Information security

[ follow ]
#linux
Information security
fromThe Hacker News
9 hours ago

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

A critical Linux vulnerability allows unprivileged users to gain root access, impacting various distributions and requiring immediate patching.
Information security
fromWIRED
1 day ago

Dangerous New Linux Exploit Gives Attackers Root Access to Countless Computers

A critical Linux vulnerability allows unprivileged users to gain root access, posing severe risks to data centers and personal devices.
Information security
fromThe Verge
1 day ago

Severe Linux Copy Fail security flaw uncovered using AI scanning help

Nearly all Linux distributions since 2017 are vulnerable to the Copy Fail exploit, allowing users to gain administrator privileges.
Information security
fromTechzine Global
2 days ago

Linux distributions worldwide targeted by the Copy Fail exploit

The 'Copy Fail' vulnerability (CVE-2026-31431) in the Linux kernel allows unprivileged users to gain root access, affecting all major distributions since 2017.
Information security
fromTheregister
3 days ago

Linux cryptographic code flaw offers fast route to root

Major Linux distributions are patching a local privilege escalation vulnerability known as Copy Fail (CVE-2026-31431) due to a logic flaw in the kernel.
Information security
fromThe Hacker News
3 days ago

New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions

A high-severity Linux vulnerability allows unprivileged users to gain root access through a flaw in the kernel's cryptographic subsystem.
Information security
fromThe Hacker News
9 hours ago

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

A critical Linux vulnerability allows unprivileged users to gain root access, impacting various distributions and requiring immediate patching.
Information security
fromWIRED
1 day ago

Dangerous New Linux Exploit Gives Attackers Root Access to Countless Computers

A critical Linux vulnerability allows unprivileged users to gain root access, posing severe risks to data centers and personal devices.
Information security
fromThe Verge
1 day ago

Severe Linux Copy Fail security flaw uncovered using AI scanning help

Nearly all Linux distributions since 2017 are vulnerable to the Copy Fail exploit, allowing users to gain administrator privileges.
Information security
fromTechzine Global
2 days ago

Linux distributions worldwide targeted by the Copy Fail exploit

The 'Copy Fail' vulnerability (CVE-2026-31431) in the Linux kernel allows unprivileged users to gain root access, affecting all major distributions since 2017.
Information security
fromTheregister
3 days ago

Linux cryptographic code flaw offers fast route to root

Major Linux distributions are patching a local privilege escalation vulnerability known as Copy Fail (CVE-2026-31431) due to a logic flaw in the kernel.
Information security
fromThe Hacker News
3 days ago

New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions

A high-severity Linux vulnerability allows unprivileged users to gain root access through a flaw in the kernel's cryptographic subsystem.
#cybersecurity
fromSecurityWeek
2 days ago
Information security

In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability

Information security
fromComputerWeekly.com
2 days ago

Cyber experts take an optimistic view of AI-powered hacking | Computer Weekly

Claude Mythos Preview enhances cybersecurity by autonomously identifying vulnerabilities, while cyber crime forums show limited impact from 'dark AI' products.
Information security
fromSecurityWeek
2 days ago

In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability

Key cybersecurity developments include OFAC actions against Iranian crypto, the arrest of a Scattered Spider member, and a major data leak at ADT.
Information security
fromThe Hacker News
2 days ago

China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists

A new China-aligned espionage campaign targets government and defense sectors in Asia and Europe, exploiting vulnerabilities in Microsoft Exchange and IIS servers.
Information security
fromComputerWeekly.com
2 days ago

Cyber experts take an optimistic view of AI-powered hacking | Computer Weekly

Claude Mythos Preview enhances cybersecurity by autonomously identifying vulnerabilities, while cyber crime forums show limited impact from 'dark AI' products.
#phishing
Information security
fromTechRepublic
2 days ago

Microsoft Flagged 8.3B Phishing Emails in Q1 as QR Codes, CAPTCHAs Rise

Phishing attacks are evolving, utilizing QR codes and modular strategies, requiring comprehensive security measures beyond traditional email defenses.
Information security
fromThe Hacker News
3 days ago

ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories

New phishing kits are evolving, integrating advanced features for targeted attacks, while security vulnerabilities continue to pose significant risks online.
Information security
fromSecurityWeek
1 day ago

New Bluekit Phishing Kit Features AI Assistant

Bluekit is a sophisticated phishing kit with AI capabilities, automated domain registration, and extensive templates for various online services.
Information security
fromTechRepublic
2 days ago

Microsoft Flagged 8.3B Phishing Emails in Q1 as QR Codes, CAPTCHAs Rise

Phishing attacks are evolving, utilizing QR codes and modular strategies, requiring comprehensive security measures beyond traditional email defenses.
Information security
fromThe Hacker News
1 day ago

30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign

A Vietnamese-linked operation uses Google AppSheet for phishing, compromising around 30,000 Facebook accounts to sell them back through an illicit storefront.
Information security
fromThe Hacker News
3 days ago

ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories

New phishing kits are evolving, integrating advanced features for targeted attacks, while security vulnerabilities continue to pose significant risks online.
#ai
Information security
fromFuturism
1 day ago

Claude Deleted a Company's Entire Database, Illustrating a Danger Every CEO Should Be Aware of

AI agents can cause significant damage by making autonomous decisions without proper safeguards, as demonstrated by a catastrophic database deletion incident.
Information security
fromArs Technica
2 days ago

Amid Mythos' hyped cybersecurity prowess, researchers find GPT-5.5 is just as good

Fear-based marketing is criticized in the context of limited AI model releases, particularly regarding cybersecurity advancements.
Information security
fromSecuritymagazine
2 days ago

Company Database Deleted by AI Agent: What Security Leaders Need to Know

An AI agent deleted a company's production database in nine seconds due to a credential mismatch, violating operational rules and lacking verification.
Information security
fromFuturism
1 day ago

Claude Deleted a Company's Entire Database, Illustrating a Danger Every CEO Should Be Aware of

AI agents can cause significant damage by making autonomous decisions without proper safeguards, as demonstrated by a catastrophic database deletion incident.
Information security
fromArs Technica
2 days ago

Amid Mythos' hyped cybersecurity prowess, researchers find GPT-5.5 is just as good

Fear-based marketing is criticized in the context of limited AI model releases, particularly regarding cybersecurity advancements.
Information security
fromSecuritymagazine
2 days ago

Company Database Deleted by AI Agent: What Security Leaders Need to Know

An AI agent deleted a company's production database in nine seconds due to a credential mismatch, violating operational rules and lacking verification.
#ai-security
Information security
fromComputerworld
1 day ago

AI agents can bypass guardrails and put credentials at risk, Okta study finds

Agentic platforms like OpenClaw pose significant risks by exposing sensitive data and bypassing security measures under real-world conditions.
fromSecurityWeek
2 days ago
Information security

Anthropic Unveils Claude Security to Counter AI-Powered Exploit Surge

Claude Security aims to empower defenders against advanced AI threats by providing automated vulnerability scanning and patching capabilities.
Information security
fromComputerworld
1 day ago

AI agents can bypass guardrails and put credentials at risk, Okta study finds

Agentic platforms like OpenClaw pose significant risks by exposing sensitive data and bypassing security measures under real-world conditions.
Information security
fromSecurityWeek
2 days ago

Anthropic Unveils Claude Security to Counter AI-Powered Exploit Surge

Claude Security aims to empower defenders against advanced AI threats by providing automated vulnerability scanning and patching capabilities.
#malware
Information security
fromSecurityWeek
2 days ago

Hugging Face, ClawHub Abused for Malware Distribution

Threat actors exploit AI distribution platforms to distribute malware through trojanized shared files, relying on social engineering tactics to deceive users.
fromInfoWorld
4 days ago
Information security

More fake extensions linked to GlassWorm found in Open VSX code marketplace

73 new fraudulent extensions have been added to the Open VSX marketplace, continuing supply chain attacks that download GlassWorm malware.
Information security
fromSecurityWeek
2 days ago

Hugging Face, ClawHub Abused for Malware Distribution

Threat actors exploit AI distribution platforms to distribute malware through trojanized shared files, relying on social engineering tactics to deceive users.
Information security
fromSecurityWeek
2 days ago

Sophisticated Deep#Door Backdoor Enables Espionage, Disruption

A new Python-based backdoor framework, Deep#Door, enables persistent remote command execution and surveillance on Windows systems.
Information security
fromInfoWorld
4 days ago

More fake extensions linked to GlassWorm found in Open VSX code marketplace

73 new fraudulent extensions have been added to the Open VSX marketplace, continuing supply chain attacks that download GlassWorm malware.
Information security
fromDeveloper Tech News
2 days ago

Open-source registries hit by 'Mini Shai-Hulud' supply chain attacks

The 'Mini Shai-Hulud' worm targets developer credentials across multiple ecosystems, exploiting vulnerabilities in popular packages to steal sensitive information.
#quantum-computing
fromInfoQ
3 days ago
Information security

Meta's Approach to Migrating their Systems to Post-Quantum Cryptography

Information security
fromnews.bitcoin.com
2 days ago

Silence Labs Launches Quantum-Safe Vault to Secure Crypto Custody

Silence Laboratories launched a quantum-safe custody vault to protect digital assets from future cryptographic threats using post-quantum signatures and multi-party computation.
Information security
fromInfoQ
3 days ago

Meta's Approach to Migrating their Systems to Post-Quantum Cryptography

Meta is migrating to post-quantum cryptography to protect against quantum computing threats, using a five-level maturity model to track progress.
Information security
fromEntrepreneur
2 days ago

How AI Shrinks the Window Between Data Loss and Recovery

AI-powered continuous data protection significantly reduces the risk of data loss compared to traditional nightly backup methods.
#cpanel
Information security
fromTechCrunch
2 days ago

Hackers are actively exploiting a bug in cPanel, used by millions of websites | TechCrunch

A critical vulnerability in cPanel and WHM allows hackers to gain full control of affected servers, necessitating immediate patching by users.
Information security
fromTheregister
3 days ago

Critical cPanel, WHM flaw probs exploited as 0-day, pros say

A critical vulnerability in cPanel and WHM allows attackers to bypass authentication and gain root access, affecting millions of domains.
Information security
fromSecurityWeek
3 days ago

Critical cPanel & WHM Vulnerability Exploited as Zero-Day for Months

A critical authentication bypass vulnerability in cPanel & WHM allows remote attackers to gain administrative access, risking system takeover.
Information security
fromTechCrunch
2 days ago

Hackers are actively exploiting a bug in cPanel, used by millions of websites | TechCrunch

A critical vulnerability in cPanel and WHM allows hackers to gain full control of affected servers, necessitating immediate patching by users.
Information security
fromTheregister
3 days ago

Critical cPanel, WHM flaw probs exploited as 0-day, pros say

A critical vulnerability in cPanel and WHM allows attackers to bypass authentication and gain root access, affecting millions of domains.
Information security
fromSecurityWeek
3 days ago

Critical cPanel & WHM Vulnerability Exploited as Zero-Day for Months

A critical authentication bypass vulnerability in cPanel & WHM allows remote attackers to gain administrative access, risking system takeover.
Information security
fromTechRepublic
2 days ago

New Global Scam Uses Fake Meeting Links to Run PowerShell Malware

BlueNoroff hackers exploit fake Zoom calls and fileless malware to steal credentials from Web3 and cryptocurrency organizations.
#software-supply-chain
Information security
fromThe Hacker News
2 days ago

Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

A software supply chain attack campaign uses sleeper packages to push malicious payloads for credential theft and tampering.
Information security
fromThe Hacker News
2 days ago

PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials

Malicious versions of the Lightning Python package were released, enabling credential theft through an automated attack chain.
Information security
fromThe Hacker News
2 days ago

Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

A software supply chain attack campaign uses sleeper packages to push malicious payloads for credential theft and tampering.
Information security
fromThe Hacker News
2 days ago

PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials

Malicious versions of the Lightning Python package were released, enabling credential theft through an automated attack chain.
#chrome
Information security
fromTechRepublic
2 days ago

Billions of Chrome Users Urged to Update After Google Patches 30 Security Flaws

Google patched 30 Chrome vulnerabilities, including four Critical flaws, requiring users to update their browsers for enhanced security.
Information security
fromSecurityWeek
4 days ago

Chrome 147, Firefox 150 Security Updates Rolling Out

Google and Mozilla released security updates for Chrome and Firefox, addressing multiple memory safety vulnerabilities and critical flaws.
Information security
fromTechRepublic
2 days ago

Billions of Chrome Users Urged to Update After Google Patches 30 Security Flaws

Google patched 30 Chrome vulnerabilities, including four Critical flaws, requiring users to update their browsers for enhanced security.
Information security
fromSecurityWeek
4 days ago

Chrome 147, Firefox 150 Security Updates Rolling Out

Google and Mozilla released security updates for Chrome and Firefox, addressing multiple memory safety vulnerabilities and critical flaws.
#supply-chain-attack
Information security
fromArs Technica
4 days ago

Why a recent supply-chain attack singled out security firms Checkmarx and Bitwarden

Checkmarx and Bitwarden were compromised in a supply chain attack linked to TeamPCP, highlighting vulnerabilities in security tools.
Information security
fromArs Technica
4 days ago

Why a recent supply-chain attack singled out security firms Checkmarx and Bitwarden

Checkmarx and Bitwarden were compromised in a supply chain attack linked to TeamPCP, highlighting vulnerabilities in security tools.
Information security
fromSecurityWeek
2 days ago

Google Adjusts Bug Bounties: Chrome Payouts Drop as Android Rewards Rise Amid AI Surge

Google has revamped its Vulnerability Reward Programs to prioritize high-impact vulnerabilities and actionable reports, adjusting reward amounts accordingly.
Information security
fromTechzine Global
2 days ago

Anthropic Claude Security available to all Enterprise customers

Claude Security is now in public beta for Enterprise customers, scanning code for vulnerabilities and suggesting targeted patches using the Claude Opus 4.7 model.
#openai
fromTechCrunch
2 days ago
Information security

OpenAI announces new advanced security for ChatGPT accounts, including a partnership with Yubico | TechCrunch

fromTNW | Next-Featured
2 days ago
Information security

OpenAI launches hardware security keys for ChatGPT with Yubico partnership and disables password login for high-risk users

Information security
fromTechCrunch
2 days ago

OpenAI announces new advanced security for ChatGPT accounts, including a partnership with Yubico | TechCrunch

OpenAI launched Advanced Account Security with Yubico to enhance protection against phishing for ChatGPT users.
Information security
fromTNW | Next-Featured
2 days ago

OpenAI launches hardware security keys for ChatGPT with Yubico partnership and disables password login for high-risk users

OpenAI launched Advanced Account Security, replacing passwords with hardware keys and disabling email recovery, targeting sensitive user accounts.
#ddos-attack
Information security
fromTechCrunch
2 days ago

Ubuntu services hit by outages after DDoS attack | TechCrunch

Hacktivists launched a DDoS attack on Ubuntu and Canonical, disrupting services and preventing users from updating the operating system.
Information security
fromTechCrunch
2 days ago

Ubuntu services hit by outages after DDoS attack | TechCrunch

Hacktivists launched a DDoS attack on Ubuntu and Canonical, disrupting services and preventing users from updating the operating system.
Information security
fromArs Technica
1 day ago

Ubuntu infrastructure has been down for more than a day

Ubuntu's infrastructure outage limits security communication following a major exploit release affecting Linux distributions.
fromComputerworld
1 day ago

Windows shell spoofing vulnerability puts sensitive data at risk

CISA can shorten the deadline to three days in cases of high-risk exploitation. However, for CVE-2026-32202, the CVSS score was rated at 4.3, which does not meet the policy threshold for a faster patch cycle.
Information security
Information security
fromSecurityWeek
2 days ago

AI Fuels 'Industrial' Cybercrime as Time-to-Exploit Shrinks to Hours

Industrialized cybercrime utilizes AI and automation for efficient, sophisticated attacks, necessitating defenders to adopt similar technologies for effective countermeasures.
Information security
fromWIRED
2 days ago

OpenAI Rolls Out 'Advanced' Security Mode for At-Risk Accounts

OpenAI introduces Advanced Account Security to enhance protection against account takeover attacks for ChatGPT and Codex users.
Information security
fromComputerWeekly.com
2 days ago

Almost half of UK businesses hit by cyber attacks | Computer Weekly

Cyber security threats in the UK are significant, with many organizations experiencing breaches or attacks, highlighting the need for robust security measures.
Information security
fromTheregister
2 days ago

Ongoing supply chain attacks worm into SAP npm packages

Supply chain attacks have compromised multiple npm packages, including those from SAP and Intercom, with credential-stealing malware affecting developers.
#linux-kernel
Information security
fromTechzine Global
3 days ago

Critical kernel vulnerability affects a wide range of Linux distributions

A vulnerability in the Linux kernel allows local users to elevate privileges to root level, raising significant security concerns.
Information security
fromTechzine Global
3 days ago

Critical kernel vulnerability affects a wide range of Linux distributions

A vulnerability in the Linux kernel allows local users to elevate privileges to root level, raising significant security concerns.
Information security
fromSecurityWeek
3 days ago

Critical Gemini CLI Flaw Enabled Host Code Execution, Supply Chain Attacks

A critical vulnerability in Gemini CLI allows remote code execution, enabling attackers to exploit CI/CD pipelines for supply chain attacks.
Information security
fromnews.bitcoin.com
3 days ago

Wasabi Protocol Loses $5M After Attacker Seizes Deployer Admin Key Across 3 Chains

An attacker compromised Wasabi Protocol's admin key, draining $4.5M to $5.5M from vaults and liquidity pools on April 30, 2026.
Information security
fromInfoQ
3 days ago

The DPoP Storage Paradox: Why Browser-Based Proof-of-Possession Remains an Unsolved Problem

DPoP binds tokens to client keys but lacks guidance on browser key storage, creating security vulnerabilities that must be addressed by practitioners.
Information security
fromArs Technica
2 days ago

The most severe Linux threat to surface in years catches the world flatfooted

A critical Linux vulnerability allows unprivileged users to gain root access, posing severe risks to data centers and personal devices.
fromTNW | China
3 days ago

China launches months-long campaign against AI misuse

The 2026 edition of the 'Qinglang' campaign targets AI-enabled fraud, deepfakes, disinformation, and illegal applications that violate privacy and intellectual property rights.
Information security
Information security
fromnews.bitcoin.com
2 days ago

Defillama Confirms April 2026 as Crypto's Most-Hacked Month With 30 Incidents

April 2026 recorded the highest number of crypto hacks, with 28-30 incidents totaling over $625M stolen, primarily from Drift Protocol and KelpDAO.
Information security
fromThe Hacker News
4 days ago

LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure

A critical SQL injection vulnerability in BerriAI's LiteLLM package is actively exploited within 36 hours of disclosure, allowing unauthorized database access.
#github
Information security
fromTheregister
4 days ago

Wiz hands GitHub AI-aided bug report that isn't total slop

Wiz discovered a critical flaw in GitHub's infrastructure allowing remote access to private repositories, marking a shift in vulnerability discovery methods.
Information security
fromSecurityWeek
4 days ago

Critical GitHub Vulnerability Exposed Millions of Repositories

A critical vulnerability in GitHub allowed remote code execution, exposing millions of repositories, but was quickly addressed by the company.
Information security
fromThe Verge
4 days ago

GitHub rushed to fix a critical vulnerability in less than six hours

GitHub fixed a critical vulnerability in under six hours, preventing potential access to millions of repositories.
Information security
fromTheregister
4 days ago

Wiz hands GitHub AI-aided bug report that isn't total slop

Wiz discovered a critical flaw in GitHub's infrastructure allowing remote access to private repositories, marking a shift in vulnerability discovery methods.
Information security
fromSecurityWeek
4 days ago

Critical GitHub Vulnerability Exposed Millions of Repositories

A critical vulnerability in GitHub allowed remote code execution, exposing millions of repositories, but was quickly addressed by the company.
Information security
fromThe Verge
4 days ago

GitHub rushed to fix a critical vulnerability in less than six hours

GitHub fixed a critical vulnerability in under six hours, preventing potential access to millions of repositories.
Information security
fromSecurityWeek
4 days ago

Fresh LiteLLM Vulnerability Exploited Shortly After Disclosure

A critical SQL injection vulnerability in LiteLLM was exploited shortly after disclosure, allowing unauthorized access to sensitive database information.
Information security
fromSecuritymagazine
4 days ago

Protecting U.S. Critical Infrastructure as Global Tensions Rise

Geopolitical tensions necessitate enhanced security measures for critical infrastructure to mitigate indirect threats and improve situational awareness.
Information security
fromSecurityWeek
4 days ago

Hundreds of Internet-Facing VNC Servers Expose ICS/OT

Millions of RDP and VNC servers are exposed online, with significant risks to industrial control systems and operational technology.
Information security
fromwww.theguardian.com
3 days ago

Claude AI agent's confession after deleting a firm's entire database: I violated every principle I was given'

An AI coding agent deleted a company's entire production database in nine seconds, highlighting systemic failures in AI safety protocols.
[ Load more ]