Information security

[ follow ]
Information security
fromZDNET
39 minutes ago

5 ways to fortify your network against the new speed of AI attacks

Enterprise intrusions are accelerating as attackers automate handoffs, while humans remain the weakest link, requiring structural network defenses and preventative security changes.
Information security
fromThe Hacker News
2 hours ago

INTERPOL Operation Ramz Disrupts MENA Cybercrime Networks with 201 Arrests

A coordinated MENA cybercrime crackdown arrested 201 suspects, identified 382 more, seized 53 servers, and disrupted phishing and malware operations across 13 countries.
Information security
fromThe Hacker News
5 hours ago

Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More

Exploited vulnerabilities in trusted systems enable key leakage, cloud access, and production incidents, so patching quiet risks first reduces fast-moving attack impact.
#software-supply-chain-security
Information security
fromThe Hacker News
9 hours ago

Developer Workstations Are Now Part of the Software Supply Chain

Supply chain attacks increasingly target developer and CI/CD credentials, turning trusted software ecosystems into credential-harvesting operations.
fromDevOps.com
3 days ago
Information security

Widespread Mini Shai-Hulud Campaign Is a Matter of Trust - DevOps.com

Shai-Hulud attacks evolve into supply-chain playbooks that abuse trusted CI/CD publishing paths and OIDC tokens to deliver malicious packages with valid provenance.
Information security
fromThe Hacker News
9 hours ago

Developer Workstations Are Now Part of the Software Supply Chain

Supply chain attacks increasingly target developer and CI/CD credentials, turning trusted software ecosystems into credential-harvesting operations.
Information security
fromDevOps.com
3 days ago

Widespread Mini Shai-Hulud Campaign Is a Matter of Trust - DevOps.com

Shai-Hulud attacks evolve into supply-chain playbooks that abuse trusted CI/CD publishing paths and OIDC tokens to deliver malicious packages with valid provenance.
Information security
fromSecuritymagazine
21 hours ago

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

MFA is often not bypassed; attackers exploit post-authentication or identity lifecycle gaps, so defenses should focus on session monitoring and risk evaluation.
#phishing
Information security
fromThe Hacker News
7 hours ago

How to Reduce Phishing Exposure Before It Turns into Business Disruption

Early phishing detection turns uncertain exposure into evidence, speeds response, and prevents one click from escalating into account compromise, remote access, or disruption.
fromSecuritymagazine
3 days ago
Information security

AI Makes Phishing Scams Harder to Identify in the Workplace

Phishing is becoming harder to detect as AI improves message realism and workplace urgency drives rushed, after-hours responses.
Information security
fromThe Hacker News
7 hours ago

How to Reduce Phishing Exposure Before It Turns into Business Disruption

Early phishing detection turns uncertain exposure into evidence, speeds response, and prevents one click from escalating into account compromise, remote access, or disruption.
Information security
fromThe Hacker News
9 hours ago

Ivanti, Fortinet, SAP, VMware, n8n Patch RCE, SQL Injection, Privilege Escalation Flaws

Security fixes address critical vulnerabilities across Ivanti, Fortinet, and SAP that could enable authentication bypass, unauthorized code execution, and sensitive data exposure.
Information security
fromTechRepublic
5 days ago

Microsoft's Patch Tuesday Update Targets 120 Security Flaws

May Patch Tuesday fixed 120 vulnerabilities, including 31 remote code execution and 61 privilege escalation flaws, with no zero-days reported, requiring prompt IT updates.
#cybersecurity
Information security
fromtheregister
8 hours ago

Poland directs officials to ditch Signal in favor of 'secure' state-developed alternative

Poland urges government officials to stop using Signal due to security risks from APT-linked social engineering and phishing that can compromise accounts and sensitive communications.
Information security
fromTechCrunch
7 hours ago

Open source tool maker Grafana Labs says hackers stole its code, refuses to pay ransom | TechCrunch

Hackers accessed Grafana’s GitLab using a stolen token, obtained source code repositories, and demanded payment, but Grafana refused and invalidated the token.
Information security
fromtheregister
8 hours ago

Poland directs officials to ditch Signal in favor of 'secure' state-developed alternative

Poland urges government officials to stop using Signal due to security risks from APT-linked social engineering and phishing that can compromise accounts and sensitive communications.
Information security
fromTechCrunch
7 hours ago

Open source tool maker Grafana Labs says hackers stole its code, refuses to pay ransom | TechCrunch

Hackers accessed Grafana’s GitLab using a stolen token, obtained source code repositories, and demanded payment, but Grafana refused and invalidated the token.
#openclaw
Information security
fromSecurityWeek
8 hours ago

'Claw Chain' OpenClaw Flaws Allow Sandbox Escape, Backdoor Delivery

Chained OpenClaw vulnerabilities let attackers with sandbox code execution control the agent, bypass restrictions, steal secrets, escalate privileges, and persist on the host.
Information security
fromThe Hacker News
3 days ago

Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence

Four OpenClaw vulnerabilities can be chained to bypass sandbox controls, steal sensitive data, escalate privileges, and maintain persistence via backdoors.
Information security
fromSecurityWeek
8 hours ago

'Claw Chain' OpenClaw Flaws Allow Sandbox Escape, Backdoor Delivery

Chained OpenClaw vulnerabilities let attackers with sandbox code execution control the agent, bypass restrictions, steal secrets, escalate privileges, and persist on the host.
Information security
fromThe Hacker News
3 days ago

Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence

Four OpenClaw vulnerabilities can be chained to bypass sandbox controls, steal sensitive data, escalate privileges, and maintain persistence via backdoors.
#windows-privilege-escalation
Information security
fromSecurityWeek
10 hours ago

Researcher Drops MiniPlasma Windows Exploit for Unpatched 2020 CVE

MiniPlasma exploits CVE-2020-17103 in the Windows Cloud Filter driver to gain a System shell, indicating the vulnerability may remain unpatched on Windows 11.
Information security
fromThe Hacker News
12 hours ago

MiniPlasma Windows 0-Day Enables SYSTEM Privilege Escalation on Fully Patched Systems

MiniPlasma enables SYSTEM-level privilege escalation on fully patched Windows systems by exploiting cldflt.sys in HsmOsBlockPlaceholderAccess.
Information security
fromSecurityWeek
10 hours ago

Researcher Drops MiniPlasma Windows Exploit for Unpatched 2020 CVE

MiniPlasma exploits CVE-2020-17103 in the Windows Cloud Filter driver to gain a System shell, indicating the vulnerability may remain unpatched on Windows 11.
Information security
fromThe Hacker News
12 hours ago

MiniPlasma Windows 0-Day Enables SYSTEM Privilege Escalation on Fully Patched Systems

MiniPlasma enables SYSTEM-level privilege escalation on fully patched Windows systems by exploiting cldflt.sys in HsmOsBlockPlaceholderAccess.
Information security
fromArs Technica
7 hours ago

Bug bounty businesses bombarded with AI slop

AI-generated bug reports are flooding bug bounty programs with false, low-quality submissions, forcing some companies to suspend or change these schemes.
#data-breach
fromSecurityWeek
9 hours ago
Information security

7-Eleven Data Breach Confirmed After ShinyHunters Ransom Demand

7-Eleven confirmed a data breach tied to ShinyHunters, involving compromised franchisee application data and security incident notices sent to affected parties.
Information security
fromSecurityWeek
3 days ago

In Other News: Big Tech vs Canada Encryption Bill, Cisco's Free AI Security Spec, Audi App Flaws

GeForce NOW user data was exposed via a partner breach, while the FCC extended update timelines for covered foreign routers and OpenAI sought EU access to a cyber-focused GPT variant.
Information security
fromSecurityWeek
12 hours ago

Grafana Confirms Breach After Hackers Claim They Stole Data

A compromised GitHub token enabled attackers to download Grafana’s codebase, demand ransom, and threaten leaks, but no customer data was taken and systems were unaffected.
Information security
fromSecurityWeek
9 hours ago

7-Eleven Data Breach Confirmed After ShinyHunters Ransom Demand

7-Eleven confirmed a data breach tied to ShinyHunters, involving compromised franchisee application data and security incident notices sent to affected parties.
Information security
fromSecurityWeek
3 days ago

In Other News: Big Tech vs Canada Encryption Bill, Cisco's Free AI Security Spec, Audi App Flaws

GeForce NOW user data was exposed via a partner breach, while the FCC extended update timelines for covered foreign routers and OpenAI sought EU access to a cyber-focused GPT variant.
Information security
fromTNW | Data-Security
4 hours ago

Grafana Labs refuses ransom after hackers steal already-open-source code

Hackers stole Grafana’s open-source codebase and demanded ransom to prevent release; Grafana refused, citing FBI guidance and security controls.
Information security
fromtheregister
4 hours ago

Linux kernel flaw opens root-only files to unprivileged users

A local kernel flaw lets unprivileged users read root-only files, but a fix landed and ModuleJail aims to reduce similar bug impact.
#nginx
Information security
fromtheregister
7 hours ago

NGINX Rift attackers waste no time targeting exposed servers

An unauthenticated heap buffer overflow in NGINX can crash worker processes and, under rare conditions, enable code execution, with active exploitation observed days after disclosure.
Information security
fromThe Hacker News
1 day ago

NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE

CVE-2026-42945 in NGINX heap overflow is actively exploited, enabling unauthenticated worker crashes and potential RCE when ASLR is disabled and specific configuration is known.
Information security
fromThe Hacker News
4 days ago

18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE

NGINX Rift is a critical ngx_http_rewrite_module heap buffer overflow enabling remote code execution or denial-of-service via crafted requests.
Information security
fromtheregister
7 hours ago

NGINX Rift attackers waste no time targeting exposed servers

An unauthenticated heap buffer overflow in NGINX can crash worker processes and, under rare conditions, enable code execution, with active exploitation observed days after disclosure.
Information security
fromThe Hacker News
1 day ago

NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE

CVE-2026-42945 in NGINX heap overflow is actively exploited, enabling unauthenticated worker crashes and potential RCE when ASLR is disabled and specific configuration is known.
Information security
fromThe Hacker News
4 days ago

18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE

NGINX Rift is a critical ngx_http_rewrite_module heap buffer overflow enabling remote code execution or denial-of-service via crafted requests.
#cybercrime
Information security
fromtheregister
15 hours ago

Grafana Labs admits all its codebase are belong to someone who popped its GitHub account

An attacker stole Grafana Labs’ GitHub codebase and demanded ransom to prevent release, but Grafana decided not to pay.
Information security
fromtheregister
15 hours ago

Grafana Labs admits all its codebase are belong to someone who popped its GitHub account

An attacker stole Grafana Labs’ GitHub codebase and demanded ransom to prevent release, but Grafana decided not to pay.
from24/7 Wall St.
5 hours ago

Okta Price Target Bumped to $103 at KeyBanc as Security Spending Catches Fire

Analyst Eric Heath raised the firm’s price target on Okta to $103 from $95 and kept an Overweight rating on the shares, citing a sharper outlook for enterprise security spending in the back half of the year.
Information security
fromtheregister
6 hours ago

TanStack weighs invitation-only pull requests after supply chain attack

The attack used code from the Shai-Hulud worm, published by malware outfit TeamPCP, which can extract secrets from memory used by GitHub Actions. It began with a PR that triggered an automatic workflow via TanStack's use of the pull_request_target feature, causing the malicious code to be built and run by a GitHub Action, poisoning a cache used across the entire repository.
Information security
Information security
fromThe Hacker News
10 hours ago

Four Malicious npm Packages Deliver Infostealers and Phantom Bot DDoS Malware

Four npm packages were found to contain information-stealing malware, including a clone of the Shai-Hulud worm and a Golang DDoS botnet payload.
#supply-chain-attacks
Information security
fromnews.bitcoin.com
11 hours ago

Crypto Bridge Exploits Hit $328.6M in May as Peckshield Tracks 8 Major Incidents

Bridge verification weaknesses enabled multiple cross-chain exploits, draining $328.6M by mid-May 2026 and pushing 2026 losses past $750M.
fromSecurityWeek
16 hours ago

Hackers Earn $1.3 Million at Pwn2Own Berlin 2026

According to TrendAI's Zero Day Initiative (ZDI), white hat hackers have been awarded $1,298,250 for 47 unique vulnerabilities. Nearly $750,000 of the total amount was won by the first two teams: Devcore and StarLabs SG. The two teams also received the highest payouts for a single exploit chain. Devcore earned $200,000 for a remote code execution exploit with System privileges on Microsoft Exchange, and $175,000 for a Microsoft Edge sandbox escape. It also received $100,000 for exploiting Microsoft SharePoint.
Information security
Information security
fromThe Hacker News
1 day ago

Grafana GitHub Token Breach Led to Codebase Download and Extortion Attempt

An unauthorized party accessed Grafana’s GitHub environment via a stolen token, downloaded code, attempted extortion, and Grafana invalidated credentials and added security measures.
Information security
fromTNW | Data-Security
1 day ago

A student with a laptop and a radio stopped four high-speed trains. The crypto keys hadn't been changed in 19 years.

A university student used cloned TETRA emergency signaling to trigger manual braking across Taiwan’s high-speed rail network, disrupting service for 48 minutes.
#ransomware
Information security
fromwww.theguardian.com
2 days ago

Canvas hack: is it ever a good idea to pay a ransom, and what happens to the data?

Instructure reached an agreement with ransomware attackers after student data theft, login page defacement, and assignment delays, with experts suspecting ransom payment.
Information security
fromSecuritymagazine
4 days ago

Foxconn Confirms Cyberattack, Security Experts Discuss

A Foxconn cyberattack disrupted North American facilities and involved alleged theft of 8TB of hardware and network data, creating long-term supply-chain and product-security risks.
Information security
fromwww.theguardian.com
2 days ago

Canvas hack: is it ever a good idea to pay a ransom, and what happens to the data?

Instructure reached an agreement with ransomware attackers after student data theft, login page defacement, and assignment delays, with experts suspecting ransom payment.
Information security
fromSecuritymagazine
4 days ago

Foxconn Confirms Cyberattack, Security Experts Discuss

A Foxconn cyberattack disrupted North American facilities and involved alleged theft of 8TB of hardware and network data, creating long-term supply-chain and product-security risks.
Information security
fromThe Hacker News
2 days ago

Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming

Unauthenticated attackers can inject malicious JavaScript into WooCommerce checkout pages via Funnel Builder versions before 3.15.0.3 to steal payment data.
Information security
fromtheregister
2 days ago

Europe built sovereign clouds to escape US control. Then forgot about the processors

European sovereign cloud programs reduce legal exposure, but underlying Intel/AMD management engines operate below host control and can persist outside security visibility.
fromWIRED
2 days ago
Information security

Cybercriminal Twins Caught After They Forgot to Turn Off Microsoft Teams Recording

Stolen iPhones enable phishing targeting contacts, while cyberattacks, drone experiments, maritime blockades, and insider sabotage expand security risks.
Information security
fromThe Hacker News
3 days ago

What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface

Legitimate administrative tools are widely abused in high-severity incidents, so reducing attack surface by removing risky capabilities is faster than relying on detection alone.
Information security
fromTechRepublic
3 days ago

Two Unpatched Windows Exploits Target BitLocker, SYSTEM Access

Two unpatched Windows vulnerabilities, YellowKey and GreenPlasma, can bypass BitLocker protections or escalate privileges after May Patch Tuesday.
Information security
fromTechRepublic
3 days ago

OpenAI Warns Mac Users to Update Apps After Supply-Chain Attack

Mac users must update ChatGPT, Codex, and Atlas apps by June 12 after exposed code-signing certificates from an npm supply-chain attack.
#supply-chain-attack
Information security
fromThe Hacker News
3 days ago

TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates

Two employee devices were impacted by a supply-chain attack, but no user data, production systems, or intellectual property were compromised or modified.
Information security
fromSecurityWeek
3 days ago

OpenAI Hit by TanStack Supply Chain Attack

Credential material was exfiltrated from internal repositories after a TanStack supply-chain attack, leading to credential rotation, session revocation, and app re-signing.
Information security
fromThe Hacker News
3 days ago

TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates

Two employee devices were impacted by a supply-chain attack, but no user data, production systems, or intellectual property were compromised or modified.
Information security
fromSecurityWeek
3 days ago

OpenAI Hit by TanStack Supply Chain Attack

Credential material was exfiltrated from internal repositories after a TanStack supply-chain attack, leading to credential rotation, session revocation, and app re-signing.
Information security
fromThe Hacker News
3 days ago

CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits

CVE-2026-20182 in Cisco Catalyst SD-WAN Controller enables unauthenticated remote authentication bypass and administrative access, added to CISA KEV with FCEB remediation by May 17, 2026.
#ai-agents
Information security
fromtheregister
3 days ago

AI agents show they can create exploits, not just find vulns

Frontier AI models can convert software vulnerabilities into working exploits, outperforming peers on a benchmark measuring arbitrary code execution capability.
Information security
fromtheregister
3 days ago

AI agents show they can create exploits, not just find vulns

Frontier AI models can convert software vulnerabilities into working exploits, outperforming peers on a benchmark measuring arbitrary code execution capability.
#microsoft-exchange-server
Information security
fromThe Hacker News
3 days ago

On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email

CVE-2026-42897 enables spoofing via cross-site scripting in on-premises Exchange Server, with active exploitation, mitigated by emergency service or EOMT.
Information security
fromSecurityWeek
3 days ago

Microsoft Warns of Exchange Server Zero-Day Exploited in the Wild

CVE-2026-42897 is a spoofing and XSS Exchange zero-day exploited via crafted emails, requiring immediate mitigations until a permanent patch is available.
Information security
fromThe Hacker News
3 days ago

On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email

CVE-2026-42897 enables spoofing via cross-site scripting in on-premises Exchange Server, with active exploitation, mitigated by emergency service or EOMT.
Information security
fromSecurityWeek
3 days ago

Microsoft Warns of Exchange Server Zero-Day Exploited in the Wild

CVE-2026-42897 is a spoofing and XSS Exchange zero-day exploited via crafted emails, requiring immediate mitigations until a permanent patch is available.
Information security
fromSecurityWeek
3 days ago

Cisco Patches Another SD-WAN Zero-Day, the Sixth Exploited in 2026

Cisco released patches for CVE-2026-20182, an exploited SD-WAN authentication bypass that can grant remote attackers admin privileges via crafted packets.
Information security
fromtheregister
3 days ago

OpenAI caught in TanStack npm supply chain chaos after employee devices compromised

Attackers exfiltrated limited internal credentials from two employee devices, prompting OpenAI to rotate signing certificates and require software updates.
Information security
fromtheregister
3 days ago

Patch time for Cisco SD-WAN admins as vendor drops yet another make-me-admin zero-day

CVE-2026-20182 is a max-severity, actively exploited Cisco Catalyst SD-WAN Controller/Manager flaw enabling unauthenticated admin access and NETCONF manipulation.
Information security
fromtheregister
3 days ago

Nobody believes the 'criminals and scumbags' who hacked Canvas really deleted stolen student data

Instructure claims stolen data was destroyed and no customers will be extorted, but ransomware researchers doubt deletion and warn further threats are likely.
Information security
fromSecuritymagazine
3 days ago

Did Iran Hack Tank Readers at US Gas Stations? Security Leaders Discuss

Iranian actors are suspected of hacking gas station tank gauge systems, altering displayed readings without changing fuel levels, prompting calls to strengthen critical infrastructure security.
Information security
fromSecuritymagazine
3 days ago

Why Most Workplace Violence Prevention Starts Too Late

Workplace violence prevention fails when leadership-driven structural breakdowns delay recognition and reporting, making response systems activate after harm begins.
#linux-kernel
Information security
fromZDNET
3 days ago

The 4th Linux kernel flaw this month can lead to stolen SSH host keys

Linux kernel flaw ssh-keysign-pwn enables ordinary users to read sensitive files like SSH host private keys and the shadow password file.
Information security
fromZDNET
4 days ago

The third major Linux kernel flaw in two weeks has been found - thanks to AI

Fragnesia is a Linux kernel page-cache corruption flaw that lets unprivileged users gain reliable root access across major distributions.
Information security
fromtheregister
4 days ago

Dirty Frag gets a sequel as Fragnesia hands Linux attackers root-level access

Fragnesia (CVE-2026-46300) enables unprivileged users to gain root by corrupting Linux page-cache memory via the XFRM ESP-in-TCP/IPsec path, with public exploit code available.
Information security
fromZDNET
3 days ago

The 4th Linux kernel flaw this month can lead to stolen SSH host keys

Linux kernel flaw ssh-keysign-pwn enables ordinary users to read sensitive files like SSH host private keys and the shadow password file.
Information security
fromZDNET
4 days ago

The third major Linux kernel flaw in two weeks has been found - thanks to AI

Fragnesia is a Linux kernel page-cache corruption flaw that lets unprivileged users gain reliable root access across major distributions.
Information security
fromtheregister
4 days ago

Dirty Frag gets a sequel as Fragnesia hands Linux attackers root-level access

Fragnesia (CVE-2026-46300) enables unprivileged users to gain root by corrupting Linux page-cache memory via the XFRM ESP-in-TCP/IPsec path, with public exploit code available.
Information security
fromtheregister
3 days ago

Exploited Exchange Server flaw turns OWA inboxes into script launchpads

CVE-2026-42897 in on-prem Exchange OWA can enable arbitrary JavaScript execution via crafted emails, with emergency mitigation potentially breaking inline images and calendar printing.
Information security
fromThe Hacker News
3 days ago

Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access

Turla’s Kazuar backdoor has been upgraded into a modular P2P botnet for stealthy, persistent access and flexible tasking on compromised hosts.
fromnews.bitcoin.com
3 days ago

Ripple's Schwartz Warns XRP Users to Stay Safe From Giveaway Scams

SCAM ALERT: There has been a huge escalation lately in airdrop and giveaway scams targetting XRPL users lately. Any such posts you see are likely scams. Ripple-linked fraud warnings in recent months have also covered phishing operations targeting XRP holders through fake verification requests and malicious wallet prompts. Some schemes encouraged users to connect wallets or submit sensitive recovery information through unofficial channels masquerading as trusted XRP resources.
Information security
Information security
fromSecurityWeek
3 days ago

Chrome 148 Update Patches Critical Vulnerabilities

Chrome 148 fixes 79 vulnerabilities, including 14 critical issues, with multiple memory-safety bugs and paid bug bounties, while no exploitation in the wild is reported.
Information security
fromTNW | Blockchain
3 days ago

AI-powered crypto hacks drain $600M from DeFi as North Korea exploits surge

Two North Korea-linked hacks in April drained nearly $600 million from Drift Protocol and Kelp DAO, using AI-assisted targeting and exploit design.
Information security
fromComputerWeekly.com
3 days ago

Jaguar Land Rover profit slumps after cyber attack | Computer Weekly

A 2025 cyber attack caused major revenue and profit declines for Jaguar Land Rover despite production recovery, leading to large systemic economic costs and ongoing FY27 growth focus.
Information security
fromSecurityWeek
4 days ago

Hackers Targeted PraisonAI Vulnerability Hours After Disclosure

PraisonAI versions with authentication disabled by default allowed unauthenticated access to agent metadata and workflow execution endpoints.
Information security
fromTechRepublic
4 days ago

The First AI-Crafted Zero-Day Was Easy to Spot. The Next One May Not Be

AI-assisted zero-day exploitation has been confirmed, showing logic flaws can be found at scale and increasing supply-chain and containment risks.
Information security
fromThe Hacker News
4 days ago

PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure

A missing authentication flaw in PraisonAI’s legacy Flask API server enables unauthenticated access to protected endpoints, allowing workflow triggering and quota consumption.
Information security
fromTNW | Openai
4 days ago

OpenAI says no user data was touched in the TanStack npm worm

Malicious TanStack npm packages were published via the legitimate release pipeline after a hijacked GitHub Actions runner exfiltrated an OIDC token mid-build.
Information security
fromTechCrunch
4 days ago

A spyware investigator exposed Russian government hackers trying to hijack Signal accounts | TechCrunch

Hackers impersonated Signal, warned of fake security threats, and used verification-code prompts to trick users into granting account access via attacker-controlled devices.
#ai-cybersecurity
Information security
fromSocial Media Explorer
5 days ago

AI Model "Claude Mythos" Raises New Questions About Cybersecurity and Machine Intelligence - Social Media Explorer

AI systems are rapidly advancing in cybersecurity tasks, creating dual-use risks by improving vulnerability discovery while potentially lowering barriers to cyberattacks.
Information security
fromAxios
4 days ago

The next phase of AI cybersecurity still needs humans

Powerful AI security models rapidly discover many bugs and can chain low-severity issues into attack paths, increasing vulnerability volume and defender workload.
Information security
fromEntrepreneur
4 days ago

Companies Only Have 3-5 Months to Outpace AI-Driven Cyberattacks Before They Become 'the New Norm,' Warns Top Tech Executive

Organizations have a three-to-five-month window to strengthen defenses before AI-driven exploits become routine.
Information security
fromNextgov.com
4 days ago

NIST aims for summer release of AI cyber guidelines

NIST will release an AI-specific cybersecurity framework and control overlay guidance to mitigate AI-enabled threats while enabling safe, rapid AI adoption.
Information security
fromSocial Media Explorer
5 days ago

AI Model "Claude Mythos" Raises New Questions About Cybersecurity and Machine Intelligence - Social Media Explorer

AI systems are rapidly advancing in cybersecurity tasks, creating dual-use risks by improving vulnerability discovery while potentially lowering barriers to cyberattacks.
Information security
fromAxios
4 days ago

The next phase of AI cybersecurity still needs humans

Powerful AI security models rapidly discover many bugs and can chain low-severity issues into attack paths, increasing vulnerability volume and defender workload.
Information security
fromEntrepreneur
4 days ago

Companies Only Have 3-5 Months to Outpace AI-Driven Cyberattacks Before They Become 'the New Norm,' Warns Top Tech Executive

Organizations have a three-to-five-month window to strengthen defenses before AI-driven exploits become routine.
Information security
fromNextgov.com
4 days ago

NIST aims for summer release of AI cyber guidelines

NIST will release an AI-specific cybersecurity framework and control overlay guidance to mitigate AI-enabled threats while enabling safe, rapid AI adoption.
Information security
fromThe Hacker News
4 days ago

Windows Zero-Days Expose BitLocker Bypasses And CTFMON Privilege Escalation

YellowKey enables a BitLocker bypass in WinRE by using crafted FsTx files to trigger a shell, even when TPM+PIN is enabled.
Information security
fromtheregister
4 days ago

To gain root access at this company, all an intruder had to do was ask nicely

IT staff reset an account after a caller failed challenge questions, enabling unauthorized access through social engineering and weak password reset procedures.
Information security
fromSecurityWeek
4 days ago

Enhancing Data Center Security Without Sacrificing Performance

Move security workloads from host CPUs to DPUs to eliminate hypervisor blind spots while preserving performance and enabling tamper-proof, line-speed enforcement.
Information security
fromThe Hacker News
4 days ago

Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access

Cisco released updates for CVE-2026-20182, a maximum-severity authentication bypass in Catalyst SD-WAN Controller that enables unauthenticated remote admin access and NETCONF configuration changes.
Information security
fromThe Hacker News
4 days ago

ThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories

Compromised sites and fake helpdesks enable modular persistence, encrypted proxy access, credential theft, privilege escalation, lateral movement, and data exfiltration.
Information security
fromSecuritymagazine
4 days ago

The Bench You'll Need in Three Years Depends on Decisions You Make Now

AI-native security tools automate entry-level tasks, shrinking the entry talent pipeline and creating a widening skills mismatch that will reduce hiring, provider quality, and bench strength.
Information security
fromThe Hacker News
4 days ago

How AI Hallucinations Are Creating Real Security Risks

AI models can produce confident, incorrect outputs that exploit misplaced trust, creating security vulnerabilities in critical infrastructure and cybersecurity decisions.
Information security
fromSecurityWeek
4 days ago

Chinese APTs Expand Targets, Update Backdoors in Recent Campaigns

Salt Typhoon expanded targeting and updated tools, exploiting Microsoft Exchange vulnerabilities to deploy web shells and Deed RAT, then moving laterally via RDP and Impacket.
Information security
fromEngadget
4 days ago

The ChatGPT desktop app for Mac just got hit with a security breach - Engadget

A compromised open-source library led to limited credential exfiltration from code repositories, prompting a ChatGPT Mac update rollout and no evidence of user data access.
fromSecurityWeek
4 days ago

F5 Patches Over 50 Vulnerabilities

The most severe of the resolved issues is CVE-2026-42945 (CVSS v4.0 score of 9.2), a denial-of-service (DoS) condition in NGINX's ngx_http_rewrite_module module. The bug allows an unauthenticated attacker to send crafted HTTP requests that, combined with certain conditions beyond the attacker's control, could trigger a heap buffer overflow and a restart. If Address Space Layout Randomization (ASLR) is disabled, the flaw can be exploited for code execution.
Information security
Information security
fromWIRED
4 days ago

Your iPhone Gets Stolen. Then the Hacking Begins

Cybercrime services sell iPhone unlocking tools and phishing technology, enabling resale of unlocked, wiped devices and driving rapid growth in related phishing domains.
fromArs Technica
4 days ago

Zero-day exploit completely defeats default Windows 11 BitLocker protections

A zero-day exploit circulating online allows people with physical access to a Windows 11 system to bypass default BitLocker protections and gain complete access to an encrypted drive within seconds. The exploit, named YellowKey, was published earlier this week by a researcher who goes by the alias Nightmare-Eclipse. It reliably bypasses default Windows 11 deployments of BitLocker, the full-volume encryption protection Microsoft provides to make disk contents off-limits to anyone without the decryption key, which is stored in a secured piece of hardware known as a trusted platform module (TPM).
Information security
[ Load more ]