Information security

[ follow ]
#windows-admin-center
fromThe Hacker News
4 minutes ago
Information security

Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center

A high-severity privilege escalation vulnerability (CVE-2026-26119) in Windows Admin Center allows attackers to gain the rights of the running user and risks domain compromise.
fromTechRepublic
18 hours ago
Information security

Microsoft: Critical Windows Admin Center Flaw Allows Privilege Escalation

A Windows Admin Center authentication flaw (CVE-2026-26119) lets authorized users escalate privileges across networks, potentially granting widespread administrative control.
#android-malware
#cybercrime
Information security
fromSecurityWeek
7 hours ago

Ivanti Exploitation Surges as Zero-Day Attacks Traced Back to July 2025

Exploitation of two patched Ivanti EPMM critical vulnerabilities (CVE-2026-1281, CVE-2026-1340) has surged, enabling remote unauthenticated code execution and full MDM compromise.
#data-breach
fromTechCrunch
1 day ago
Information security

Data breach at fintech giant Figure affects close to a million customers | TechCrunch

fromTechCrunch
1 day ago
Information security

Data breach at fintech giant Figure affects close to a million customers | TechCrunch

fromThe Hacker News
10 hours ago

CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware

The campaign exploits recent geopolitical developments to lure victims into opening malicious .LNK files disguised as protest-related images or videos, researchers Subhajeet Singha, Eliad Kimhy, and Darrel Virtusio said in a report published this week. These files are bundled with authentic media and a Farsi-language report providing updates from 'the rebellious cities of Iran.' This pro- protest framing appears to be intended to increase credibility and to attract Farsi-speaking Iranians seeking protest-related information.
Information security
Information security
fromThe Hacker News
6 hours ago

From Exposure to Exploitation: How AI Collapses Your Response Window

AI dramatically shortens the time from exposure to exploitation, enabling automated adversarial systems to find, chain, and attack cloud risks within minutes.
#moldova
fromTheregister
7 hours ago

NHS strategy: Write password on whiteboard, hope for best

We've excised the text, but suffice it to say that the whiteboard contains usernames and passwords for system access. It's a change from a Post-it note stuck to the screen, but it's no less likely to make a security professional shriek in horror. After all, not only is the account exposed, but anyone can use it, which renders an access log somewhat redundant.
Information security
#openclaw
Information security
fromTechCrunch
4 hours ago

Exclusive: Bug in student admissions website exposed children's personal information

Ravenna Hub exposed students' and parents' personal data via an IDOR vulnerability; VentureEd fixed the bug but declined to commit to notifying users.
Information security
fromNextgov.com
2 hours ago

Chinese telecom hackers likely holding stolen data 'in perpetuity' for later attempts, FBI official says

Chinese state-backed Salt Typhoon likely retains stolen telecom data indefinitely for surveillance, future exploitation, and aggregation with other exfiltrated information.
Information security
fromCointelegraph
12 hours ago

Why Address Poisoning Works Without Stealing Private Keys

Address poisoning steals funds by manipulating transaction history and exploiting users copying lookalike addresses, not by stealing private keys.
Information security
fromSecurityWeek
6 hours ago

Venice Security Emerges From Stealth With $33M Funding for Privileged Access Management

Venice Security raised $33 million to launch an adaptive privileged access management platform providing just-in-time access and immediate revocation across hybrid enterprise environments.
fromSecuritymagazine
19 hours ago

Why Traditional Upskilling Strategies Fall Short in Cybersecurity

Hoang: My background sits at the intersection of enterprise IT, data protection, and cybersecurity. I've spent much of my career working with CIOs and CISOs on resilience - how organizations protect, recover, and govern their most critical data in the face of cyber threats, outages, and operational risk. Today, as CIO at Commvault, I see security not as a standalone function, but as a core business capability.
Information security
Information security
fromThe Hacker News
8 hours ago

Fake IPTV Apps Spread Massiv Android Malware Targeting Mobile Banking Users

Massiv is an Android trojan that enables device takeover and credential theft via overlays, screen streaming, keylogging, SMS interception, and remote control for financial fraud.
#generative-ai
Information security
fromInfoWorld
9 hours ago

What happens when you add AI to SAST

AI agents with multi-modal analysis in SAST dramatically reduce false positives and false negatives inherent in traditional and rules-based SAST tools.
fromTechzine Global
4 hours ago

Abstract innovates in SIEM with 'composable' architecture

We had already heard of 'next-gen SIEM'. This is a system that replaces traditional rule-based logging with automatic recognition of complex threats. It was designed to reduce noise on the line for SecOps personnel by reducing the number of false positives. However, according to Abstract CEO and co-founder Colby DeRodeff, this was only the beginning. He believes that a real 'reset' is needed, in the form of an 'AI-Gen Composable SIEM'.
Information security
#cisa-kev
fromThe Hacker News
1 day ago
Information security

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

CISA added four actively exploited high-severity vulnerabilities to its KEV catalog, including Chrome use-after-free, TeamT5 arbitrary upload, Zimbra SSRF, and Windows ActiveX RCE.
fromComputerWeekly.com
23 hours ago
Information security

Flaws in Google, Microsoft products added to Cisa catalogue | Computer Weekly

Chromium zero-day and a 2008 Windows Video ActiveX RCE were added to CISA's KEV list, prompting remediation by 10 March 2026.
#cve-2026-22769
Information security
fromSecurityWeek
1 day ago

CISA: Hackers Exploiting Vulnerability in Product of Taiwan Security Firm TeamT5

A high-severity arbitrary file-upload vulnerability (CVE-2024-7694) in TeamT5's ThreatSonar Anti-Ransomware has been exploited in the wild and added to CISA's KEV catalog.
Information security
fromInfoWorld
1 day ago

Flaws in four popular VS Code extensions left 128 million installs open to attack

Critical and high-severity vulnerabilities in four widely used VS Code extensions exposed developers to file theft, remote code execution, and local network reconnaissance.
#vs-code-extensions
#ransomware
#notepad
Information security
fromThe Hacker News
1 day ago

Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution

Unauthenticated stack-based buffer overflow (CVE-2026-2329) in Grandstream GXP1600 VoIP phones' /cgi-bin/api.values.get allows remote root code execution via malicious request parameter.
Information security
fromSecurityWeek
1 day ago

Vulnerabilities in Popular PDF Platforms Allowed Account Takeover, Data Exfiltration

Critical and high-severity vulnerabilities were found in Apryse and Foxit PDF platforms that could enable account takeover, data exfiltration, and remote code execution.
#password-managers
fromThe Hacker News
1 day ago

3 Ways to Start Your Intelligent Workflow Program

Security, IT, and engineering teams today are under relentless pressure to accelerate outcomes, cut operational drag, and unlock the full potential of AI and automation. But simply investing in tools isn't enough. 88% of AI proofs-of-concept never make it to production, even though 70% of workers cite freeing time for high-value work as the primary AI automation motivation. Real impact comes from intelligent workflows that combine automation, AI-driven decisioning, and human ingenuity into seamless processes that work across teams and systems.
Information security
Information security
fromSecurityWeek
1 day ago

Cogent Security Raises $42 Million for AI-Driven Vulnerability Management

Cogent Security raised $42M Series A to build autonomous AI agents that automate vulnerability investigation, prioritization, and remediation across environments.
fromSecurityWeek
1 day ago

New Keenadu Android Malware Found on Thousands of Devices

Researchers at Kaspersky have analyzed a recently discovered Android malware that enables its operators to remotely control compromised devices. Dubbed Keenadu, the backdoor has been found in the firmware of various Android device brands, particularly tablets. While in some cases the malware appears to have been injected into the firmware during development, it has also been delivered to devices via OTA firmware updates.
Information security
fromTechRepublic
1 day ago

Substack Breach May Have Leaked Nearly 700,000 User Details Online

On February 3rd, we identified evidence of a problem with our systems that allowed an unauthorized third party to access limited user data without permission, including email addresses, phone numbers, and other internal metadata,
Information security
#cybersecurity
fromTechCrunch
1 day ago

Microsoft says Office bug exposed customers' confidential emails to Copilot AI | TechCrunch

Microsoft has confirmed that a bug allowed its Copilot AI to summarize customers' confidential emails for weeks without permission. The bug, first reported by Bleeping Computer, allowed Copilot Chat to read and outline the contents of emails since January, even if customers had data loss prevention policies to prevent ingesting their sensitive information into Microsoft's large language model. Copilot Chat allows paying Microsoft 365 customers to use the AI-powered chat feature in its Office software products, including Word, Excel, and PowerPoint.
Information security
Information security
fromFortune
1 day ago

Exclusive: Bain and Greylock bet $42 million that AI agents can finally fix cybersecurity's messiest bottleneck | Fortune

AI-driven agents can reduce the vulnerability-to-remediation bottleneck by prioritizing and automating fixes to address critical software vulnerabilities at enterprise scale.
Information security
fromHarvard Business Review
1 day ago

Cybersecurity Requires Collective Resilience

Rapid recovery depended on leaders quickly assessing scope and risk, validating mitigations, and coordinating communications after the CrowdStrike patch disrupted Windows endpoints worldwide.
Information security
fromWIRED
1 day ago

A Vast Trove of Exposed Social Security Numbers May Put Millions at Risk of Identity Theft

A publicly exposed database held roughly 3 billion emails/passwords and 2.7 billion Social Security–number records, likely aggregated from multiple historic breaches.
#acquisition
Information security
fromTheregister
23 hours ago

Copilot Chat bug bypasses DLP on 'Confidential' email

Microsoft 365 Copilot Chat summarized emails labeled "confidential" despite configured sensitivity labels and DLP policies, exposing protected email content.
Information security
fromTechCrunch
1 day ago

This former Microsoft PM thinks she can unseat CyberArk in 18 months | TechCrunch

Venice provides identity and access management across cloud and on-premises environments, securing credentials for AI-driven non-human agents and raising $20M in Series A funding.
fromDataBreaches.Net
20 hours ago

Nigerian Man Sentenced to Eight Years in Prison for Computer Intrusion and Theft - DataBreaches.Net

Matthew A. Akande, 37, was sentenced by U.S. District Court Judge Indira Talwani to eight years in prison, to be followed by three years of supervised release. Akande was also ordered to pay $1,393,230 in restitution. Akande was arrested in October 2024 at Heathrow Airport in the United Kingdom at the request of the United States and extradited to the United States on March 5, 2025.
Information security
fromTheregister
1 day ago

Dutch defense chief: F-35s can be jailbroken like iPhones

The Netherlands' defense secretary claimed F-35 software can be jailbroken like an iPhone, implying European operators could modify it without US permission.
Information security
from24/7 Wall St.
1 day ago

Why Palo Alto Networks (PANW) Is Really Down 6.5% This Morning

Palo Alto Networks reported solid Q2 results, but weak Q3 profit guidance and acquisition-related integration costs triggered a sharp share price decline.
Information security
fromTheregister
1 day ago

Palo Alto CEO says AI isn't great for business, yet

Enterprise AI adoption lags consumer uptake by years; only coding assistants show significant enterprise use, creating limited network traffic but prompting security and traffic-consolidation needs.
#def-con
Information security
from24/7 Wall St.
1 day ago

Morgan Stanley Pounds the Table: Microsoft is the Most Under-Owned Stock

Morgan Stanley labels Microsoft the most under-owned megacap as shares trade at multi-year low multiples despite strong cloud and AI-driven revenue growth.
Information security
fromSecurityWeek
2 days ago

3 Threat Groups Started Targeting ICS/OT in 2025: Dragos

Three new threat groups—Sylvanite, Azurite, and Pyroxene—began targeting ICS and OT in 2025, expanding threats to critical infrastructure globally.
Information security
fromSecurityWeek
2 days ago

Cyber Insights 2026: The Ongoing Fight to Secure Industrial Control Systems

Industrial Control Systems remain highly vulnerable due to legacy design, long lifecycles, operator reluctance to take systems offline, and growing sophistication of attacks.
fromTheregister
1 day ago

China-linked crew embedded in US energy networks

In its yearly cybersecurity report, Dragos said state-sponsored crews haven't let up on their attempts to compromise America's critical infrastructure, with three new OT-focused threat groups joining the fray. This brings the total number worldwide to 26, and of these, 11 were active in 2025. Additionally, an existing group that Dragos tracks as Voltzite and is "highly correlated" with Volt Typhoon, according to Dragos CEO Robert M. Lee, kept up its intrusion activities last year.
Information security
Information security
fromThe Hacker News
2 days ago

SmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC Infostealer

Threat actors trojanized an Oura MCP server to distribute the StealC infostealer via fake GitHub repositories and poisoned MCP registries.
Information security
fromComputerWeekly.com
2 days ago

Western cyber alliances risk fragmenting in new world order | Computer Weekly

Geopolitical fragmentation in 2025 drove cyber shifts toward coercion, disrupted alliances and intelligence sharing, decentralised resilient cybercrime, and intensified US–China AI competition.
Information security
fromThe Hacker News
2 days ago

Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies

AI web-browsing assistants can be abused as stealthy command-and-control relays that tunnel attacker commands and exfiltrate data while evading account-based defenses.
fromComputerworld
2 days ago

Exploit available for new Chrome zero-day vulnerability, says Google

Gene Moody, field CTO at Action1, explained that, in this vulnerability, a browser frees an object, but later continues to use the stale reference memory location. Any attacker who can shape heap layout with controlled content can potentially replace the contents of that freed memory with data they control. Because this lives in the renderer, and is reachable through normal page content, he said, the trigger surface is almost absolute.
Information security
Information security
fromBusiness Matters
3 days ago

Security Convergence and The Human Error

Human error causes the majority of data breaches, driven by skill- and decision-based mistakes, employee negligence, and basic security vulnerabilities like weak passwords.
fromZDNET
2 days ago

How ChatGPT's new Lockdown Mode protects you from cyberattacks - and why it's not for everyone

Prompt injection attacks pose a serious threat to anyone who uses AI tools, but especially to professionals who rely on them at work. By exploiting a vulnerability that affects most AIs, a hacker can insert malicious code into a text prompt, which may then alter the results or even steal confidential data. Also: 5 custom ChatGPT instructions I use to get better AI results - faster Now, OpenAI has introduced a feature called Lockdown Mode to better thwart these types of attacks.
Information security
#phobos-ransomware
Information security
fromSecurityWeek
2 days ago

VulnCheck Raises $25 Million in Series B Funding to Scale Vulnerability Intelligence

VulnCheck raised $25M in a Series B to expand product development and scale growth for its vulnerability intelligence platform that tracks exploit lifecycle and prioritizes risks.
fromSecurityWeek
2 days ago

Man Linked to Phobos Ransomware Arrested in Poland

A 47-year-old man arrested by police in Poland for allegedly being involved in cybercriminal activities has been linked to the Phobos ransomware operation. According to Poland's Central Cybercrime Bureau, officers found hacking tools, credentials, payment card numbers, and server IP addresses on the unnamed suspect's devices during a search. They also discovered that the suspect had exchanged messages with the Phobos ransomware group.
Information security
fromDataBreaches.Net
2 days ago

Marietta also affected by BridgePay ransomware attack. - DataBreaches.Net

This temporary disruption is the result of a nationwide ransomware attack on BridgePay Network Solutions, one of the City's online payment gateway providers. The attack occurred early in the morning on February 6, 2026 and is impacting payment services for hundreds of municipalities across the United States. BridgePay is cooperating with federal authorities and recovery specialists as the incident is being reviewed. BridgePay reports that their initial findings indicate that no payment card data was compromised and there is no evidence of usable data exposure.
Information security
Information security
fromTechzine Global
2 days ago

Checkmarx integrates agentic security within AWS Kiro IDE

Checkmarx Developer Assist integrated in AWS Kiro IDE provides real-time IDE-native analysis of source code and dependencies to detect and resolve security issues before commit.
Information security
fromThe Hacker News
2 days ago

My Day Getting My Hands Dirty with an NDR System

NDR enables network threat hunting and incident response by providing accessible, user-friendly tools that accelerate analysis and fit into SOC workflows for mid-to-elite operations.
Information security
fromThe Hacker News
2 days ago

Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster

Automated, context-aware cloud forensics is essential because ephemeral infrastructure, rotating identities, and expiring logs destroy evidence before manual investigations can complete.
Information security
fromSilicon Canals
2 days ago

ITC Secure and IronNet Unite to Form Collective Defence, a New Force in Critical Infrastructure Protection Against Hybrid Warfare - Silicon Canals

Collective Defence combines ITC Secure and IronNet to protect critical infrastructure from state-sponsored and hybrid threats using AI-driven cybersecurity and collaborative threat sharing.
fromEngadget
1 day ago

Texas AG sues TP-Link over purported connection to China

TP-Link is no longer owned by a Chinese company and its products are assembled in Vietnam, but Paxton's lawsuit claims that because the company's "ownership and supply-chain are tied to China" it's subject to the country's data laws, which require companies to comply with requests from Chinese intelligence agencies. The lawsuit also says that firmware vulnerabilities in TP-Link's hardware have already "exposed millions of consumers to severe cybersecurity risks."
Information security
Information security
fromSecuritymagazine
2 days ago

The Copilot Problem: Why Internal AI Assistants Are Becoming Accidental Data Breach Engines

Internal copilots can surface and expose accessible enterprise data, amplifying existing over-permissioning and causing visibility-driven security failures.
[ Load more ]