Information security

[ follow ]
Information security
fromZDNET
2 hours ago

How AI can trick you into making fake payments - 5 red flags

AI-accelerated scams are rapidly increasing consumer harm by compressing fraud cycles and shifting fraud toward social engineering that tricks people into authorizing malicious actions.
#supply-chain-attacks
Information security
fromDevOps.com
1 hour ago

GitHub Breach Tied to Malicious VS Code Extension Exposes Thousands of Internal Repositories

A compromised Visual Studio Code extension led to access of about 3,800 internal repositories, with no evidence found of customer or external enterprise impact.
fromTechCrunch
1 day ago
Information security

Hackers have compromised dozens of popular open source packages in an ongoing supply chain attack | TechCrunch

Information security
fromDevOps.com
1 hour ago

GitHub Breach Tied to Malicious VS Code Extension Exposes Thousands of Internal Repositories

A compromised Visual Studio Code extension led to access of about 3,800 internal repositories, with no evidence found of customer or external enterprise impact.
Information security
fromSecurityWeek
9 hours ago

Over 320 NPM Packages Hit by Fresh Mini Shai-Hulud Supply Chain Attack

A compromised NPM maintainer account published malicious package versions that triggered multi-stage credential theft and persistence across CI environments and developer tooling.
Information security
fromSecurityWeek
10 hours ago

GitHub Confirms Hack Impacting 3,800 Internal Repositories

About 3,800 GitHub internal repositories were exfiltrated after a poisoned VS Code extension compromised an employee workstation, prompting secret rotation and ongoing monitoring.
Information security
fromThe Hacker News
1 day ago

Compromised Nx Console 18.95.0 Targeted VS Code Developers with Credential Stealer

A compromised Nx Console VS Code extension silently installs a credential-stealing payload via an orphan commit, exfiltrating secrets and adding a macOS backdoor.
Information security
fromTechCrunch
1 day ago

Hackers have compromised dozens of popular open source packages in an ongoing supply chain attack | TechCrunch

Hackers compromised open source project accounts and released malicious updates to steal credentials and spread malware to downstream users.
Information security
fromArs Technica
1 hour ago

Google publishes exploit code threatening millions of Chromium users

Unfixed Chromium vulnerability lets websites exploit Browser Fetch to monitor activity, proxy browsing, and enable denial-of-service, potentially turning many devices into a botnet.
Information security
fromThe Hacker News
15 hours ago

GitHub Investigating TeamPCP Claimed Breach of ~4,000 Internal Repositories

GitHub is investigating unauthorized access to internal repositories after TeamPCP listed source code and organizations for sale, while monitoring for customer impact.
Information security
fromSecurityWeek
6 hours ago

1Password Teams With OpenAI to Stop AI Coding Agents From Leaking Credentials

An integration enables OpenAI Codex coding agents to use enterprise credentials without exposing secrets in prompts, code, repositories, terminals, or model context.
Information security
fromThe Hacker News
6 hours ago

Webworm Deploys EchoCreep and GraphWorm Backdoors Using Discord and MS Graph API

Webworm uses Discord and Microsoft Graph API for command-and-control, deploying new backdoors in 2025 and blending malware via a WordPress-impersonating GitHub repository.
#data-breaches
Information security
fromTechzine Global
11 hours ago

Vulnerabilities are the number one cause of data breaches for the first time

Exploiting vulnerabilities is now the leading entry point for data breaches, while AI accelerates exploitation and expands risks from shadow AI, supply chains, and mobile attacks.
Information security
fromComputerWeekly.com
1 day ago

Vulnerability exploitation now primary origin of data breaches | Computer Weekly

About 31% of breaches start with exploitation of unpatched software vulnerabilities, driven by AI-enabled faster weaponization, requiring stronger risk management and patch readiness.
Information security
fromTechzine Global
11 hours ago

Vulnerabilities are the number one cause of data breaches for the first time

Exploiting vulnerabilities is now the leading entry point for data breaches, while AI accelerates exploitation and expands risks from shadow AI, supply chains, and mobile attacks.
Information security
fromComputerWeekly.com
1 day ago

Vulnerability exploitation now primary origin of data breaches | Computer Weekly

About 31% of breaches start with exploitation of unpatched software vulnerabilities, driven by AI-enabled faster weaponization, requiring stronger risk management and patch readiness.
Information security
fromSecurityWeek
5 hours ago

AI-Powered App Attacks Are Faster, More Frequent and Harder to Stop

Agentic AI collapses attacker cost and expertise, making all apps primary targets and turning app publication into an immediate security exposure event.
Information security
fromZDNET
7 hours ago

Mobile phishing is a bigger threat than email now - how to stay protected

Mobile phishing and social engineering are increasing faster than email phishing, with higher click-through rates, requiring mobile-focused training and protections.
Information security
fromThe Hacker News
9 hours ago

Typosquatting Is No Longer a User Problem. It's a Supply Chain Problem

AI-generated lookalike domains embedded in third-party scripts evade firewalls, WAFs, EDR, and CSP, requiring detection that observes executed browser behavior.
#macos-malware
Information security
fromTechRepublic
1 day ago

Mac Users Face New Malware Threat Spoofing Apple, Google, and Microsoft

SHub Reaper macOS infostealer uses brand-spoofing and social engineering to steal passwords, browser data, crypto data, and business files while maintaining stealth persistence.
Information security
fromtheregister
1 day ago

Do fear the Reaper - stealer swipes macOS users' passwords, wallets, then backdoors them

Reaper macOS infostealer spoofs major trusted brands, uses Script Editor to bypass Terminal defenses, then steals password-manager credentials and crypto-wallet access.
Information security
fromTechRepublic
1 day ago

Mac Users Face New Malware Threat Spoofing Apple, Google, and Microsoft

SHub Reaper macOS infostealer uses brand-spoofing and social engineering to steal passwords, browser data, crypto data, and business files while maintaining stealth persistence.
Information security
fromtheregister
1 day ago

Do fear the Reaper - stealer swipes macOS users' passwords, wallets, then backdoors them

Reaper macOS infostealer spoofs major trusted brands, uses Script Editor to bypass Terminal defenses, then steals password-manager credentials and crypto-wallet access.
#github-actions
Information security
fromnews.bitcoin.com
13 hours ago

GitHub Worm Hits npm Packages With 16M Downloads

A GitHub Actions cache poisoning attack enabled malicious npm packages to pass provenance checks, while a dead-man’s switch wipes developer machines if the npm token is revoked.
Information security
fromtheregister
2 days ago

TanStack weighs invitation-only pull requests after supply chain attack

A GitHub Actions misconfiguration enabled a worm to poison shared cache and extract secrets, prompting TanStack to tighten CI and consider invitation-only PRs.
Information security
fromnews.bitcoin.com
13 hours ago

GitHub Worm Hits npm Packages With 16M Downloads

A GitHub Actions cache poisoning attack enabled malicious npm packages to pass provenance checks, while a dead-man’s switch wipes developer machines if the npm token is revoked.
Information security
fromtheregister
2 days ago

TanStack weighs invitation-only pull requests after supply chain attack

A GitHub Actions misconfiguration enabled a worm to poison shared cache and extract secrets, prompting TanStack to tighten CI and consider invitation-only PRs.
Information security
fromTNW | Data-Security
7 hours ago

QIZ Security and Google Cloud partner on quantum-safe encryption

QIZ Security and Google Cloud collaborate to accelerate enterprise migration to quantum-resistant cryptography by providing unified visibility into cryptographic risk across hybrid environments.
Information security
fromDevOps.com
7 hours ago

1Password Allies With OpenAI to Secure Codex AI Coding Tool - DevOps.com

Codex credentials are issued just-in-time via an MCP server so secret values never appear in code, terminals, model context, or disk.
Information security
fromnews.bitcoin.com
13 hours ago

OKX's Gracie Lin Says AI Agents Need Sub-Cent Payments as Bank Rails Slow Tasks

AI agents will trigger CAPTCHAs and MFA blocks, turning web security designed for humans into checkout roadblocks for autonomous commerce.
Information security
fromSecurityWeek
9 hours ago

Caught Off Guard: Securing AI After It Hits Production

Security teams must be involved early in the software development lifecycle to prevent reactive, afterthought security failures as AI use cases move to production.
Information security
fromThe Hacker News
5 hours ago

Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks

Microsoft disrupted a malware-signing-as-a-service operation using Artifact Signing, seizing infrastructure and blocking access to stop ransomware and other attacks.
#cybersecurity
Information security
fromSecurityWeek
7 hours ago

Anthropic Silently Patches Claude Code Sandbox Bypass

Two Claude Code network sandbox bypasses could have enabled outbound connections to unapproved hosts, but fixes were released, including a null-byte SOCKS5 issue.
Information security
fromTechCrunch
6 hours ago

GitHub says hackers stole data from thousands of internal repositories | TechCrunch

Attackers compromised an employee device via a poisoned VS Code extension and stole data from about 3,800 internal GitHub repositories.
Information security
fromSecuritymagazine
20 hours ago

Financial Services, Cybersecurity and the Evolving Threat Landscape

Financial institutions can manage accelerating cyber threats by integrating resilience into daily operations, strengthening governance and risk management, and leveraging collaboration.
Information security
fromComputerWeekly.com
3 hours ago

Bulgaria fires up Google Cloud for national cyber security | Computer Weekly

Bulgaria deployed Google Cloud Cybershield to centralize AI-powered cyber intelligence and telemetry, reducing detection and response time across government entities.
Information security
fromThe Hacker News
14 hours ago

Grafana GitHub Breach Exposes Source Code via TanStack npm Attack

Breach impact was limited to Grafana Labs GitHub repositories, with no evidence of customer production systems or Grafana Cloud operations being compromised.
Information security
fromTechzine Global
1 day ago

Anthropic allows partners to share findings from Mythos

Partners in Project Glasswing may share Mythos cybersecurity findings, best practices, tools, and code with external parties under responsible disclosure standards.
Information security
fromSecurityWeek
7 hours ago

Anthropic Silently Patches Claude Code Sandbox Bypass

Two Claude Code network sandbox bypasses could have enabled outbound connections to unapproved hosts, but fixes were released, including a null-byte SOCKS5 issue.
Information security
fromTechCrunch
6 hours ago

GitHub says hackers stole data from thousands of internal repositories | TechCrunch

Attackers compromised an employee device via a poisoned VS Code extension and stole data from about 3,800 internal GitHub repositories.
Information security
fromSecuritymagazine
20 hours ago

Financial Services, Cybersecurity and the Evolving Threat Landscape

Financial institutions can manage accelerating cyber threats by integrating resilience into daily operations, strengthening governance and risk management, and leveraging collaboration.
Information security
fromComputerWeekly.com
3 hours ago

Bulgaria fires up Google Cloud for national cyber security | Computer Weekly

Bulgaria deployed Google Cloud Cybershield to centralize AI-powered cyber intelligence and telemetry, reducing detection and response time across government entities.
Information security
fromThe Hacker News
14 hours ago

Grafana GitHub Breach Exposes Source Code via TanStack npm Attack

Breach impact was limited to Grafana Labs GitHub repositories, with no evidence of customer production systems or Grafana Cloud operations being compromised.
Information security
fromTechzine Global
1 day ago

Anthropic allows partners to share findings from Mythos

Partners in Project Glasswing may share Mythos cybersecurity findings, best practices, tools, and code with external parties under responsible disclosure standards.
Information security
fromThe Hacker News
3 hours ago

Microsoft Open-Sources RAMPART and Clarity to Secure AI Agents During Development

RAMPART and Clarity provide open-source tools for testing AI agents’ safety and security and for pressure-testing assumptions early in development.
#code-signing-abuse
Information security
fromtheregister
22 hours ago

Microsoft shuts down illegal code-signing operation used by ransomware crims to mask their malware

Microsoft seized websites and took down a code-signing certificate service used to make ransomware and malware appear legitimate, infecting thousands of US machines including Microsoft-owned systems.
Information security
fromNextgov.com
1 day ago

Microsoft disrupts cybercrime service offering malware disguised as legitimate software

Fox Tempest abused Microsoft code-signing tools to sell malware-signing services, leading to widespread ransomware and malicious attacks across multiple sectors and countries.
Information security
fromtheregister
22 hours ago

Microsoft shuts down illegal code-signing operation used by ransomware crims to mask their malware

Microsoft seized websites and took down a code-signing certificate service used to make ransomware and malware appear legitimate, infecting thousands of US machines including Microsoft-owned systems.
Information security
fromNextgov.com
1 day ago

Microsoft disrupts cybercrime service offering malware disguised as legitimate software

Fox Tempest abused Microsoft code-signing tools to sell malware-signing services, leading to widespread ransomware and malicious attacks across multiple sectors and countries.
Information security
fromThe Hacker News
10 hours ago

Microsoft Releases Mitigation for YellowKey BitLocker Bypass CVE-2026-45585 Exploit

Microsoft released a mitigation for the YellowKey BitLocker bypass vulnerability (CVE-2026-45585) affecting multiple Windows 11 and Windows Server 2025 versions.
Information security
fromGameSpot
3 hours ago

Your Nvidia GPU Needs A Driver Update Right Now, Unless You Enjoy Surprise Malware DLC

Update Nvidia GPU display drivers to address a Windows and Linux driver vulnerability that could enable unauthorized access, data theft, or malicious code injection.
Information security
fromMail Online
4 hours ago

Warning to Gmail users over fake 'friend' invites stealing accounts

Phishing emails disguised as trusted e-invitations can steal Google credentials or install malware after users click RSVP links.
Information security
fromSecuritymagazine
20 hours ago

GitHub Breached, Internal Repositories Exposed

An unauthorized actor accessed GitHub internal repositories via a compromised employee device and an impacted VS Code extension, with TeamPCP claiming responsibility and selling access data.
fromtheregister
9 hours ago

GitHub says internal repos exfiltrated after poisoned VS Code extension attack

GitHub, the world's biggest code repository and DevOps platform, fell victim to a malicious Visual Studio Code (VS Code) extension. The company's initial assessment is that only internal repositories were exfiltrated. The incident was reported by GitHub on X, with follow-up posts revealing a "poisoned VS Code extension" as the cause. The Microsoft-owned code shack continues to "analyze logs, validate secret rotation, and monitor for any follow-on activity."
Information security
Information security
fromSecurityWeek
4 hours ago

Microsoft Rolls Out Mitigations for 'YellowKey' BitLocker Bypass

YellowKey enables physical attackers to bypass BitLocker by spawning a shell in recovery mode, and Microsoft provides mitigations to restore WinRE protection.
fromInfoWorld
4 hours ago

GitHub admits major source code leak after 3,800 internal repositories breached

“Yesterday we detected and contained a compromise of an employee device involving a poisoned VS [Visual Studio] Code extension. We removed the malicious extension version, isolated the endpoint, and began incident response immediately,” GitHub said.
Information security
fromSecurityWeek
4 hours ago

Quantum Bridge Raises $8 Million for Quantum-Safe Key Distribution Solution

Quantum Bridge announced on Wednesday that it has raised $8 million in Series A funding for its quantum-safe key distribution solution. The new funding, which brings the total raised by the company to $16 million, was supported by Wayra (Telefónica), Cadenza VC, Club degli Investitori angels, HPE, and Bacchus Venture Capital.
Information security
Information security
fromtheregister
1 day ago

Shadow AI invades the workplace, up 4x in the last year

Unauthorized personal accounts are increasingly used to access workplace AI tools, driving a surge in non-malicious insider risk and potential proprietary data exposure.
Information security
fromThe Hacker News
1 day ago

The New Phishing Click: How OAuth Consent Bypasses MFA

EvilTokens used OAuth consent to steal refresh tokens, bypassing MFA and avoiding sign-in detection by exploiting routine user clicks on microsoft.com/devicelogin.
Information security
fromComputerWeekly.com
1 day ago

Assume autonomy: Why security teams need to rethink defence at machine speed | Computer Weekly

Cybersecurity must shift from human-speed assumptions to an Assume Autonomy mindset, because AI enables autonomous discovery, exploitation, and lateral movement faster than current defenses.
#software-supply-chain-attacks
Information security
fromThe Hacker News
1 day ago

Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account

A compromised npm maintainer account pushed trojanized @antv and related packages, embedding credential-stealing code and creating significant downstream exposure for auto-updating dependencies.
Information security
fromThe Hacker News
1 day ago

Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account

A compromised npm maintainer account pushed trojanized @antv and related packages, embedding credential-stealing code and creating significant downstream exposure for auto-updating dependencies.
Information security
fromThe Hacker News
1 day ago

GitHub Actions Supply Chain Attack Redirects Tags to Steal CI/CD Credentials

Compromised GitHub Actions workflows use imposter commits to steal CI/CD credentials and exfiltrate them to attacker-controlled servers.
Information security
fromInfoWorld
1 day ago

GitHub scales back bug bounties, reminds users security is their responsibility too

Security reports should show real security impact caused by GitHub, not user choices or hardening/documentation issues, and AI use is encouraged.
Information security
fromThe Hacker News
1 day ago

Trapdoor Android Ad Fraud Scheme Hit 659 Million Daily Bid Requests Using 455 Apps

Trapdoor uses malicious Android apps and malvertising to drive installs, hidden WebViews, and HTML5 ad requests, generating self-sustaining fraud revenue.
Information security
fromTNW | Anthropic
1 day ago

Project Glasswing partners can now share Mythos findings beyond the programme

Partners can share Mythos vulnerability findings with external security teams, regulators, open-source maintainers, and the public under responsible-disclosure norms.
Information security
fromSecurityWeek
1 day ago

Unpatched ChromaDB Vulnerability Can Lead to Server Takeover

An unpatched ChromaDB flaw enables pre-authentication remote code execution, letting unauthenticated attackers spawn a shell and access server data.
#npm-supply-chain-attacks
Information security
fromtheregister
1 day ago

Shai-Hulud keeps burrowing: 314 npm packages infected after another account compromise

An npm account compromise injected malware into 314 packages, stole cloud and GitHub credentials, and used GitHub as command-and-control via automated token-driven activity.
Information security
fromThe Hacker News
2 days ago

Four Malicious npm Packages Deliver Infostealers and Phantom Bot DDoS Malware

Four npm packages were found to contain information-stealing malware, including a clone of the Shai-Hulud worm and a Golang DDoS botnet payload.
Information security
fromtheregister
1 day ago

Shai-Hulud keeps burrowing: 314 npm packages infected after another account compromise

An npm account compromise injected malware into 314 packages, stole cloud and GitHub credentials, and used GitHub as command-and-control via automated token-driven activity.
Information security
fromThe Hacker News
2 days ago

Four Malicious npm Packages Deliver Infostealers and Phantom Bot DDoS Malware

Four npm packages were found to contain information-stealing malware, including a clone of the Shai-Hulud worm and a Golang DDoS botnet payload.
#data-breach
Information security
fromSecuritymagazine
1 day ago

Should Customers Worry About the 7-Eleven Data Breach?

Unauthorized access exposed franchise application information stored in 7-Eleven systems, potentially including names and addresses, with other elements unconfirmed.
Information security
fromSecuritymagazine
2 days ago

123,000 Impacted by American Lending Center's Year-Old Breach

A banking and finance data breach involved ransomware, with possible access to sensitive personal information affecting over 123,000 individuals.
Information security
fromSecurityWeek
2 days ago

Grafana Confirms Breach After Hackers Claim They Stole Data

A compromised GitHub token enabled attackers to download Grafana’s codebase, demand ransom, and threaten leaks, but no customer data was taken and systems were unaffected.
Information security
fromSecurityWeek
2 days ago

7-Eleven Data Breach Confirmed After ShinyHunters Ransom Demand

7-Eleven confirmed a data breach tied to ShinyHunters, involving compromised franchisee application data and security incident notices sent to affected parties.
Information security
fromSecuritymagazine
1 day ago

Should Customers Worry About the 7-Eleven Data Breach?

Unauthorized access exposed franchise application information stored in 7-Eleven systems, potentially including names and addresses, with other elements unconfirmed.
Information security
fromSecuritymagazine
2 days ago

123,000 Impacted by American Lending Center's Year-Old Breach

A banking and finance data breach involved ransomware, with possible access to sensitive personal information affecting over 123,000 individuals.
Information security
fromSecurityWeek
2 days ago

Grafana Confirms Breach After Hackers Claim They Stole Data

A compromised GitHub token enabled attackers to download Grafana’s codebase, demand ransom, and threaten leaks, but no customer data was taken and systems were unaffected.
Information security
fromSecurityWeek
2 days ago

7-Eleven Data Breach Confirmed After ShinyHunters Ransom Demand

7-Eleven confirmed a data breach tied to ShinyHunters, involving compromised franchisee application data and security incident notices sent to affected parties.
#cybercrime
Information security
fromSecurityWeek
1 day ago

Microsoft Disrupts Malware-Signing Service Run by 'Fox Tempest'

Fox Tempest used malware-signing-as-a-service with short-lived code-signing certificates to evade detection, and Microsoft disrupted it by revoking certificates, seizing infrastructure, and filing lawsuits.
Information security
fromtheregister
2 days ago

Grafana Labs admits all its codebase are belong to someone who popped its GitHub account

An attacker stole Grafana Labs’ GitHub codebase and demanded ransom to prevent release, but Grafana decided not to pay.
Information security
fromSecurityWeek
1 day ago

Microsoft Disrupts Malware-Signing Service Run by 'Fox Tempest'

Fox Tempest used malware-signing-as-a-service with short-lived code-signing certificates to evade detection, and Microsoft disrupted it by revoking certificates, seizing infrastructure, and filing lawsuits.
Information security
fromtheregister
2 days ago

Grafana Labs admits all its codebase are belong to someone who popped its GitHub account

An attacker stole Grafana Labs’ GitHub codebase and demanded ransom to prevent release, but Grafana decided not to pay.
Information security
fromThe Hacker News
1 day ago

SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic Access

Multiple unauthenticated vulnerabilities in SEPPMail Secure E-Mail Gateway enable remote code execution and unauthorized access to arbitrary mail and local files.
Information security
fromtheregister
1 day ago

America's top cyber-defense agency left a GitHub repo open with with passwords, keys, tokens - and incredibly obvious filenames

A public GitHub repository exposed CISA secrets for six months, including tokens, keys, credentials, and certificates, until removal after reporting.
Information security
fromSecurityWeek
1 day ago

Critical Vulnerability Exposes Industrial Robot Fleets to Hacking

PolyScope 5 Dashboard Server has a critical command injection flaw patched in PolyScope 5.25.1, enabling unauthenticated remote code execution if reachable.
Information security
fromEntrepreneur
1 day ago

Your Next Scam Call Could Sound Exactly Like Your Child. 77% of People Who Received One Lost Money.

AI voice cloning scams can target one in four people, using three seconds of audio to create convincing voice messages that cause financial losses.
Information security
fromNextgov.com
1 day ago

Telecom firms form new cyber information-sharing group

Major telecom companies formed C2 ISAC to share real-time cybersecurity intelligence and coordinate defenses against persistent network threats.
Information security
fromSecurityWeek
1 day ago

Legacy Windows Tool MSHTA Fuels Surge in Silent Malware Attacks

MSHTA enables Microsoft-signed execution of remote scripts, making it a growing LOLBIN used to deliver and persist malware despite legitimate backward compatibility.
Information security
fromSecurityWeek
1 day ago

PoC Released for DirtyDecrypt Linux Kernel Vulnerability

DirtyDecrypt (DirtyCBC) exploits a missing copy-on-write guard in rxgk_decrypt_skb to overwrite privileged memory or page cache and gain root privileges.
Information security
fromSecurityWeek
1 day ago

Drupal to Patch Highly Critical Vulnerability at Risk of Quick Exploitation

Drupal will release patches for a highly critical vulnerability on May 20, with mitigation guidance provided and potential exploitation expected soon after disclosure.
Information security
fromTechCrunch
23 hours ago

From teen hacker to Iron Dome researcher, this founder raised $28M to fight AI phishing | TechCrunch

Ocean builds an agentic email security platform that uses AI to detect AI-powered phishing and impersonation by analyzing email context at scale.
fromnews.bitcoin.com
1 day ago

Echo Protocol Pauses Monad Bridge After Admin Key Breach Sparks $816K Loss

An attacker compromised an administrative key tied to Echo Protocol’s deployment on the Monad blockchain network and used it to mint 1,000 eBTC tokens valued at about $76.7 million. The attacker granted their own wallet minting privileges, then deposited 45 eBTC as collateral into the Curvance decentralized lending protocol. Using that collateral, the attacker borrowed 11.29 WBTC, bridged the borrowed assets to Ethereum, swapped them for ETH, and sent about 385 ETH into Tornado Cash.
Information security
fromTechRepublic
2 days ago

Grafana Rejects Ransom Demand After GitHub Breach Exposes Codebase Theft

Grafana has confirmed that an unauthorized party gained access to its GitHub environment after obtaining a compromised token, allowing the attacker to download parts of its codebase. In a public statement shared on X, the company said its investigation found no evidence that customer data or personal information was accessed and that no evidence that customer systems or operations were affected. The breach was discovered after unusual activity triggered a forensic investigation.
Information security
#phishing
Information security
fromThe Hacker News
2 days ago

How to Reduce Phishing Exposure Before It Turns into Business Disruption

Early phishing detection turns uncertain exposure into evidence, speeds response, and prevents one click from escalating into account compromise, remote access, or disruption.
Information security
fromThe Hacker News
2 days ago

How to Reduce Phishing Exposure Before It Turns into Business Disruption

Early phishing detection turns uncertain exposure into evidence, speeds response, and prevents one click from escalating into account compromise, remote access, or disruption.
Information security
fromThe Hacker News
2 days ago

Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More

Exploited vulnerabilities in trusted systems enable key leakage, cloud access, and production incidents, so patching quiet risks first reduces fast-moving attack impact.
Information security
fromZDNET
2 days ago

5 ways to fortify your network against the new speed of AI attacks

Enterprise intrusions are accelerating as attackers automate handoffs, while humans remain the weakest link, requiring structural network defenses and preventative security changes.
Information security
fromThe Hacker News
2 days ago

Developer Workstations Are Now Part of the Software Supply Chain

Supply chain attacks increasingly target developer and CI/CD credentials, turning trusted software ecosystems into credential-harvesting operations.
Information security
fromSecuritymagazine
2 days ago

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

MFA is often not bypassed; attackers exploit post-authentication or identity lifecycle gaps, so defenses should focus on session monitoring and risk evaluation.
Information security
fromThe Hacker News
2 days ago

Ivanti, Fortinet, SAP, VMware, n8n Patch RCE, SQL Injection, Privilege Escalation Flaws

Security fixes address critical vulnerabilities across Ivanti, Fortinet, and SAP that could enable authentication bypass, unauthorized code execution, and sensitive data exposure.
Information security
fromTechRepublic
1 week ago

Microsoft's Patch Tuesday Update Targets 120 Security Flaws

May Patch Tuesday fixed 120 vulnerabilities, including 31 remote code execution and 61 privilege escalation flaws, with no zero-days reported, requiring prompt IT updates.
Information security
fromSecurityWeek
2 days ago

'Claw Chain' OpenClaw Flaws Allow Sandbox Escape, Backdoor Delivery

Chained OpenClaw vulnerabilities let attackers with sandbox code execution control the agent, bypass restrictions, steal secrets, escalate privileges, and persist on the host.
Information security
fromNextgov.com
1 day ago

Advanced AI models bring government to 'reflection point,' CIA official says

Advanced AI with hacking-like capabilities should be treated as a reflection point for federal agencies handling sensitive information.
#windows-privilege-escalation
Information security
fromSecurityWeek
2 days ago

Researcher Drops MiniPlasma Windows Exploit for Unpatched 2020 CVE

MiniPlasma exploits CVE-2020-17103 in the Windows Cloud Filter driver to gain a System shell, indicating the vulnerability may remain unpatched on Windows 11.
Information security
fromThe Hacker News
2 days ago

MiniPlasma Windows 0-Day Enables SYSTEM Privilege Escalation on Fully Patched Systems

MiniPlasma enables SYSTEM-level privilege escalation on fully patched Windows systems by exploiting cldflt.sys in HsmOsBlockPlaceholderAccess.
Information security
fromSecurityWeek
2 days ago

Researcher Drops MiniPlasma Windows Exploit for Unpatched 2020 CVE

MiniPlasma exploits CVE-2020-17103 in the Windows Cloud Filter driver to gain a System shell, indicating the vulnerability may remain unpatched on Windows 11.
Information security
fromThe Hacker News
2 days ago

MiniPlasma Windows 0-Day Enables SYSTEM Privilege Escalation on Fully Patched Systems

MiniPlasma enables SYSTEM-level privilege escalation on fully patched Windows systems by exploiting cldflt.sys in HsmOsBlockPlaceholderAccess.
Information security
fromArs Technica
2 days ago

Bug bounty businesses bombarded with AI slop

AI-generated bug reports are flooding bug bounty programs with false, low-quality submissions, forcing some companies to suspend or change these schemes.
Information security
fromTNW | Data-Security
2 days ago

Grafana Labs refuses ransom after hackers steal already-open-source code

Hackers stole Grafana’s open-source codebase and demanded ransom to prevent release; Grafana refused, citing FBI guidance and security controls.
Information security
fromtheregister
2 days ago

Linux kernel flaw opens root-only files to unprivileged users

A local kernel flaw lets unprivileged users read root-only files, but a fix landed and ModuleJail aims to reduce similar bug impact.
Information security
fromtheregister
2 days ago

NGINX Rift attackers waste no time targeting exposed servers

An unauthenticated heap buffer overflow in NGINX can crash worker processes and, under rare conditions, enable code execution, with active exploitation observed days after disclosure.
from24/7 Wall St.
2 days ago

Okta Price Target Bumped to $103 at KeyBanc as Security Spending Catches Fire

Analyst Eric Heath raised the firm’s price target on Okta to $103 from $95 and kept an Overweight rating on the shares, citing a sharper outlook for enterprise security spending in the back half of the year.
Information security
Information security
fromThe Hacker News
2 days ago

INTERPOL Operation Ramz Disrupts MENA Cybercrime Networks with 201 Arrests

A coordinated MENA cybercrime crackdown arrested 201 suspects, identified 382 more, seized 53 servers, and disrupted phishing and malware operations across 13 countries.
Information security
fromnews.bitcoin.com
2 days ago

Crypto Bridge Exploits Hit $328.6M in May as Peckshield Tracks 8 Major Incidents

Bridge verification weaknesses enabled multiple cross-chain exploits, draining $328.6M by mid-May 2026 and pushing 2026 losses past $750M.
fromSecurityWeek
2 days ago

Hackers Earn $1.3 Million at Pwn2Own Berlin 2026

According to TrendAI's Zero Day Initiative (ZDI), white hat hackers have been awarded $1,298,250 for 47 unique vulnerabilities. Nearly $750,000 of the total amount was won by the first two teams: Devcore and StarLabs SG. The two teams also received the highest payouts for a single exploit chain. Devcore earned $200,000 for a remote code execution exploit with System privileges on Microsoft Exchange, and $175,000 for a Microsoft Edge sandbox escape. It also received $100,000 for exploiting Microsoft SharePoint.
Information security
[ Load more ]