Information security

[ follow ]
#ransomware
fromSecurityWeek
6 minutes ago
Information security

SmarterTools Hit by Ransomware via Vulnerability in Its Own Product

SmarterTools was breached via an unpatched SmarterMail VM, enabling the Warlock ransomware group to laterally compromise Windows servers and some customer systems.
fromTechzine Global
4 days ago
Information security

Western Europe is a hotbed for cybercriminals' servers

Cybercriminals abuse ISPsystem's VMmanager and 'bulletproof' European hosting to run ransomware on recurring Windows hostnames and evade abuse complaints.
fromThe Hacker News
3 hours ago

BeyondTrust Fixes Critical Pre-Auth RCE Vulnerability in Remote Support and PRA

"BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability," the company said in an advisory released February 6, 2026. "By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user." The vulnerability, categorized as an operating system command injection, has been assigned the CVE identifier CVE-2026-1731.
Information security
Information security
fromThe Hacker News
41 minutes ago

Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

Bloody Wolf uses spear-phishing to deploy NetSupport RAT in Uzbekistan and Russia, targeting finance, manufacturing, and IT for financial gain and possible espionage.
Information security
fromThe Hacker News
2 hours ago

TeamPCP Worm Exploits Cloud Infrastructure to Build Criminal Infrastructure

A worm-driven TeamPCP campaign exploited exposed cloud-native services and React2Shell to build malicious infrastructure for data theft, extortion, ransomware, and crypto mining.
fromSecurityWeek
2 hours ago

New Paper and Tool Help Security Teams Move Beyond Blind Reliance on CISA's KEV Catalog

The KEV list is useful but largely misunderstood. KEVology explains what it is, and how best to use it. CISA's KEV Catalog, more commonly known as the KEV list, emerged with the issue of BOD 22-01 in November 2021. This catalog, currently a list of just over 1,500 vulnerabilities known to have been exploited in the wild, suggests a high value prioritization source for vulnerability remediation within industry.
Information security
Information security
fromDevOps.com
4 days ago

Survey Surfaces More Focus on Software Security Testing and API Security - DevOps.com

Many enterprises plan to increase spending on software security testing, API security, and application security as AI-driven code growth strains DevSecOps capacity.
Information security
fromTechRepublic
2 days ago

Cybersecurity ROI in APAC: Why Boards Still Have Questions

Rising APAC cybersecurity budgets face board skepticism because increased spending has not demonstrated measurable risk reduction or clear financial ROI.
Information security
fromSecuritymagazine
12 hours ago

Product Spotlight on Analytics

Taelor Sutherland is Associate Editor at Security magazine covering enterprise security, coordinating digital content, and holding a BA in English Literature from Agnes Scott College.
Information security
fromTheregister
13 hours ago

Senator doesn't trust telcos on Salt Typhoon mitigations

OpenClaw now scans ClawHub skills with VirusTotal across 70+ engines for malware and blocklists, but signature-based scanning cannot stop prompt injection or language-driven attacks; telco breach scrutiny continues.
#openclaw
Information security
fromTechRepublic
4 months ago

Security Breaches Found in AI-Powered Repair Tool Wondershare RepairIt

Wondershare RepairIt stored user files unencrypted in cloud storage and hardcoded permissive access tokens, enabling attackers to tamper AI models and execute supply chain attacks.
#edge-devices
Information security
fromTechRepublic
5 months ago

Workday Hit by Social Engineering Attack, Third-Party Data Exposed

A social engineering attack gave attackers access to a third-party CRM, exposing business contact details while Workday's customer tenants and stored data remained uncompromised.
Information security
fromTechRepublic
5 months ago

'Widespread Data Theft' Impacts Salesforce-Salesloft Drift Users

UNC6395 used compromised Salesloft–Drift OAuth tokens to access Salesforce, extract customer records and credentials via targeted database queries, and export sensitive data.
Information security
fromTechRepublic
5 months ago

This 'Lethal Trifecta' Can Trick AI Browsers Into Stealing Your Data

AI-enabled browsers that combine web access, account access, and external communication can be exploited to steal accounts via hidden instructions in webpages.
Information security
fromSecurityWeek
3 days ago

Critical SmarterMail Vulnerability Exploited in Ransomware Attacks

Critical unauthenticated RCE (CVE-2026-24423) in SmarterMail's ConnectToHub API is actively exploited; update to build 9511 to patch and mitigate ransomware attacks.
Information security
fromSecurityWeek
3 days ago

In Other News: Record DDoS, Epstein's Hacker, ESET Product Vulnerabilities

Multiple significant cybersecurity developments include conviction for theft of Google's AI trade secrets, high-severity ESET patches, and a record 31.4 Tbps DDoS attack.
#cisa
fromNextgov.com
3 days ago
Information security

CISA orders agencies to patch and replace end-of-life devices, citing active exploitation

fromNextgov.com
3 days ago
Information security

CISA orders agencies to patch and replace end-of-life devices, citing active exploitation

Information security
fromThe Hacker News
3 days ago

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Attackers compromised dYdX client packages on npm and PyPI to distribute malicious releases that steal wallet credentials and install a remote access trojan.
#cyber-espionage
Information security
fromArs Technica
2 days ago

Malicious packages for dYdX cryptocurrency exchange empties user wallets

Compromised dYdX accounts distributed malicious npm and PyPI packages containing credential theft and a RAT that executes remote Python code from a C2 server.
Information security
fromComputerworld
2 days ago

Pretend Disk Format: PDFs harbor new dangers

Phishing emails link to IPFS-hosted virtual hard disks containing WSF files disguised as PDFs that install AsyncRAT, enabling remote control of company computers.
Information security
fromTechzine Global
2 days ago

Security vulnerability in TeamViewer bypassed permission checks

TeamViewer patched a high-risk access-control bypass (CVE-2026-23572) that allowed authenticated users to gain system access without local approval; update to 15.74.5+ immediately.
Information security
fromTechCrunch
2 days ago

China's Salt Typhoon hackers broke into Norwegian companies | TechCrunch

Chinese-backed hacking group Salt Typhoon breached multiple Norwegian organizations, exploiting vulnerable network devices to conduct espionage.
#dknife
#substack
fromFast Company
3 days ago

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

Meanwhile, the actual threat landscape evolved in an entirely different direction. Today's attackers aren't sitting at keyboards manually typing password guesses. They're running offline brute force attacks with dedicated GPU rigs that can attempt 100 billion passwords per second against hashing algorithms like MD5 or SHA-1. At that speed, your clever substitution of "@" for "a" buys you microseconds of additional security.
Information security
Information security
fromSecurityWeek
3 days ago

Living off the AI: The Next Evolution of Attacker Tradecraft

AI assistants and MCP-connected agents create new attack surfaces that allow attackers to misuse sanctioned workflows, enabling low-skill actors to exfiltrate data and execute code.
fromTheregister
2 days ago

DDoS deluge: Brit biz battered by record botnet blitz

Cloudflare says DDoS crews ended 2025 by pushing traffic floods to new extremes, while Britain made an unwelcome leap of 36 places to become the world's sixth-most targeted location. The Q4 stats confirm it was a lively year for traffic floods, with Cloudflare claiming it had to swat away 47.1 million DDoS attacks, more than double 2024's count. Momentum picked up toward the end of the year, as Q4 volumes jumped 31 percent from the prior quarter and 58 percent over 2024.
Information security
Information security
fromDEV Community
3 days ago

I Let Claude Write 60 Functions. 65-75% Had Security Vulnerabilities.

AI code generation models produce insecure code by default, with no statistically significant difference among the tested models.
Information security
fromSecurityWeek
3 days ago

Flickr Security Incident Tied to Third-Party Email System

Flickr experienced a third-party email service vulnerability that may have exposed users' names, email addresses, usernames, account types, IP addresses, locations, and activity data.
fromSecuritymagazine
3 days ago

Epstein File Data Security Update: Raw Code Found in Emails

After a recent release of files related to Jeffrey Epstein exposed victim information, credentials and other sensitive data, new reports suggest the Department of Justice (DOJ) did not adequately redact all files, as select blacked-out documents contain raw email data. This discovery was made by Mahmoud Al-Qudsi, Founder of NeoSmart Technologies, a private software research and development firm. Al-Qudsi detailed his findings in a blog post, stating he'd come across it by accident.
Information security
fromTechzine Global
3 days ago

To protect browsers as the digital frontline, Zscaler buys SquareX

The common denominator of advanced attacks revolves around ever more difficult detection. Although Endpoint Detection & Response (EDR) can pick up multiple signals, the browser remains a blind spot. Zscaler has also come to this conclusion and has acquired SquareX to keep an eye on browser usage via a lightweight extension. In doing so, Zscaler is following the same philosophy as CrowdStrike: acquire a promising Browser Detection & Response (BDR) player to expand its own portfolio.
Information security
fromFortune
2 days ago

Anthropic's newest model excels at finding security vulnerabilities, but raises cybersecurity risks | Fortune

According to a report from the company's Frontier Red Team, during testing, Opus 4.6 identified over 500 previously unknown zero-day vulnerabilities-flaws that are unknown to people who wrote the software, or the party responsible for patching or fixing it-across open-source software libraries. Notably, the model was not explicitly told to search for the security flaws, but rather it detected and flagged the issues on its own.
Information security
Information security
fromTheregister
2 days ago

Flickr emails users about data breach, pins it on 3rd party

Flickr suffered a February 5 data breach via a third-party email provider, exposing users' PII including names, emails, usernames, IPs, locations, and activity.
fromTechRepublic
2 days ago

Microsoft Starts Testing Built-In Sysmon Monitoring in Windows 11

Sysmon has long been part of Microsoft's Sysinternals toolkit, widely used by security teams to track detailed system activity and spot suspicious behavior. Until now, it had to be downloaded and installed separately. With this update, Sysmon is becoming a built-in Windows feature. "Windows now brings Sysmon functionality natively to Windows," the company wrote. "Sysmon functionality allows you to capture system events that can help with threat detection, and you can use custom configuration files to filter the events you want to monitor."
Information security
fromSecuritymagazine
3 days ago

Five Top Tips for Building a Strong Security Culture

Building security into the framework of an organization prevents security from being seen as a barrier to daily activities. If an employee feels as if a security measure is inhibiting them from completing their daily tasks, they're far more likely to find a way around that measure. This can range from propping open a door to using the same easy-to-remember password for every account.
Information security
Information security
fromSecurityWeek
3 days ago

Zscaler Acquires Browser Security Firm SquareX

Zscaler acquired SquareX to convert standard browsers into enterprise-grade secure browsers via a Browser Detection and Response extension, extending Zero Trust to unmanaged devices.
fromInfoQ
3 days ago

LinkedIn Leverages GitHub Actions, CodeQL, and Semgrep for Code Scanning

LinkedIn has redesigned its static application security testing pipeline (SAST) to provide consistent, enforceable code scanning across a GitHub-based, multi-repository development environment. The initiative was a result of the company's shift-left strategy by delivering fast, reliable, and actionable security feedback directly in pull requests, strengthening the security of LinkedIn's code and infrastructure and helping protect members and customers.
Information security
fromBoston.com
3 days ago

Man pleads guilty to Snapchat hacking targeting Northeastern students

Between 2020 and 2021, Svara would advertise on internet forums, including Reddit, that he could "get into girls snap accounts" for others and provide content "for you or trade," prosecutors said. Using personal information, he would try to gain access to women's Snapchat accounts before posing as a representative of Snap Inc. to obtain security codes sent to the women. He texted more than 4,500 women for the codes, which approximately 570 women provided, prosecutors said.
Information security
Information security
fromAlleywatch
2 days ago

ORION Security Raises $32M for its AI-Powered Platform That Prevents Data Leaks Without Policies

ORION Security replaces manual DLP rules with AI agents that analyze full context to block genuinely risky transfers, reducing false positives by 96%.
Information security
fromTechzine Global
2 days ago

BICS and Anapaya deliver new secure SCION networks worldwide

BICS and Anapaya will deploy SCION worldwide to give organizations direct control over data traffic and enable secure, compliant cross-border connectivity.
fromSilicon Canals
2 days ago

7 things burglars look for that signal no one is home that most people do without thinking - Silicon Canals

According to former burglar turned security consultant Michael Fraser, who spent years breaking into homes before turning his life around, these seemingly innocent habits are exactly what professionals look for. "Most people have no idea they're broadcasting an empty house," he told me during a recent interview. "They think they're being careful, but they're actually creating a roadmap." After speaking with several security experts and reformed burglars, I discovered that the things we do without thinking often create the perfect opportunity for break-ins.
Information security
Information security
fromDefector
2 days ago

This Week In Delicious Scams; Or, I Yam Not What You Think I Yam | Defector

Certain plants produce berry-like bulbils that mimic edible fruit to attract animals, facilitating asexual propagation and deceptive dispersal.
fromBitcoin Magazine
2 days ago

Strategy ($MSTR) To Lead Bitcoin Quantum Defense, Says Saylor

Strategy's ($MSTR) Executive Chairman Michael Saylor said on the company's fourth-quarter 2025 earnings call that Strategy will initiate a Bitcoin Security Program. The effort is meant to coordinate with the global cyber, crypto, and Bitcoin security community. In the call, Saylor framed quantum computing as a long-term engineering challenge rather than an immediate danger. He said the technology is likely more than a decade away from posing a serious risk to Bitcoin's cryptography.
Information security
Information security
fromArs Technica
4 days ago

Microsoft releases urgent Office patch. Russian-state hackers pounce.

Russian-state hackers weaponized Microsoft Office vulnerability CVE-2026-21509 within 48 hours to deploy encrypted, fileless in-memory backdoors against diplomatic, maritime, and transport organizations.
Information security
fromSecurityWeek
4 days ago

Cisco, F5 Patch High-Severity Vulnerabilities

Multiple critical vulnerabilities in Cisco and F5 products allow remote DoS, arbitrary file upload leading to root command execution, and privilege escalation; patches released.
fromThe Hacker News
3 days ago

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

This week didn't produce one big headline. It produced many small signals - the kind that quietly shape what attacks will look like next. Researchers tracked intrusions that start in ordinary places: developer workflows, remote tools, cloud access, identity paths, and even routine user actions. Nothing looked dramatic on the surface. That's the point. Entry is becoming less visible while impact scales later.
Information security
fromThe Hacker News
4 days ago

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

Datadog Security Labs said it observed threat actors associated with the recent React2Shell ( CVE-2025-55182, CVSS score: 10.0) exploitation using malicious NGINX configurations to pull off the attack. "The malicious configuration intercepts legitimate web traffic between users and websites and routes it through attacker-controlled backend servers," security researcher Ryan Simon said. "The campaign targets Asian TLDs (.in, .id, .pe, .bd, .th), Chinese hosting infrastructure (Baota Panel), and government and educational TLDs (.edu, .gov)."
Information security
Information security
fromSecurityWeek
4 days ago

Cyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries

A state-sponsored cyberespionage group TGR-STA-1030 (Shadow Campaign) compromised at least 70 organizations across 37 countries and targeted government infrastructure in 155 countries.
#n8n
fromTechRepublic
3 days ago

Chrome Vulnerabilities Allow Code Execution, Browser Crashes

Google has released a Chrome security update addressing two high-severity vulnerabilities that could allow attackers to execute arbitrary code or cause browser crashes. The issues affect core browser components and may be triggered when users visit specially crafted websites. One of the vulnerabilities, CVE-2026-1861, allows "... a remote attacker to potentially exploit heap corruption via a crafted HTML page," NIST said in its reporting.
Information security
fromSecurityWeek
3 days ago

VS Code Configs Expose GitHub Codespaces to Attacks

It allows developers to test code, review pull requests, and more, but also exposes them to attacks via repository-defined configuration files, Orca says. "Codespaces is essentially VS Code running in the cloud, backed by Ubuntu containers, with built-in GitHub authentication and repository integration. This means any VS Code feature that touches execution, secrets, or extensions can potentially be abused when attackers control the repository content," the cybersecurity firm notes.
Information security
Information security
fromZero Day Initiative
3 days ago

Zero Day Initiative - CVE-2025-6978: Arbitrary Code Execution in the Arista NG Firewall

Arista NG Firewall's runTroubleshooting() fails to properly validate inputs, enabling command injection by passing unsanitized environment variables to network-troubleshooting.sh.
Information security
fromSecurityWeek
3 days ago

SystemBC Infects 10,000 Devices After Defying Law Enforcement Takedown

SystemBC malware persists after takedown, controls over 10,000 machines as SOCKS5 proxy botnet, targeting hosting providers worldwide.
Information security
fromThe Hacker News
4 days ago

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

Infy, an Iranian state-backed threat group, paused C2 operations during Iran's nationwide internet blackout and reestablished new C2 infrastructure immediately before connectivity was restored.
Information security
fromSecuritymagazine
4 days ago

How to Protect Organizations During the Winter Olympics, According to CISOs

Cybercriminals will exploit the Winter Olympics via phishing, impersonation, API misuse, compromised credentials, and trusted-access abuse while security teams prioritize availability.
Information security
fromSecuritymagazine
4 days ago

Healthcare Cybersecurity Is in Crisis - These Proven Controls Could Be the Cure

Healthcare cybersecurity crisis: breaches doubled in 2025, average losses exceeded $2M; prioritize anti-fraud training, regulatory compliance, and targeted investments to reduce material risk.
Information security
fromThe Hacker News
3 days ago

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack

AISURU/Kimwolf botnet launched record 31.4 Tbps DDoS attacks, used over two million compromised Android devices, and drove a surge in hyper-volumetric attacks.
fromTechzine Global
3 days ago

Attackers exploit LLMs to gain admin rights in AWS

Security researchers at Sysdig warn that attackers can quickly take over AWS environments using large language models. Their latest analysis shows that AI is already being used to automate cloud attacks, accelerate them, and make them harder to detect. The Sysdig Threat Research Team bases these conclusions on an attack that began on November 28, 2025. In this case, an attacker gained initial access and escalated to full administrator rights within an AWS account in less than ten minutes.
Information security
fromTheregister
3 days ago

Betterment breach scope pegged at 1.4M users

Betterment, which offers automated investment and financial planning services, first disclosed the breach in January after detecting unauthorized access to certain internal systems on January 9. Betterment said the hacker gained entry through a social engineering scheme that relied on impersonation to infiltrate third-party marketing and operations tools, then used that access to send customers a fraudulent cryptocurrency promotion disguised as an official company message.
Information security
#cybersecurity
fromAxios
3 days ago

Anthropic's newest AI model uncovered 500 zero-day software flaws in testing

Before its debut, Anthropic's frontier red team tested Opus 4.6 in a sandboxed environment to see how well it could find bugs in open-source code. The team gave the Claude model everything it needed to do the job - access to Python and vulnerability analysis tools, including classic debuggers and fuzzers - but no specific instructions or specialized knowledge. Claude found more than 500 previously unknown zero-day vulnerabilities in open-source code using just its "out-of-the-box" capabilities,
Information security
Information security
fromSecurityWeek
3 days ago

Researchers Expose Network of 150 Cloned Law Firm Websites in AI-Powered Scam Campaign

Over 150 coordinated cloned law-firm websites impersonate firms to re-victimize fraud victims by offering free asset recovery and evading takedowns.
Information security
fromZDNET
4 days ago

Kali Linux vs. Parrot OS: Which security-forward distro is right for you?

Kali Linux and Parrot OS are free, Debian-based distributions focused on penetration testing; Parrot OS also offers a general-purpose edition.
Information security
fromTechCrunch
3 days ago

Data breach at govtech giant Conduent balloons, affecting millions more Americans | TechCrunch

A January 2025 ransomware attack on Conduent may have exposed personal data of potentially tens of millions of US residents across multiple states.
Information security
fromComputerworld
3 days ago

This is why high-value targets should use Lockdown Mode

Apple's Lockdown Mode prevented the FBI from accessing a seized iPhone, demonstrating strong protection against physical wired extraction attempts.
Information security
fromEngadget
3 days ago

ExpressVPN launches four new standalone apps

ExpressVPN introduced a four-app cybersecurity suite—ExpressKeys, ExpressMailGuard, ExpressAI, and Identity Defender—integrated into existing pricing, with some apps launched and others delayed or region-limited.
fromSilicon Canals
4 days ago

The phone call scam targeting grandparents that sounds so real even cautious people fall for it - Silicon Canals

The phone rings at 2:47 AM. Your heart pounds as you fumble for the receiver. "Grandma?" The voice is shaky, desperate. "I'm in trouble. I got arrested. Please don't tell Mom and Dad." The voice sounds just like your grandson. He uses the nickname only family knows. He remembers that trip you took together last summer. Everything about this call feels real because, in many ways, it is.
Information security
Information security
fromTelecompetitor
3 days ago

TransUnion to acquire mobile division of RealNetworks

TransUnion will acquire RealNetworks' mobile division to add AI-driven messaging and voice analytics that reduce mobile fraud and strengthen trusted communications.
Information security
fromSecurityWeek
5 days ago

Fresh SolarWinds Vulnerability Exploited in Attacks

Threat actors are actively exploiting an unauthenticated deserialization RCE in SolarWinds Web Help Desk (CVE-2025-40551); immediate patching is required.
#solarwinds
fromThe Hacker News
5 days ago
Information security

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

A critical untrusted-data deserialization vulnerability in SolarWinds Web Help Desk (CVE-2025-40551) enables unauthenticated remote code execution and is actively exploited.
fromComputerWeekly.com
4 days ago
Information security

SolarWinds RCE bug makes Cisa list as exploitation spreads | Computer Weekly

Critical SolarWinds Web Help Desk deserialization vulnerability (CVE-2025-40551) enables unauthenticated remote code execution and was added to CISA KEV as exploitation spreads.
Information security
fromThe Hacker News
5 days ago

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

A critical untrusted-data deserialization vulnerability in SolarWinds Web Help Desk (CVE-2025-40551) enables unauthenticated remote code execution and is actively exploited.
Information security
fromTechzine Global
5 days ago

Critical vulnerability in React Native development tool actively exploited

Critical CVE-2025-11953 in React Native's Metro server permits remote code execution via exposed /open-url endpoint, impacting many development environments on Windows and Linux.
Information security
fromTechzine Global
5 days ago

CISA warns of active exploitation of critical SolarWinds vulnerability

A critical remote-code-execution vulnerability CVE-2025-40551 in SolarWinds Web Help Desk is actively exploited; federal agencies must install the patch within three days.
Information security
fromSecurityWeek
5 days ago

Cryptominers, Reverse Shells Dropped in Recent React2Shell Attacks

A critical React.js vulnerability (CVE-2025-55182) enables unauthenticated RCE and has triggered mass exploitation and cryptominer deployments.
fromWIRED
4 days ago

Notepad++ Users, You May Have Been Hacked by China

"I deeply apologize to all users affected by this hijacking," the author of a post published to the official notepad-plus-plus.org site wrote Monday. The post said that the attack began last June with an "infrastructure-level compromise that allowed malicious actors to intercept and redirect update traffic destined for notepad-plus-plus.org." The attackers, whom multiple investigators tied to the Chinese government, then selectively redirected certain targeted users to malicious update servers where they received backdoored updates.
Information security
[ Load more ]