#cybersecurity-vulnerabilities

[ follow ]
Information security
fromwww.theguardian.com
4 days ago

Exploit every vulnerability': rogue AI agents published passwords and overrode anti-virus software

AI agents in laboratory tests autonomously bypassed security systems to leak sensitive information and override safety controls without explicit instruction to do so.
Information security
fromThe Hacker News
4 days ago

Attackers Don't Just Send Phishing Emails. They Weaponize Your SOC's Workload

Attackers deliberately overwhelm SOC analysts with high-volume phishing campaigns to delay investigations and create windows for successful breaches, making analyst capacity a critical vulnerability.
Privacy professionals
fromKotaku
5 days ago

Top PlayStation Trophy Hunter In The World Has Been Permabanned And Blames A Hacker - Kotaku

David Tremblay, a former top PlayStation Trophy holder, was permanently banned from PSN after a hacker compromised his account and allegedly used violation messages to trigger the suspension.
fromTheregister
5 days ago

Swiss e-vote snafu leaves 2,048 ballots unreadable

Three USB sticks were used, all with the correct code, but none of them worked. By the close of polling on Sunday, its e-voting system had collected 2,048 votes, but Basel-Stadt officials were not able to decrypt them with the hardware provided, despite the involvement of IT experts.
Canada news
fromWIRED
1 week ago

From Ukraine to Iran, Hacking Security Cameras Is Now Part of War's 'Playbook'

On Wednesday, Tel Aviv-based security firm Check Point released new research describing hundreds of hacking attempts that targeted consumer-grade security cameras around the Middle East-with many apparently timed to Iran's recent missile and drone strikes on targets that included Israel, Qatar, and Cyprus. Those camera-hijacking efforts, some of which Check Point has attributed to a hacker group that's been previously linked to Iranian intelligence, suggest that Iran's military has tried to use civilian surveillance cameras as a means to spot targets, plan strikes, or assess damage from its attacks.
Information security
Information security
fromThe Hacker News
1 week ago

Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog

CISA added two critical vulnerabilities affecting Hikvision and Rockwell Automation products to its Known Exploited Vulnerabilities catalog due to active exploitation evidence.
Information security
fromBusiness Matters
1 week ago

7 Data Privacy Risks Leaders Miss in 2026

Organizations overlook seven critical privacy risks in 2026 that bypass security awareness, including public WiFi interception, malicious browser extensions, shadow AI tools, unencrypted messaging, credential reuse, unmanaged personal devices, and data retention gaps.
Artificial intelligence
fromThe Hacker News
3 months ago

Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs

DeepSeek-R1 produces significantly more insecure code when prompts include topics China deems politically sensitive, raising severe vulnerability likelihood by up to 50%.
Privacy technologies
fromZDNET
8 months ago

How I used ChatGPT to analyze, debug, and rewrite a broken plugin from scratch - in an hour

Website security is crucial, and vulnerabilities in plugins pose significant risks.
[ Load more ]