Information security

[ follow ]
#generative-ai
fromDataBreaches.Net
3 hours ago

Update Chrome now: Zero-day bug allows code execution via malicious webpages - DataBreaches.Net

Google has issued a patch for a high‑severity Chrome zero‑day, tracked as CVE‑2026‑2441, a memory bug in how the browser handles certain font features that attackers are already exploiting. CVE-2026-2441 has the questionable honor of being the first Chrome zero-day of 2026. Google considered it serious enough to issue a separate update of the stable channel for it, rather than wait for the next major release.
Information security
#voip
Information security
fromDataBreaches.Net
3 hours ago

Discord's age verification data has a frontend leak -- now what? - DataBreaches.Net

Frontend components tied to Persona used in Discord's age verification were exposed on the open web, revealing verification flow structure and increasing compliance pressure.
Information security
fromDataBreaches.Net
2 hours ago

This is how you do it: Dentist speaks out after practice hit by cyber attack - DataBreaches.Net

A dental practice's computer system was hacked, sending fraudulent invoice emails; the breach was quickly detected, halted by IT, and appears to have originated overseas.
#cve-2026-1731
Information security
fromThe Hacker News
7 hours ago

CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

Two actively exploited Roundcube vulnerabilities (CVE-2025-49113, CVE-2025-68461) enable remote code execution and XSS; federal agencies must remediate by March 13, 2026.
fromInfoWorld
11 hours ago

Compromised npm package silently installs OpenClaw on developer machines

Researchers have discovered that a compromised npm publish token pushed an update for the widely-used Cline command line interface (CLI) containing a malicious postinstall script. That script installs the wildly popular, but increasingly condemned, agentic application OpenClaw on the unsuspecting user's machine. This can be extremely dangerous, as OpenClaw has broad system access and deep integrations with messaging platforms including WhatsApp, Telegram, Slack, Discord, iMessage, Teams, and others.
Information security
fromWIRED
4 hours ago

Password Managers Share a Hidden Weakness

An FBI informant helped run the Incognito dark web market and allegedly approved the sale of fentanyl-laced pills, including those from a dealer linked to a confirmed death, WIRED reported this week. Meanwhile, Jeffrey Epstein's ties to Customs and Border Protection officers sparked a Department of Justice probe. Documents say that CBP officers in the US Virgin Islands were still friendly with Epstein years after his 2008 conviction, illustrating the infamous sex offender's tactics for cultivating allies.
Information security
#cve-2026-22769
fromSecurityWeek
1 day ago

In Other News: Ransomware Shuts US Clinics, ICS Vulnerability Surge, European Parliament Bans AI

Axonius has laid off approximately 40 employees, representing less than 4% of its global staff, with the majority of cuts in marketing and sales. Co-founder Dean Sysman has stepped down from his role as CEO to become executive chairman, with company president Joe Diamond appointed as interim CEO. The workforce adjustment aims to refine the company's organizational structure and improve operational efficiency as it prepares for a potential IPO.
Information security
Information security
fromTechzine Global
1 day ago

Microsoft closes Teams leak that allowed access without authentication

A critical improper access control vulnerability in Microsoft Teams allowed unauthenticated attackers to obtain network information; Microsoft resolved it server-side with no user action required.
Information security
fromThe Hacker News
1 day ago

ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT RAT

MIMICRAT is a sophisticated, previously undocumented RAT delivered via a ClickFix campaign using compromised legitimate sites, multi-stage PowerShell ETW/AMSI bypass, and HTTPS C2.
Information security
fromThe Hacker News
1 day ago

Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems

Unauthorized npm update to Cline CLI (cline@2.3.0) installed OpenClaw via a postinstall script, affecting about 4,000 downloads during an eight-hour window on Feb 17, 2026.
#ransomware
Information security
fromComputerworld
1 day ago

New phishing campaign tricks employees into bypassing Microsoft 365 MFA

Attackers trick employees into registering a hacker-controlled device via OAuth device authorization, granting persistent access to Microsoft accounts and bypassing MFA.
Information security
fromTheregister
1 day ago

RAT disguised as an RMM costs crims $300 a month

Criminals created a fake RMM vendor, TrustConnect, selling a RAT as a subscription and using a fake website plus an EV code-signing certificate to bypass security.
#atm-jackpotting
fromSecuritymagazine
1 day ago

The 25 Most Vulnerable Passwords of 2026

The methodology involved assessing Comparitech's Most Common Password report and NordPass's Top 200 Most Common Passwords list, then leveraging KeywordTool to determine search volumes to find the 25 most common passwords based on global popularity. According to the research, higher search volumes could suggest higher public interest, which could lead to higher password usage. Therefore, this places those passwords at a greater risk of being hacked.
Information security
#data-breach
fromDataBreaches.Net
1 day ago
Information security

Loan applications, drivers licences, personal data of 440k Aussies exposed after hacker hits Sydney finance tech company youX - DataBreaches.Net

fromDataBreaches.Net
1 day ago
Information security

Loan applications, drivers licences, personal data of 440k Aussies exposed after hacker hits Sydney finance tech company youX - DataBreaches.Net

fromZDNET
1 day ago

Phone acting weird? 5 red flags that could point to hackers

Your mobile phone is a treasure trove of personal and confidential information. That's why it's a prime target for hackers who want to compromise or steal your data. Through malicious apps and websites, phishing attacks, and other threats, an attacker can gain control of your device through spyware. But how can you tell if your phone has been hacked or tapped?
Information security
#android-malware
Information security
fromThe Hacker News
1 day ago

Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026

Identity security posture—password hygiene, privileged access, and MFA coverage—now strongly determines cyber underwriting and insurance costs.
Information security
fromTechCrunch
22 hours ago

Ukrainian man jailed for identity theft that helped North Koreans get jobs at US companies | TechCrunch

A Ukrainian was sentenced to five years for running an identity theft network that placed North Korean workers in U.S. jobs, funneling wages to Pyongyang.
Information security
fromDataBreaches.Net
1 day ago

A single compromised account gave hackers access to 1.2 million French banking records - DataBreaches.Net

Stolen credentials from one government official allowed attackers to access France's FICOBA database, exposing over 1.2 million bank accounts and sensitive financial data.
fromSecurityWeek
1 day ago

NIST's Quantum Breakthrough: Single Photons Produced on a Chip

NIST has developed a chip that reliably emits a single photon on demand. This ability will improve the efficiency of QKD (quantum key distribution) as we prepare for the arrival of quantum computers. Quantum computers will upend current cryptology by using Shor's algorithm to rapidly negate the current public/private key secure encryption methods. This has largely been solved by NIST's post quantum cryptology (PQC) algorithms.
Information security
Information security
fromFortune
21 hours ago

AI can now hunt software bugs on its own. Anthropic is turning that into a security tool. | Fortune

Claude Code Security uses Anthropic's Opus 4.6 AI to review entire codebases, detect high-severity vulnerabilities, rate severity, and suggest fixes for developer approval.
fromTheregister
18 hours ago

PayPal app code error leaked personal info

PayPal has notified about 100 customers that their personal information was exposed online during a code change gone awry, and in a few of these cases, people saw unauthorized transactions on their accounts. All of these customers have been fully refunded, according to a PayPal spokesperson. "When there is a potential exposure of customer information, PayPal is required to notify affected customers," the spokesperson told The Register. "In this case, PayPal's systems were not compromised. As such, we contacted the approximately 100 customers who were potentially impacted to provide awareness on this matter."
Information security
Information security
fromTechzine Global
1 day ago

Kyndryl launches integrated Cyber Defense Operations Center

Kyndryl opened a Cyber Defense Operations Center in Bengaluru consolidating network and security operations to deliver integrated monitoring, threat detection, incident response and performance management.
Information security
fromBusiness Matters
2 days ago

Detecting Configuration Drift: Continuous Controls vs. Point-in-Time Snapshots

Continuous controls monitoring (CCM) is required to detect and remediate configuration drift in rapidly changing cloud environments before risks persist unnoticed.
fromTheregister
1 day ago

Ex-Google engineers accused of swiping chip security secrets

Two former Google engineers and a third alleged accomplice are facing federal charges after prosecutors accused them of swiping sensitive chip and security technology secrets and then trying to cover their tracks when the scheme began to unravel. According to the Department of Justice, sisters Samaneh and Soroor Ghandali, both former Google employees, along with Mohammadjavad Khosravi, who worked at another unnamed technology company, have been charged with conspiracy, theft of trade secrets, and obstruction of justice.
Information security
fromLogRocket Blog
1 day ago

How to design 2FA: Comparing methods, user flows, and recovery strategies - LogRocket Blog

2FA or two-factor authentication is a specific type of multi-factor authentication. As the name suggests, 2FA requires two distinct forms of user verification factors to access a specific protected, registered user-only software system. In the past, software teams used only a one-factor authentication strategy with users' passwords, but nowadays, with growing security concerns and user authentication evolution, every digital product uses 2FA with password-based authentication, starting from simple SMS OTPs (One Time Tokens) to futuristic AI-powered adaptive 2FA methods and high-security hardware keys.
Information security
Information security
fromEngadget
1 day ago

Google Play used AI to help block 1.75 million bad apps in 2025

Google used AI to block 1.75 million policy-violating apps in 2025, reduced threats and strengthened Play Protect protections across billions of devices.
Information security
fromFuturism
22 hours ago

Lockheed Martin F-35s Can Be Jailbroken Like $80 Million iPhones, European Military Chief Says

A Dutch official claims F-35s can be 'jailbroken' like phones, implying potential European ability to modify or maintain aircraft software independent of US updates.
Information security
fromArs Technica
21 hours ago

Wikipedia bans Archive.today after site executed DDoS and altered web captures

English Wikipedia blacklisted Archive.today after the site was used to direct a DDoS attack and altered archived pages, making it unreliable.
Information security
fromSecurityWeek
2 days ago

Ivanti Exploitation Surges as Zero-Day Attacks Traced Back to July 2025

Exploitation of two patched Ivanti EPMM critical vulnerabilities (CVE-2026-1281, CVE-2026-1340) has surged, enabling remote unauthenticated code execution and full MDM compromise.
#windows-admin-center
fromThe Hacker News
1 day ago
Information security

Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center

A high-severity privilege escalation vulnerability (CVE-2026-26119) in Windows Admin Center allows attackers to gain the rights of the running user and risks domain compromise.
fromTechRepublic
2 days ago
Information security

Microsoft: Critical Windows Admin Center Flaw Allows Privilege Escalation

A Windows Admin Center authentication flaw (CVE-2026-26119) lets authorized users escalate privileges across networks, potentially granting widespread administrative control.
fromThe Hacker News
2 days ago

CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware

The campaign exploits recent geopolitical developments to lure victims into opening malicious .LNK files disguised as protest-related images or videos, researchers Subhajeet Singha, Eliad Kimhy, and Darrel Virtusio said in a report published this week. These files are bundled with authentic media and a Farsi-language report providing updates from 'the rebellious cities of Iran.' This pro- protest framing appears to be intended to increase credibility and to attract Farsi-speaking Iranians seeking protest-related information.
Information security
Information security
fromZero Day Initiative
1 day ago

Zero Day Initiative - CVE-2026-20841: Arbitrary Code Execution in the Windows Notepad

Remote code execution in Windows Notepad via improper validation of Markdown links can allow arbitrary command execution when a user opens a malicious file.
Information security
fromThe Hacker News
2 days ago

From Exposure to Exploitation: How AI Collapses Your Response Window

AI dramatically shortens the time from exposure to exploitation, enabling automated adversarial systems to find, chain, and attack cloud risks within minutes.
#moldova
fromTheregister
2 days ago

NHS strategy: Write password on whiteboard, hope for best

We've excised the text, but suffice it to say that the whiteboard contains usernames and passwords for system access. It's a change from a Post-it note stuck to the screen, but it's no less likely to make a security professional shriek in horror. After all, not only is the account exposed, but anyone can use it, which renders an access log somewhat redundant.
Information security
#openclaw
Information security
fromTechCrunch
2 days ago

Exclusive: Bug in student admissions website exposed children's personal information

Ravenna Hub exposed students' and parents' personal data via an IDOR vulnerability; VentureEd fixed the bug but declined to commit to notifying users.
fromZDNET
1 day ago

Half of all cyberattacks start in your browser: 10 essential tips for staying safe

Web browsers are among the top targets for today's cybercriminals, playing a role in nearly half of all security incidents, new research reveals. According to Palo Alto Networks' 2026 Global Incident Response report, an analysis of 750 major cyber incidents recorded last year across 50 countries found that, in total, 48% of cybercrime events involved browser activity. Individuals trying to connect to the web, including business employees, are exposed to cyberthreats on a daily basis.
Information security
Information security
fromNextgov.com
1 day ago

Chinese telecom hackers likely holding stolen data 'in perpetuity' for later attempts, FBI official says

Chinese state-backed Salt Typhoon likely retains stolen telecom data indefinitely for surveillance, future exploitation, and aggregation with other exfiltrated information.
Information security
fromCointelegraph
2 days ago

Why Address Poisoning Works Without Stealing Private Keys

Address poisoning steals funds by manipulating transaction history and exploiting users copying lookalike addresses, not by stealing private keys.
Information security
fromSecurityWeek
2 days ago

Venice Security Emerges From Stealth With $33M Funding for Privileged Access Management

Venice Security raised $33 million to launch an adaptive privileged access management platform providing just-in-time access and immediate revocation across hybrid enterprise environments.
fromSecuritymagazine
2 days ago

Why Traditional Upskilling Strategies Fall Short in Cybersecurity

Hoang: My background sits at the intersection of enterprise IT, data protection, and cybersecurity. I've spent much of my career working with CIOs and CISOs on resilience - how organizations protect, recover, and govern their most critical data in the face of cyber threats, outages, and operational risk. Today, as CIO at Commvault, I see security not as a standalone function, but as a core business capability.
Information security
Information security
fromThe Hacker News
2 days ago

Fake IPTV Apps Spread Massiv Android Malware Targeting Mobile Banking Users

Massiv is an Android trojan that enables device takeover and credential theft via overlays, screen streaming, keylogging, SMS interception, and remote control for financial fraud.
Information security
fromTechCrunch
1 day ago

Google says its AI systems helped deter Play Store malware in 2025 | TechCrunch

In 2025 fewer malicious apps targeted Google Play as stronger AI-driven defenses, developer verification, and over 10,000 safety checks reduced policy violations and banned accounts.
Information security
fromThe Hacker News
1 day ago

INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown

Operation Red Card 2.0: 651 arrests, $4.3 million recovered, cybercrime infrastructure disrupted across 16 African countries.
Information security
fromInfoWorld
2 days ago

What happens when you add AI to SAST

AI agents with multi-modal analysis in SAST dramatically reduce false positives and false negatives inherent in traditional and rules-based SAST tools.
fromTechzine Global
2 days ago

Abstract innovates in SIEM with 'composable' architecture

We had already heard of 'next-gen SIEM'. This is a system that replaces traditional rule-based logging with automatic recognition of complex threats. It was designed to reduce noise on the line for SecOps personnel by reducing the number of false positives. However, according to Abstract CEO and co-founder Colby DeRodeff, this was only the beginning. He believes that a real 'reset' is needed, in the form of an 'AI-Gen Composable SIEM'.
Information security
#cisa-kev
fromThe Hacker News
3 days ago
Information security

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

CISA added four actively exploited high-severity vulnerabilities to its KEV catalog, including Chrome use-after-free, TeamT5 arbitrary upload, Zimbra SSRF, and Windows ActiveX RCE.
fromComputerWeekly.com
2 days ago
Information security

Flaws in Google, Microsoft products added to Cisa catalogue | Computer Weekly

Chromium zero-day and a 2008 Windows Video ActiveX RCE were added to CISA's KEV list, prompting remediation by 10 March 2026.
Information security
fromSecurityWeek
3 days ago

CISA: Hackers Exploiting Vulnerability in Product of Taiwan Security Firm TeamT5

A high-severity arbitrary file-upload vulnerability (CVE-2024-7694) in TeamT5's ThreatSonar Anti-Ransomware has been exploited in the wild and added to CISA's KEV catalog.
Information security
fromInfoWorld
3 days ago

Flaws in four popular VS Code extensions left 128 million installs open to attack

Critical and high-severity vulnerabilities in four widely used VS Code extensions exposed developers to file theft, remote code execution, and local network reconnaissance.
#vs-code-extensions
#notepad
Information security
fromSecurityWeek
3 days ago

Vulnerabilities in Popular PDF Platforms Allowed Account Takeover, Data Exfiltration

Critical and high-severity vulnerabilities were found in Apryse and Foxit PDF platforms that could enable account takeover, data exfiltration, and remote code execution.
fromThe Hacker News
3 days ago

3 Ways to Start Your Intelligent Workflow Program

Security, IT, and engineering teams today are under relentless pressure to accelerate outcomes, cut operational drag, and unlock the full potential of AI and automation. But simply investing in tools isn't enough. 88% of AI proofs-of-concept never make it to production, even though 70% of workers cite freeing time for high-value work as the primary AI automation motivation. Real impact comes from intelligent workflows that combine automation, AI-driven decisioning, and human ingenuity into seamless processes that work across teams and systems.
Information security
Information security
fromSecurityWeek
3 days ago

Cogent Security Raises $42 Million for AI-Driven Vulnerability Management

Cogent Security raised $42M Series A to build autonomous AI agents that automate vulnerability investigation, prioritization, and remediation across environments.
fromSecurityWeek
3 days ago

New Keenadu Android Malware Found on Thousands of Devices

Researchers at Kaspersky have analyzed a recently discovered Android malware that enables its operators to remotely control compromised devices. Dubbed Keenadu, the backdoor has been found in the firmware of various Android device brands, particularly tablets. While in some cases the malware appears to have been injected into the firmware during development, it has also been delivered to devices via OTA firmware updates.
Information security
fromTechRepublic
2 days ago

Substack Breach May Have Leaked Nearly 700,000 User Details Online

On February 3rd, we identified evidence of a problem with our systems that allowed an unauthorized third party to access limited user data without permission, including email addresses, phone numbers, and other internal metadata,
Information security
Information security
fromThe Hacker News
3 days ago

Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability

Cybersecurity must be structural reinforcement ensuring operational continuity, visibility, and controlled adaptation amid continuous AI-driven threats, regulatory constraints, and geopolitical pressure.
fromTechCrunch
3 days ago

Microsoft says Office bug exposed customers' confidential emails to Copilot AI | TechCrunch

Microsoft has confirmed that a bug allowed its Copilot AI to summarize customers' confidential emails for weeks without permission. The bug, first reported by Bleeping Computer, allowed Copilot Chat to read and outline the contents of emails since January, even if customers had data loss prevention policies to prevent ingesting their sensitive information into Microsoft's large language model. Copilot Chat allows paying Microsoft 365 customers to use the AI-powered chat feature in its Office software products, including Word, Excel, and PowerPoint.
Information security
Information security
fromFortune
3 days ago

Exclusive: Bain and Greylock bet $42 million that AI agents can finally fix cybersecurity's messiest bottleneck | Fortune

AI-driven agents can reduce the vulnerability-to-remediation bottleneck by prioritizing and automating fixes to address critical software vulnerabilities at enterprise scale.
Information security
fromHarvard Business Review
3 days ago

Cybersecurity Requires Collective Resilience

Rapid recovery depended on leaders quickly assessing scope and risk, validating mitigations, and coordinating communications after the CrowdStrike patch disrupted Windows endpoints worldwide.
Information security
fromWIRED
2 days ago

A Vast Trove of Exposed Social Security Numbers May Put Millions at Risk of Identity Theft

A publicly exposed database held roughly 3 billion emails/passwords and 2.7 billion Social Security–number records, likely aggregated from multiple historic breaches.
[ Load more ]