2026 Patch Tuesday fixes about 140 CVEs with no zero-days, but nearly 20 critical flaws require rapid patching and Secure Boot certificate rotation by 26 June.
Information security
fromSecurityWeek
1 day ago

Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening Enterprises

CVE-2026-40361 is a zero-click Outlook remote code execution flaw requiring patching to protect enterprise inboxes.
Information security
fromTechzine Global
1 day ago

Microsoft patches 137 vulnerabilities and deploys AI scanner

Microsoft’s May Patch Tuesday fixes 137 vulnerabilities, including 30 critical, with AI-driven detection and an internal MDASH scanning environment accelerating discovery and patching.
Information security
fromComputerWeekly.com
2 days ago

Microsoft releases rare zero-day free Patch Tuesday update | Computer Weekly

May 2026 Patch Tuesday fixes about 140 CVEs with no zero-days, but nearly 20 critical flaws require rapid patching and Secure Boot certificate rotation by 26 June.
Information security
fromSecurityWeek
1 day ago

Chipmaker Patch Tuesday: Intel and AMD Patch 70 Vulnerabilities

Intel and AMD released May 2026 Patch Tuesday advisories covering 70 vulnerabilities, including critical flaws enabling privilege escalation and potential code execution.
Information security
fromComputerWeekly.com
1 day ago

Can data sovereignty become a liability in war? | Computer Weekly

In conflict, data access matters more than data sovereignty, and both national control and global cloud reliance can create single points of failure.
Information security
fromSecurityWeek
2 days ago

ICS Patch Tuesday: New Security Advisories From Siemens, Schneider, CISA

Multiple vendors released May 2026 ICS security advisories addressing critical and high-severity vulnerabilities, including remote code execution, takeover, XSS, and session hijacking.
fromwww.theregister.com
2 days ago

Malware crew TeamPCP open-sources its Shai-Hulud worm on GitHub

“Shai-Hulud: Open Sourcing The CarnageIs it vibe coded? Yes. Does it work? Let results speak. Change keys and C2 as needed. Love - TeamPCP”
Information security
Information security
fromComputerworld
1 day ago

Cyberattack: First they come for Foxconn, then they come for you

Attackers can still disrupt and compromise highly secured industrial networks, causing widespread operational shutdowns and data theft claims.
Information security
fromThe Hacker News
1 day ago

GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data

GemStuffer abuses RubyGems to exfiltrate scraped UK council portal content by publishing data-bearing gems using hardcoded API keys.
fromThe Hacker News
1 day ago

Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation

A threat actor with affiliations to China has been linked to a "multi-wave intrusion" targeting an unnamed Azerbaijani oil and gas company between late December 2025 and late February 2026, marking an expansion of its targeting.
Information security
Information security
fromIndependent
2 days ago

More than 200 fake websites targeted Irish residents with scams last year

Financial scams targeting Irish residents increased 52% in one year, often impersonating Revenue, An Post, and Irish banks to steal money.
fromIndependent
2 days ago

More than 200 fake websites targeted Irish residents with scams last year

More than 200 websites were found to be targeting Irish residents with scams last year, including fake online shops and fraudulent loan websites claiming to be regulated by the Central Bank of Ireland.
Information security
Information security
fromInfoQ
3 days ago

GitHub Expands Secret Scanning with General Availability of MCP Server Integration

GitHub added general availability of secret scanning via its MCP Server to let AI agents and automation detect and remediate exposed credentials in structured workflows.
Information security
fromSearch Storage
3 days ago

Attackers targeting storage infrastructure for remote work | TechTarget

Threat actors increasingly target storage infrastructure to access valuable data, disable backups, steal credentials, and spread ransomware impact efficiently.
Information security
fromMedium
2 days ago

AI's Double-Edged Sword: Innovation, Risk, and the Expanding Attack Surface

AI capability is expanding cybersecurity risks by turning intelligence and autonomy into attack vectors for fraud, misinformation, and physical threats.
#soc-operations
Information security
fromSecurityWeek
2 days ago

Is The SOC Obsolete, And We Just Haven't Admitted It Yet?

SOC operations are increasingly mismatched to machine-speed threats, and current AI SOC promises rarely replace human investigation and contextual decision-making.
Information security
fromThe Hacker News
2 days ago

Webinar: What the Riskiest SOC Alerts Go Unanswered - and How Radiant Security Can Help

High-risk SOC alerts go unanswered due to structural coverage ceilings, lack of specialized expertise, and automation limits that deprioritize unfamiliar or novel alert categories.
Information security
fromSecurityWeek
2 days ago

Is The SOC Obsolete, And We Just Haven't Admitted It Yet?

SOC operations are increasingly mismatched to machine-speed threats, and current AI SOC promises rarely replace human investigation and contextual decision-making.
Information security
fromThe Hacker News
2 days ago

Webinar: What the Riskiest SOC Alerts Go Unanswered - and How Radiant Security Can Help

High-risk SOC alerts go unanswered due to structural coverage ceilings, lack of specialized expertise, and automation limits that deprioritize unfamiliar or novel alert categories.
Information security
fromSecurityWeek
2 days ago

Microsoft Patches 137 Vulnerabilities

Microsoft patched 137 vulnerabilities, including critical privilege escalation and remote code execution flaws, with none reported exploited in the wild.
Information security
fromDevOps.com
2 days ago

OpenAI's Daybreak Challenges Anthropic in AI Cybersecurity Race

Daybreak embeds AI-driven vulnerability identification, fix validation, and faster patching into enterprise software development workflows using Codex Security and vendor integrations.
Information security
fromtheregister
2 days ago

Cache-poisoning caper turns TanStack npm packages toxic

Eighty-four malicious TanStack npm package versions stole credentials, self-propagated, and wiped disks after poisoning GitHub Actions caches and extracting npm OIDC tokens.
Information security
fromSecurityWeek
2 days ago

Claude Mythos Finds Only One Curl Vulnerability; Experts Divided on What It Really Means

Claude Mythos testing of curl found only one low-severity vulnerability, challenging claims of thousands of zero-days and suggesting curl’s security may be strong.
Information security
fromTNW | Data-Security
2 days ago

Google identifies first AI-developed zero-day exploit and thwarts planned mass exploitation event

Google identified an AI-assisted zero-day exploit, disrupted a planned mass exploitation event, and documented state-sponsored AI use in vulnerability research and malware development.
Information security
fromSecurityWeek
2 days ago

TanStack, Mistral AI, UiPath Hit in Fresh Supply Chain Attack

A coordinated Mini Shai-Hulud supply chain attack compromised 170+ packages, stealing tokens and credentials and spreading via CI publishing of malicious package versions.
Information security
fromwww.cbc.ca
2 days ago

Instructure strikes deal with hackers after massive Canvas cyber breach hits universities | CBC News

Instructure reached an agreement with the hacking group, received verification of data destruction, and assured customers would not face extortion or further targeting.
[ Load more ]