#cybersecurity

[ follow ]
#linux
Information security
fromThe Hacker News
1 day ago

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

A critical Linux vulnerability allows unprivileged users to gain root access, impacting various distributions and requiring immediate patching.
Information security
fromThe Hacker News
4 days ago

New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions

A high-severity Linux vulnerability allows unprivileged users to gain root access through a flaw in the kernel's cryptographic subsystem.
Information security
fromThe Hacker News
1 day ago

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

A critical Linux vulnerability allows unprivileged users to gain root access, impacting various distributions and requiring immediate patching.
Information security
fromThe Hacker News
4 days ago

New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions

A high-severity Linux vulnerability allows unprivileged users to gain root access through a flaw in the kernel's cryptographic subsystem.
Information security
fromThe Hacker News
1 hour ago

Critical cPanel Vulnerability Weaponized to Target Government and MSP Networks

A new threat actor targets Southeast Asian government and military entities by exploiting a critical cPanel vulnerability.
#account-security
fromWIRED
3 days ago
Information security

OpenAI Rolls Out 'Advanced' Security Mode for At-Risk Accounts

Privacy technologies
fromTechRepublic
2 days ago

OpenAI Introduces Password-Free Login for Millions of ChatGPT Users

OpenAI's Advanced Account Security replaces passwords with passkeys or security keys, enhancing protection against cyberattacks but limiting recovery options.
Information security
fromWIRED
3 days ago

OpenAI Rolls Out 'Advanced' Security Mode for At-Risk Accounts

OpenAI introduces Advanced Account Security to enhance protection against account takeover attacks for ChatGPT and Codex users.
#data-breach
Privacy professionals
fromTechzine Global
2 hours ago

ShinyHunters claims Instructure breach, data from 275M users stolen

Instructure confirmed a data breach affecting personal data of users, with claims of 275 million individuals' data stolen by the ShinyHunters group.
Information security
fromSecurityWeek
2 days ago

In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability

Key cybersecurity developments include OFAC actions against Iranian crypto, the arrest of a Scattered Spider member, and a major data leak at ADT.
Healthcare
fromSecurityWeek
4 days ago

Sandhills Medical Says Ransomware Breach Affects 170,000

Sandhills Medical Foundation experienced a data breach affecting nearly 170,000 individuals due to a ransomware attack discovered on May 8, 2025.
Privacy professionals
fromTechzine Global
2 hours ago

ShinyHunters claims Instructure breach, data from 275M users stolen

Instructure confirmed a data breach affecting personal data of users, with claims of 275 million individuals' data stolen by the ShinyHunters group.
Information security
fromSecurityWeek
2 days ago

In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability

Key cybersecurity developments include OFAC actions against Iranian crypto, the arrest of a Scattered Spider member, and a major data leak at ADT.
Healthcare
fromSecurityWeek
4 days ago

Sandhills Medical Says Ransomware Breach Affects 170,000

Sandhills Medical Foundation experienced a data breach affecting nearly 170,000 individuals due to a ransomware attack discovered on May 8, 2025.
#cpanel
Information security
fromSecurityWeek
3 hours ago

Over 40,000 Servers Compromised in Ongoing cPanel Exploitation

Over 40,000 servers have been compromised due to a critical cPanel zero-day vulnerability, CVE-2026-41940, allowing unauthorized administrative access.
Information security
fromTechCrunch
3 days ago

Hackers are actively exploiting a bug in cPanel, used by millions of websites | TechCrunch

A critical vulnerability in cPanel and WHM allows hackers to gain full control of affected servers, necessitating immediate patching by users.
Information security
fromSecurityWeek
4 days ago

Critical cPanel & WHM Vulnerability Exploited as Zero-Day for Months

A critical authentication bypass vulnerability in cPanel & WHM allows remote attackers to gain administrative access, risking system takeover.
Information security
fromTheregister
4 days ago

Critical cPanel, WHM flaw probs exploited as 0-day, pros say

A critical vulnerability in cPanel and WHM allows attackers to bypass authentication and gain root access, affecting millions of domains.
Information security
fromSecurityWeek
3 hours ago

Over 40,000 Servers Compromised in Ongoing cPanel Exploitation

Over 40,000 servers have been compromised due to a critical cPanel zero-day vulnerability, CVE-2026-41940, allowing unauthorized administrative access.
Information security
fromTechCrunch
3 days ago

Hackers are actively exploiting a bug in cPanel, used by millions of websites | TechCrunch

A critical vulnerability in cPanel and WHM allows hackers to gain full control of affected servers, necessitating immediate patching by users.
Information security
fromSecurityWeek
4 days ago

Critical cPanel & WHM Vulnerability Exploited as Zero-Day for Months

A critical authentication bypass vulnerability in cPanel & WHM allows remote attackers to gain administrative access, risking system takeover.
Information security
fromTheregister
4 days ago

Critical cPanel, WHM flaw probs exploited as 0-day, pros say

A critical vulnerability in cPanel and WHM allows attackers to bypass authentication and gain root access, affecting millions of domains.
Europe politics
fromwww.theguardian.com
7 hours ago

EU forging closer ties with Armenia as it sends experts to help counter Russian interference

The EU is deploying experts to Armenia to combat Russian propaganda and support the country during a critical political period.
#cisa
#ai
Information security
fromComputerWeekly.com
3 days ago

Cyber experts take an optimistic view of AI-powered hacking | Computer Weekly

Claude Mythos Preview enhances cybersecurity by autonomously identifying vulnerabilities, while cyber crime forums show limited impact from 'dark AI' products.
Information security
fromZDNET
3 days ago

Anthropic's new Claude Security tool scans your codebase for flaws - and helps you decide what to fix first

AI vulnerability scanning is integrating into developer workflows to enhance cybersecurity.
Artificial intelligence
fromFuturism
1 day ago

The White House Suddenly Seems Pretty Terrified of Anthropic

Mythos, an AI model by Anthropic, poses significant cybersecurity risks, prompting concerns from the White House and a strained relationship with the Department of Defense.
Higher education
fromNextgov.com
2 days ago

US imposes AI skills requirement on CyberCorps pipeline

CyberCorps scholarship program now requires applicants to demonstrate skills in AI and cybersecurity integration for government jobs.
Information security
fromArs Technica
2 days ago

Amid Mythos' hyped cybersecurity prowess, researchers find GPT-5.5 is just as good

Fear-based marketing is criticized in the context of limited AI model releases, particularly regarding cybersecurity advancements.
Information security
fromComputerWeekly.com
3 days ago

Cyber experts take an optimistic view of AI-powered hacking | Computer Weekly

Claude Mythos Preview enhances cybersecurity by autonomously identifying vulnerabilities, while cyber crime forums show limited impact from 'dark AI' products.
Information security
fromZDNET
3 days ago

Anthropic's new Claude Security tool scans your codebase for flaws - and helps you decide what to fix first

AI vulnerability scanning is integrating into developer workflows to enhance cybersecurity.
Information security
fromwww.dw.com
1 day ago

North Korea rejects US cybercrime claims as 'absurd slander'

North Korea denied US cybercrime allegations, calling them absurd slander and asserting it does not pose a cyber threat.
Business
fromwww.businessinsider.com
1 day ago

Berkshire Hathaway's first Q&A without Warren Buffett opened with a question from a deepfake Warren Buffett

Warren Buffett's likeness was used in a deepfake at Berkshire Hathaway's annual meeting to discuss the risks of cyberattacks and misinformation.
#phishing
Information security
fromTechRepublic
2 days ago

Microsoft Flagged 8.3B Phishing Emails in Q1 as QR Codes, CAPTCHAs Rise

Phishing attacks are evolving, utilizing QR codes and modular strategies, requiring comprehensive security measures beyond traditional email defenses.
Information security
fromThe Hacker News
3 days ago

ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories

New phishing kits are evolving, integrating advanced features for targeted attacks, while security vulnerabilities continue to pose significant risks online.
Information security
fromSecurityWeek
2 days ago

New Bluekit Phishing Kit Features AI Assistant

Bluekit is a sophisticated phishing kit with AI capabilities, automated domain registration, and extensive templates for various online services.
Information security
fromThe Hacker News
2 days ago

30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign

A Vietnamese-linked operation uses Google AppSheet for phishing, compromising around 30,000 Facebook accounts to sell them back through an illicit storefront.
Information security
fromTechRepublic
2 days ago

Microsoft Flagged 8.3B Phishing Emails in Q1 as QR Codes, CAPTCHAs Rise

Phishing attacks are evolving, utilizing QR codes and modular strategies, requiring comprehensive security measures beyond traditional email defenses.
Information security
fromThe Hacker News
3 days ago

ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories

New phishing kits are evolving, integrating advanced features for targeted attacks, while security vulnerabilities continue to pose significant risks online.
Privacy technologies
fromHarvard Gazette
2 days ago

Worried about how online firms use data they get from you? - Harvard Gazette

Keyring wallet allows users to verify identity while controlling personal information and reducing vulnerability to identity theft.
#ddos-attack
Information security
fromTechCrunch
2 days ago

Ubuntu services hit by outages after DDoS attack | TechCrunch

Hacktivists launched a DDoS attack on Ubuntu and Canonical, disrupting services and preventing users from updating the operating system.
Information security
fromTechCrunch
2 days ago

Ubuntu services hit by outages after DDoS attack | TechCrunch

Hacktivists launched a DDoS attack on Ubuntu and Canonical, disrupting services and preventing users from updating the operating system.
Information security
fromThe Hacker News
2 days ago

China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists

A new China-aligned espionage campaign targets government and defense sectors in Asia and Europe, exploiting vulnerabilities in Microsoft Exchange and IIS servers.
Information security
fromTechRepublic
3 days ago

New Global Scam Uses Fake Meeting Links to Run PowerShell Malware

BlueNoroff hackers exploit fake Zoom calls and fileless malware to steal credentials from Web3 and cryptocurrency organizations.
#ransomware
Information security
fromThe Hacker News
3 days ago

Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks

Two cybersecurity professionals were sentenced to four years for facilitating BlackCat ransomware attacks in 2023.
Information security
fromThe Hacker News
3 days ago

Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks

Two cybersecurity professionals were sentenced to four years for facilitating BlackCat ransomware attacks in 2023.
#openai
Information security
fromTNW | Next-Featured
3 days ago

OpenAI launches hardware security keys for ChatGPT with Yubico partnership and disables password login for high-risk users

OpenAI launched Advanced Account Security, replacing passwords with hardware keys and disabling email recovery, targeting sensitive user accounts.
Information security
fromTechCrunch
3 days ago

After dissing Anthropic for limiting Mythos, OpenAI restricts access to Cyber, too | TechCrunch

OpenAI will restrict access to its cybersecurity tool Cyber, similar to Anthropic's approach with Mythos.
Information security
fromTNW | Next-Featured
3 days ago

OpenAI launches hardware security keys for ChatGPT with Yubico partnership and disables password login for high-risk users

OpenAI launched Advanced Account Security, replacing passwords with hardware keys and disabling email recovery, targeting sensitive user accounts.
Information security
fromTechCrunch
3 days ago

After dissing Anthropic for limiting Mythos, OpenAI restricts access to Cyber, too | TechCrunch

OpenAI will restrict access to its cybersecurity tool Cyber, similar to Anthropic's approach with Mythos.
Information security
fromDeveloper Tech News
3 days ago

Open-source registries hit by 'Mini Shai-Hulud' supply chain attacks

The 'Mini Shai-Hulud' worm targets developer credentials across multiple ecosystems, exploiting vulnerabilities in popular packages to steal sensitive information.
Growth hacking
fromThe Hacker News
3 days ago

Top Five Sales Challenges Costing MSPs Cybersecurity Revenue

The managed security services market is set to grow significantly, but MSPs often fail to align technical expertise with business needs.
#malware
Information security
fromSecurityWeek
3 days ago

Hugging Face, ClawHub Abused for Malware Distribution

Threat actors exploit AI distribution platforms to distribute malware through trojanized shared files, relying on social engineering tactics to deceive users.
fromThe Hacker News
3 days ago
Information security

New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

DEEP#DOOR is a Python-based backdoor framework that enables persistent access and sensitive information harvesting from compromised systems.
fromInfoWorld
4 days ago
Information security

SAP npm package attack highlights risks in developer tools and CI/CD pipelines

Attackers view developer workstations as critical access points, targeting them to infiltrate software supply chains.
Information security
fromSecurityWeek
3 days ago

Sophisticated Deep#Door Backdoor Enables Espionage, Disruption

A new Python-based backdoor framework, Deep#Door, enables persistent remote command execution and surveillance on Windows systems.
Information security
fromSecurityWeek
3 days ago

Hugging Face, ClawHub Abused for Malware Distribution

Threat actors exploit AI distribution platforms to distribute malware through trojanized shared files, relying on social engineering tactics to deceive users.
Information security
fromThe Hacker News
3 days ago

New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

DEEP#DOOR is a Python-based backdoor framework that enables persistent access and sensitive information harvesting from compromised systems.
Information security
fromInfoWorld
4 days ago

SAP npm package attack highlights risks in developer tools and CI/CD pipelines

Attackers view developer workstations as critical access points, targeting them to infiltrate software supply chains.
SF politics
fromTNW | Anthropic
3 days ago

Anthropic's Mythos is moving between governments faster than regulators

Anthropic's Mythos cybersecurity model faces conflicting government interests regarding its access and usage among state actors and private sectors.
Software development
fromDevOps.com
3 days ago

Anthropic Brings AI-Powered Security Scanning to Enterprise Teams With Claude Security - DevOps.com

Claude Security enables security teams to scan codebases for vulnerabilities and generate patches efficiently, enhancing remediation processes.
Information security
fromTechzine Global
3 days ago

Anthropic Claude Security available to all Enterprise customers

Claude Security is now in public beta for Enterprise customers, scanning code for vulnerabilities and suggesting targeted patches using the Claude Opus 4.7 model.
Information security
fromTheregister
3 days ago

Ongoing supply chain attacks worm into SAP npm packages

Supply chain attacks have compromised multiple npm packages, including those from SAP and Intercom, with credential-stealing malware affecting developers.
Cryptocurrency
fromnews.bitcoin.com
3 days ago

Pentagon Eyes Bitcoin Infrastructure as Strategic Asset, Hegseth Says

Bitcoin is integrated into classified U.S. Defense Department efforts to enhance national security and counter China.
Information security
fromArs Technica
3 days ago

The most severe Linux threat to surface in years catches the world flatfooted

A critical Linux vulnerability allows unprivileged users to gain root access, posing severe risks to data centers and personal devices.
Information security
fromNextgov.com
3 days ago

Why recovery speed matters when the homeland is the cyber battlefield

Cyberattacks are now a constant threat to essential services and military readiness, requiring a shift in defense strategies to anticipate and recover from disruptions.
fromTheregister
3 days ago

FBI: China's hacker-for-hire ecosystem 'out of control'

Motivated by profit, this network of private companies and contractors in China cast a wide net to identify vulnerable computers, exploit those computers, and then identify information that it could sell directly or indirectly to the PRC government.
Information security
Information security
fromSecurityWeek
3 days ago

AI Fuels 'Industrial' Cybercrime as Time-to-Exploit Shrinks to Hours

Industrialized cybercrime utilizes AI and automation for efficient, sophisticated attacks, necessitating defenders to adopt similar technologies for effective countermeasures.
Information security
fromSecurityWeek
3 days ago

Anthropic Unveils Claude Security to Counter AI-Powered Exploit Surge

Claude Security aims to empower defenders against advanced AI threats by providing automated vulnerability scanning and patching capabilities.
Information security
fromThe Hacker News
3 days ago

PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials

Malicious versions of the Lightning Python package were released, enabling credential theft through an automated attack chain.
World politics
fromFortune
3 days ago

For years, the risk Jamie Dimon was most concerned about was geopolitics. His answer has shifted | Fortune

Geopolitical tensions and cybersecurity risks are the greatest threats to the global economy, according to Jamie Dimon.
Information security
fromTNW | Opinion
3 days ago

Why cybersecurity leaders are losing control in the age of AI threats

AI-driven threats are increasing, and effective cybersecurity relies on leadership clarity, AI integration, and workforce awareness.
Women in technology
fromAbove the Law
3 days ago

ILTA EVOLVE: Sometimes Less Is More - A Focus On Leadership - Above the Law

Smaller, focused conferences like ILTA EVOLVE enhance interaction and address critical topics such as cybersecurity, GenAI, and leadership in legal tech.
#china
Information security
fromTheregister
4 days ago

Chinese spy group caught lurking in Poland, Asia networks

A China-linked threat group infiltrated critical networks in multiple countries, using advanced techniques and tools for long-term access and espionage.
Information security
fromTheregister
4 days ago

Chinese spy group caught lurking in Poland, Asia networks

A China-linked threat group infiltrated critical networks in multiple countries, using advanced techniques and tools for long-term access and espionage.
Artificial intelligence
fromThe Verge
4 days ago

OpenAI's new security model is for 'critical cyber defenders' only

OpenAI is launching GPT-5.5-Cyber for select cyber defenders, not for public access, to enhance cybersecurity measures.
Privacy professionals
fromWIRED
4 days ago

Exposed Data Illustrates the Nightmare Scenario for a Stalkerware Victim

Stalkerware enables secret surveillance of individuals, leading to severe privacy violations and potential data breaches of sensitive information.
Information security
fromInfoQ
4 days ago

Meta's Approach to Migrating their Systems to Post-Quantum Cryptography

Meta is migrating to post-quantum cryptography to protect against quantum computing threats, using a five-level maturity model to track progress.
European startups
fromTechzine Global
4 days ago

mnemonic opens Dutch Security Operations Centre (SOC) and relocates to new office in Utrecht

mnemonic will open a new Security Operations Centre in the Netherlands on 1 May to enhance local SOC services for the Benelux market.
Information security
fromTheregister
4 days ago

Finance company stored their DB credentials in spreadsheet

Sensitive information was inadequately protected in a publicly accessible SharePoint folder, highlighting significant security flaws in a fintech startup's practices.
Information security
fromIT Brew
4 days ago

Does the agentic era signal the end of cybersecurity perimeters?

Agentic AI complicates cybersecurity by enabling synthetic identities and unsupervised workflows, challenging traditional perimeter defenses.
Deliverability
fromTechRepublic
4 days ago

Hackers Abuse Robinhood Signup Process to Deliver Phishing Emails

Robinhood users received phishing emails that appeared legitimate, exploiting a flaw in the account creation process to steal login credentials.
#supply-chain-attack
Information security
fromThe Hacker News
4 days ago

SAP npm Packages Compromised by "Mini Shai-Hulud" Credential-Stealing Malware

A new supply chain attack campaign targets SAP-related npm packages with credential-stealing malware, affecting multiple versions and compromising developer environments.
Information security
fromArs Technica
5 days ago

Why a recent supply-chain attack singled out security firms Checkmarx and Bitwarden

Checkmarx and Bitwarden were compromised in a supply chain attack linked to TeamPCP, highlighting vulnerabilities in security tools.
Information security
fromThe Hacker News
4 days ago

SAP npm Packages Compromised by "Mini Shai-Hulud" Credential-Stealing Malware

A new supply chain attack campaign targets SAP-related npm packages with credential-stealing malware, affecting multiple versions and compromising developer environments.
Information security
fromArs Technica
5 days ago

Why a recent supply-chain attack singled out security firms Checkmarx and Bitwarden

Checkmarx and Bitwarden were compromised in a supply chain attack linked to TeamPCP, highlighting vulnerabilities in security tools.
Information security
fromTheregister
4 days ago

CISA flags data-theft bug in NSA-built OT networking tool

CISA warns of a vulnerability in GrassMarlin that could expose sensitive information due to insufficient XML parsing hardening.
Privacy technologies
fromZDNET
4 days ago

These two critical Mac security features are off by default - how to turn them on and why you should

A Firewall and Stealth Mode are essential for securing Macs against network vulnerabilities.
Information security
fromTechCrunch
4 days ago

Sri Lanka discloses another missing payment, days after hackers stole $2.5M from its finance ministry | TechCrunch

Sri Lanka is investigating missing payments and cyber thefts linked to hackers targeting its financial systems.
Information security
fromSecurityWeek
4 days ago

Fresh LiteLLM Vulnerability Exploited Shortly After Disclosure

A critical SQL injection vulnerability in LiteLLM was exploited shortly after disclosure, allowing unauthorized access to sensitive database information.
DevOps
fromThe Hacker News
4 days ago

What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)

Exposure management platforms vary in effectiveness, and security leaders need to evaluate them based on their ability to reduce actual risk.
Information security
fromSecurityWeek
4 days ago

Hundreds of Internet-Facing VNC Servers Expose ICS/OT

Millions of RDP and VNC servers are exposed online, with significant risks to industrial control systems and operational technology.
Privacy professionals
fromTheregister
5 days ago

Non-profit's GoDaddy nightmare and the IT chaos that ensued

GoDaddy is investigating claims of unauthorized domain transfer without proper authentication, leading to significant downtime for a client.
Information security
fromThe Verge
5 days ago

GitHub rushed to fix a critical vulnerability in less than six hours

GitHub fixed a critical vulnerability in under six hours, preventing potential access to millions of repositories.
Information security
fromThe Hacker News
5 days ago

CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV

CISA added two vulnerabilities to its KEV catalog due to active exploitation, impacting ConnectWise ScreenConnect and Microsoft Windows.
[ Load more ]