OpenAI Introduces Password-Free Login for Millions of ChatGPT Users
OpenAI's Advanced Account Security replaces passwords with passkeys or security keys, enhancing protection against cyberattacks but limiting recovery options.
Over 40,000 Servers Compromised in Ongoing cPanel Exploitation
Over 40,000 servers have been compromised due to a critical cPanel zero-day vulnerability, CVE-2026-41940, allowing unauthorized administrative access.
Over 40,000 Servers Compromised in Ongoing cPanel Exploitation
Over 40,000 servers have been compromised due to a critical cPanel zero-day vulnerability, CVE-2026-41940, allowing unauthorized administrative access.
Cyber experts take an optimistic view of AI-powered hacking | Computer Weekly
Claude Mythos Preview enhances cybersecurity by autonomously identifying vulnerabilities, while cyber crime forums show limited impact from 'dark AI' products.
The White House Suddenly Seems Pretty Terrified of Anthropic
Mythos, an AI model by Anthropic, poses significant cybersecurity risks, prompting concerns from the White House and a strained relationship with the Department of Defense.
Cyber experts take an optimistic view of AI-powered hacking | Computer Weekly
Claude Mythos Preview enhances cybersecurity by autonomously identifying vulnerabilities, while cyber crime forums show limited impact from 'dark AI' products.
ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories
New phishing kits are evolving, integrating advanced features for targeted attacks, while security vulnerabilities continue to pose significant risks online.
30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign
A Vietnamese-linked operation uses Google AppSheet for phishing, compromising around 30,000 Facebook accounts to sell them back through an illicit storefront.
ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories
New phishing kits are evolving, integrating advanced features for targeted attacks, while security vulnerabilities continue to pose significant risks online.
China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists
A new China-aligned espionage campaign targets government and defense sectors in Asia and Europe, exploiting vulnerabilities in Microsoft Exchange and IIS servers.
Open-source registries hit by 'Mini Shai-Hulud' supply chain attacks
The 'Mini Shai-Hulud' worm targets developer credentials across multiple ecosystems, exploiting vulnerabilities in popular packages to steal sensitive information.
Hugging Face, ClawHub Abused for Malware Distribution
Threat actors exploit AI distribution platforms to distribute malware through trojanized shared files, relying on social engineering tactics to deceive users.
Hugging Face, ClawHub Abused for Malware Distribution
Threat actors exploit AI distribution platforms to distribute malware through trojanized shared files, relying on social engineering tactics to deceive users.
Anthropic Claude Security available to all Enterprise customers
Claude Security is now in public beta for Enterprise customers, scanning code for vulnerabilities and suggesting targeted patches using the Claude Opus 4.7 model.
Ongoing supply chain attacks worm into SAP npm packages
Supply chain attacks have compromised multiple npm packages, including those from SAP and Intercom, with credential-stealing malware affecting developers.
Why recovery speed matters when the homeland is the cyber battlefield
Cyberattacks are now a constant threat to essential services and military readiness, requiring a shift in defense strategies to anticipate and recover from disruptions.
FBI: China's hacker-for-hire ecosystem 'out of control'
Motivated by profit, this network of private companies and contractors in China cast a wide net to identify vulnerable computers, exploit those computers, and then identify information that it could sell directly or indirectly to the PRC government.
AI Fuels 'Industrial' Cybercrime as Time-to-Exploit Shrinks to Hours
Industrialized cybercrime utilizes AI and automation for efficient, sophisticated attacks, necessitating defenders to adopt similar technologies for effective countermeasures.
ILTA EVOLVE: Sometimes Less Is More - A Focus On Leadership - Above the Law
Smaller, focused conferences like ILTA EVOLVE enhance interaction and address critical topics such as cybersecurity, GenAI, and leadership in legal tech.
Chinese spy group caught lurking in Poland, Asia networks
A China-linked threat group infiltrated critical networks in multiple countries, using advanced techniques and tools for long-term access and espionage.
Chinese spy group caught lurking in Poland, Asia networks
A China-linked threat group infiltrated critical networks in multiple countries, using advanced techniques and tools for long-term access and espionage.
Finance company stored their DB credentials in spreadsheet
Sensitive information was inadequately protected in a publicly accessible SharePoint folder, highlighting significant security flaws in a fintech startup's practices.
SAP npm Packages Compromised by "Mini Shai-Hulud" Credential-Stealing Malware
A new supply chain attack campaign targets SAP-related npm packages with credential-stealing malware, affecting multiple versions and compromising developer environments.
SAP npm Packages Compromised by "Mini Shai-Hulud" Credential-Stealing Malware
A new supply chain attack campaign targets SAP-related npm packages with credential-stealing malware, affecting multiple versions and compromising developer environments.
Fresh LiteLLM Vulnerability Exploited Shortly After Disclosure
A critical SQL injection vulnerability in LiteLLM was exploited shortly after disclosure, allowing unauthorized access to sensitive database information.