Information security

[ follow ]
Information security
fromSecurityWeek
1 hour ago

Cisco Patches Catalyst SD-WAN Zero-Day Exploited by Highly Sophisticated Hackers

Cisco released emergency patches for a critical zero-day vulnerability (CVE-2026-20127) in Catalyst SD-WAN that allows unauthenticated remote attackers to bypass authentication and gain administrative privileges.
Information security
fromSecurityWeek
1 hour ago

Trend Micro Patches Critical Apex One Vulnerabilities

TrendAI released patches for eight vulnerabilities in Apex One endpoint security, including two critical flaws allowing remote code execution on the management console.
Information security
fromThe Hacker News
4 hours ago

Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access

A maximum-severity authentication bypass vulnerability (CVE-2026-20127, CVSS 10.0) in Cisco Catalyst SD-WAN Controller and Manager has been actively exploited since 2023, allowing unauthenticated attackers to gain administrative privileges.
Information security
fromSecurityWeek
32 minutes ago

US Sanctions Russian Exploit Broker Operation Zero

The US government sanctioned seven individuals and entities for acquiring and distributing cyber exploits, including a Russian broker who paid $1.3 million for stolen zero-day exploits intended for government use.
Information security
fromInfoWorld
1 hour ago

Three web security blind spots in mobile DevSecOps pipelines

Mobile apps require fundamentally different security approaches than web applications because they operate as untrusted endpoints where attackers have physical access to the binary, making traditional web-centric security models inadequate.
fromSecuritymagazine
11 hours ago

How AI Could Impact Tax Season Security This Year

Tax season is stressful for many, making it an ideal time for scammers to target unsuspecting and distracted taxpayers. Awareness is our first, and best, line of defense. Criminals often pose as the IRS, payroll companies, tax preparation services, or even trusted financial institutions in an effort to steal money and sensitive information.
Information security
Information security
fromSecuritymagazine
11 hours ago

Harvest Now, Decrypt Later: Preparing for the Quantum Hangover

Adversaries are currently stealing encrypted data through harvest-now, decrypt-later attacks, planning to decrypt it once quantum computing matures, making the quantum threat an immediate cybersecurity concern rather than a distant future problem.
Information security
fromTheregister
53 minutes ago

GCHQ hunts for CISO with 130K top salary

GCHQ is recruiting a chief information security officer at £96,981 to £130,000 to lead cybersecurity defenses against advanced adversaries while managing risk and technological progress.
Information security
fromBleepingComputer
9 hours ago

Fake Next.js job interview tests backdoor developer's devices

Attackers deploy malicious Next.js repositories targeting developers through job-themed lures, using multiple execution triggers to achieve remote code execution and data exfiltration.
Information security
fromTheregister
10 hours ago

Claude's collaboration tools allowed remote code execution

Claude Code contained three security vulnerabilities allowing remote code execution and API key theft through malicious repository configurations, posing significant supply chain risks to developers.
Information security
fromSecurityWeek
19 hours ago

SolarWinds Patches Four Critical Serv-U Vulnerabilities

SolarWinds released patches for four critical vulnerabilities in Serv-U with CVSS scores of 9.1 that enable remote code execution when exploited by administrators.
Information security
fromThe Hacker News
20 hours ago

Malicious NuGet Packages Stole ASP.NET Data; npm Package Dropped Malware

Four malicious NuGet packages targeted ASP.NET developers to steal identity data, manipulate authorization rules, and establish persistent backdoors in applications.
Information security
fromThe Hacker News
1 day ago

SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution

SolarWinds released patches for four critical remote code execution vulnerabilities in Serv-U file transfer software, all rated 9.1 CVSS severity, requiring administrative privileges for exploitation.
Information security
fromComputerWeekly.com
17 hours ago

Cisco Catalyst SD-WAN users targeted in series of cyber attacks | Computer Weekly

UK and Five Eyes agencies warn of active threat campaigns targeting Cisco Catalyst SD-WAN products, requiring immediate investigation and patching of critical authentication bypass vulnerabilities.
Information security
fromTheregister
18 hours ago

Next.js jobseekers targeted with malicious 'interview' repos

Hackers distribute malicious Next.js repositories that execute in-memory JavaScript on developers' machines through multiple attack vectors during normal development workflows.
Information security
fromThe Hacker News
1 day ago

CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability

CISA added CVE-2026-25108, an OS command injection vulnerability in FileZen, to its Known Exploited Vulnerabilities catalog due to active exploitation evidence.
Information security
fromComputerWeekly.com
19 hours ago

Application exploitation back in vogue, says IBM cyber unit | Computer Weekly

Cyber attacks exploiting vulnerable public-facing applications increased 44%, surpassing credential abuse attacks, with AI tools accelerating vulnerability discovery and exploitation.
Information security
fromNextgov.com
13 hours ago

Hackers are exploiting exposed Cisco products, Five Eyes intelligence agencies say

CISA, NSA, and Five Eyes partners issued an emergency alert about a significant cyber threat exploiting Cisco wide-area networking vulnerabilities, affecting federal and global networks.
Information security
fromSecurityWeek
18 hours ago

The Blast Radius Problem: Stolen Credentials are Weaponizing Agentic AI

Over half of tracked vulnerabilities require no authentication, while AI amplifies attacker capabilities and supply chain breaches surge fourfold, creating expanding security risks.
Information security
fromThe Hacker News
16 hours ago

Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries

Google disrupted UNC2814, a China-nexus cyber espionage group that breached 53 organizations across 42 countries using novel backdoor GRIDTIDE that abuses Google Sheets API for command-and-control communications.
fromInfoWorld
23 hours ago

Microsoft warns of jobthemed repo lures targeting developers with multistage backdoors

Multiple repositories followed repeatable naming conventions and project 'family' patterns, enabling targeted searches for additional related repositories that were not directly referenced in observed telemetry but exhibited the same execution and staging behavior.
Information security
Information security
fromThe Hacker News
17 hours ago

Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

Multiple critical vulnerabilities in Claude Code allow remote code execution and API credential theft when users open untrusted repositories.
#cybercrime
fromSecurityWeek
19 hours ago

Google Disrupts Chinese Cyberespionage Campaign Targeting Telecoms, Governments

The attacker was using API calls to communicate with SaaS apps as command-and-control (C2) infrastructure to disguise their malicious traffic as benign, a common tactic used by threat actors when attempting to improve the stealth of their intrusions. Rather than abusing a weakness or security flaw, attackers rely on cloud-hosted products to function correctly and make their malicious traffic seem legitimate.
Information security
fromSecurityWeek
1 day ago

Ad Tech Company Optimizely Targeted in Cyberattack

The threat actor gained access to Optimizely's systems through a sophisticated voice-phishing attack, but was unable to escalate privileges, install software, or create any backdoors in the Optimizely environment. The incident was confined to certain internal business systems including Zendesk, records in our Salesforce CRM, and a limited set of internal documents used for back-office operations.
Information security
Information security
fromTheregister
14 hours ago

Google and friends disrupt suspected Beijing espionage op

Google disrupted UNC2814, a China-linked group conducting widespread cyberattacks on telecommunications and government organizations across multiple continents using Google Sheets API for command-and-control operations.
fromTechzine Global
22 hours ago

Go developer questions effectiveness of Dependabot

Dependabot sounded the alarm on a large scale. Thousands of repositories automatically received pull requests and warnings, including a high vulnerability score and signals about possible compatibility issues. According to Valsorda, this shows that the tool mainly checks whether a dependency is present, without analyzing whether the vulnerable code is actually accessible within a project.
Information security
#ransomware-attack
#ai-security
fromEngadget
17 hours ago
Information security

Hacker used Anthropic's Claude chatbot to attack multiple government agencies in Mexico

fromFortune
20 hours ago
Information security

Nearly two-thirds of companies have lost track of their data just as they're letting AI in through the front door to wander around | Fortune

fromEngadget
17 hours ago
Information security

Hacker used Anthropic's Claude chatbot to attack multiple government agencies in Mexico

fromFortune
20 hours ago
Information security

Nearly two-thirds of companies have lost track of their data just as they're letting AI in through the front door to wander around | Fortune

#data-breach
Information security
fromMail Online
19 hours ago

'Largest breach in US history' exposes records of 26 MILLION Americans

A massive breach at Conduent exposed personal data for at least 26 million Americans, with millions in Texas and Oregon most severely affected, including addresses, Social Security numbers, and health information.
Information security
fromDataBreaches.Net
21 hours ago

Wynn Resorts Confirms Data Breach After Hackers Remove It From Leak Site - DataBreaches.Net

Wynn Resorts' data listing was removed from ShinyHunters leak site after the company reportedly paid an extortion demand, with the resort confirming deletion of stolen employee data.
#malvertising
#cybersecurity
fromCSS-Tricks
13 hours ago

An Exploit ... in CSS?! | CSS-Tricks

Google credits security researcher Shaheen Fazim with reporting the exploit to Google. The dude's LinkedIn says he's a professional bug hunter, and I'd say he deserves the highest possible bug bounty for finding something that a government agency is saying "in CSS in Google Chrome before 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page."
Information security
#cyberattack
fromSecurityWeek
22 hours ago

Ex-US Defense Contractor Executive Jailed for Selling Exploits to Russia

Peter Williams stole a U.S. defense contractor's trade secrets about highly sensitive cyber capabilities and sold them to a broker whose clients include the Russian government, putting our national security and countless potential victims at risk.
Information security
#espionage
fromTechCrunch
15 hours ago
Information security

Inside the story of the US defense contractor who leaked hacking tools to Russia | TechCrunch

fromTechCrunch
15 hours ago
Information security

Inside the story of the US defense contractor who leaked hacking tools to Russia | TechCrunch

Information security
fromSecurityWeek
1 day ago

Astelia Raises $35 Million for Exposure Management

Astelia raised $35 million to expand its AI-powered exposure management platform that identifies and prioritizes critical vulnerabilities through attack-path modeling and real-world exploitation analysis.
Information security
fromThe Hacker News
23 hours ago

Manual Processes Are Putting National Security at Risk

Over half of national security organizations rely on manual sensitive data transfers, creating critical security vulnerabilities that adversaries actively exploit in contested operational environments.
Information security
fromTheregister
1 day ago

Threat intelligence supply chain is full of weak links

China's ban on foreign security software threatens the global threat intelligence ecosystem by risking data fragmentation and weakening international cybersecurity collaboration.
Information security
fromSecurityWeek
23 hours ago

SecurityWeek Report: 426 Cybersecurity M&A Deals Announced in 2025

The cybersecurity M&A market rebounded in 2025 with 426 deals, a 5% increase from 2024, reflecting strategic consolidation and increased globalization with higher deal values and complexity.
Information security
fromSecuritymagazine
1 day ago

From the Outside In: A Smarter Approach to Vendor Access

Organizations should shift from employee-centric access control to perimeter-focused security strategies to better manage risks from external vendors, contractors, and temporary workers.
Information security
fromTechCrunch
14 hours ago

US cybersecurity agency CISA reportedly in dire shape amid Trump cuts and layoffs | TechCrunch

CISA has lost approximately one-third of its staff, compromising its cybersecurity mission capabilities and leaving the nation vulnerable to cyber threats.
Information security
fromThe Hacker News
19 hours ago

Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

Triage failures occur when decisions are made without execution evidence, causing false positives, missed threats, and higher costs; interactive sandboxes enable evidence-backed verdicts within seconds.
Information security
fromWIRED
16 hours ago

OpenClaw Users Are Allegedly Bypassing Anti-Bot Systems

OpenClaw users employ Scrapling, an open-source tool, to bypass anti-bot systems like Cloudflare Turnstile and scrape websites despite anti-scraping protections.
fromSecuritymagazine
1 day ago

Strategies for Security Leaders in the Midst of Skill Shortages

Organizations have reported heightened cybersecurity risks as a result of these skill shortages, but the issues don't end there. Many teams will also experience burnout, which is an issue for security teams even in the best of times, which can only add to the talent gap concern if burnt out employees leave the industry.
Information security
fromReadWrite
23 hours ago

Second lawsuit targets Wynn data breach claims

We have learned that an unauthorized third party acquired certain employee data. Upon discovery, we immediately activated our incident response protocols and launched a thorough investigation with the help of external cybersecurity experts. The unauthorized third party has stated that the stolen data has been deleted. We are monitoring and to date have not seen any evidence that the data has been published or otherwise misused.
Information security
Information security
fromThe Hacker News
2 days ago

Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More

Critical zero-day in Dell RecoverPoint for VMs (CVE-2026-22769) is actively exploited, enabling root access and backdoor deployment via hard-coded Tomcat credentials.
Information security
fromSecurityWeek
3 days ago

Recent RoundCube Webmail Vulnerability Exploited in Attacks

Two RoundCube Webmail vulnerabilities (CVE-2025-49113 and CVE-2025-68461) are being actively exploited; organizations must apply available patches immediately.
Information security
fromThe Hacker News
2 days ago

Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens

SANDWORM_MODE supply-chain worm uses malicious npm packages to harvest credentials and crypto keys, propagate via stolen identities, and target AI coding assistants.
#fortigate
Information security
fromTechzine Global
2 days ago

Why cyberattacks don't require advanced hacking

Poor cyber hygiene, weak identity security, overdue IT maintenance, and incomplete logging make organizations vulnerable to financially motivated attacks such as ransomware and email fraud.
Information security
fromSecuritymagazine
3 days ago

Human-related security risks rose 90% in 2025

Human-related cybersecurity incidents surged 90% in 2025, driven by email-based attacks, employee mistakes, insider threats, and increasing AI and deepfake exploitation.
fromDevOps.com
1 week ago

Checkmarx Extends Vulnerability Detection to AI Coding Tool from AWS - DevOps.com

Rather than relying completely on scans that are run as code is moving through a continuous integration/continuous delivery (CI/CD) pipeline, Checkmarx Developer Assist can eliminate 90% of vulnerabilities before they enter the DevOps workflow, said Kinsbruner. That's critical because the first generation of AI coding tools are creating more vulnerabilities that, unless discovered and remediated, are actually making applications less secure than ever, he added.
Information security
Information security
fromSecurityWeek
2 days ago

Autonomous AI Agents Provide New Class of Supply Chain Attack

Agentic AI can enable active agent-to-agent attacks that harvest private keys and launder funds through malicious 'skills' promoted across agent marketplaces and social platforms.
Information security
fromThe Hacker News
2 days ago

How Exposed Endpoints Increase Risk Across LLM Infrastructure

Exposed LLM endpoints with excessive permissions and long-lived credentials create a critical attack surface enabling cybercriminals to access systems, identities, and secrets.
fromTheregister
3 days ago

Work experience kids sent manager to Ctrl-Alt-Del hell

This week, meet a reader we'll Regomize as "Curt" who once worked as IT security manager at a company where the helpdesk manager routinely ignored company policy by not logging out of his PC. The machine sat there ready for use, instead of reverting to a password-protected screensaver that could only be dispelled by pressing Ctrl-Alt-Del to spawn a login dialog.
Information security
Information security
fromTheregister
3 days ago

Every day in every way, passwords are getting worse

Passwords remain ubiquitous, aging and increasingly vulnerable due to implementation flaws, password manager weaknesses, and AI-related risks.
Information security
fromCointelegraph
3 days ago

How Pig-Butchering Crypto Scams Turn Trust Into a Financial Weapon

Pig-butchering scams build long-term emotional trust to coerce victims into fraudulent crypto investments, extracting funds over time through staged profits and blocked withdrawals.
Information security
fromSecuritymagazine
3 days ago

41% of Organizations Have Hired a Fake Candidate

AI-enabled identity attacks surged in 2025—deepfakes, impersonation, and synthetic identities are frequent while many organizations overestimate defenses and underprioritize deepfake-resistant IAM.
fromTechzine Global
2 days ago

Support for Windows Server 2016 is coming to an end

Microsoft is warning organizations about the impending end of support for several Windows products from 2016. These include Windows Server 2016, Windows 10 Enterprise 2016 LTSB, and Windows IoT Enterprise LTSB 2016. According to Microsoft, these products are approaching the final stage of their lifecycle, which has direct consequences for organizations that still depend on this software. The lifecycle documentation on Microsoft Learn shows that Windows Server 2016 has not received regular support since January 2022 and is now fully in the extended support phase.
Information security
Information security
fromInfoQ
2 days ago

Building a Least-Privilege AI Agent Gateway for Infrastructure Automation with MCP, OPA, and Ephemeral Runners

Enforce external governance, policy-as-code authorization, observability, and short-lived isolated execution runners to limit AI agents' access and contain the blast radius of autonomous operations.
Information security
fromTheregister
2 days ago

Suspected Anonymous members cuffed in Spain over DDoS attack

Four self‑proclaimed Anonymous Fénix members were arrested in Spain for carrying out DDoS attacks on public authorities after the 2024 DANA floods.
Information security
fromTravel + Leisure
2 days ago

This New Travel Con Is So Real Looking It's Tricking Even the Most 'Scam Aware' Travelers-Here's How to Stay Safe

Urgent, personalized texts impersonating airlines or hotels trick travelers into clicking counterfeit links or calling scammers to steal login, payment, and travel-identifying information.
fromDataBreaches.Net
3 days ago

The hospitality sector continues to be lucrative targets - DataBreaches.Net

Choice Hotels International disclosed a breach affecting franchisees and applicants. Its notification letter states that a "skilled person used social engineering" to gain access on January 14, 2026 to an application that contained records regarding franchisees and franchise applicants. The access occurred even though access required multifactor authentication (MFA). The information involved included names and Social Security numbers. There is no indication that any guest data was involved. No gang has publicly claimed responsibility for the attack as yet.
Information security
#cve-2026-1731
Information security
fromThe Hacker News
5 days ago

CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

Two actively exploited Roundcube vulnerabilities (CVE-2025-49113, CVE-2025-68461) enable remote code execution and XSS; federal agencies must remediate by March 13, 2026.
Information security
fromThe Hacker News
4 days ago

AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries

A Russian-speaking financially motivated actor used commercial generative AI to compromise 600+ FortiGate devices in 55 countries by exploiting exposed management ports and weak credentials.
fromInfoWorld
5 days ago

Compromised npm package silently installs OpenClaw on developer machines

Researchers have discovered that a compromised npm publish token pushed an update for the widely-used Cline command line interface (CLI) containing a malicious postinstall script. That script installs the wildly popular, but increasingly condemned, agentic application OpenClaw on the unsuspecting user's machine. This can be extremely dangerous, as OpenClaw has broad system access and deep integrations with messaging platforms including WhatsApp, Telegram, Slack, Discord, iMessage, Teams, and others.
Information security
fromDataBreaches.Net
4 days ago

Update Chrome now: Zero-day bug allows code execution via malicious webpages - DataBreaches.Net

Google has issued a patch for a high‑severity Chrome zero‑day, tracked as CVE‑2026‑2441, a memory bug in how the browser handles certain font features that attackers are already exploiting. CVE-2026-2441 has the questionable honor of being the first Chrome zero-day of 2026. Google considered it serious enough to issue a separate update of the stable channel for it, rather than wait for the next major release.
Information security
Information security
fromSecurityWeek
4 days ago

Critical Grandstream Phone Vulnerability Exposes Calls to Interception

A stack-based buffer overflow (CVE-2026-2329) in Grandstream GXP1600 phones enables unauthenticated remote root code execution, allowing call interception and credential extraction.
Information security
fromDataBreaches.Net
4 days ago

Discord's age verification data has a frontend leak -- now what? - DataBreaches.Net

Frontend components tied to Persona used in Discord's age verification were exposed on the open web, revealing verification flow structure and increasing compliance pressure.
Information security
fromDataBreaches.Net
4 days ago

This is how you do it: Dentist speaks out after practice hit by cyber attack - DataBreaches.Net

A dental practice's computer system was hacked, sending fraudulent invoice emails; the breach was quickly detected, halted by IT, and appears to have originated overseas.
fromWIRED
4 days ago

Password Managers Share a Hidden Weakness

An FBI informant helped run the Incognito dark web market and allegedly approved the sale of fentanyl-laced pills, including those from a dealer linked to a confirmed death, WIRED reported this week. Meanwhile, Jeffrey Epstein's ties to Customs and Border Protection officers sparked a Department of Justice probe. Documents say that CBP officers in the US Virgin Islands were still friendly with Epstein years after his 2008 conviction, illustrating the infamous sex offender's tactics for cultivating allies.
Information security
Information security
fromKotaku
4 days ago

Hackers Raise The Alarm About Discord's Recent Age-Verification Partner - Kotaku

Persona's weak security enabled hackers to access biometric data and revealed extensive surveillance, including facial scanning against watchlists, raising privacy and government-collaboration concerns.
fromTechCrunch
4 days ago

Wikipedia blacklists Archive.today after alleged DDoS attack | TechCrunch

Wikipedia editors have decided to remove all links to Archive.today, a web archiving service that they said has been linked to more than 695,000 times across the online encyclopedia. Archive.today - which also operates under several other domain names, including archive.is and archive.ph - is perhaps most widely used to access content that's otherwise inaccessible behind paywalls. That also makes it useful as a source for Wikipedia citations.
Information security
fromTheregister
5 days ago

CISA gives feds 3 days to patch actively exploited Dell bug

Uncle Sam's cyber defenders have given federal agencies just three days to patch a maximum-severity Dell bug that's been under active exploitation since at least mid-2024. CISA this week added the flaw, tracked as CVE-2026-22769, to its Known Exploited Vulnerabilities catalog, ordering civilian agencies to secure affected systems by February 21 - giving them just three days to get fixes in place.
Information security
fromSecurityWeek
5 days ago

In Other News: Ransomware Shuts US Clinics, ICS Vulnerability Surge, European Parliament Bans AI

Axonius has laid off approximately 40 employees, representing less than 4% of its global staff, with the majority of cuts in marketing and sales. Co-founder Dean Sysman has stepped down from his role as CEO to become executive chairman, with company president Joe Diamond appointed as interim CEO. The workforce adjustment aims to refine the company's organizational structure and improve operational efficiency as it prepares for a potential IPO.
Information security
[ Load more ]