#cybersecurity

[ follow ]
#data-breach
Privacy professionals
fromTechzine Global
38 minutes ago

Booking.com confirms data breach, but is tight-lipped about details

A data breach at Booking.com exposed customer bookings, with unauthorized access to personal information, though the extent and timing remain unclear.
Los Angeles
fromLos Angeles Times
2 days ago

How thousands of sensitive LAPD files got leaked online - and what happens next

A significant data breach exposed sensitive LAPD files and other records, attributed to the hacking group WorldLeaks.
Privacy professionals
fromTechCrunch
3 days ago

After data breach, $10B valued startup Mercor is having a month | TechCrunch

Mercor faces significant challenges after a data breach, with hackers claiming to have stolen 4TB of sensitive data.
Information security
fromSecuritymagazine
4 days ago

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

A massive trove of sensitive data has allegedly been stolen from a Chinese supercomputer, including classified defense documents and missile schematics.
Los Angeles
fromTechRepublic
3 days ago

Massive Data Breach Exposes 337K LAPD-Linked Records

A massive data breach in Los Angeles exposed 7.7 terabytes of sensitive LAPD records through a third-party discovery system.
Privacy professionals
fromTechzine Global
38 minutes ago

Booking.com confirms data breach, but is tight-lipped about details

A data breach at Booking.com exposed customer bookings, with unauthorized access to personal information, though the extent and timing remain unclear.
Los Angeles
fromLos Angeles Times
2 days ago

How thousands of sensitive LAPD files got leaked online - and what happens next

A significant data breach exposed sensitive LAPD files and other records, attributed to the hacking group WorldLeaks.
Privacy professionals
fromTechCrunch
3 days ago

After data breach, $10B valued startup Mercor is having a month | TechCrunch

Mercor faces significant challenges after a data breach, with hackers claiming to have stolen 4TB of sensitive data.
Information security
fromSecuritymagazine
4 days ago

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

A massive trove of sensitive data has allegedly been stolen from a Chinese supercomputer, including classified defense documents and missile schematics.
Los Angeles
fromTechRepublic
3 days ago

Massive Data Breach Exposes 337K LAPD-Linked Records

A massive data breach in Los Angeles exposed 7.7 terabytes of sensitive LAPD records through a third-party discovery system.
#ai
fromTechCrunch
9 hours ago
Information security

Trump officials may be encouraging banks to test Anthropic's Mythos model | TechCrunch

fromFast Company
1 day ago
Artificial intelligence

Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask

US news
fromwww.npr.org
1 day ago

How AI is getting better at finding security holes

AI models are evolving to identify security flaws, posing risks for misuse by hackers while aiding software developers in enhancing cybersecurity.
Information security
fromPsychology Today
2 days ago

What If We Used AI to Detect Threats to Humanity?

AI model Mythos escaped its sandbox, demonstrating capabilities to find software vulnerabilities, raising concerns about technological risks and threat assessment.
Podcast
fromTheregister
7 hours ago

Anthropic's Mythos has The Kettle crew curious, skeptical

Kettle Anthropic launched Mythos, an AI model capable of finding and exploiting zero-day vulnerabilities.
Information security
fromTechCrunch
9 hours ago

Trump officials may be encouraging banks to test Anthropic's Mythos model | TechCrunch

Bank executives are encouraged to use Anthropic's Mythos model to detect vulnerabilities, despite its limited access and ongoing legal issues.
Artificial intelligence
fromFast Company
1 day ago

Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask

Claude Mythos AI model may enhance cybersecurity defenses but also poses risks for hackers due to its ability to identify vulnerabilities and create exploits.
Information security
fromPsychology Today
2 days ago

What If We Used AI to Detect Threats to Humanity?

AI model Mythos escaped its sandbox, demonstrating capabilities to find software vulnerabilities, raising concerns about technological risks and threat assessment.
Privacy technologies
fromYahoo Tech
2 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Marketing
fromFast Company
19 hours ago

Is a Formula One partnership worth it?

Brand alliances with Formula One teams require significant investment, but alignment with business goals and audience is crucial for success.
#malware
Information security
fromThe Hacker News
2 days ago

GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

A new Zig dropper in the GlassWorm campaign stealthily infects all IDEs on a developer's machine through a malicious VS Code extension.
Information security
fromThe Hacker News
3 days ago

UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns

A new threat cluster UAT-10362 targets Taiwanese NGOs and universities with Lua-based malware LucidRook via spear-phishing campaigns.
Information security
fromThe Hacker News
2 days ago

GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

A new Zig dropper in the GlassWorm campaign stealthily infects all IDEs on a developer's machine through a malicious VS Code extension.
Information security
fromThe Hacker News
3 days ago

UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns

A new threat cluster UAT-10362 targets Taiwanese NGOs and universities with Lua-based malware LucidRook via spear-phishing campaigns.
Information security
fromEngadget
1 day ago

Rockstar Games has confirmed it was hit by third-party data breach

ShinyHunters claims to have breached Rockstar Games' servers, demanding payment to prevent data leaks.
#hungary
Information security
fromTheregister
1 day ago

Hungary officials used weak passwords exposed in breach dump

Hungarian government officials' weak password choices pose a significant national security threat, with nearly 800 compromised email-password pairs discovered.
EU data protection
fromComputerworld
2 days ago

Hungarian government email passwords exposed ahead of election

Hungarian government email security breaches expose vulnerabilities, undermining claims of effective national security.
Information security
fromTheregister
1 day ago

Hungary officials used weak passwords exposed in breach dump

Hungarian government officials' weak password choices pose a significant national security threat, with nearly 800 compromised email-password pairs discovered.
EU data protection
fromComputerworld
2 days ago

Hungarian government email passwords exposed ahead of election

Hungarian government email security breaches expose vulnerabilities, undermining claims of effective national security.
#iran
fromFortune
2 days ago
Privacy professionals

First they went after medtech, then Kash Patel. Iranian hackers' next target is likely 'low-hanging fruit' in water, energy, and tourism, experts say | Fortune

fromFortune
3 days ago
Information security

Trump's 'cease-fire' won't stop Iranian hackers for long, cyber experts say | Fortune

Privacy professionals
fromFortune
2 days ago

First they went after medtech, then Kash Patel. Iranian hackers' next target is likely 'low-hanging fruit' in water, energy, and tourism, experts say | Fortune

Iran-linked hackers are targeting high-profile figures and critical infrastructure in the U.S. and Israel to sow disruption.
Information security
fromSecurityWeek
2 days ago

Industry Reactions to Iran Hacking ICS in Critical Infrastructure: Feedback Friday

Iran-linked hackers are targeting critical infrastructure, exploiting vulnerabilities in industrial control systems and operational technology.
Information security
fromFortune
3 days ago

Trump's 'cease-fire' won't stop Iranian hackers for long, cyber experts say | Fortune

Cyberattacks by Iranian-backed hackers will continue despite a ceasefire, targeting Israel and potentially the U.S. when deemed appropriate.
Information security
fromSecurityWeek
4 days ago

Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long

Cyberattacks by Iranian-backed hackers will continue despite a ceasefire, targeting Israel and potentially the U.S. when deemed appropriate.
Information security
fromArs Technica
4 days ago

Iran-linked hackers disrupt operations at US critical infrastructure sites

Iranian government-affiliated hackers are disrupting US critical infrastructure operations, targeting programmable logic controllers across various sectors.
Information security
fromZDNET
2 days ago

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

FBI and NSA warn of Russian hackers targeting vulnerable routers, urging users to update firmware and strengthen passwords.
Information security
fromNextgov.com
2 days ago

US push to counter hackers draws industry deeper into offensive cyber debate

The U.S. government seeks private sector involvement in cyber defense, but clarity on offensive roles remains uncertain.
Information security
fromwww.theguardian.com
2 days ago

Anthropic's new AI tool has implications for us all whether we want it or not

A new AI model, Claude Mythos, poses significant cybersecurity threats by exploiting vulnerabilities in major software systems, potentially enabling widespread chaos.
Careers
fromComputerWeekly.com
2 days ago

Businesses are paying the price for CISO burnout | Computer Weekly

Burnout among CISOs poses significant risks to businesses, driven by overwhelming responsibilities and rising cyber threats.
#ai-risks
fromSecurityWeek
2 days ago
Information security

In Other News: Cyberattack Stings Stryker, Windows Zero-Day, China Supercomputer Hack

Cybersecurity developments include discussions on AI risks, new malware targeting crypto wallets, and collaboration among Japanese corporations to enhance security.
fromwww.theguardian.com
2 days ago
Artificial intelligence

US summoned bank bosses to discuss cyber risks posed by Anthropic's latest AI model

US Treasury secretary convened bank chiefs to address cybersecurity risks from Anthropic's AI model, Claude Mythos, which poses unprecedented threats.
Information security
fromSecurityWeek
2 days ago

In Other News: Cyberattack Stings Stryker, Windows Zero-Day, China Supercomputer Hack

Cybersecurity developments include discussions on AI risks, new malware targeting crypto wallets, and collaboration among Japanese corporations to enhance security.
Artificial intelligence
fromwww.theguardian.com
2 days ago

US summoned bank bosses to discuss cyber risks posed by Anthropic's latest AI model

US Treasury secretary convened bank chiefs to address cybersecurity risks from Anthropic's AI model, Claude Mythos, which poses unprecedented threats.
Business
from24/7 Wall St.
2 days ago

CrowdStrike (CRWD) Falls, But Here's Why Wall Street Sees 15% Upside

CrowdStrike's stock is undervalued despite strong fiscal performance and positive analyst sentiment.
Artificial intelligence
fromLos Angeles Times
2 days ago

Commentary: Wipe out a 'civilization'? Minor stuff compared with what just happened in AI

Anthropic warns its powerful AI could disrupt civilization by hacking secure systems, raising severe concerns for economies and national security.
fromSecurityWeek
2 days ago

MITRE Releases Fight Fraud Framework

"These incidents involve the intentional use of deceptive or illegal practices to fraudulently obtain money, assets, or information from individuals or institutions, and include actions carried out over cyber channels."
Information security
Information security
fromSecurityWeek
2 days ago

Critical Marimo Flaw Exploited Hours After Public Disclosure

A critical vulnerability in Marimo was exploited within hours of its public disclosure, allowing unauthenticated remote code execution.
Information security
fromSecurityWeek
2 days ago

Microsoft Finds Vulnerability Exposing Millions of Android Crypto Wallet Users

A severe vulnerability in EngageLab's EngageSDK affects cryptocurrency wallet apps, risking exposure of sensitive user information.
Information security
fromThe Hacker News
2 days ago

Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers

Unknown threat actors hijacked the Smart Slider 3 Pro plugin update system to distribute a backdoored version affecting WordPress and Joomla users.
Startup companies
fromTechCrunch
3 days ago

What founders can learn from Anjuna's layoffs and recovery | TechCrunch

Anjuna Security navigated market challenges by prioritizing internal culture and transparent communication during layoffs.
Information security
fromNextgov.com
3 days ago

Treasury debuts effort to share cyber threat intel with crypto firms

The Treasury Department will share cyber threat intelligence with cryptocurrency firms to enhance their cybersecurity measures against increasing threats.
#hacking
fromTechSpot
3 days ago
Information security

Hackers are turning home routers into tools to spy on Microsoft 365 users

Information security
fromTechSpot
3 days ago

Hackers are turning home routers into tools to spy on Microsoft 365 users

Forest Blizzard hackers exploit insecure routers to compromise devices and intercept traffic, targeting Microsoft 365 domains for sensitive data.
Information security
fromTechRepublic
3 days ago

Hackers Exploit Adobe PDF Flaw for Months to Steal Data, No Fix Yet

Attackers exploit a zero-day vulnerability in Adobe Acrobat Reader to steal data and potentially take over systems using malicious PDF files.
World news
fromWIRED
3 days ago

China Is Cracking Down on Scams. Just Not the Ones Hitting Americans

Governments struggle to combat industrial-scale scamming operations linked to organized crime, causing billions in losses, particularly affecting foreign victims.
Information security
fromTheregister
3 days ago

'Several dozen' orgs targeted by a new extortion crew

A new extortion crew, UNC6783, targets high-value corporations using phishing and social engineering tactics to steal sensitive data.
#ai-security
Artificial intelligence
fromFast Company
3 days ago

Did Anthropic just soft-launch the scariest AI model yet?

Anthropic's Claude Mythos Preview model shows potential for dangerous cyber exploits, raising concerns about its misuse in the wrong hands.
fromDevOps.com
3 days ago
Information security

LayerX: Anthropic's Claude Code Can Easily Be Easily Weaponized - DevOps.com

fromAxios
3 days ago
Artificial intelligence

Scoop: OpenAI plans staggered rollout of new model over cybersecurity risk

Artificial intelligence
fromFast Company
3 days ago

Did Anthropic just soft-launch the scariest AI model yet?

Anthropic's Claude Mythos Preview model shows potential for dangerous cyber exploits, raising concerns about its misuse in the wrong hands.
Artificial intelligence
fromAxios
3 days ago

Scoop: OpenAI plans staggered rollout of new model over cybersecurity risk

Anthropic and OpenAI are limiting access to advanced AI models due to concerns over their hacking capabilities.
Apple
fromTechRepublic
3 days ago

New Apple Scam Hits Millions of iPhone Users Worldwide, Draining Bank Accounts

Apple warns iPhone users about a surge in social engineering scams targeting bank accounts through panic-inducing messages.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

Treasury Launches Cybersecurity Initiative Expanding Threat Intelligence Access for Digital Asset Firms

U.S. Treasury expands cybersecurity coordination with digital asset firms to enhance protections and integrate with traditional finance.
fromTechCrunch
3 days ago

Hacker stole 700,000 from U.K. energy company by redirecting payment | TechCrunch

Zephyr Energy stated that it is working with corresponding banks and consultants to attempt to recover the diverted funds after the theft of £700,000.
Information security
#bitcoin-depot
Cryptocurrency
fromBitcoin Magazine
3 days ago

Bitcoin Depot Reports $3.7 Million Stolen In Wallet Security Breach

Hackers stole approximately $3.7 million in bitcoin from Bitcoin Depot after accessing internal credentials linked to its settlement accounts.
Cryptocurrency
fromBitcoin Magazine
3 days ago

Bitcoin Depot Reports $3.7 Million Stolen In Wallet Security Breach

Hackers stole approximately $3.7 million in bitcoin from Bitcoin Depot after accessing internal credentials linked to its settlement accounts.
Business
from24/7 Wall St.
3 days ago

BTIG Cuts Zscaler to Neutral: Has the Cybersecurity Boom Already Been Priced Into This Stock?

Zscaler's stock downgrade by BTIG reflects valuation concerns despite strong earnings and growth guidance.
Information security
fromTheregister
3 days ago

Chevin pulls the handbrake on FleetWave after security scare

A major outage of FleetWave affects customers in the UK and US due to cybersecurity precautions taken by Chevin Fleet Solutions.
#fcc
fromTheregister
3 days ago

Old Adobe Reader zero-day uses PDFs to size up targets

"Such a mechanism allows the threat actor to collect user information, steal local data, perform advanced 'fingerprinting', and launch future attacks. If the target meets the attacker's conditions, the attacker may deliver additional exploit to achieve RCE or SBX."
Information security
Information security
from24/7 Wall St.
3 days ago

Why I'd Bottom-Fish in CrowdStrike While the Street is Still Nervous About Software

The SaaS sell-off continues, with many companies facing risks from AI disruption and significant stock declines.
fromTheregister
3 days ago

Microsoft locks out top open source devs, blames process

Microsoft did not send me any emails or prior warnings. I have received no explanation for the termination and their message indicates that no appeal is possible. I have tried to contact Microsoft through various channels but I have only received automated replies and bots. I was unable to reach a human.
Software development
fromFast Company
3 days ago

BlackBerry stock is rising today, but this time it's not a meme thing

"We are no longer a company in transition. We are a growth company with a proven track record of execution, and we are well positioned for the path ahead."
Business
World news
from24/7 Wall St.
3 days ago

Stock Market Live April 9, 2026: S&P 500 (SPY) Reverses as Oil Gushes Higher

Major indices decline amid geopolitical tensions, rising oil prices, and increasing cyber threats from Iran targeting U.S. water and energy facilities.
fromSecurityWeek
3 days ago

Apple Intelligence AI Guardrails Bypassed in New Attack

The first is Neural Execs, a known prompt injection attack that uses 'gibberish' inputs to trick the AI into executing arbitrary, attacker-defined tasks. These inputs act as universal triggers that do not need to be remade for different payloads.
Apple
fromnews.bitcoin.com
3 days ago

ZachXBT Publishes Leaked DPRK Payment Data Showing $1M Monthly Crypto-to-Fiat Pipeline

The internal platform at the center of the investigation was luckyguys.site, also referred to internally as WebMsg. It functioned as a Discord-style messenger, allowing DPRK IT workers to report payments to their handlers.
Cryptocurrency
Information security
fromThe Hacker News
3 days ago

ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories

A new variant of the Phorpiex botnet combines traditional and peer-to-peer communication, facilitating sophisticated malware operations and high-volume spam.
Information security
fromDevOps.com
3 days ago

Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action - DevOps.com

Mallory provides an AI-native threat intelligence platform that delivers actionable insights for enterprise security teams, focusing on real threats and vulnerabilities.
Information security
fromSecurityWeek
3 days ago

Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access

Google API keys in Android apps can be exploited to access Gemini AI endpoints, risking personal data exposure.
Information security
fromSecurityWeek
3 days ago

Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities

Palo Alto Networks and SonicWall released patches for multiple vulnerabilities, including high-severity bugs that could allow unauthorized access and code execution.
Information security
fromTheregister
3 days ago

Zephyr Energy loses 700K to contractor payment fraud

Zephyr Energy plc experienced a cyber incident that redirected £700,000 to an attacker-controlled account during a routine payment process.
#phishing
fromThe Hacker News
3 days ago
Information security

Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region

A hack-for-hire campaign linked to the Indian government targeted journalists and activists in the MENA region through phishing attacks.
Information security
fromSecurityWeek
3 days ago

Google Warns of New Campaign Targeting BPOs to Steal Corporate Data

A financially motivated threat actor, UNC6783, targets BPO organizations to steal sensitive data from high-value companies using social engineering and phishing tactics.
Information security
fromThe Hacker News
3 days ago

Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region

A hack-for-hire campaign linked to the Indian government targeted journalists and activists in the MENA region through phishing attacks.
Information security
fromSecurityWeek
3 days ago

Google Warns of New Campaign Targeting BPOs to Steal Corporate Data

A financially motivated threat actor, UNC6783, targets BPO organizations to steal sensitive data from high-value companies using social engineering and phishing tactics.
#adobe-reader
Information security
fromThe Hacker News
3 days ago

Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025

A zero-day vulnerability in Adobe Reader is being exploited through malicious PDF documents to harvest sensitive data and execute additional payloads.
Information security
fromThe Hacker News
3 days ago

Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025

A zero-day vulnerability in Adobe Reader is being exploited through malicious PDF documents to harvest sensitive data and execute additional payloads.
DevOps
fromFortune
3 days ago

The digital sovereignty dilemma is a false choice - here's how enterprises can have both | Fortune

Organizations must ensure digital sovereignty by balancing local control with global technology access to remain resilient and competitive.
Information security
fromTheregister
4 days ago

Criminal wannabes even more dangerous than the pros

Ransomware is a significant current threat, targeting critical infrastructure and healthcare, causing immediate harm and financial losses.
Privacy professionals
fromTechCrunch
4 days ago

Hack-for-hire group caught targeting Android devices and iCloud backups | TechCrunch

A hack-for-hire group is targeting journalists and officials in the Middle East and North Africa using phishing and spyware tactics.
[ Load more ]