Information security

[ follow ]
Information security
fromComputerWeekly.com
20 minutes ago

From breach to resilience: How the Electoral Commission rebuilt its cyber defences | Computer Weekly

The UK's electoral system is critical national infrastructure vulnerable to cyber-attacks, requiring sustained investment and comprehensive rebuilding to ensure electoral resilience.
Information security
fromNextgov.com
48 minutes ago

Pentagon bans tech vendors from using China-based personnel following a ProPublica investigation

The Defense Department banned China-based personnel from Pentagon cloud systems and requires qualified technical escorts plus detailed audit logs of foreign engineers' maintenance.
Information security
fromArs Technica
2 hours ago

Here's how potent Atomic credential stealer is finding its way onto Macs

Malicious search ads impersonate legitimate services to deliver macOS credential stealers like Atomic Stealer and Amos Stealer, targeting LastPass users and others.
#scattered-spider
#data-breach
fromTechCrunch
2 hours ago
Information security

Automaker giant Stellantis says customers' personal data stolen during breach | TechCrunch

fromWIRED
2 days ago
Information security

Security News This Week: A Dangerous Worm Is Eating Its Way Through Software Packages

fromSecurityWeek
3 days ago
Information security

In Other News: 600k Hit by Healthcare Breaches, Major ShinyHunters Hacks, DeepSeek's Coding Bias

Multiple major data breaches and critical software vulnerabilities were disclosed, exposing millions of customer and patient records and security flaws in widely used platforms.
fromIT Pro
3 days ago
Information security

The Salesloft hackers claim they have 1.5 billion compromised Salesforce records

Threat actors claim theft of over 1.5 billion records via Salesloft Drift attacks using social engineering and malicious OAuth tokens to access Salesforce instances.
fromTechCrunch
2 hours ago
Information security

Automaker giant Stellantis says customers' personal data stolen during breach | TechCrunch

fromWIRED
2 days ago
Information security

Security News This Week: A Dangerous Worm Is Eating Its Way Through Software Packages

fromSecurityWeek
3 days ago
Information security

In Other News: 600k Hit by Healthcare Breaches, Major ShinyHunters Hacks, DeepSeek's Coding Bias

fromIT Pro
3 days ago
Information security

The Salesloft hackers claim they have 1.5 billion compromised Salesforce records

Information security
fromDevOps.com
10 hours ago

The DevSecOps Career Path: What No One Tells You About Getting Started - DevOps.com

DevOps teams must integrate security into every stage of rapid development, developing skills to balance delivery speed with robust threat-aware practices.
fromMedium
1 month ago

DLP vs. EDR: A Technical Deep Dive Beyond the Acronyms

Alright, let's cut through the marketing noise. You're a tech pro. You've seen the alphabet soup of security tools, and two that frequently cause confusion are DLP (Data Loss Prevention) and EDR (Endpoint Detection and Response). On the surface, they both run agents on endpoints and promise "protection." But that's like saying a packet sniffer and a compiler are the same because they both process code.
Information security
#dhs
fromThe Hacker News
9 hours ago

How to Gain Control of AI Agents and Non-Human Identities

Every enterprise today runs on more than users. Behind the scenes, thousands of non-human identities, from service accounts to API tokens to AI agents, access systems, move data, and execute tasks around the clock. They're not new. But they're multiplying fast. And most weren't built with security in mind. Traditional identity tools assume intent, context, and ownership. Non-human identities have none of those.
Information security
Information security
fromSecuritymagazine
20 hours ago

Layered Secure Entrances Strengthen Warehouse and Supply Chain Security

Layered secured entry systems combining access control, security entrances, sensors, and biometrics strengthen warehouse security, deter threats, control flows, and protect inventory and personnel.
#microsoft-entra-id
#ransomware
fromTechCrunch
6 hours ago
Information security

EU cyber agency confirms ransomware attack causing airport disruptions | TechCrunch

fromTechCrunch
6 hours ago
Information security

EU cyber agency confirms ransomware attack causing airport disruptions | TechCrunch

Information security
fromTechCrunch
6 hours ago

Unit 221B raises $5 million to help track and disrupt today's top hacking groups | TechCrunch

English-speaking teenage and young adult hackers have become a leading global cyber threat, causing large-scale breaches, extortion, and societal harm.
Information security
fromComputerWeekly.com
12 hours ago

Balancing IT security with AI and cloud innovation | Computer Weekly

Cloud-based AI adoption ties organisational AI strategies to cloud security and availability while SLAs often omit data protection, breach response, and regulatory responsibilities.
fromSecurityWeek
9 hours ago

HoundBytes Launches Automated Security Analyst

Named WorkHorse, the solution is described as a tool that easily integrates with an organization's SIEM system and within minutes it begins transforming raw alerts into fully contextualized information that is ready for Tier 2 analysts. The goal is to cut alert fatigue to zero and reduce case triage time from hours to seconds.
Information security
#entra-id
fromIT Pro
8 hours ago
Information security

A terrifying Microsoft flaw could've allowed hackers to compromise 'every Entra ID tenant in the world'

fromIT Pro
8 hours ago
Information security

A terrifying Microsoft flaw could've allowed hackers to compromise 'every Entra ID tenant in the world'

Information security
fromThe Hacker News
3 hours ago

ComicForm and SectorJ149 Hackers Deploy Formbook Malware in Eurasian Cyberattacks

ComicForm conducted phishing since April 2025 targeting Belarus, Kazakhstan, and Russia to deploy Formbook via multi-stage .NET malware.
fromThe Local France
7 hours ago

Data from French government ANTS website 'not for sale on the dark web'

Over the weekend it was widely reported in French media that a group of hackers had breached the government's ANTS website, stealing personal data from between 12 and 13 million people. The unidentified group posted messages online claiming that the personal data was now for sale on the dark web, offering sample data to apparently prove that their hack had been successful.
Information security
Information security
fromSecurityWeek
12 hours ago

Fortra Patches Critical GoAnywhere MFT Vulnerability

A deserialization vulnerability in GoAnywhere MFT (CVE-2025-10035) can enable remote code execution; apply provided patches and restrict Admin Console exposure.
Information security
fromZDNET
3 hours ago

FBI warns its scam reporting site is being spoofed - how to avoid getting tricked

Scammers are creating spoofed websites impersonating the FBI’s IC3 to steal personal and financial information and facilitate monetary scams.
fromTechzine Global
8 hours ago

Seagate and Acronis join forces for archival cloud storage

The combination of artificial intelligence and exponential data growth presents new challenges for organizations. Many companies struggle with the cost-effective storage of large amounts of data that are rarely used but must be retained for compliance purposes. Focus on compliance The solution focuses specifically on sectors with strict retention requirements. Healthcare providers, financial institutions, law firms, and government agencies often have to retain large volumes of data for years.
Information security
#cyberattack
fromWIRED
14 hours ago
Information security

A Cyberattack on Jaguar Land Rover Is Causing a Supply Chain Disaster

fromWIRED
14 hours ago
Information security

A Cyberattack on Jaguar Land Rover Is Causing a Supply Chain Disaster

Information security
fromInfoWorld
11 hours ago

NPM attacks and the security of software supply chains

Process improvements and sustainable funding provide far more protection for open-source software supply chains than isolated technical guardrails.
fromZDNET
7 hours ago

How researchers tricked ChatGPT into sharing sensitive email data

While AI agents show promise in bringing AI assistance to the next level by carrying out tasks for users, that autonomy also unleashes a whole new set of risks. Cybersecurity company Radware, as by The Verge, decided to test OpenAI's Deep Research agent for those risks -- and the results were alarming. Also: OpenAI's Deep Research has more fact-finding stamina than you, but it's still wrong half the time
Information security
fromSecurityWeek
7 hours ago

Researchers Earn $150,000 for L1TF Exploit Leaking Data From Public Cloud

Academic researchers from Vrije Universiteit Amsterdam have demonstrated that transient execution CPU vulnerabilities are practical to exploit in real-world scenarios to leak memory from VMs running on public cloud services. The research shows that L1TF (L1 Terminal Fault), also known as Foreshadow, a bug in Intel processors reported in January 2018, and half-Spectre, gadgets believed unexploitable on new-generation CPUs, as they cannot directly leak secret data, can be used together to leak data from the public cloud.
Information security
#cybersecurity
fromSFGATE
1 day ago
Information security

Teen arrested on suspicion of Vegas Strip attack that cost $100M

fromIT Pro
3 days ago
Information security

'Channel their curiosity into something meaningful': Cyber expert warns an uptick of youth hackers should be a 'wake-up call' after teens charged over TfL attack

fromSFGATE
1 day ago
Information security

Teen arrested on suspicion of Vegas Strip attack that cost $100M

fromIT Pro
3 days ago
Information security

'Channel their curiosity into something meaningful': Cyber expert warns an uptick of youth hackers should be a 'wake-up call' after teens charged over TfL attack

Information security
fromSecurityWeek
10 hours ago

FBI Warns of Spoofed IC3 Website

Threat actors are spoofing the FBI IC3 website to steal personal and financial information; users should access www.ic3.gov directly and avoid suspicious links.
#cybercrime
Information security
fromTheregister
8 hours ago

Stellantis says a third-party vendor spilled customer data

Stellantis says a third-party breach exposed customers' names and emails; no financial data was compromised, and affected customers are being notified.
Information security
fromDataBreaches.Net
4 days ago

Two teenage suspected Scattered Spider members charged in UK over TfL hack - DataBreaches.Net

Two suspected Scattered Spider members were arrested and charged in the UK over the August 2024 Transport for London hack.
fromBig Think
7 hours ago

How to greet the dawn of "future-state predictive intelligence"

Cybersecurity veteran Brian Gumbel - president and chief operating officer (COO) at Dataminr - works at the confluence of real-time information and AI. Mainlined into humanity's daily maelstrom of data, Dataminr detects events "on average 5 hours ahead of the Associated Press" - it picked up the 2024 Baltimore bridge collapse, for example, about an hour ahead of all mainstream media sources. The accuracy rate of its "news" is, says Gumbel, a highly impressive 99.5%.
Information security
Information security
fromTheregister
12 hours ago

Brit banking group insists security priority in AI rollout

Lloyds Banking Group pursues AI adoption cautiously, enforcing strict data protections and blocking risky external model hosting to safeguard 28 million customers' data.
Information security
fromDataBreaches.Net
1 day ago

When "Goodbye" isn't the end: Scattered LAPSUS$ Hunters hack on - DataBreaches.Net

Some cybercriminals claimed retirement while others continue exploiting vulnerabilities, indicating ongoing attacks despite farewell messages.
Information security
fromThe Hacker News
1 day ago

DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams

North Korea–linked actors used ClickFix lures to deliver BeaverTail and InvisibleFerret malware to non-developer cryptocurrency, retail, and Web3 roles via fake hiring platforms.
#sms-blasters
fromFuturism
2 days ago
Information security

Scammers Are Now Driving Around With Fake Cell Towers That Blast 100,000 Texts Per Hour

fromFuturism
2 days ago
Information security

Scammers Are Now Driving Around With Fake Cell Towers That Blast 100,000 Texts Per Hour

Information security
fromAxios
1 day ago

Rise of the new radical internet

Closed gaming forums and pseudonymous gaming spaces facilitate radicalization, hate, and exploitation, while platform moderation and research visibility remain insufficient to protect vulnerable young users.
Information security
fromFortune
2 days ago

London teenager orchestrated 'help desk' extortion scheme against 47 U.S. companies that netted $115 million says DOJ | Fortune

A 19-year-old London resident allegedly led social-engineering attacks that extorted $115 million, compromising at least 120 networks and targeting 47 U.S. entities including federal courts.
Information security
fromKotaku
2 days ago

If You're Afraid of Getting Hacked, This Avast Tool Does More Than Stop Viruses - Kotaku

Avast now offers comprehensive paid security solutions protecting PCs, Macs, Android and iOS devices against modern cyberattacks, moving beyond free antivirus.
fromArs Technica
2 days ago

Microsoft's Entra ID vulnerabilities could have been catastrophic

Microsoft built security controls around identity like conditional access and logs, but this internal impression token mechanism bypasses them all,
Information security
Information security
fromZDNET
2 days ago

Your passkeys could be vulnerable to attack, and everyone - including you - must act

An exploit can trick password managers into revealing traditional credentials or passkey-like artifacts under specific preconditions, though passkeys and the protocol were not proven vulnerable.
Information security
fromwww.npr.org
2 days ago

Flushable wipes and Iran: Water treatment facility adds cyber attacks to worry list

Small-town water systems face rising cyberattacks that threaten treatment operations and require technical and volunteer partnerships to secure critical infrastructure.
Information security
fromWIRED
2 days ago

1Password Is Still the Gold Standard for Securely Managing Your Passwords

1Password combines zero-knowledge security, passkey and autofill support, Travel Mode, and encrypted storage under a subscription model for comprehensive credential management.
fromThe Hacker News
2 days ago

Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell

In a report examining the malicious use of LLMs, the cybersecurity company said AI models are being increasingly used by threat actors for operational support, as well as for embedding them into their tools - an emerging category called LLM-embedded malware that's exemplified by the appearance of LAMEHUG (aka PROMPTSTEAL) and PromptLock. This includes the discovery of a previously reported Windows executable called MalTerminal that uses OpenAI GPT-4 to dynamically generate ransomware code or a reverse shell.
Information security
#shadowleak
Information security
fromThe Local France
2 days ago

Flights cancelled at European airports following 'cyber-related disruption'

A cyber-related disruption to Collins Aerospace's MUSE check-in and baggage-drop software has caused delays and cancellations at major European airports including Brussels, Berlin and Heathrow.
Information security
fromComputerworld
3 days ago

Why IT/Security alignment is the key to efficient operations

Misalignment between IT and security—driven by differing mandates and siloed data—creates unpatched vulnerabilities, delayed incident response, and increased operational and regulatory risk.
Information security
fromComputerworld
3 days ago

Leading the charge in cyber risk mitigation: From gut feeling to objective evaluation

Cybersecurity must be managed as a core business risk using objective, data-driven exposure management to detect hidden threats and prioritize remediation.
#ivanti-epmm
Information security
fromIT Pro
3 days ago

Getting a grip on digital identity

Businesses must centralize and monitor human, machine, and AI agent identities, using AI-driven detection to identify probing and preempt identity-based breaches.
Information security
fromSecurityWeek
3 days ago

Unpatched Vulnerabilities Expose Novakon HMIs to Remote Hacking

Novakon HMIs contain multiple unauthenticated vulnerabilities enabling remote root code execution, with no available patches and the vendor largely unresponsive.
Information security
fromComputerWeekly.com
3 days ago

UK cyber action plan lays out path to resilience | Computer Weekly

Implement nine core recommendations to strengthen the UK cyber security sector, unlocking untapped potential for economic growth, national security, innovation, and business resilience.
Information security
fromSecuritymagazine
3 days ago

CISA 2015 Closes in on Expiration, Security Leaders Share Concerns

Expiration of CISA 2015 risks eroding public-private cybersecurity information sharing, leaving defenders isolated and undermining national security resilience.
Information security
fromZDNET
3 days ago

5 ways to spot software supply chain attacks and stop worms - before it's too late

Shai-Hulud is an ongoing, widespread npm software supply-chain worm attack compromising JavaScript packages and posing a major security crisis for JavaScript developers.
Information security
fromwww.independent.co.uk
3 days ago

MI6 launches dark web portal to attract spies in Russia

MI6 launched 'Silent Courier', a dark web secure messaging portal to recruit spies worldwide, while a news outlet seeks donations to fund free, on-the-ground journalism.
fromTheregister
3 days ago

Fortra discloses 10/10 severity bug in GoAnywhere MFT

Budding ransomware crooks have another shot at exploiting Fortra's GoAnywhere MFT product now that a new 10/10 severity vulnerability needs patching. The vendor issued an advisory for CVE-2025-10035 on Thursday, saying successful exploitation can potentially lead to command injection. Fortra's advisory states "a deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MFT allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection."
Information security
fromThe Hacker News
3 days ago

How To Automate Alert Triage With AI Agents and Confluence SOPs Using Tines

Run by the team at workflow orchestration and AI platform Tines, the Tines library features over 1,000 pre-built workflows shared by security practitioners from across the community - all free to import and deploy through the platform's Community Edition. The workflow we are highlighting streamlines security alert handling by automatically identifying and executing the appropriate Standard Operating Procedures (SOPs) from Confluence. When an alert triggers, AI agents analyze it, locate
Information security
fromThe Hacker News
3 days ago

UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware

An Iran-nexus cyber espionage group known as UNC1549 has been attributed to a new campaign targeting European telecommunications companies, successfully infiltrating 34 devices across 11 organizations as part of a recruitment-themed activity on LinkedIn. Swiss cybersecurity company PRODAFT is tracking the cluster under the name Subtle Snail. It's assessed to be affiliated with Iran's Islamic Revolutionary Guard Corps (IRGC). The targeted 11 companies are located in Canada, France, the United Arab Emirates, the United Kingdom, and the United States.
Information security
Information security
fromThe Cyber Express
1 week ago

New Infostealer Campaign Targets Popular Games

Maranhão Stealer spreads via social-engineering sites offering pirated software, uses reflective DLL injection and persistence mechanisms to steal credentials and cryptocurrency data.
Information security
fromThe Hacker News
3 days ago

17,500 Phishing Domains Target 316 Brands Across 74 Countries in Global PhaaS Surge

The Lucid and Lighthouse PhaaS platforms power large-scale phishing campaigns, hosting over 17,500 phishing domains targeting 316 brands across 74 countries.
#gamaredon
Information security
fromNextgov.com
3 days ago

White House in process of crafting quantum executive action

The White House plans executive actions directing federal agencies to migrate networks to post-quantum cryptography and advance quantum technology policy.
fromThe Hacker News
3 days ago

SystemBC Powers REM Proxy With 1,500 Daily VPS Victims Across 80 C2 Servers

REM Proxy is a sizeable network, which also markets a pool of 20,000 Mikrotik routers and a variety of open proxies it finds freely available online. This service has been a favorite for several actors such as those behind TransferLoader, which has ties to the Morpheus ransomware group. SystemBC is a C-based malware that turns infected computers into SOCKS5 proxies, allowing infected hosts to communicate with a command-and-control (C2) server and download additional payloads.
Information security
Information security
fromArs Technica
3 days ago

Two of the Kremlin's most active hack groups are collaborating, ESET says

Turla and Gamaredon collaborated, with Gamaredon providing access and deployment support enabling Turla to restart and deploy Kazuar across targeted Ukrainian systems.
Information security
fromTheregister
3 days ago

ChatGPT's agent can dodge select CAPTCHAs after priming

Prompt misdirection and replay into an agent chat can coax ChatGPT to solve many CAPTCHA types, undermining CAPTCHA effectiveness as a human-only test.
Information security
fromDataBreaches.Net
3 days ago

'I Was a Weird Kid': Jailhouse Confessions of a Teen Hacker - DataBreaches.Net

Cybercriminals used violent-looking kidnapping videos in Telegram chats to extort cryptocurrency-related associates, coercing ransom demands from young gang members.
Information security
fromBitcoin Magazine
3 days ago

Bitcoin's Quantum Risk Is Real - One Solution Might Start With Taproot

A quantum computer could break Bitcoin's signature scheme, exposing roughly a quarter of supply and undermining trust in Bitcoin's security model.
[ Load more ]