Information security

[ follow ]
Information security
fromtheregister
3 hours ago

Grafana Labs admits all its codebase are belong to someone who popped its GitHub account

An attacker stole Grafana Labs’ GitHub codebase and demanded ransom to prevent release, but Grafana decided not to pay.
#nginx
Information security
fromSecurityWeek
1 hour ago

Exploitation of Critical NGINX Vulnerability Begins

CVE-2026-42945 enables remote heap buffer overflow exploitation in NGINX rewrite, with DoS on default setups and possible RCE when ASLR is disabled.
Information security
fromThe Hacker News
17 hours ago

NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE

CVE-2026-42945 in NGINX heap overflow is actively exploited, enabling unauthenticated worker crashes and potential RCE when ASLR is disabled and specific configuration is known.
Information security
fromThe Hacker News
4 days ago

18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE

NGINX Rift is a critical ngx_http_rewrite_module heap buffer overflow enabling remote code execution or denial-of-service via crafted requests.
Information security
fromSecurityWeek
1 hour ago

Exploitation of Critical NGINX Vulnerability Begins

CVE-2026-42945 enables remote heap buffer overflow exploitation in NGINX rewrite, with DoS on default setups and possible RCE when ASLR is disabled.
Information security
fromThe Hacker News
17 hours ago

NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE

CVE-2026-42945 in NGINX heap overflow is actively exploited, enabling unauthenticated worker crashes and potential RCE when ASLR is disabled and specific configuration is known.
Information security
fromThe Hacker News
4 days ago

18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE

NGINX Rift is a critical ngx_http_rewrite_module heap buffer overflow enabling remote code execution or denial-of-service via crafted requests.
#data-breach
fromSecurityWeek
15 minutes ago
Information security

Grafana Confirms Breach After Hackers Claim They Stole Data

A compromised GitHub token enabled attackers to download Grafana’s codebase, demand ransom, and threaten leaks, but no customer data was taken and systems were unaffected.
Information security
fromSecurityWeek
2 days ago

In Other News: Big Tech vs Canada Encryption Bill, Cisco's Free AI Security Spec, Audi App Flaws

GeForce NOW user data was exposed via a partner breach, while the FCC extended update timelines for covered foreign routers and OpenAI sought EU access to a cyber-focused GPT variant.
Information security
fromSecurityWeek
15 minutes ago

Grafana Confirms Breach After Hackers Claim They Stole Data

A compromised GitHub token enabled attackers to download Grafana’s codebase, demand ransom, and threaten leaks, but no customer data was taken and systems were unaffected.
Information security
fromSecurityWeek
2 days ago

In Other News: Big Tech vs Canada Encryption Bill, Cisco's Free AI Security Spec, Audi App Flaws

GeForce NOW user data was exposed via a partner breach, while the FCC extended update timelines for covered foreign routers and OpenAI sought EU access to a cyber-focused GPT variant.
Information security
fromThe Hacker News
23 seconds ago

MiniPlasma Windows 0-Day Enables SYSTEM Privilege Escalation on Fully Patched Systems

MiniPlasma enables SYSTEM-level privilege escalation on fully patched Windows systems by exploiting cldflt.sys in HsmOsBlockPlaceholderAccess.
fromSecurityWeek
4 hours ago

Hackers Earn $1.3 Million at Pwn2Own Berlin 2026

According to TrendAI's Zero Day Initiative (ZDI), white hat hackers have been awarded $1,298,250 for 47 unique vulnerabilities. Nearly $750,000 of the total amount was won by the first two teams: Devcore and StarLabs SG. The two teams also received the highest payouts for a single exploit chain. Devcore earned $200,000 for a remote code execution exploit with System privileges on Microsoft Exchange, and $175,000 for a Microsoft Edge sandbox escape. It also received $100,000 for exploiting Microsoft SharePoint.
Information security
Information security
fromThe Hacker News
1 day ago

Grafana GitHub Token Breach Led to Codebase Download and Extortion Attempt

An unauthorized party accessed Grafana’s GitHub environment via a stolen token, downloaded code, attempted extortion, and Grafana invalidated credentials and added security measures.
Information security
fromTNW | Data-Security
23 hours ago

A student with a laptop and a radio stopped four high-speed trains. The crypto keys hadn't been changed in 19 years.

A university student used cloned TETRA emergency signaling to trigger manual braking across Taiwan’s high-speed rail network, disrupting service for 48 minutes.
#ransomware
Information security
fromwww.theguardian.com
1 day ago

Canvas hack: is it ever a good idea to pay a ransom, and what happens to the data?

Instructure reached an agreement with ransomware attackers after student data theft, login page defacement, and assignment delays, with experts suspecting ransom payment.
Information security
fromSecuritymagazine
4 days ago

Foxconn Confirms Cyberattack, Security Experts Discuss

A Foxconn cyberattack disrupted North American facilities and involved alleged theft of 8TB of hardware and network data, creating long-term supply-chain and product-security risks.
Information security
fromTechzine Global
4 days ago

Foxconn attackers allegedly obtained Apple and Nvidia data

Foxconn confirmed a North American ransomware attack, with Nitrogen claiming theft of confidential data and Foxconn restarting affected factories.
Information security
fromwww.theguardian.com
1 day ago

Canvas hack: is it ever a good idea to pay a ransom, and what happens to the data?

Instructure reached an agreement with ransomware attackers after student data theft, login page defacement, and assignment delays, with experts suspecting ransom payment.
Information security
fromSecuritymagazine
4 days ago

Foxconn Confirms Cyberattack, Security Experts Discuss

A Foxconn cyberattack disrupted North American facilities and involved alleged theft of 8TB of hardware and network data, creating long-term supply-chain and product-security risks.
Information security
fromTechzine Global
4 days ago

Foxconn attackers allegedly obtained Apple and Nvidia data

Foxconn confirmed a North American ransomware attack, with Nitrogen claiming theft of confidential data and Foxconn restarting affected factories.
Information security
fromThe Hacker News
1 day ago

Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming

Unauthenticated attackers can inject malicious JavaScript into WooCommerce checkout pages via Funnel Builder versions before 3.15.0.3 to steal payment data.
Information security
fromtheregister
1 day ago

Europe built sovereign clouds to escape US control. Then forgot about the processors

European sovereign cloud programs reduce legal exposure, but underlying Intel/AMD management engines operate below host control and can persist outside security visibility.
fromWIRED
1 day ago
Information security

Cybercriminal Twins Caught After They Forgot to Turn Off Microsoft Teams Recording

Stolen iPhones enable phishing targeting contacts, while cyberattacks, drone experiments, maritime blockades, and insider sabotage expand security risks.
Information security
fromThe Hacker News
2 days ago

What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface

Legitimate administrative tools are widely abused in high-severity incidents, so reducing attack surface by removing risky capabilities is faster than relying on detection alone.
Information security
fromTechRepublic
2 days ago

Two Unpatched Windows Exploits Target BitLocker, SYSTEM Access

Two unpatched Windows vulnerabilities, YellowKey and GreenPlasma, can bypass BitLocker protections or escalate privileges after May Patch Tuesday.
Information security
fromTechRepublic
2 days ago

OpenAI Warns Mac Users to Update Apps After Supply-Chain Attack

Mac users must update ChatGPT, Codex, and Atlas apps by June 12 after exposed code-signing certificates from an npm supply-chain attack.
Information security
fromDevOps.com
2 days ago

Widespread Mini Shai-Hulud Campaign Is a Matter of Trust - DevOps.com

Shai-Hulud attacks evolve into supply-chain playbooks that abuse trusted CI/CD publishing paths and OIDC tokens to deliver malicious packages with valid provenance.
#supply-chain-attack
Information security
fromThe Hacker News
2 days ago

TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates

Two employee devices were impacted by a supply-chain attack, but no user data, production systems, or intellectual property were compromised or modified.
Information security
fromSecurityWeek
2 days ago

OpenAI Hit by TanStack Supply Chain Attack

Credential material was exfiltrated from internal repositories after a TanStack supply-chain attack, leading to credential rotation, session revocation, and app re-signing.
Information security
fromThe Hacker News
3 days ago

CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits

CVE-2026-20182 in Cisco Catalyst SD-WAN Controller enables unauthenticated remote authentication bypass and administrative access, added to CISA KEV with FCEB remediation by May 17, 2026.
#ai-agents
Information security
fromtheregister
2 days ago

AI agents show they can create exploits, not just find vulns

Frontier AI models can convert software vulnerabilities into working exploits, outperforming peers on a benchmark measuring arbitrary code execution capability.
Information security
fromtheregister
2 days ago

AI agents show they can create exploits, not just find vulns

Frontier AI models can convert software vulnerabilities into working exploits, outperforming peers on a benchmark measuring arbitrary code execution capability.
#microsoft-exchange-server
Information security
fromThe Hacker News
3 days ago

On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email

CVE-2026-42897 enables spoofing via cross-site scripting in on-premises Exchange Server, with active exploitation, mitigated by emergency service or EOMT.
Information security
fromSecurityWeek
2 days ago

Microsoft Warns of Exchange Server Zero-Day Exploited in the Wild

CVE-2026-42897 is a spoofing and XSS Exchange zero-day exploited via crafted emails, requiring immediate mitigations until a permanent patch is available.
Information security
fromThe Hacker News
3 days ago

On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email

CVE-2026-42897 enables spoofing via cross-site scripting in on-premises Exchange Server, with active exploitation, mitigated by emergency service or EOMT.
Information security
fromSecurityWeek
2 days ago

Microsoft Warns of Exchange Server Zero-Day Exploited in the Wild

CVE-2026-42897 is a spoofing and XSS Exchange zero-day exploited via crafted emails, requiring immediate mitigations until a permanent patch is available.
Information security
fromSecurityWeek
3 days ago

Cisco Patches Another SD-WAN Zero-Day, the Sixth Exploited in 2026

Cisco released patches for CVE-2026-20182, an exploited SD-WAN authentication bypass that can grant remote attackers admin privileges via crafted packets.
Information security
fromtheregister
2 days ago

OpenAI caught in TanStack npm supply chain chaos after employee devices compromised

Attackers exfiltrated limited internal credentials from two employee devices, prompting OpenAI to rotate signing certificates and require software updates.
Information security
fromThe Hacker News
2 days ago

Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence

Four OpenClaw vulnerabilities can be chained to bypass sandbox controls, steal sensitive data, escalate privileges, and maintain persistence via backdoors.
Information security
fromtheregister
2 days ago

Patch time for Cisco SD-WAN admins as vendor drops yet another make-me-admin zero-day

CVE-2026-20182 is a max-severity, actively exploited Cisco Catalyst SD-WAN Controller/Manager flaw enabling unauthenticated admin access and NETCONF manipulation.
Information security
fromtheregister
3 days ago

Nobody believes the 'criminals and scumbags' who hacked Canvas really deleted stolen student data

Instructure claims stolen data was destroyed and no customers will be extorted, but ransomware researchers doubt deletion and warn further threats are likely.
Information security
fromSecuritymagazine
3 days ago

Did Iran Hack Tank Readers at US Gas Stations? Security Leaders Discuss

Iranian actors are suspected of hacking gas station tank gauge systems, altering displayed readings without changing fuel levels, prompting calls to strengthen critical infrastructure security.
Information security
fromSecuritymagazine
3 days ago

Why Most Workplace Violence Prevention Starts Too Late

Workplace violence prevention fails when leadership-driven structural breakdowns delay recognition and reporting, making response systems activate after harm begins.
#linux-kernel
Information security
fromZDNET
2 days ago

The 4th Linux kernel flaw this month can lead to stolen SSH host keys

Linux kernel flaw ssh-keysign-pwn enables ordinary users to read sensitive files like SSH host private keys and the shadow password file.
Information security
fromZDNET
3 days ago

The third major Linux kernel flaw in two weeks has been found - thanks to AI

Fragnesia is a Linux kernel page-cache corruption flaw that lets unprivileged users gain reliable root access across major distributions.
Information security
fromtheregister
3 days ago

Dirty Frag gets a sequel as Fragnesia hands Linux attackers root-level access

Fragnesia (CVE-2026-46300) enables unprivileged users to gain root by corrupting Linux page-cache memory via the XFRM ESP-in-TCP/IPsec path, with public exploit code available.
Information security
fromSecurityWeek
3 days ago

New Linux Kernel Vulnerability Fragnesia Allows Root Privilege Escalation

Fragnesia (CVE-2026-46300) is a local kernel flaw enabling unprivileged attackers to overwrite files and gain root; patches are available and should be applied quickly.
Information security
fromZDNET
2 days ago

The 4th Linux kernel flaw this month can lead to stolen SSH host keys

Linux kernel flaw ssh-keysign-pwn enables ordinary users to read sensitive files like SSH host private keys and the shadow password file.
Information security
fromZDNET
3 days ago

The third major Linux kernel flaw in two weeks has been found - thanks to AI

Fragnesia is a Linux kernel page-cache corruption flaw that lets unprivileged users gain reliable root access across major distributions.
Information security
fromtheregister
3 days ago

Dirty Frag gets a sequel as Fragnesia hands Linux attackers root-level access

Fragnesia (CVE-2026-46300) enables unprivileged users to gain root by corrupting Linux page-cache memory via the XFRM ESP-in-TCP/IPsec path, with public exploit code available.
Information security
fromSecurityWeek
3 days ago

New Linux Kernel Vulnerability Fragnesia Allows Root Privilege Escalation

Fragnesia (CVE-2026-46300) is a local kernel flaw enabling unprivileged attackers to overwrite files and gain root; patches are available and should be applied quickly.
Information security
fromtheregister
2 days ago

Exploited Exchange Server flaw turns OWA inboxes into script launchpads

CVE-2026-42897 in on-prem Exchange OWA can enable arbitrary JavaScript execution via crafted emails, with emergency mitigation potentially breaking inline images and calendar printing.
Information security
fromThe Hacker News
2 days ago

Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access

Turla’s Kazuar backdoor has been upgraded into a modular P2P botnet for stealthy, persistent access and flexible tasking on compromised hosts.
fromnews.bitcoin.com
3 days ago

Ripple's Schwartz Warns XRP Users to Stay Safe From Giveaway Scams

SCAM ALERT: There has been a huge escalation lately in airdrop and giveaway scams targetting XRPL users lately. Any such posts you see are likely scams. Ripple-linked fraud warnings in recent months have also covered phishing operations targeting XRP holders through fake verification requests and malicious wallet prompts. Some schemes encouraged users to connect wallets or submit sensitive recovery information through unofficial channels masquerading as trusted XRP resources.
Information security
Information security
fromSecurityWeek
3 days ago

Chrome 148 Update Patches Critical Vulnerabilities

Chrome 148 fixes 79 vulnerabilities, including 14 critical issues, with multiple memory-safety bugs and paid bug bounties, while no exploitation in the wild is reported.
Information security
fromTNW | Blockchain
2 days ago

AI-powered crypto hacks drain $600M from DeFi as North Korea exploits surge

Two North Korea-linked hacks in April drained nearly $600 million from Drift Protocol and Kelp DAO, using AI-assisted targeting and exploit design.
#cyberattack
Information security
fromComputerWeekly.com
2 days ago

Jaguar Land Rover profit slumps after cyber attack | Computer Weekly

A 2025 cyber attack caused major revenue and profit declines for Jaguar Land Rover despite production recovery, leading to large systemic economic costs and ongoing FY27 growth focus.
Information security
fromSecuritymagazine
4 days ago

Expert Insights on the West Pharmaceutical Ransomware Attack

West Pharmaceutical Services identified a cyberattack, confirmed data exfiltration, and restored enterprise systems while some global operations remained disrupted.
Information security
fromComputerWeekly.com
2 days ago

Jaguar Land Rover profit slumps after cyber attack | Computer Weekly

A 2025 cyber attack caused major revenue and profit declines for Jaguar Land Rover despite production recovery, leading to large systemic economic costs and ongoing FY27 growth focus.
Information security
fromSecuritymagazine
4 days ago

Expert Insights on the West Pharmaceutical Ransomware Attack

West Pharmaceutical Services identified a cyberattack, confirmed data exfiltration, and restored enterprise systems while some global operations remained disrupted.
Information security
fromSecurityWeek
3 days ago

Hackers Targeted PraisonAI Vulnerability Hours After Disclosure

PraisonAI versions with authentication disabled by default allowed unauthenticated access to agent metadata and workflow execution endpoints.
Information security
fromTechRepublic
3 days ago

The First AI-Crafted Zero-Day Was Easy to Spot. The Next One May Not Be

AI-assisted zero-day exploitation has been confirmed, showing logic flaws can be found at scale and increasing supply-chain and containment risks.
Information security
fromThe Hacker News
3 days ago

PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure

A missing authentication flaw in PraisonAI’s legacy Flask API server enables unauthenticated access to protected endpoints, allowing workflow triggering and quota consumption.
Information security
fromTNW | Openai
4 days ago

OpenAI says no user data was touched in the TanStack npm worm

Malicious TanStack npm packages were published via the legitimate release pipeline after a hijacked GitHub Actions runner exfiltrated an OIDC token mid-build.
Information security
fromTechCrunch
3 days ago

A spyware investigator exposed Russian government hackers trying to hijack Signal accounts | TechCrunch

Hackers impersonated Signal, warned of fake security threats, and used verification-code prompts to trick users into granting account access via attacker-controlled devices.
#ai-cybersecurity
Information security
fromSocial Media Explorer
4 days ago

AI Model "Claude Mythos" Raises New Questions About Cybersecurity and Machine Intelligence - Social Media Explorer

AI systems are rapidly advancing in cybersecurity tasks, creating dual-use risks by improving vulnerability discovery while potentially lowering barriers to cyberattacks.
Information security
fromAxios
3 days ago

The next phase of AI cybersecurity still needs humans

Powerful AI security models rapidly discover many bugs and can chain low-severity issues into attack paths, increasing vulnerability volume and defender workload.
Information security
fromEntrepreneur
3 days ago

Companies Only Have 3-5 Months to Outpace AI-Driven Cyberattacks Before They Become 'the New Norm,' Warns Top Tech Executive

Organizations have a three-to-five-month window to strengthen defenses before AI-driven exploits become routine.
Information security
fromNextgov.com
3 days ago

NIST aims for summer release of AI cyber guidelines

NIST will release an AI-specific cybersecurity framework and control overlay guidance to mitigate AI-enabled threats while enabling safe, rapid AI adoption.
Information security
fromNextgov.com
3 days ago

House Homeland panel gets briefing on Anthropic's Mythos

A congressional briefing demonstrated Anthropic’s Mythos AI hacking capabilities and emphasized urgent, responsible deployment of advanced U.S. models to patch vulnerabilities before adversaries exploit them.
Information security
fromSocial Media Explorer
4 days ago

AI Model "Claude Mythos" Raises New Questions About Cybersecurity and Machine Intelligence - Social Media Explorer

AI systems are rapidly advancing in cybersecurity tasks, creating dual-use risks by improving vulnerability discovery while potentially lowering barriers to cyberattacks.
Information security
fromAxios
3 days ago

The next phase of AI cybersecurity still needs humans

Powerful AI security models rapidly discover many bugs and can chain low-severity issues into attack paths, increasing vulnerability volume and defender workload.
Information security
fromEntrepreneur
3 days ago

Companies Only Have 3-5 Months to Outpace AI-Driven Cyberattacks Before They Become 'the New Norm,' Warns Top Tech Executive

Organizations have a three-to-five-month window to strengthen defenses before AI-driven exploits become routine.
Information security
fromNextgov.com
3 days ago

NIST aims for summer release of AI cyber guidelines

NIST will release an AI-specific cybersecurity framework and control overlay guidance to mitigate AI-enabled threats while enabling safe, rapid AI adoption.
Information security
fromNextgov.com
3 days ago

House Homeland panel gets briefing on Anthropic's Mythos

A congressional briefing demonstrated Anthropic’s Mythos AI hacking capabilities and emphasized urgent, responsible deployment of advanced U.S. models to patch vulnerabilities before adversaries exploit them.
Information security
fromThe Hacker News
3 days ago

Windows Zero-Days Expose BitLocker Bypasses And CTFMON Privilege Escalation

YellowKey enables a BitLocker bypass in WinRE by using crafted FsTx files to trigger a shell, even when TPM+PIN is enabled.
Information security
fromtheregister
4 days ago

To gain root access at this company, all an intruder had to do was ask nicely

IT staff reset an account after a caller failed challenge questions, enabling unauthorized access through social engineering and weak password reset procedures.
Information security
fromSecurityWeek
3 days ago

Enhancing Data Center Security Without Sacrificing Performance

Move security workloads from host CPUs to DPUs to eliminate hypervisor blind spots while preserving performance and enabling tamper-proof, line-speed enforcement.
Information security
fromThe Hacker News
3 days ago

Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access

Cisco released updates for CVE-2026-20182, a maximum-severity authentication bypass in Catalyst SD-WAN Controller that enables unauthenticated remote admin access and NETCONF configuration changes.
Information security
fromThe Hacker News
3 days ago

ThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories

Compromised sites and fake helpdesks enable modular persistence, encrypted proxy access, credential theft, privilege escalation, lateral movement, and data exfiltration.
Information security
fromSecuritymagazine
4 days ago

The Bench You'll Need in Three Years Depends on Decisions You Make Now

AI-native security tools automate entry-level tasks, shrinking the entry talent pipeline and creating a widening skills mismatch that will reduce hiring, provider quality, and bench strength.
Information security
fromThe Hacker News
3 days ago

How AI Hallucinations Are Creating Real Security Risks

AI models can produce confident, incorrect outputs that exploit misplaced trust, creating security vulnerabilities in critical infrastructure and cybersecurity decisions.
Information security
fromSecurityWeek
3 days ago

Chinese APTs Expand Targets, Update Backdoors in Recent Campaigns

Salt Typhoon expanded targeting and updated tools, exploiting Microsoft Exchange vulnerabilities to deploy web shells and Deed RAT, then moving laterally via RDP and Impacket.
Information security
fromEngadget
3 days ago

The ChatGPT desktop app for Mac just got hit with a security breach - Engadget

A compromised open-source library led to limited credential exfiltration from code repositories, prompting a ChatGPT Mac update rollout and no evidence of user data access.
fromSecurityWeek
3 days ago

F5 Patches Over 50 Vulnerabilities

The most severe of the resolved issues is CVE-2026-42945 (CVSS v4.0 score of 9.2), a denial-of-service (DoS) condition in NGINX's ngx_http_rewrite_module module. The bug allows an unauthenticated attacker to send crafted HTTP requests that, combined with certain conditions beyond the attacker's control, could trigger a heap buffer overflow and a restart. If Address Space Layout Randomization (ASLR) is disabled, the flaw can be exploited for code execution.
Information security
Information security
fromWIRED
3 days ago

Your iPhone Gets Stolen. Then the Hacking Begins

Cybercrime services sell iPhone unlocking tools and phishing technology, enabling resale of unlocked, wiped devices and driving rapid growth in related phishing domains.
fromArs Technica
3 days ago

Zero-day exploit completely defeats default Windows 11 BitLocker protections

A zero-day exploit circulating online allows people with physical access to a Windows 11 system to bypass default BitLocker protections and gain complete access to an encrypted drive within seconds. The exploit, named YellowKey, was published earlier this week by a researcher who goes by the alias Nightmare-Eclipse. It reliably bypasses default Windows 11 deployments of BitLocker, the full-volume encryption protection Microsoft provides to make disk contents off-limits to anyone without the decryption key, which is stored in a secured piece of hardware known as a trusted platform module (TPM).
Information security
Information security
fromSecurityWeek
4 days ago

High-Severity Vulnerability Patched in VMware Fusion

VMware Fusion released an update to patch CVE-2026-41702, a TOCTOU SETUID flaw that can let local non-admin users escalate privileges to root.
Information security
fromFortune
3 days ago

North Korean operatives stole $2 billion last year-and financial firms are the next target | Fortune

North Korea-linked cyber groups stole over $2 billion in digital assets in 2025, using credential theft and laundering to fund military and nuclear programs.
Information security
fromThe Hacker News
3 days ago

Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strike

Ghostwriter/FrostyNeighbor conducts persistent, adaptive cyber operations against Eastern European government targets using evolving malware, phishing, and credential abuse.
Information security
fromSecurityWeek
3 days ago

Akamai to Acquire AI and Browser Security Firm LayerX for $205 Million

Akamai will acquire LayerX for about $205 million to add AI usage control and browser security capabilities to its Zero Trust portfolio.
Information security
fromSecurityWeek
4 days ago

Microsoft, Palo Alto Networks Find Many Vulnerabilities by Using AI on Their Own Code

Microsoft and Palo Alto Networks report significant vulnerability discoveries after enabling AI-driven scanning on their own code and product portfolios.
Information security
fromSecuritymagazine
5 days ago

What Security Leaders Say About the First AI-Developed Zero-Day Exploit

AI-generated zero-day exploitation has become operational, requiring stronger, phishing-resistant authentication and treating privileged access as a separate attack surface.
Information security
fromSecurityWeek
4 days ago

Sweet Security Launches Agentic AI Red Teaming to Counter 'Mythos Moment'

Human security cannot match AI-assisted cyberattack speed and volume, requiring security programs that use environment-specific AI agents and continuous red teaming.
Information security
fromtheregister
4 days ago

Bug hunter tracks down three massive MCP flaws and one vendor won't fix theirs

Missing or faulty security validation in MCP servers enables SQL injection, metadata exfiltration, and potential takeover of internet-exposed database instances.
#cybersecurity
Information security
fromBusiness Matters
6 days ago

Stryker hack shows cyber intelligence is more important than ever

A major medical device company’s devices were wiped after an Iran-linked ransomware attack, showing cyber threats can strike anytime and require urgent security priorities.
Information security
fromSecuritymagazine
5 days ago

Cybersecurity Is No Longer a Gatekeeper, But the Engine of Delivery Across Digital Economy

Cybersecurity is a top fast-growing skill and must be integrated into product delivery, since both protection gaps and misconfigured controls can cause outages, breaches, and lost trust.
Information security
fromBusiness Matters
6 days ago

Stryker hack shows cyber intelligence is more important than ever

A major medical device company’s devices were wiped after an Iran-linked ransomware attack, showing cyber threats can strike anytime and require urgent security priorities.
Information security
fromSecuritymagazine
5 days ago

Cybersecurity Is No Longer a Gatekeeper, But the Engine of Delivery Across Digital Economy

Cybersecurity is a top fast-growing skill and must be integrated into product delivery, since both protection gaps and misconfigured controls can cause outages, breaches, and lost trust.
Information security
fromThe Hacker News
4 days ago

Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws

Microsoft released patches for 138 vulnerabilities across its products, including critical Windows DNS and Azure flaws, with no publicly known active attacks reported.
Information security
fromwww.bbc.com
5 days ago

More than 70 million warnings sent to people seeking child abuse material

Over two years, 70 million CSAM warning messages were sent, with 700,000 accessing support resources, and most who seek help continued engaging.
Information security
fromSecurityWeek
4 days ago

Fortinet, Ivanti Patch Critical Vulnerabilities

Fortinet and Ivanti released patches for 18 vulnerabilities, including three critical flaws enabling remote, unauthenticated code execution or file manipulation.
Information security
fromtheregister
4 days ago

Welcome to the vulnpocalypse, as vendors use AI to find bugs and patches multiply like rabbits

AI-based code scanning is rapidly increasing vulnerability discovery, driving more patches and greater administrative workload while raising risks if patches break systems.
#microsoft-patch-tuesday
Information security
fromSecurityWeek
4 days ago

Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening Enterprises

CVE-2026-40361 is a zero-click Outlook remote code execution flaw requiring patching to protect enterprise inboxes.
Information security
fromTechzine Global
5 days ago

Microsoft patches 137 vulnerabilities and deploys AI scanner

Microsoft’s May Patch Tuesday fixes 137 vulnerabilities, including 30 critical, with AI-driven detection and an internal MDASH scanning environment accelerating discovery and patching.
Information security
fromSecurityWeek
4 days ago

Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening Enterprises

CVE-2026-40361 is a zero-click Outlook remote code execution flaw requiring patching to protect enterprise inboxes.
Information security
fromTechzine Global
5 days ago

Microsoft patches 137 vulnerabilities and deploys AI scanner

Microsoft’s May Patch Tuesday fixes 137 vulnerabilities, including 30 critical, with AI-driven detection and an internal MDASH scanning environment accelerating discovery and patching.
Information security
fromSecurityWeek
5 days ago

Chipmaker Patch Tuesday: Intel and AMD Patch 70 Vulnerabilities

Intel and AMD released May 2026 Patch Tuesday advisories covering 70 vulnerabilities, including critical flaws enabling privilege escalation and potential code execution.
Information security
fromComputerWeekly.com
4 days ago

Can data sovereignty become a liability in war? | Computer Weekly

In conflict, data access matters more than data sovereignty, and both national control and global cloud reliance can create single points of failure.
[ Load more ]