Information security

[ follow ]
#freepbx-security
Information security
fromTheregister
1 hour ago

Suspected Nork intruders infecting US healthcare, education

North Korean-linked hackers deployed a new backdoor called Dohdoor to infect US education and healthcare institutions since December for financial gain.
Information security
fromThe Verge
1 hour ago

CISA is getting a new acting director after less than a year

CISA's acting director Madhu Gottumukkala is replaced by Nick Andersen following reports of uploading sensitive documents to ChatGPT, amid agency budget cuts and politicization under the Trump administration.
fromRaw Story
3 hours ago

Massive trove of FBI 'Epstein investigation' data compromised in 'cyber intrusion': report

We noticed strange IP activity that took place yesterday from two IP addresses. The activity included combing through certain files pertaining to the Epstein investigation.
Information security
Information security
fromSecurityWeek
13 hours ago

Critical Flaws Exposed Gardyn Smart Gardens to Remote Hacking

Gardyn smart indoor gardens contained four serious vulnerabilities enabling remote hacking through command injection, hardcoded credentials, and cleartext data transmission, now patched.
fromSecurityWeek
10 hours ago

Juniper Networks PTX Routers Affected by Critical Vulnerability

The On-Box Anomaly detection framework should only be reachable by other internal processes over the internal routing instance, but not over an externally exposed port. With the ability to access and manipulate the service to execute code as root a remote attacker can take complete control of the device.
Information security
#supply-chain-attack
fromInfoWorld
2 days ago
Information security

Microsoft warns of jobthemed repo lures targeting developers with multistage backdoors

fromInfoWorld
2 days ago
Information security

Microsoft warns of jobthemed repo lures targeting developers with multistage backdoors

fromTechRepublic
4 hours ago

5 Nations Alert: Critical Cisco Bug Used in Global Espionage Campaign

Cisco confirmed that attackers exploited the bug, tracked as CVE-2026-20127, to bypass authentication, gain privileged access, and quietly steal data. The discovery prompted a rare joint warning from authorities in the US, UK, Australia, Canada, and New Zealand.
Information security
Information security
fromSecurityWeek
5 hours ago

In Other News: ATT&CK Advisory Council, Russian Cyberattacks Aid Missile Strikes, Predator Bypasses iOS Indicators

Predator spyware suppresses iOS indicators through kernel-level access, Russian cyberattacks on Ukraine's energy grid gather intelligence for missile targeting, and Treasury launches AI cybersecurity initiative for financial services.
#cisco-vulnerability
fromDataBreaches.Net
21 hours ago
Information security

Cisco says hackers have been exploiting a critical bug to break into big customer networks since 2023 - DataBreaches.Net

fromTechCrunch
1 day ago
Information security

Cisco says hackers have been exploiting a critical bug to break into big customer networks since 2023 | TechCrunch

fromDataBreaches.Net
21 hours ago
Information security

Cisco says hackers have been exploiting a critical bug to break into big customer networks since 2023 - DataBreaches.Net

fromTechCrunch
1 day ago
Information security

Cisco says hackers have been exploiting a critical bug to break into big customer networks since 2023 | TechCrunch

#ai-security
fromEngadget
2 days ago
Information security

Hacker used Anthropic's Claude chatbot to attack multiple government agencies in Mexico

fromFortune
2 days ago
Information security

Nearly two-thirds of companies have lost track of their data just as they're letting AI in through the front door to wander around | Fortune

fromEngadget
2 days ago
Information security

Hacker used Anthropic's Claude chatbot to attack multiple government agencies in Mexico

fromFortune
2 days ago
Information security

Nearly two-thirds of companies have lost track of their data just as they're letting AI in through the front door to wander around | Fortune

Information security
fromThe Hacker News
10 hours ago

Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

Threat actors distribute trojanized gaming utilities via browsers and chat platforms to deploy a multi-purpose RAT that establishes persistence through scheduled tasks and evades detection via Microsoft Defender exclusions.
Information security
fromThe Hacker News
7 hours ago

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

North Korean threat actor ScarCruft deployed the Ruby Jumper campaign using malware families that abuse Zoho WorkDrive for C2 communications and removable media to compromise air-gapped networks.
#data-breach
fromTheregister
4 hours ago

Ransomware payments cratered in 2025 - attacks did not

Despite the relative stability in total payments, ransomware attacks surged across multiple vectors in 2025, with eCrime.ch data showing a 50 percent YoY increase in claimed ransomware victims, marking the most active year on record.
Information security
Information security
fromTechzine Global
11 hours ago

Cyber resilience gap: High confidence, but reality lags behind

Organizations invest heavily in cyber resilience but remain vulnerable to external threats due to perimeter-focused strategies that neglect ecosystem-wide protection.
#ransomware-attack
Information security
fromTechzine Global
8 hours ago

Forescout and Netskope bring Zero Trust to all devices

Forescout and Netskope integration delivers Zero Trust security across all device types by combining real-time device intelligence with AI-powered cloud security for dynamic access control.
fromTechzine Global
12 hours ago

AI code undermines control over open source and IP

While AI tools are lowering the barrier to development, the gap between speed and manageability is growing. In just over a year and a half, AI code assistants have grown from an experiment to an integral part of modern development environments. They are driving strong productivity growth, but organizations are not keeping up with the associated security and governance issues.
Information security
Information security
fromSecurityWeek
9 hours ago

Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience

Aeternum C2 botnet uses Polygon blockchain for command-and-control, making it resilient to takedowns while eliminating central infrastructure costs.
#cybercrime
Information security
fromSecuritymagazine
21 hours ago

Enhancing Incident Response with Integrated Access Control and Video Verification

Integrated access control and video verification technology enhance incident response capabilities and operational resilience by providing situational clarity and enabling faster security action.
fromTechCrunch
5 hours ago

CISA replaces acting director after a bumbling year on the job | TechCrunch

Gottumukkala struggled to lead the agency during his tenure as acting director and caused security headaches, including the uploading of sensitive government documents to ChatGPT, according to reports. Staffing at the agency was slashed by one-third. Gottumukkala also reportedly failed a counterintelligence polygraph he took in order to view classified documents, and suspended several career officials in response, including the agency's then-chief security officer.
Information security
#cisa-leadership-changes
Information security
fromThe Mercury News
20 hours ago

San Jose police rein in license-plate reader policies as surveillance-tech debate rages

San Jose Police Department is reducing automated license-plate reader data retention from one year to 30 days and restricting camera placement near houses of worship and reproductive health clinics to address privacy and immigration enforcement concerns.
Information security
fromThe Hacker News
1 day ago

ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories

Cyberattack breakout times dropped to 29 minutes in 2025, with adversaries using legitimate credentials and AI to accelerate intrusions while maintaining stealth through malware-free techniques.
Information security
fromBleepingComputer
1 day ago

Fake Next.js job interview tests backdoor developer's devices

Attackers deploy malicious Next.js repositories targeting developers through job-themed lures, using multiple execution triggers to achieve remote code execution and data exfiltration.
Information security
fromSecurityWeek
1 day ago

Cisco Patches Catalyst SD-WAN Zero-Day Exploited by Highly Sophisticated Hackers

Cisco released emergency patches for a critical zero-day vulnerability (CVE-2026-20127) in Catalyst SD-WAN that allows unauthenticated remote attackers to bypass authentication and gain administrative privileges.
Information security
fromSecurityWeek
1 day ago

Trend Micro Patches Critical Apex One Vulnerabilities

TrendAI released patches for eight vulnerabilities in Apex One endpoint security, including two critical flaws allowing remote code execution on the management console.
#cisco-catalyst-sd-wan
fromTechzine Global
1 day ago
Information security

Critical Cisco SD-WAN vulnerability exploited since 2023

A critical zero-day vulnerability in Cisco Catalyst SD-WAN (CVE-2026-20127) has been actively exploited since 2023, allowing attackers to compromise controllers and inject malicious peers into networks.
fromComputerWeekly.com
2 days ago
Information security

Cisco Catalyst SD-WAN users targeted in series of cyber attacks | Computer Weekly

UK and Five Eyes agencies warn of active threat campaigns targeting Cisco Catalyst SD-WAN products, requiring immediate investigation and patching of critical authentication bypass vulnerabilities.
Information security
fromTheregister
1 day ago

Five Eyes urge action as Cisco zero-day attacks uncovered

Five Eyes intelligence agencies warn of active exploitation of two critical Cisco Catalyst SD-WAN vulnerabilities enabling persistent unauthorized access and root compromise.
Information security
fromThe Hacker News
1 day ago

Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access

A maximum-severity authentication bypass vulnerability (CVE-2026-20127, CVSS 10.0) in Cisco Catalyst SD-WAN Controller and Manager has been actively exploited since 2023, allowing unauthenticated attackers to gain administrative privileges.
fromSecurityWeek
1 day ago

Zyxel Patches Critical Vulnerability in Many Device Models

An attacker could exploit the flaw via crafted UPnP SOAP requests to execute OS commands on a vulnerable device. It is important to note that WAN access is disabled by default on these devices, and the attack can be carried out remotely only if both WAN access and the vulnerable UPnP function have been enabled.
Information security
Information security
fromThe Hacker News
1 day ago

Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware

A coordinated campaign uses fake Next.js repositories and job assessment lures to trick developers into executing malicious code that establishes persistent command-and-control access.
Information security
fromSecurityWeek
1 day ago

US Sanctions Russian Exploit Broker Operation Zero

The US government sanctioned seven individuals and entities for acquiring and distributing cyber exploits, including a Russian broker who paid $1.3 million for stolen zero-day exploits intended for government use.
Information security
fromThe Hacker News
1 day ago

UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor

A new threat group UAT-10027 targets U.S. education and healthcare sectors with Dohdoor, a DNS-over-HTTPS backdoor enabling stealthy command-and-control communications and secondary payload execution.
#ai-security-vulnerabilities
fromDevOps.com
1 day ago
Information security

Security Flaws in Anthropic's Claude Code Risk Stolen Data, System Takeover - DevOps.com

fromDevOps.com
1 day ago
Information security

Security Flaws in Anthropic's Claude Code Risk Stolen Data, System Takeover - DevOps.com

Information security
fromTheregister
1 day ago

Claude's collaboration tools allowed remote code execution

Claude Code contained three security vulnerabilities allowing remote code execution and API key theft through malicious repository configurations, posing significant supply chain risks to developers.
fromComputerWeekly.com
1 day ago

Qilin crew continues to dominate ransomware ecosystem | Computer Weekly

Given the scale and disruption of 2025, this pattern could be an early signal that 2026 may follow a similar path. Organisations should not mistake the month-on-month drop for a decline in risk. As for Qilin, its attacks show no signs of stopping - within the past few days it has claimed a breach of the Local 100 Chapter of the Transport Workers Union of America, affecting 41,000 current and 26,000 former employees.
Information security
Information security
fromThe Hacker News
1 day ago

Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokens

A malicious NuGet package named StripeApi.Net impersonated Stripe's legitimate library to steal financial sector developers' API tokens and sensitive data.
fromTheregister
1 day ago

Rapid AI-driven development makes security unattainable

Security debt as 'known vulnerabilities left unresolved for more than a year' now affects 82 percent of companies, up from 74 percent a year ago. High-risk vulnerabilities, meaning flaws that are both severe and likely to be exploited, have risen from 8.3 percent to 11.3 percent.
Information security
Information security
fromInfoWorld
1 day ago

Three web security blind spots in mobile DevSecOps pipelines

Mobile apps require fundamentally different security approaches than web applications because they operate as untrusted endpoints where attackers have physical access to the binary, making traditional web-centric security models inadequate.
Information security
fromThe Hacker News
1 day ago

Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown

Aeternum C2 botnet uses Polygon blockchain for command-and-control infrastructure, making it resistant to traditional takedown methods by storing instructions on immutable public ledgers.
Information security
fromTheregister
1 day ago

Scattered Lapsus$ Hunters seeks women to defraud helpdesks

Scattered Lapsus$ Hunters recruits women for social engineering attacks against IT helpdesks, offering $500-$1,000 per successful call to exploit gender bias in security training.
Information security
fromPsychology Today
1 day ago

The Importance of Media Psychology in Cybersecurity

Cybersecurity breaches exploit human psychological vulnerabilities through media psychology principles including persuasion, attention manipulation, and cognitive biases.
fromSecurityWeek
1 day ago

Four Risks Boards Cannot Treat as Background Noise

Rather than stolen data making headlines, it was business stoppage that triggered attention. Moving into 2026, the board's focus should be on ensuring business continuity and building resilience in the face of emerging risks generated by AI usage and attack vectors, quantum computing and geopolitics.
Information security
#cybersecurity-funding
Information security
fromDataBreaches.Net
1 day ago

Extorting the Extorters? Moscow man accused of posing as FSB officer to extort Conti ransomware gang - DataBreaches.Net

A Moscow resident was accused of extorting money from the Conti ransomware group by impersonating an FSB officer and threatening criminal prosecution.
fromSecuritymagazine
1 day ago

How AI Could Impact Tax Season Security This Year

Tax season is stressful for many, making it an ideal time for scammers to target unsuspecting and distracted taxpayers. Awareness is our first, and best, line of defense. Criminals often pose as the IRS, payroll companies, tax preparation services, or even trusted financial institutions in an effort to steal money and sensitive information.
Information security
#quantum-computing-threat
Information security
fromArs Technica
1 day ago

New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises

Guest Wi-Fi networks lack true client isolation due to fundamental network stack vulnerabilities that encryption cannot prevent, allowing attackers to intercept traffic between connected devices.
fromZDNET
1 day ago

Why scammers call you and say nothing - and how to respond safely

Calls where no one responds are rarely accidental. In many cases, they are automated reconnaissance events. Fraud operations run at industrial scale, and before they invest human effort in a target, they validate that a number is active and answered by a real person.
Information security
Information security
fromTheregister
1 day ago

GCHQ hunts for CISO with 130K top salary

GCHQ is recruiting a chief information security officer at £96,981 to £130,000 to lead cybersecurity defenses against advanced adversaries while managing risk and technological progress.
fromReadWrite
1 day ago

Multiple class action lawsuits target Wynn data breach

Omitted from the Notice Letter were the identity of the cybercriminals who perpetrated this Data Breach, the details of the root cause of the Data Breach, the vulnerabilities exploited, and the remedial measures undertaken to ensure such a breach does not occur again.
Information security
Information security
fromSecurityWeek
2 days ago

SolarWinds Patches Four Critical Serv-U Vulnerabilities

SolarWinds released patches for four critical vulnerabilities in Serv-U with CVSS scores of 9.1 that enable remote code execution when exploited by administrators.
Information security
fromThe Hacker News
2 days ago

Malicious NuGet Packages Stole ASP.NET Data; npm Package Dropped Malware

Four malicious NuGet packages targeted ASP.NET developers to steal identity data, manipulate authorization rules, and establish persistent backdoors in applications.
Information security
fromThe Hacker News
2 days ago

SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution

SolarWinds released patches for four critical remote code execution vulnerabilities in Serv-U file transfer software, all rated 9.1 CVSS severity, requiring administrative privileges for exploitation.
Information security
fromTheregister
2 days ago

Next.js jobseekers targeted with malicious 'interview' repos

Hackers distribute malicious Next.js repositories that execute in-memory JavaScript on developers' machines through multiple attack vectors during normal development workflows.
Information security
fromThe Hacker News
2 days ago

CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability

CISA added CVE-2026-25108, an OS command injection vulnerability in FileZen, to its Known Exploited Vulnerabilities catalog due to active exploitation evidence.
Information security
fromComputerWeekly.com
2 days ago

Application exploitation back in vogue, says IBM cyber unit | Computer Weekly

Cyber attacks exploiting vulnerable public-facing applications increased 44%, surpassing credential abuse attacks, with AI tools accelerating vulnerability discovery and exploitation.
Information security
fromNextgov.com
1 day ago

Hackers are exploiting exposed Cisco products, Five Eyes intelligence agencies say

CISA, NSA, and Five Eyes partners issued an emergency alert about a significant cyber threat exploiting Cisco wide-area networking vulnerabilities, affecting federal and global networks.
Information security
fromSecurityWeek
2 days ago

The Blast Radius Problem: Stolen Credentials are Weaponizing Agentic AI

Over half of tracked vulnerabilities require no authentication, while AI amplifies attacker capabilities and supply chain breaches surge fourfold, creating expanding security risks.
Information security
fromThe Hacker News
2 days ago

Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries

Google disrupted UNC2814, a China-nexus cyber espionage group that breached 53 organizations across 42 countries using novel backdoor GRIDTIDE that abuses Google Sheets API for command-and-control communications.
Information security
fromThe Hacker News
2 days ago

Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

Multiple critical vulnerabilities in Claude Code allow remote code execution and API credential theft when users open untrusted repositories.
fromSecurityWeek
2 days ago

Google Disrupts Chinese Cyberespionage Campaign Targeting Telecoms, Governments

The attacker was using API calls to communicate with SaaS apps as command-and-control (C2) infrastructure to disguise their malicious traffic as benign, a common tactic used by threat actors when attempting to improve the stealth of their intrusions. Rather than abusing a weakness or security flaw, attackers rely on cloud-hosted products to function correctly and make their malicious traffic seem legitimate.
Information security
fromSecurityWeek
2 days ago

Ad Tech Company Optimizely Targeted in Cyberattack

The threat actor gained access to Optimizely's systems through a sophisticated voice-phishing attack, but was unable to escalate privileges, install software, or create any backdoors in the Optimizely environment. The incident was confined to certain internal business systems including Zendesk, records in our Salesforce CRM, and a limited set of internal documents used for back-office operations.
Information security
Information security
fromTheregister
2 days ago

Google and friends disrupt suspected Beijing espionage op

Google disrupted UNC2814, a China-linked group conducting widespread cyberattacks on telecommunications and government organizations across multiple continents using Google Sheets API for command-and-control operations.
fromTechzine Global
2 days ago

Go developer questions effectiveness of Dependabot

Dependabot sounded the alarm on a large scale. Thousands of repositories automatically received pull requests and warnings, including a high vulnerability score and signals about possible compatibility issues. According to Valsorda, this shows that the tool mainly checks whether a dependency is present, without analyzing whether the vulnerable code is actually accessible within a project.
Information security
#malvertising
fromMashable
2 days ago
Information security

Hackers use this tool to bypass fraud detection and weaponize Google ads

fromMashable
2 days ago
Information security

Hackers use this tool to bypass fraud detection and weaponize Google ads

fromCSS-Tricks
1 day ago

An Exploit ... in CSS?! | CSS-Tricks

Google credits security researcher Shaheen Fazim with reporting the exploit to Google. The dude's LinkedIn says he's a professional bug hunter, and I'd say he deserves the highest possible bug bounty for finding something that a government agency is saying "in CSS in Google Chrome before 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page."
Information security
#cyberattack
fromDataBreaches.Net
1 day ago
Information security

Clalit probes suspected cyberattack after Iranian-linked hackers leak patient files - DataBreaches.Net

fromDataBreaches.Net
1 day ago
Information security

Clalit probes suspected cyberattack after Iranian-linked hackers leak patient files - DataBreaches.Net

fromSecurityWeek
2 days ago

Ex-US Defense Contractor Executive Jailed for Selling Exploits to Russia

Peter Williams stole a U.S. defense contractor's trade secrets about highly sensitive cyber capabilities and sold them to a broker whose clients include the Russian government, putting our national security and countless potential victims at risk.
Information security
#espionage
fromTechCrunch
2 days ago
Information security

Inside the story of the US defense contractor who leaked hacking tools to Russia | TechCrunch

fromTechCrunch
2 days ago
Information security

Inside the story of the US defense contractor who leaked hacking tools to Russia | TechCrunch

Information security
fromThe Hacker News
2 days ago

Manual Processes Are Putting National Security at Risk

Over half of national security organizations rely on manual sensitive data transfers, creating critical security vulnerabilities that adversaries actively exploit in contested operational environments.
Information security
fromTheregister
2 days ago

Threat intelligence supply chain is full of weak links

China's ban on foreign security software threatens the global threat intelligence ecosystem by risking data fragmentation and weakening international cybersecurity collaboration.
Information security
fromSecurityWeek
2 days ago

SecurityWeek Report: 426 Cybersecurity M&A Deals Announced in 2025

The cybersecurity M&A market rebounded in 2025 with 426 deals, a 5% increase from 2024, reflecting strategic consolidation and increased globalization with higher deal values and complexity.
Information security
fromSecuritymagazine
2 days ago

From the Outside In: A Smarter Approach to Vendor Access

Organizations should shift from employee-centric access control to perimeter-focused security strategies to better manage risks from external vendors, contractors, and temporary workers.
[ Load more ]