#cybersecurity

[ follow ]
#ai-security
Artificial intelligence
fromAxios
2 hours ago

Trump administration considering safety review for new AI models

The White House is developing an AI security framework to assess vulnerabilities before public deployment of advanced AI models.
Information security
fromSecurityWeek
4 days ago

Anthropic Unveils Claude Security to Counter AI-Powered Exploit Surge

Claude Security aims to empower defenders against advanced AI threats by providing automated vulnerability scanning and patching capabilities.
Artificial intelligence
fromAxios
2 hours ago

Trump administration considering safety review for new AI models

The White House is developing an AI security framework to assess vulnerabilities before public deployment of advanced AI models.
Information security
fromSecurityWeek
4 days ago

Anthropic Unveils Claude Security to Counter AI-Powered Exploit Surge

Claude Security aims to empower defenders against advanced AI threats by providing automated vulnerability scanning and patching capabilities.
Information security
fromNextgov.com
3 hours ago

Operational technology providers are feeling 'annoyance' at exclusion from Anthropic's Mythos rollout, sources say

Operational technology providers seek access to Anthropic's Mythos model for cybersecurity, citing exclusion from initial rollout affecting critical infrastructure.
#ransomware
Information security
fromThe Hacker News
3 days ago

Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks

Two cybersecurity professionals were sentenced to four years for facilitating BlackCat ransomware attacks in 2023.
Information security
fromThe Hacker News
3 days ago

Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks

Two cybersecurity professionals were sentenced to four years for facilitating BlackCat ransomware attacks in 2023.
DevOps
fromZDNET
4 hours ago

The future of IT service delivery is built on AI and automation

The traditional IT playbook is ineffective due to tool sprawl and operational inefficiencies, necessitating a more connected IT ecosystem.
#phishing
Information security
fromTechRepublic
3 days ago

Microsoft Flagged 8.3B Phishing Emails in Q1 as QR Codes, CAPTCHAs Rise

Phishing attacks are evolving, utilizing QR codes and modular strategies, requiring comprehensive security measures beyond traditional email defenses.
Information security
fromThe Hacker News
5 hours ago

Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM Tools

An active phishing campaign using legitimate RMM software has targeted over 80 organizations since April 2025, enabling persistent remote access.
Information security
fromSecurityWeek
2 days ago

New Bluekit Phishing Kit Features AI Assistant

Bluekit is a sophisticated phishing kit with AI capabilities, automated domain registration, and extensive templates for various online services.
Information security
fromThe Hacker News
3 days ago

30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign

A Vietnamese-linked operation uses Google AppSheet for phishing, compromising around 30,000 Facebook accounts to sell them back through an illicit storefront.
Information security
fromTechRepublic
3 days ago

Microsoft Flagged 8.3B Phishing Emails in Q1 as QR Codes, CAPTCHAs Rise

Phishing attacks are evolving, utilizing QR codes and modular strategies, requiring comprehensive security measures beyond traditional email defenses.
#cpanel
Information security
fromTechCrunch
5 hours ago

Hackers are still exploiting the cPanel bug to gain control of thousands of websites | TechCrunch

Hackers are actively exploiting a critical vulnerability in cPanel and WHM, affecting over 550,000 servers and leading to numerous compromises.
Information security
fromSecurityWeek
15 hours ago

Over 40,000 Servers Compromised in Ongoing cPanel Exploitation

Over 40,000 servers have been compromised due to a critical cPanel zero-day vulnerability, CVE-2026-41940, allowing unauthorized administrative access.
Information security
fromTechCrunch
4 days ago

Hackers are actively exploiting a bug in cPanel, used by millions of websites | TechCrunch

A critical vulnerability in cPanel and WHM allows hackers to gain full control of affected servers, necessitating immediate patching by users.
Information security
fromSecurityWeek
4 days ago

Critical cPanel & WHM Vulnerability Exploited as Zero-Day for Months

A critical authentication bypass vulnerability in cPanel & WHM allows remote attackers to gain administrative access, risking system takeover.
Information security
fromTheregister
4 days ago

Critical cPanel, WHM flaw probs exploited as 0-day, pros say

A critical vulnerability in cPanel and WHM allows attackers to bypass authentication and gain root access, affecting millions of domains.
Information security
fromTechCrunch
5 hours ago

Hackers are still exploiting the cPanel bug to gain control of thousands of websites | TechCrunch

Hackers are actively exploiting a critical vulnerability in cPanel and WHM, affecting over 550,000 servers and leading to numerous compromises.
Information security
fromSecurityWeek
15 hours ago

Over 40,000 Servers Compromised in Ongoing cPanel Exploitation

Over 40,000 servers have been compromised due to a critical cPanel zero-day vulnerability, CVE-2026-41940, allowing unauthorized administrative access.
Information security
fromTechCrunch
4 days ago

Hackers are actively exploiting a bug in cPanel, used by millions of websites | TechCrunch

A critical vulnerability in cPanel and WHM allows hackers to gain full control of affected servers, necessitating immediate patching by users.
Information security
fromSecurityWeek
4 days ago

Critical cPanel & WHM Vulnerability Exploited as Zero-Day for Months

A critical authentication bypass vulnerability in cPanel & WHM allows remote attackers to gain administrative access, risking system takeover.
Information security
fromTheregister
4 days ago

Critical cPanel, WHM flaw probs exploited as 0-day, pros say

A critical vulnerability in cPanel and WHM allows attackers to bypass authentication and gain root access, affecting millions of domains.
#data-breach
Information security
fromTechRepublic
11 hours ago

Canvas Breach May Put 275M Users, 9,000 Schools at Risk

Instructure confirmed a Canvas breach affecting user information and messages, with hackers claiming 275 million users and nearly 9,000 schools impacted.
Privacy professionals
fromTechzine Global
14 hours ago

ShinyHunters claims Instructure breach, data from 275M users stolen

Instructure confirmed a data breach affecting personal data of users, with claims of 275 million individuals' data stolen by the ShinyHunters group.
Information security
fromSecurityWeek
3 days ago

In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability

Key cybersecurity developments include OFAC actions against Iranian crypto, the arrest of a Scattered Spider member, and a major data leak at ADT.
Information security
fromTechRepublic
11 hours ago

Canvas Breach May Put 275M Users, 9,000 Schools at Risk

Instructure confirmed a Canvas breach affecting user information and messages, with hackers claiming 275 million users and nearly 9,000 schools impacted.
Privacy professionals
fromTechzine Global
14 hours ago

ShinyHunters claims Instructure breach, data from 275M users stolen

Instructure confirmed a data breach affecting personal data of users, with claims of 275 million individuals' data stolen by the ShinyHunters group.
Information security
fromSecurityWeek
3 days ago

In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability

Key cybersecurity developments include OFAC actions against Iranian crypto, the arrest of a Scattered Spider member, and a major data leak at ADT.
#ai
Higher education
fromNextgov.com
3 days ago

US imposes AI skills requirement on CyberCorps pipeline

CyberCorps scholarship program now requires applicants to demonstrate skills in AI and cybersecurity integration for government jobs.
EU data protection
fromTNW | Eu
8 hours ago

Why the EU is now demanding access to Anthropic's Mythos

Anthropic's Mythos AI model can identify zero-day vulnerabilities, raising geopolitical concerns and prompting discussions among European finance ministers.
Information security
from24/7 Wall St.
8 hours ago

"The Nuclear Weapons of Cybersecurity": Why Treasury Just Warned Banks About AI's New Power

The Treasury Secretary and Fed Chair warned Wall Street banks about AI's potential to exploit software vulnerabilities rapidly.
Artificial intelligence
fromFuturism
1 day ago

The White House Suddenly Seems Pretty Terrified of Anthropic

Mythos, an AI model by Anthropic, poses significant cybersecurity risks, prompting concerns from the White House and a strained relationship with the Department of Defense.
Higher education
fromNextgov.com
3 days ago

US imposes AI skills requirement on CyberCorps pipeline

CyberCorps scholarship program now requires applicants to demonstrate skills in AI and cybersecurity integration for government jobs.
Information security
fromThe Hacker News
8 hours ago

Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE & More

Cyber attackers are increasingly exploiting vulnerabilities in SaaS environments, using sophisticated methods like vishing for data theft and control over systems.
Information security
fromInfoQ
23 hours ago

Cloudflare Processes 10M+ Daily Insights with New Security Overview Dashboard

Cloudflare's new Security Overview dashboard consolidates security signals into actionable insights, prioritizing vulnerabilities for efficient risk management.
fromSecurityWeek
10 hours ago

Cybersecurity M&A Roundup: 33 Deals Announced in April 2026

Airbus has entered into an agreement to acquire Quarkslab, a French cybersecurity company founded in 2011 with approximately 100 employees. The transaction is part of Airbus' broader strategy to build sovereign cybersecurity capabilities across Europe.
Information security
Information security
fromSecurityWeek
10 hours ago

DigiCert Revokes Certificates After Support Portal Hack

DigiCert revoked certificates fraudulently obtained through a cyberattack targeting its support portal, affecting multiple customer accounts.
#cybercrime
Information security
fromSecurityWeek
4 days ago

AI Fuels 'Industrial' Cybercrime as Time-to-Exploit Shrinks to Hours

Industrialized cybercrime utilizes AI and automation for efficient, sophisticated attacks, necessitating defenders to adopt similar technologies for effective countermeasures.
Information security
fromThe Hacker News
11 hours ago

Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and Russia

A China-based cybercrime group is targeting organizations in Russia and India with a new malware called ABCDoor via phishing emails.
Information security
fromSecurityWeek
4 days ago

AI Fuels 'Industrial' Cybercrime as Time-to-Exploit Shrinks to Hours

Industrialized cybercrime utilizes AI and automation for efficient, sophisticated attacks, necessitating defenders to adopt similar technologies for effective countermeasures.
#linux
Information security
fromThe Hacker News
1 day ago

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

A critical Linux vulnerability allows unprivileged users to gain root access, impacting various distributions and requiring immediate patching.
Information security
fromThe Hacker News
4 days ago

New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions

A high-severity Linux vulnerability allows unprivileged users to gain root access through a flaw in the kernel's cryptographic subsystem.
Information security
fromThe Hacker News
1 day ago

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

A critical Linux vulnerability allows unprivileged users to gain root access, impacting various distributions and requiring immediate patching.
Information security
fromThe Hacker News
4 days ago

New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions

A high-severity Linux vulnerability allows unprivileged users to gain root access through a flaw in the kernel's cryptographic subsystem.
#account-security
Privacy technologies
fromTechRepublic
3 days ago

OpenAI Introduces Password-Free Login for Millions of ChatGPT Users

OpenAI's Advanced Account Security replaces passwords with passkeys or security keys, enhancing protection against cyberattacks but limiting recovery options.
Information security
fromWIRED
4 days ago

OpenAI Rolls Out 'Advanced' Security Mode for At-Risk Accounts

OpenAI introduces Advanced Account Security to enhance protection against account takeover attacks for ChatGPT and Codex users.
Privacy technologies
fromTechRepublic
3 days ago

OpenAI Introduces Password-Free Login for Millions of ChatGPT Users

OpenAI's Advanced Account Security replaces passwords with passkeys or security keys, enhancing protection against cyberattacks but limiting recovery options.
Information security
fromWIRED
4 days ago

OpenAI Rolls Out 'Advanced' Security Mode for At-Risk Accounts

OpenAI introduces Advanced Account Security to enhance protection against account takeover attacks for ChatGPT and Codex users.
Europe politics
fromwww.theguardian.com
19 hours ago

EU forging closer ties with Armenia as it sends experts to help counter Russian interference

The EU is deploying experts to Armenia to combat Russian propaganda and support the country during a critical political period.
#cisa
Information security
fromwww.dw.com
1 day ago

North Korea rejects US cybercrime claims as 'absurd slander'

North Korea denied US cybercrime allegations, calling them absurd slander and asserting it does not pose a cyber threat.
Business
fromwww.businessinsider.com
2 days ago

Berkshire Hathaway's first Q&A without Warren Buffett opened with a question from a deepfake Warren Buffett

Warren Buffett's likeness was used in a deepfake at Berkshire Hathaway's annual meeting to discuss the risks of cyberattacks and misinformation.
Privacy technologies
fromHarvard Gazette
3 days ago

Worried about how online firms use data they get from you? - Harvard Gazette

Keyring wallet allows users to verify identity while controlling personal information and reducing vulnerability to identity theft.
#ddos-attack
Information security
fromTechCrunch
3 days ago

Ubuntu services hit by outages after DDoS attack | TechCrunch

Hacktivists launched a DDoS attack on Ubuntu and Canonical, disrupting services and preventing users from updating the operating system.
Information security
fromTechCrunch
3 days ago

Ubuntu services hit by outages after DDoS attack | TechCrunch

Hacktivists launched a DDoS attack on Ubuntu and Canonical, disrupting services and preventing users from updating the operating system.
Information security
fromThe Hacker News
3 days ago

China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists

A new China-aligned espionage campaign targets government and defense sectors in Asia and Europe, exploiting vulnerabilities in Microsoft Exchange and IIS servers.
Information security
fromTechRepublic
4 days ago

New Global Scam Uses Fake Meeting Links to Run PowerShell Malware

BlueNoroff hackers exploit fake Zoom calls and fileless malware to steal credentials from Web3 and cryptocurrency organizations.
#openai
Information security
fromTNW | Next-Featured
4 days ago

OpenAI launches hardware security keys for ChatGPT with Yubico partnership and disables password login for high-risk users

OpenAI launched Advanced Account Security, replacing passwords with hardware keys and disabling email recovery, targeting sensitive user accounts.
Information security
fromTechCrunch
4 days ago

After dissing Anthropic for limiting Mythos, OpenAI restricts access to Cyber, too | TechCrunch

OpenAI will restrict access to its cybersecurity tool Cyber, similar to Anthropic's approach with Mythos.
Information security
fromTNW | Next-Featured
4 days ago

OpenAI launches hardware security keys for ChatGPT with Yubico partnership and disables password login for high-risk users

OpenAI launched Advanced Account Security, replacing passwords with hardware keys and disabling email recovery, targeting sensitive user accounts.
Information security
fromTechCrunch
4 days ago

After dissing Anthropic for limiting Mythos, OpenAI restricts access to Cyber, too | TechCrunch

OpenAI will restrict access to its cybersecurity tool Cyber, similar to Anthropic's approach with Mythos.
Information security
fromDeveloper Tech News
3 days ago

Open-source registries hit by 'Mini Shai-Hulud' supply chain attacks

The 'Mini Shai-Hulud' worm targets developer credentials across multiple ecosystems, exploiting vulnerabilities in popular packages to steal sensitive information.
Growth hacking
fromThe Hacker News
3 days ago

Top Five Sales Challenges Costing MSPs Cybersecurity Revenue

The managed security services market is set to grow significantly, but MSPs often fail to align technical expertise with business needs.
#malware
Information security
fromSecurityWeek
3 days ago

Hugging Face, ClawHub Abused for Malware Distribution

Threat actors exploit AI distribution platforms to distribute malware through trojanized shared files, relying on social engineering tactics to deceive users.
fromThe Hacker News
4 days ago
Information security

New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

DEEP#DOOR is a Python-based backdoor framework that enables persistent access and sensitive information harvesting from compromised systems.
fromInfoWorld
4 days ago
Information security

SAP npm package attack highlights risks in developer tools and CI/CD pipelines

Attackers view developer workstations as critical access points, targeting them to infiltrate software supply chains.
Information security
fromSecurityWeek
3 days ago

Sophisticated Deep#Door Backdoor Enables Espionage, Disruption

A new Python-based backdoor framework, Deep#Door, enables persistent remote command execution and surveillance on Windows systems.
Information security
fromSecurityWeek
3 days ago

Hugging Face, ClawHub Abused for Malware Distribution

Threat actors exploit AI distribution platforms to distribute malware through trojanized shared files, relying on social engineering tactics to deceive users.
Information security
fromThe Hacker News
4 days ago

New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

DEEP#DOOR is a Python-based backdoor framework that enables persistent access and sensitive information harvesting from compromised systems.
Information security
fromInfoWorld
4 days ago

SAP npm package attack highlights risks in developer tools and CI/CD pipelines

Attackers view developer workstations as critical access points, targeting them to infiltrate software supply chains.
SF politics
fromTNW | Anthropic
3 days ago

Anthropic's Mythos is moving between governments faster than regulators

Anthropic's Mythos cybersecurity model faces conflicting government interests regarding its access and usage among state actors and private sectors.
Software development
fromDevOps.com
3 days ago

Anthropic Brings AI-Powered Security Scanning to Enterprise Teams With Claude Security - DevOps.com

Claude Security enables security teams to scan codebases for vulnerabilities and generate patches efficiently, enhancing remediation processes.
Information security
fromTechzine Global
3 days ago

Anthropic Claude Security available to all Enterprise customers

Claude Security is now in public beta for Enterprise customers, scanning code for vulnerabilities and suggesting targeted patches using the Claude Opus 4.7 model.
Information security
fromTheregister
4 days ago

Ongoing supply chain attacks worm into SAP npm packages

Supply chain attacks have compromised multiple npm packages, including those from SAP and Intercom, with credential-stealing malware affecting developers.
Cryptocurrency
fromnews.bitcoin.com
4 days ago

Pentagon Eyes Bitcoin Infrastructure as Strategic Asset, Hegseth Says

Bitcoin is integrated into classified U.S. Defense Department efforts to enhance national security and counter China.
Information security
fromArs Technica
4 days ago

The most severe Linux threat to surface in years catches the world flatfooted

A critical Linux vulnerability allows unprivileged users to gain root access, posing severe risks to data centers and personal devices.
Information security
fromNextgov.com
4 days ago

Why recovery speed matters when the homeland is the cyber battlefield

Cyberattacks are now a constant threat to essential services and military readiness, requiring a shift in defense strategies to anticipate and recover from disruptions.
fromTheregister
4 days ago

FBI: China's hacker-for-hire ecosystem 'out of control'

Motivated by profit, this network of private companies and contractors in China cast a wide net to identify vulnerable computers, exploit those computers, and then identify information that it could sell directly or indirectly to the PRC government.
Information security
Information security
fromThe Hacker News
4 days ago

PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials

Malicious versions of the Lightning Python package were released, enabling credential theft through an automated attack chain.
World politics
fromFortune
4 days ago

For years, the risk Jamie Dimon was most concerned about was geopolitics. His answer has shifted | Fortune

Geopolitical tensions and cybersecurity risks are the greatest threats to the global economy, according to Jamie Dimon.
Information security
fromTNW | Opinion
4 days ago

Why cybersecurity leaders are losing control in the age of AI threats

AI-driven threats are increasing, and effective cybersecurity relies on leadership clarity, AI integration, and workforce awareness.
Women in technology
fromAbove the Law
4 days ago

ILTA EVOLVE: Sometimes Less Is More - A Focus On Leadership - Above the Law

Smaller, focused conferences like ILTA EVOLVE enhance interaction and address critical topics such as cybersecurity, GenAI, and leadership in legal tech.
Information security
fromTheregister
4 days ago

Chinese spy group caught lurking in Poland, Asia networks

A China-linked threat group infiltrated critical networks in multiple countries, using advanced techniques and tools for long-term access and espionage.
Artificial intelligence
fromThe Verge
4 days ago

OpenAI's new security model is for 'critical cyber defenders' only

OpenAI is launching GPT-5.5-Cyber for select cyber defenders, not for public access, to enhance cybersecurity measures.
Privacy professionals
fromWIRED
4 days ago

Exposed Data Illustrates the Nightmare Scenario for a Stalkerware Victim

Stalkerware enables secret surveillance of individuals, leading to severe privacy violations and potential data breaches of sensitive information.
Information security
fromInfoQ
4 days ago

Meta's Approach to Migrating their Systems to Post-Quantum Cryptography

Meta is migrating to post-quantum cryptography to protect against quantum computing threats, using a five-level maturity model to track progress.
[ Load more ]