Information security

[ follow ]
Information security
fromInfoWorld
2 hours ago

Angular releases patches for SSR security issues

Google's Angular team released two security updates for SSR vulnerabilities: a critical SSRF/header injection flaw and a moderate open redirect flaw, requiring immediate patching to prevent authorization header theft and phishing attacks.
Information security
fromTheregister
1 day ago

Microsoft OAuth scams abuse redirects for malware delivery

Microsoft warns of ongoing OAuth abuse scams using phishing emails and URL redirects to deliver malware and compromise organizational devices, primarily targeting government and public-sector entities.
Information security
fromThe Hacker News
12 hours ago

Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries

Russian-speaking threat actors used CyberStrikeAI, a China-linked open-source AI security tool, to attack Fortinet FortiGate appliances, compromising over 600 devices across 55 countries.
Information security
fromFortune
16 hours ago

Boards aren't ready for the AI age: What happens when your CEO gets deepfaked? | Fortune

Deepfake fraud losses tripled to $1.1 billion in 2025, with executives vulnerable to synthetic voice and video impersonation attacks targeting both financial theft and reputational damage.
Information security
fromTechzine Global
13 hours ago

DeepKeep maps attack surface for AI agents

DeepKeep's AI Agent Scanner identifies security risks in AI agents by mapping vulnerabilities, tool access, and data exposure across supported frameworks using OWASP standards.
Information security
fromTechCrunch
13 hours ago

Fig Security emerges from stealth with $38M to help security teams deal with change | TechCrunch

Fig Security monitors enterprise security stacks to ensure detection and response capabilities function properly despite complex tool interactions and system changes.
Information security
fromThe Hacker News
16 hours ago

Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

Microsoft warns of phishing campaigns exploiting OAuth redirect mechanisms to bypass email and browser defenses, targeting government and public-sector organizations to deliver malware without stealing credentials.
Information security
fromFortune
13 hours ago

Why investing in cybersecurity just became a 'must-have' for CFOs | Fortune

CFOs must treat vendor cyber risk as a material balance sheet risk, integrating resilience assessments and proactive risk quantification into enterprise frameworks amid heightened geopolitical threats.
Information security
fromSecurityWeek
13 hours ago

New 'AirSnitch' Attack Shows Wi-Fi Client Isolation Could be a False Sense of Security

Researchers discovered that client isolation in Wi-Fi networks can be bypassed on all tested routers due to missing standardization and inconsistent vendor implementations.
Information security
fromTechRepublic
9 hours ago

Chrome Extension Hijacked to Deliver Malware, Steal Crypto Wallets

QuickLens Chrome extension was compromised to deliver malware, steal cryptocurrency wallet data, and execute ClickFix attacks by stripping security headers and establishing command-and-control communications.
Information security
fromComputerworld
13 hours ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
Information security
fromSecurityWeek
16 hours ago

Vulnerability in MS-Agent AI Framework Can Allow Full System Compromise

CVE-2026-2256 in ModelScope MS-Agent framework allows arbitrary OS command execution through inadequate input sanitization in the Shell tool using regex-based blacklist filtering.
#api-security
Information security
fromTheregister
3 hours ago

Dev stunned by $82K Gemini API key bill after theft

A developer's stolen Google Gemini API key resulted in $82,314 in unauthorized charges within 48 hours, while Google refused to waive costs citing shared responsibility, threatening the startup's survival.
Information security
fromTheregister
3 hours ago

Dev stunned by $82K Gemini API key bill after theft

A developer's stolen Google Gemini API key resulted in $82,314 in unauthorized charges within 48 hours, while Google refused to waive costs citing shared responsibility, threatening the startup's survival.
Information security
fromwww.bbc.com
17 hours ago

Deepfake attack: 'Many people could have been cheated'

Deepfake technology has increased 3,000% over two years, enabling fraudsters to impersonate executives and manipulate financial markets and corporate security through AI-generated videos and audio.
Information security
fromTheregister
12 hours ago

Perplexity Comet browser hole was exploitable via cal invite

Perplexity's Comet browser had critical security vulnerabilities allowing attackers to steal local files and access password vaults through malicious calendar invitations until recently.
#iphone-security-vulnerabilities
Information security
fromNextgov.com
4 hours ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
Information security
fromTechCrunch
3 hours ago

A suite of government hacking tools targeting iPhones is now being used by cybercriminals | TechCrunch

Government-designed iPhone exploit kit Coruna leaked from surveillance vendor to cybercriminals, Russian espionage groups, and Chinese hackers, demonstrating how state-sponsored tools proliferate into criminal markets.
Information security
fromNextgov.com
4 hours ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
Information security
fromTechCrunch
3 hours ago

A suite of government hacking tools targeting iPhones is now being used by cybercriminals | TechCrunch

Government-designed iPhone exploit kit Coruna leaked from surveillance vendor to cybercriminals, Russian espionage groups, and Chinese hackers, demonstrating how state-sponsored tools proliferate into criminal markets.
Information security
fromThe Hacker News
18 hours ago

SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains

SloppyLemming conducted attacks on Pakistani and Bangladeshi government and critical infrastructure using new malware families BurrowShell and a Rust-based keylogger between January 2025 and January 2026.
Information security
fromSecurityWeek
11 hours ago

Honeywell, Researcher Clash Over Impact of Building Controller Vulnerability

A researcher discovered that Honeywell's IQ4 building controller exposes unauthenticated web interfaces and allows remote administrator account creation, but Honeywell disputes the severity, claiming the vulnerability only exists during installation before the system becomes operational.
Information security
fromSecurityWeek
14 hours ago

Android Update Patches Exploited Qualcomm Zero-Day

Google released Android security updates patching nearly 130 vulnerabilities, including an exploited zero-day in Qualcomm chipsets affecting over 200 devices through integer overflow in graphics components.
Information security
fromTechRepublic
5 days ago

Google Expands AI Scam Protection to Samsung Galaxy S26

Google expands AI-powered scam detection beyond Pixel phones to Samsung Galaxy S26 and other Android devices, with real-time call and message fraud analysis using on-device AI.
Information security
fromThe Hacker News
18 hours ago

Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited

Google disclosed a high-severity Qualcomm Graphics component vulnerability (CVE-2026-21385) being exploited in Android devices, with March 2026 patches addressing 129 total vulnerabilities including critical remote code execution and privilege escalation flaws.
#chrome-security-vulnerability
Information security
fromZDNET
1 day ago

This high-severity Chrome Gemini vulnerability lets malicious extensions spy on your PC

A high-severity vulnerability in Chrome's Gemini feature allows malicious extensions to inject code, enabling attackers to spy on users, steal data, access webcams and microphones, and conduct phishing attacks.
fromThe Hacker News
1 day ago
Information security

New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

A patched Chrome vulnerability (CVE-2026-0628) allowed malicious extensions to escalate privileges and access local files, camera, microphone, and screenshots through insufficient WebView policy enforcement.
fromSecurityWeek
1 day ago
Information security

Vulnerability Allowed Hijacking Chrome's Gemini Live AI Assistant

A Chrome vulnerability allowed malicious extensions to hijack Gemini Live AI assistant and access sensitive user data through privileged browser access.
Information security
fromTheregister
15 hours ago

Chrome AI panel became privilege escalator for extensions

A high-severity Chrome vulnerability allowed malicious extensions to hijack the Gemini Live AI panel and gain unauthorized access to system resources like cameras, microphones, and local files.
Information security
fromZDNET
1 day ago

This high-severity Chrome Gemini vulnerability lets malicious extensions spy on your PC

A high-severity vulnerability in Chrome's Gemini feature allows malicious extensions to inject code, enabling attackers to spy on users, steal data, access webcams and microphones, and conduct phishing attacks.
Information security
fromThe Hacker News
1 day ago

New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

A patched Chrome vulnerability (CVE-2026-0628) allowed malicious extensions to escalate privileges and access local files, camera, microphone, and screenshots through insufficient WebView policy enforcement.
Information security
fromSecurityWeek
1 day ago

Vulnerability Allowed Hijacking Chrome's Gemini Live AI Assistant

A Chrome vulnerability allowed malicious extensions to hijack Gemini Live AI assistant and access sensitive user data through privileged browser access.
Information security
fromThe Hacker News
12 hours ago

Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

Tier 1 SOC analysts process the highest alert volume with the least experience, creating a structural vulnerability where alert fatigue, decision fatigue, and cognitive overload directly undermine organizational security performance and increase incident costs.
fromSecurityWeek
7 hours ago

Iranian Strikes on Amazon Data Centers Highlight Industry's Vulnerability to Physical Disasters

These strikes have caused structural damage, disrupted power delivery to our infrastructure, and in some cases required fire suppression activities that resulted in additional water damage. AWS said in an update on its online dashboard regarding the Iranian drone strikes on its Middle East facilities.
Information security
Information security
from24/7 Wall St.
13 hours ago

The Cybersecurity ETF That Missed the Boom Entirely

Global X Cybersecurity ETF (BUG) underperforms despite structural growth in cybersecurity spending, returning -3% over five years while competitors and broader indices significantly outpaced it.
#cybersecurity-leadership
Information security
fromSecuritymagazine
1 day ago

Shawn Fallah - Top Cybersecurity Leaders 2026

Shawn Fallah leads HSI's Cyber and Operational Technology directorate, overseeing technical law enforcement systems and a $1.1 billion budget while advancing modern security infrastructure to counter emerging threats.
Information security
fromSecuritymagazine
1 day ago

Shawn Fallah - Top Cybersecurity Leaders 2026

Shawn Fallah leads HSI's Cyber and Operational Technology directorate, overseeing technical law enforcement systems and a $1.1 billion budget while advancing modern security infrastructure to counter emerging threats.
Information security
fromTheregister
12 hours ago

Western governments seek to lock down 6G before it exists

Western governments launched 6G Security and Resilience Principles to embed supply chain controls and cyber safeguards into next-generation mobile networks before standardization occurs.
#cyber-warfare
Information security
fromFortune
2 days ago

Cyber retaliation from Iran is a problem for U.S. companies - 'It's in the hands of a 19-year-old hacker in a Telegram room,' ex-NSA operative says | Fortune

Iranian cyber operatives compromised a popular prayer app to coordinate civil resistance during strikes, prompting regime loyalists to launch aggressive counter-attacks through decentralized hacker networks.
Information security
fromFortune
2 days ago

Cyber retaliation from Iran is a problem for U.S. companies - 'It's in the hands of a 19-year-old hacker in a Telegram room,' ex-NSA operative says | Fortune

Iranian cyber operatives compromised a popular prayer app to coordinate civil resistance during strikes, prompting regime loyalists to launch aggressive counter-attacks through decentralized hacker networks.
#cisa-leadership-changes
Information security
fromThe Hacker News
8 hours ago

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Threat actors impersonate IT support via email and phone calls to deliver Havoc C2 framework for data exfiltration or ransomware attacks across multiple organizations.
fromThe Hacker News
14 hours ago

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

It launches a headless Chrome instance - a browser that operates without a visible window - inside a Docker container, loads the brand's real website, and acts as a reverse proxy between the target and the legitimate site. Recipients are served genuine page content directly through the attacker's infrastructure, ensuring the phishing page is never out of date.
Information security
fromNextgov.com
8 hours ago

Why the convergence of AI and cybersecurity must be a top priority for the administration

AI is directly impacting blue team (defender) and red team (attacker) strategies, operations and tactics. Federal cybersecurity teams are increasingly relying on AI for anomaly detection, predictive threat intelligence and faster incident response. AI can flag suspicious behavior, such as access to sensitive systems from unusual locations, without depending on static rules.
Information security
#cybersecurity
Information security
fromTheregister
1 day ago

Businesses told to harden defenses amid Iran conflict risk

The UK's NCSC warns organizations of potential cyber threats from Middle East conflict escalation, with indirect threats almost certain for region-linked businesses.
Information security
fromTheregister
1 day ago

Businesses told to harden defenses amid Iran conflict risk

The UK's NCSC warns organizations of potential cyber threats from Middle East conflict escalation, with indirect threats almost certain for region-linked businesses.
Information security
fromThe Hacker News
1 day ago

Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More

Multiple attack vectors across network systems, cloud infrastructure, and AI platforms exploit access control gaps, exposed credentials, and trusted service misuse to target high-value sectors.
#ai-security-vulnerability
Information security
fromTechzine Global
1 day ago

Flaw in OpenClaw allows complete takeover of AI agent

A critical vulnerability in OpenClaw allowed arbitrary websites to hijack AI assistants through localhost WebSocket connections without user interaction or malicious plugins.
fromSecurityWeek
1 day ago
Information security

OpenClaw Vulnerability Allowed Websites to Hijack AI Agents

OpenClaw AI assistant vulnerability allowed attackers to hijack agents through malicious websites by exploiting localhost assumptions and rate limiter exemptions for loopback connections.
Information security
fromTechzine Global
1 day ago

Flaw in OpenClaw allows complete takeover of AI agent

A critical vulnerability in OpenClaw allowed arbitrary websites to hijack AI assistants through localhost WebSocket connections without user interaction or malicious plugins.
Information security
fromSecurityWeek
1 day ago

OpenClaw Vulnerability Allowed Websites to Hijack AI Agents

OpenClaw AI assistant vulnerability allowed attackers to hijack agents through malicious websites by exploiting localhost assumptions and rate limiter exemptions for loopback connections.
Information security
fromThe Hacker News
1 day ago

How to Protect Your SaaS from Bot Attacks with SafeLine WAF

SaaS applications face constant automated bot attacks that exploit business logic, appearing as legitimate growth while degrading performance; SafeLine WAF protects by inspecting traffic patterns and behavior before requests reach application code.
Information security
fromSecuritymagazine
2 days ago

Why Security Teams Can No Longer Ignore Recruitment Fraud

AI-powered recruitment fraud exploits human trust in hiring workflows, with job scams surging over 1,000% as attackers use deepfakes and impersonation to target vulnerable candidates and organizations during periods of labor market volatility.
Information security
fromThe Hacker News
1 day ago

APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday

Microsoft patched CVE-2026-21513, a high-severity MSHTML Framework vulnerability exploited as a zero-day by Russia-linked APT28, allowing attackers to bypass security features and achieve code execution through malicious files.
Information security
fromTheregister
1 day ago

Memory scalpers hunt scarce DRAM with bot blitz

Web scraping bots are systematically targeting DRAM inventory across e-commerce sites, submitting millions of requests to identify stock for resale at inflated prices, with operators increasingly using AI tools to enhance their scraping effectiveness.
Information security
fromNextgov.com
1 day ago

Intelligence firms watch for uptick in Iran cyber activity after US, Israel strikes

Tehran-linked hackers are escalating digital reconnaissance and preparing potentially disruptive cyber operations following recent U.S. and Israeli strikes on Iran.
Information security
fromTechRepublic
5 days ago

ChatGPT Criminals: AI Scams Target Dating and Legal Impersonators - TechRepublic

Generative AI enhances traditional scams by improving message quality, consistency, and scale, making romance fraud and professional impersonation harder to detect and easier to execute at volume.
Information security
fromThe Hacker News
1 day ago

North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT

North Korean threat actors deployed 26 malicious npm packages using steganography to hide command-and-control infrastructure in Pastebin essays, targeting developers with credential stealers and remote access trojans.
Information security
fromFortune
1 day ago

Iran doesn't need sci-fi AI to pose a serious cyber threat | Fortune

Iran, a sophisticated cyber power, may develop AI-powered attacks against U.S., Israeli, and Gulf State critical infrastructure as military tensions escalate and automated hacking tools become more prevalent.
Information security
fromSecurityWeek
1 day ago

North Korean APT Targets Air-Gapped Systems in Recent Campaign

APT37 deployed five new malicious tools in the Ruby Jumper campaign targeting air-gapped systems using USB-based data exfiltration and persistence mechanisms.
Information security
fromThe Hacker News
1 day ago

Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome

Google is developing Merkle Tree Certificates to secure HTTPS against quantum computing threats while maintaining current internet speed and performance.
Information security
fromSecurityWeek
1 day ago

Google Working Towards Quantum-Safe Chrome HTTPS Certificates

Google plans to enhance Chrome's HTTPS certificate resilience against quantum computers using Merkle Tree Certificates that reduce bandwidth while maintaining security and transparency.
Information security
fromNextgov.com
1 day ago

Fake DOD memo about 'compromised' apps shows swift spread of deceptive messaging

A fake U.S. Cyber Command memo falsely claiming apps were compromised and revealing servicemembers' locations circulated during military channels, but DOD confirmed it was not authentic.
fromDataBreaches.Net
1 day ago

CISA Releases New Guidance on Assembling Multi-Disciplinary Insider Threat Management Teams - DataBreaches.Net

CISA's guidance is intended to assist critical infrastructure stakeholders, which includes private sector entities across various sectors, with implementing an insider threat mitigation program that combines physical security, cybersecurity, personnel awareness, and community partnerships. Although framed for critical infrastructure, CISA's guidance is relevant to a broader range of organizations, including those outside of critical infrastructure sectors.
Information security
Information security
fromTheregister
1 day ago

Scammers target Dubai bank accounts amid Iran missile salvo

Cybercriminals impersonated Dubai Crisis Management to exploit missile attack victims, attempting SIM-swap attacks to access bank accounts using stolen UAE Pass and Emirates ID credentials.
Information security
fromTheregister
1 day ago

Israel hacks prayer app to push propaganda to Iran: report

Israel allegedly hacked the Iranian prayer app BadeSaba to distribute messages urging military members to oppose the regime, exploiting the app's 37 million users and their location data.
#ransomware-attack
Information security
fromSecuritymagazine
2 days ago

Iranian Apps, Websites Hacked Following US-Israeli Strikes

Coordinated cyber operations against Iran caused significant internet disruption and compromised news websites and a major religious app with messages urging military surrender.
#cisa-leadership
#ai-security
Information security
fromThe Hacker News
3 days ago

ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket

OpenClaw fixed a high-severity vulnerability allowing malicious websites to hijack locally running AI agents through password brute-forcing and unauthorized device registration.
Information security
fromSecurityWeek
2 days ago

Hackers Weaponize Claude Code in Mexican Government Cyberattack

Attackers exploited Claude Code to compromise ten Mexican government bodies and a financial institution, exfiltrating 150GB of data affecting 195 million identities by bypassing AI safety guardrails through social engineering.
Information security
fromThe Hacker News
3 days ago

ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket

OpenClaw fixed a high-severity vulnerability allowing malicious websites to hijack locally running AI agents through password brute-forcing and unauthorized device registration.
fromTheregister
3 days ago

DEF CON hackers 'fed up with government,' Jake Braun says

Thinking back to Ben Franklin, we saw society moving in the right direction for the last 500 years because of our commitment to science, human rights, etc., and that seems to be at the very least slowing down, if not reversing. Braun said he blames government for this state of affairs - pointedly 'the inability of government to continue to make the progress we saw from the enlightenment.'
Information security
Information security
fromDataBreaches.Net
3 days ago

Court Refuses to Slice Up CiCi's Cyber Extortion Coverage - DataBreaches.Net

Insurers must draft cyber insurance policies with clear language to restrict coverage; ambiguous sublimit endorsements will be interpreted in favor of policyholders.
#data-breach
fromSecurityWeek
4 days ago

Critical Flaws Exposed Gardyn Smart Gardens to Remote Hacking

According to CISA, Gardyn products were affected by two critical and two high-severity vulnerabilities. One of the critical flaws, tracked as CVE-2025-29631, is a command injection issue that can be exploited to execute arbitrary OS commands on the targeted device. The second critical vulnerability, CVE-2025-1242, is related to the exposure of hardcoded admin credentials that can be used to gain full control of the Gardyn IoT Hub.
Information security
#freepbx-security
fromSecurityWeek
4 days ago

Juniper Networks PTX Routers Affected by Critical Vulnerability

The On-Box Anomaly detection framework should only be reachable by other internal processes over the internal routing instance, but not over an externally exposed port. With the ability to access and manipulate the service to execute code as root a remote attacker can take complete control of the device.
Information security
Information security
fromThe Hacker News
4 days ago

Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor

A malicious Go module impersonating legitimate golang.org/x/crypto harvests passwords, establishes SSH persistence, and deploys the Rekoobe Linux backdoor through namespace confusion attacks.
fromTechRepublic
4 days ago

5 Nations Alert: Critical Cisco Bug Used in Global Espionage Campaign

Cisco confirmed that attackers exploited the bug, tracked as CVE-2026-20127, to bypass authentication, gain privileged access, and quietly steal data. The discovery prompted a rare joint warning from authorities in the US, UK, Australia, Canada, and New Zealand.
Information security
Information security
fromSecurityWeek
4 days ago

In Other News: ATT&CK Advisory Council, Russian Cyberattacks Aid Missile Strikes, Predator Bypasses iOS Indicators

Predator spyware suppresses iOS indicators through kernel-level access, Russian cyberattacks on Ukraine's energy grid gather intelligence for missile targeting, and Treasury launches AI cybersecurity initiative for financial services.
Information security
fromTheregister
4 days ago

Suspected Nork intruders infecting US healthcare, education

North Korean-linked hackers deployed a new backdoor called Dohdoor to infect US education and healthcare institutions since December for financial gain.
fromDataBreaches.Net
5 days ago

Cisco says hackers have been exploiting a critical bug to break into big customer networks since 2023 - DataBreaches.Net

The bug, which has a maximum-rated vulnerability severity score of 10.0, allows hackers to remotely break into networks running its Catalyst SD-WAN products, which allow large companies and government agencies with multiple offices to connect their private networks over long distances.
Information security
Information security
fromThe Hacker News
4 days ago

Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

Threat actors distribute trojanized gaming utilities via browsers and chat platforms to deploy a multi-purpose RAT that establishes persistence through scheduled tasks and evades detection via Microsoft Defender exclusions.
Information security
fromThe Hacker News
4 days ago

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

North Korean threat actor ScarCruft deployed the Ruby Jumper campaign using malware families that abuse Zoho WorkDrive for C2 communications and removable media to compromise air-gapped networks.
Information security
fromTheregister
4 days ago

Double whammy: Steaelite RAT bundles data theft, ransomware

Steaelite, a new remote access trojan sold on cybercrime networks, enables double extortion attacks on Windows machines through ransomware, data theft, credential stealing, and live surveillance controlled via a centralized browser-based dashboard.
fromTheregister
4 days ago

Ransomware payments cratered in 2025 - attacks did not

Despite the relative stability in total payments, ransomware attacks surged across multiple vectors in 2025, with eCrime.ch data showing a 50 percent YoY increase in claimed ransomware victims, marking the most active year on record.
Information security
Information security
fromTechzine Global
4 days ago

Cyber resilience gap: High confidence, but reality lags behind

Organizations invest heavily in cyber resilience but remain vulnerable to external threats due to perimeter-focused strategies that neglect ecosystem-wide protection.
Information security
fromTechzine Global
4 days ago

Forescout and Netskope bring Zero Trust to all devices

Forescout and Netskope integration delivers Zero Trust security across all device types by combining real-time device intelligence with AI-powered cloud security for dynamic access control.
fromTechzine Global
4 days ago

AI code undermines control over open source and IP

While AI tools are lowering the barrier to development, the gap between speed and manageability is growing. In just over a year and a half, AI code assistants have grown from an experiment to an integral part of modern development environments. They are driving strong productivity growth, but organizations are not keeping up with the associated security and governance issues.
Information security
Information security
fromSecurityWeek
4 days ago

Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience

Aeternum C2 botnet uses Polygon blockchain for command-and-control, making it resilient to takedowns while eliminating central infrastructure costs.
Information security
fromSecurityWeek
4 days ago

Chilean Carding Shop Operator Extradited to US

A 24-year-old Chilean national was extradited to the US for operating illegal Telegram channels that trafficked in stolen credit card data from approximately 26,000 compromised payment cards.
Information security
fromSecuritymagazine
5 days ago

Enhancing Incident Response with Integrated Access Control and Video Verification

Integrated access control and video verification technology enhance incident response capabilities and operational resilience by providing situational clarity and enabling faster security action.
Information security
fromThe Verge
4 days ago

CISA is getting a new acting director after less than a year

CISA's acting director Madhu Gottumukkala is replaced by Nick Andersen following reports of uploading sensitive documents to ChatGPT, amid agency budget cuts and politicization under the Trump administration.
fromRaw Story
4 days ago

Massive trove of FBI 'Epstein investigation' data compromised in 'cyber intrusion': report

We noticed strange IP activity that took place yesterday from two IP addresses. The activity included combing through certain files pertaining to the Epstein investigation.
Information security
Information security
fromThe Mercury News
5 days ago

San Jose police rein in license-plate reader policies as surveillance-tech debate rages

San Jose Police Department is reducing automated license-plate reader data retention from one year to 30 days and restricting camera placement near houses of worship and reproductive health clinics to address privacy and immigration enforcement concerns.
fromThe Hacker News
5 days ago

ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories

The average e-crime breakout time - the period between initial access and lateral movement onto another system - dropped to 29 minutes, a 65% increase in speed from 2024. One such intrusion undertaken by Luna Moth targeting a law firm moved from initial access to data exfiltration in four minutes.
Information security
fromBleepingComputer
6 days ago

Fake Next.js job interview tests backdoor developer's devices

The Microsoft Defender team says that the attacker created fake web app projects built with Next.js and disguised them as coding projects to share with developers during job interviews or technical assessments. The researchers initially identified a repository hosted on the Bitbucket cloud-based Git-based code hosting and collaboration service. However, they discovered multiple repositories that shared code structure, loader logic, and naming patterns.
Information security
Information security
fromSecurityWeek
5 days ago

Cisco Patches Catalyst SD-WAN Zero-Day Exploited by Highly Sophisticated Hackers

Cisco released emergency patches for a critical zero-day vulnerability (CVE-2026-20127) in Catalyst SD-WAN that allows unauthenticated remote attackers to bypass authentication and gain administrative privileges.
[ Load more ]