#cybersecurity

[ follow ]
Information security
fromSecurityWeek
1 hour ago

Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents

Agentic AI is transforming cybersecurity, presenting both opportunities for defenders and risks for attackers, necessitating a strategic response from the industry.
#malware
fromWIRED
15 hours ago
Science

Newly Deciphered Sabotage Malware May Have Targeted Iran's Nuclear Program-and Predates Stuxnet

Information security
fromThe Hacker News
18 hours ago

UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware

UNC6692 uses social engineering via Microsoft Teams to deploy malware, targeting senior employees with email spam and impersonation tactics.
Information security
fromThe Hacker News
3 hours ago

Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

A new campaign targets Chinese-speaking individuals using a trojanized SumatraPDF to deploy AdaptixC2 Beacon for remote access via VS Code tunnels.
Information security
fromTheregister
6 hours ago

Researchers find sabotage malware that may predate Stuxnet

Malware named fast16 aims to sabotage engineering and physics simulation software, predating Stuxnet and targeting high-precision tools.
Science
fromWIRED
15 hours ago

Newly Deciphered Sabotage Malware May Have Targeted Iran's Nuclear Program-and Predates Stuxnet

Fast16 is a sophisticated malware capable of subtly tampering with calculation and simulation software, likely created by the US or an ally.
Information security
fromThe Hacker News
18 hours ago

UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware

UNC6692 uses social engineering via Microsoft Teams to deploy malware, targeting senior employees with email spam and impersonation tactics.
Information security
fromInfoWorld
1 day ago

Malicious pgserve, automagik developer tools found in npm registry

Malicious npm packages aim to steal sensitive data and credentials, potentially leading to complete organizational takeovers.
Information security
fromSecurityWeek
2 hours ago

US Federal Agency's Cisco Firewall Infected With 'Firestarter' Backdoor

A US federal agency was infected with malware due to vulnerabilities in Cisco firewalls linked to a China-backed espionage campaign.
Privacy technologies
fromMail Online
2 hours ago

How to create secure passwords - it might be time to switch to passkey

Using unique passwords and transitioning to passkeys enhances online security and reduces the risk of cyber threats.
Information security
fromTechzine Global
3 hours ago

Agentic AI is reshaping the network - and it's time to upgrade

Wireless connectivity is essential for AI, transforming industries and requiring strategic management to address complexity and security risks.
Information security
fromThe New Yorker
3 hours ago

How Big a Threat Are Iranian-Backed Cyber Attacks?

Iranian cyber actors have accessed critical U.S. infrastructure, highlighting vulnerabilities in cybersecurity and the ongoing nature of nation-state hacking.
#crowdstrike
Artificial intelligence
from24/7 Wall St.
1 day ago

Jim Cramer Says People Who Sold CrowdStrike on AI Fear Made the Biggest Mistake of 2026

Investors misjudged CrowdStrike's potential, as AI advancements create increased demand for cybersecurity rather than reducing it.
Artificial intelligence
from24/7 Wall St.
1 day ago

Jim Cramer Says People Who Sold CrowdStrike on AI Fear Made the Biggest Mistake of 2026

Investors misjudged CrowdStrike's potential, as AI advancements create increased demand for cybersecurity rather than reducing it.
#patch-management
DevOps
fromSecuritymagazine
2 days ago

The Security Metric That's Failing You

Measuring patch rates does not equate to a secure environment; real risks often lie in misconfigurations and outdated permissions.
DevOps
fromSecurityWeek
6 hours ago

Copperhelm Raises $7 Million for Agentic Cloud Security Platform

Copperhelm raised $7 million for its AI-driven cloud security platform that autonomously monitors and remediates threats in real time.
Information security
fromTheregister
9 hours ago

Attackers could disable all of a city's public EV chargers

Rented IoT infrastructure prioritizes user convenience over security, exposing them to denial of service attacks and vulnerabilities.
#ai-security
Information security
fromZDNET
13 hours ago

How indirect prompt injection attacks on AI work - and 6 ways to shut them down

Indirect prompt injection attacks pose significant security risks to AI systems without requiring user interaction.
Information security
fromFortune
19 hours ago

Security experts head to D.C. to debate standards for securing AI systems as Mythos raises the stakes | Fortune

AI systems are becoming attractive targets for adversaries, with vulnerabilities discovered faster than developers can respond.
Information security
fromThe Verge
2 days ago

Anthropic's most dangerous AI model just fell into the wrong hands

Mythos AI model accessed by unauthorized users, raising cybersecurity concerns about its potential misuse.
Information security
fromTNW | Anthropic
2 days ago

Unauthorized users gained access to Anthropic's restricted Mythos AI model

Unauthorized users accessed Claude Mythos Preview by guessing its URL, raising concerns about security in AI model access.
Information security
fromZDNET
13 hours ago

How indirect prompt injection attacks on AI work - and 6 ways to shut them down

Indirect prompt injection attacks pose significant security risks to AI systems without requiring user interaction.
Information security
fromFortune
19 hours ago

Security experts head to D.C. to debate standards for securing AI systems as Mythos raises the stakes | Fortune

AI systems are becoming attractive targets for adversaries, with vulnerabilities discovered faster than developers can respond.
Information security
fromThe Verge
2 days ago

Anthropic's most dangerous AI model just fell into the wrong hands

Mythos AI model accessed by unauthorized users, raising cybersecurity concerns about its potential misuse.
Information security
fromTNW | Anthropic
2 days ago

Unauthorized users gained access to Anthropic's restricted Mythos AI model

Unauthorized users accessed Claude Mythos Preview by guessing its URL, raising concerns about security in AI model access.
Cryptocurrency
fromThe Village Voice
15 hours ago

Which VPN makes sense for crypto traders in 2026? - The Village Voice

Crypto traders must choose VPNs based on technical fundamentals like protocol choices, logging policies, and security features to protect their activities.
Information security
fromIT Brew
17 hours ago

Asking around: When does ransomware threat intelligence become noise?

Effective threat intelligence requires filtering information relevant to specific market segments to avoid overwhelming alerts.
#ai
fromSecurityWeek
1 day ago
Information security

Chinese Cybersecurity Firm's AI Hacking Claims Draw Comparisons to Claude Mythos

Information security
fromSecurityWeek
1 day ago

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

AI systems can autonomously hack cloud environments, demonstrating advanced capabilities in executing sophisticated attacks without specific instructions.
Information security
fromInfoWorld
1 day ago

Claude Mythos signals a new era in AI-driven security, finding 271 flaws in Firefox

AI has exposed hundreds of vulnerabilities in Mozilla's Firefox browser, highlighting both cybersecurity advancements and dual-use risks.
Venture
fromTNW | Startups-Technology
18 hours ago

Rilian raises $17.5 million to bring agentic AI to sovereign defence

Caspian platform automates threat detection and response in compliance-restricted environments using AI agents, enhancing cybersecurity for defense and national security.
Information security
fromSecurityWeek
1 day ago

Chinese Cybersecurity Firm's AI Hacking Claims Draw Comparisons to Claude Mythos

A Chinese cybersecurity firm claims AI-driven vulnerability discovery capabilities rivaling Anthropic's Claude Mythos model.
Information security
fromSecurityWeek
1 day ago

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

AI systems can autonomously hack cloud environments, demonstrating advanced capabilities in executing sophisticated attacks without specific instructions.
Information security
fromInfoWorld
1 day ago

Claude Mythos signals a new era in AI-driven security, finding 271 flaws in Firefox

AI has exposed hundreds of vulnerabilities in Mozilla's Firefox browser, highlighting both cybersecurity advancements and dual-use risks.
Information security
fromTheregister
18 hours ago

China-linked crews turn routers into covert attack proxies

China-linked threat actors exploit compromised routers and IoT devices to create proxy networks for cyber intrusions and data theft.
#cisa
SF politics
fromTechCrunch
18 hours ago

Trump's pick to run US cyber agency CISA asks to drop out | TechCrunch

Sean Plankey withdrew his nomination to lead CISA, leaving the agency without a permanent leader amid ongoing cybersecurity challenges.
SF politics
fromNextgov.com
1 day ago

Plankey withdraws nomination to lead CISA

Sean Plankey has withdrawn his nomination to lead the Cybersecurity and Infrastructure Security Agency after a year of waiting for Senate confirmation.
Information security
fromThe Verge
1 day ago

Anthropic's Mythos rollout has missed America's cyberscurity agency

CISA lacks access to Anthropic's cybersecurity model, raising concerns about its prioritization and effectiveness in digital security.
SF politics
fromTechCrunch
18 hours ago

Trump's pick to run US cyber agency CISA asks to drop out | TechCrunch

Sean Plankey withdrew his nomination to lead CISA, leaving the agency without a permanent leader amid ongoing cybersecurity challenges.
SF politics
fromNextgov.com
1 day ago

Plankey withdraws nomination to lead CISA

Sean Plankey has withdrawn his nomination to lead the Cybersecurity and Infrastructure Security Agency after a year of waiting for Senate confirmation.
Information security
fromThe Verge
1 day ago

Anthropic's Mythos rollout has missed America's cyberscurity agency

CISA lacks access to Anthropic's cybersecurity model, raising concerns about its prioritization and effectiveness in digital security.
Information security
fromFortune
20 hours ago

A group of users leaked Anthropic's AI model Mythos by reportedly guessing where it was located | Fortune

Unauthorized access to Anthropic's Mythos model raises significant cybersecurity concerns.
Information security
fromSecuritymagazine
1 day ago

NIST's New Prioritization Criteria for CVEs, Examined by Experts

NIST is changing its approach to handling cybersecurity vulnerabilities by prioritizing certain CVEs for immediate enrichment in the National Vulnerability Database.
fromSecuritymagazine
1 day ago

Operationally Ineffective: Putting CVEs in a Chokehold with Privilege Disruption

A Common Vulnerability Exposure (CVE) that cannot reach the privilege plane is operationally ineffective - even at a CVSS Score of 10. This should be a core philosophy that is embedded into the fabric of software engineering.
Information security
Information security
fromThe Hacker News
22 hours ago

ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories

Supply chain vulnerabilities and AI tools exacerbate ongoing cyber threats, including state-backed crypto heists and active remote code execution exploits.
#data-breach
Information security
fromTechCrunch
22 hours ago

Vercel says some of its customers' data was stolen prior to its recent hack | TechCrunch

Vercel experienced a data breach affecting customer accounts, with evidence of prior compromises suggesting broader security implications.
Privacy professionals
fromSecurityWeek
1 day ago

Luxury Cosmetics Giant Rituals Discloses Data Breach

Rituals experienced a data breach affecting My Rituals members' personal information, but no passwords or payment details were compromised.
France news
fromEngadget
1 day ago

France's national agency for managing IDs and passports suffered a data breach last week

France Titres confirmed a security breach exposing personal data, including names and contact information, with potential for phishing attacks.
France news
fromTechCrunch
1 day ago

France confirms data breach at government agency that manages citizens' IDs | TechCrunch

The French government agency ANTS confirmed a data breach affecting citizens' identity documents, potentially involving millions of personal records.
Privacy professionals
fromTechCrunch
1 day ago

Cosmetics giant Rituals confirms data breach of customer membership records | TechCrunch

Rituals confirmed a data breach affecting customers' personal information after hackers stole data from its membership database.
France news
fromTheregister
2 days ago

France's 'Secure' ID agency probes claimed 19M record breach

A significant data breach may have exposed personal information of up to 19 million individuals in France.
Information security
fromTechCrunch
22 hours ago

Vercel says some of its customers' data was stolen prior to its recent hack | TechCrunch

Vercel experienced a data breach affecting customer accounts, with evidence of prior compromises suggesting broader security implications.
Privacy professionals
fromSecurityWeek
1 day ago

Luxury Cosmetics Giant Rituals Discloses Data Breach

Rituals experienced a data breach affecting My Rituals members' personal information, but no passwords or payment details were compromised.
France news
fromEngadget
1 day ago

France's national agency for managing IDs and passports suffered a data breach last week

France Titres confirmed a security breach exposing personal data, including names and contact information, with potential for phishing attacks.
France news
fromTechCrunch
1 day ago

France confirms data breach at government agency that manages citizens' IDs | TechCrunch

The French government agency ANTS confirmed a data breach affecting citizens' identity documents, potentially involving millions of personal records.
Privacy professionals
fromTechCrunch
1 day ago

Cosmetics giant Rituals confirms data breach of customer membership records | TechCrunch

Rituals confirmed a data breach affecting customers' personal information after hackers stole data from its membership database.
France news
fromTheregister
2 days ago

France's 'Secure' ID agency probes claimed 19M record breach

A significant data breach may have exposed personal information of up to 19 million individuals in France.
#passkeys
Information security
fromInfoWorld
23 hours ago

Offer customers passkeys by default, UK's NCSC tells enterprises

Passkeys are recommended as the primary authentication method due to their security against phishing and credential reuse.
Information security
fromInfoWorld
23 hours ago

Offer customers passkeys by default, UK's NCSC tells enterprises

Passkeys are recommended as the primary authentication method due to their security against phishing and credential reuse.
Privacy technologies
fromTheregister
1 day ago

NCSC: Passkeys now good enough to be the default standard

The NCSC endorses passkeys as the default authentication standard, urging consumers to abandon passwords for enhanced security.
Information security
fromInfoWorld
1 day ago

UK's NCSC calls passkeys the default, says passwords are no longer fit for the purpose

Passkeys are recommended as the primary authentication method due to their security and user-friendliness compared to traditional passwords.
Information security
fromThe Hacker News
1 day ago

Project Glasswing Proved AI Can Find the Bugs. Who's Going to Fix Them?

Project Glasswing reveals a significant gap in cybersecurity, as less than 1% of vulnerabilities discovered were patched.
DevOps
fromTheregister
1 day ago

Hybrid clouds have two attack surfaces - so watch both

Hybrid cloud management tools present significant security vulnerabilities that users often overlook.
#hacking
Information security
fromComputerWeekly.com
1 day ago

Chinese hackers using compromised networks to spy on Western companies, says Five Eyes | Computer Weekly

China-linked hackers are using vulnerable internet-connected devices to obscure espionage and hacking operations against Western organizations.
Information security
fromComputerWeekly.com
1 day ago

Chinese hackers using compromised networks to spy on Western companies, says Five Eyes | Computer Weekly

China-linked hackers are using vulnerable internet-connected devices to obscure espionage and hacking operations against Western organizations.
Privacy professionals
fromReadWrite
1 day ago

Caesars sued over 2026 data breach claims

Caesars Entertainment faces a class action lawsuit for failing to protect customer data during a second cyber incident after a previous breach in 2023.
Deliverability
fromSecurityWeek
1 day ago

The Behavioral Shift: Why Trusted Relationships Are the Newest Attack Surface

Email attackers now exploit behavioral weaknesses, using tailored tactics that blend into trusted relationships and workflows, making detection more challenging.
Information security
fromTheregister
1 day ago

NCSC's first gadget blocks malware transfer over HDMI cables

GCHQ's SilentGlass device protects display devices from cyberattacks by blocking malicious traffic between computers and monitors.
#artificial-intelligence
fromFortune
1 day ago
Information security

Former national cyber director: Anthropic's 'Mythos' AI can hack nearly anything and we aren't ready | Fortune

fromWIRED
1 day ago
Artificial intelligence

5 AI Models Tried to Scam Me. Some of Them Were Scary Good

Information security
fromFortune
1 day ago

The Mythos meeting focused on the wrong AI risk to banks. Here's the one nobody is talking about | Fortune

Artificial intelligence is transforming fraud into a machine-driven, scalable threat, posing risks beyond traditional cyber attacks.
Information security
fromFortune
1 day ago

Former national cyber director: Anthropic's 'Mythos' AI can hack nearly anything and we aren't ready | Fortune

Mythos, Anthropic's advanced AI model, poses significant risks to critical infrastructure, necessitating urgent investment and collaboration to enhance cybersecurity.
Artificial intelligence
fromWIRED
1 day ago

5 AI Models Tried to Scam Me. Some of Them Were Scary Good

Artificial intelligence is increasingly capable of executing sophisticated social engineering attacks, as demonstrated by the DeepSeek-V3 model.
Information security
fromFortune
1 day ago

The Mythos meeting focused on the wrong AI risk to banks. Here's the one nobody is talking about | Fortune

Artificial intelligence is transforming fraud into a machine-driven, scalable threat, posing risks beyond traditional cyber attacks.
fromTheregister
1 day ago

Sharing isn't caring if it's an admin password: Pwned

The client wanted to 'keep things simple' for their team, so they used the same administrative password for both staging and production environments. That password was the hard-to-guess combination of 'admin123.'
Information security
#microsoft
European startups
fromTNW | Investors-Funding
1 day ago

Microsoft commits A$25 billion to Australia by 2029

Microsoft announces A$25 billion investment in Australia, expanding AI infrastructure and cybersecurity initiatives, and training three million Australians in AI skills by 2028.
Information security
fromNextgov.com
1 day ago

Microsoft to test third-party AI models for incorporation in its security offerings

Microsoft is evaluating third-party AI systems to enhance its cybersecurity measures against AI-driven threats.
European startups
fromTNW | Investors-Funding
1 day ago

Microsoft commits A$25 billion to Australia by 2029

Microsoft announces A$25 billion investment in Australia, expanding AI infrastructure and cybersecurity initiatives, and training three million Australians in AI skills by 2028.
Information security
fromNextgov.com
1 day ago

Microsoft to test third-party AI models for incorporation in its security offerings

Microsoft is evaluating third-party AI systems to enhance its cybersecurity measures against AI-driven threats.
Information security
fromSecurityWeek
1 day ago

Recent Microsoft Defender Vulnerability Exploited as Zero-Day

A zero-day vulnerability in Microsoft Defender, tracked as CVE-2026-33825, allows privilege escalation through a flaw named BlueHammer.
Deliverability
fromTechRepublic
1 day ago

New Apple Phishing Scam Uses Fake $899 iPhone Purchase Alert

A phishing scam mimics an Apple security alert to trick users into calling a fake support number and potentially compromising their accounts.
Information security
fromTechRepublic
1 day ago

Hackers Impersonate IT Help Desk on Microsoft Teams to Gain Access, Steal Data

Hackers are increasingly using social engineering on Microsoft Teams to gain unauthorized access by impersonating IT support.
Information security
fromNextgov.com
1 day ago

Cyber Command carried out over 8,000 missions in 2025, director says

U.S. Cyber Command conducted over 8,000 missions in 2025, marking a 25% increase from 2024, with expectations for further growth in 2026.
Information security
fromWIRED
1 day ago

AI Tools Are Helping Mediocre North Korean Hackers Steal Millions

AI tools have enabled unskilled hackers to execute sophisticated cybercrime operations, resulting in significant financial theft.
Information security
fromnews.bitcoin.com
1 day ago

Mach-O Man Malware Steals macOS Keychain Data in Lazarus Group Crypto Campaign

North Korea's Lazarus Group deployed Mach-O Man malware targeting macOS users in crypto and fintech roles in April 2026.
Privacy professionals
fromTechCrunch
1 day ago

UK government says 100 countries have spyware that can hack people's phones | TechCrunch

More than half of the world's governments now have access to commercial spyware, increasing risks for citizens and critical infrastructure.
Information security
fromSecurityWeek
2 days ago

Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief Says

Hostile nations like Russia, Iran, and China are the primary sources of serious cyberattacks in the U.K.
Information security
fromComputerWeekly.com
2 days ago

A tsunami of flaws: When frontier AI and Patch Tuesday collide | Computer Weekly

April 2025 Patch Tuesday update was the second-largest in history, addressing over 160 vulnerabilities, with AI tools potentially driving the increase.
Information security
fromThe Hacker News
2 days ago

Lotus Wiper Malware Targets Venezuelan Energy Systems in Destructive Attack

A new data wiper named Lotus Wiper targets Venezuela's energy sector, erasing files and disrupting operations without financial motives.
Information security
fromSecurityWeek
2 days ago

North Korean Hackers Use AppleScript, ClickFix in Fresh macOS Attacks

North Korean hackers are targeting macOS users in financial organizations using social engineering techniques to install information-stealing malware.
Information security
fromSecurityWeek
2 days ago

Google Antigravity in Crosshairs of Security Researchers, Cybercriminals

Google Antigravity's vulnerabilities have attracted both security researchers and cybercriminals, leading to risks of remote code execution and malware delivery.
fromEngadget
2 days ago

Anthropic is investigating 'unauthorized access' of its Mythos cybersecurity tool

We're investigating a report claiming unauthorized access to Claude Mythos Previous through one of our third-party vendor environments.
Information security
Information security
fromAxios
2 days ago

Exclusive: OpenAI briefs feds and Five Eyes on new cyber product

OpenAI demonstrated its GPT-5.4-Cyber model to federal cyber defense practitioners, emphasizing a dual-track access approach for government and commercial users.
Information security
fromSecurityWeek
2 days ago

Oracle Patches 450 Vulnerabilities With April 2026 CPU

Oracle released 481 new security patches in April 2026, addressing vulnerabilities across 28 product families, with many remotely exploitable without authentication.
Information security
fromThe Hacker News
2 days ago

Mustang Panda's New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles

A new variant of LOTUSLITE malware targets India's banking sector, focusing on espionage rather than financial gain.
DevOps
fromInfoQ
2 days ago

Cloudflare Outlines MCP Architecture as Enterprises Confront Security and Governance Risks

Centralized governance and remote infrastructure are essential for secure Model Context Protocol deployments, addressing risks like prompt injection and supply chain attacks.
Information security
fromTechzine Global
2 days ago

As Mythos fixes Mozilla flaws, unauthorized access spells disaster

Firefox's Claude Mythos Preview addresses 271 vulnerabilities, but unauthorized access raises concerns about potential misuse by threat actors.
[ Load more ]