Information security

[ follow ]
fromTheregister
2 hours ago

AI agents can't pull off fully autonomous cyberattacks - yet

AI agents and other systems can't yet conduct cyberattacks fully on their own - but they can help criminals in many stages of the attack chain, according to the International AI Safety report. The second annual report, chaired by the Canadian computer scientist Yoshua Bengio and authored by more than 100 experts across 30 countries, found that over the past year, developers of AI systems have vastly improved their ability to help automate and perpetrate cyberattacks.
Information security
Information security
fromThe Hacker News
11 hours ago

Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package

CVE-2025-11953 (Metro4Shell) is actively exploited to achieve unauthenticated remote command execution and deliver persistent, Rust-based malware via a PowerShell loader.
#react-native
fromTheregister
7 hours ago
Information security

Critical React Native Metro dev server bug under attack

A critical CVE-2025-11953 OS command-injection flaw in React Native's Metro dev server enables unauthenticated remote execution and malware delivery on Windows and Linux.
fromSecurityWeek
12 hours ago
Information security

Critical React Native Vulnerability Exploited in the Wild

Critical CVE-2025-11953 (Metro4Shell) in React Native's Community CLI/Metro is being actively exploited since December, exposing thousands of internet-accessible instances.
Information security
fromSecurityWeek
15 hours ago

Russia's APT28 Rapidly Weaponizes Newly Patched Office Vulnerability

APT28 quickly weaponized Microsoft's patched Office vulnerability CVE-2026-21509, deploying droppers and additional malware such as MiniDoor within days of the patch release.
Information security
fromTheregister
9 hours ago

CISA quietly updated ransomware flags on 59 flaws last year

On 59 occasions in 2025 CISA changed KEV entries to indicate ransomware use without alerting defenders, creating unnoticed risk shifts and missed remediation priorities.
#cve-2026-21509
Information security
fromThe Hacker News
8 hours ago

Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata

A metadata label in Docker images allowed Ask Gordon's AI to execute commands via MCP Gateway, enabling remote code execution and data exfiltration until patched.
Information security
fromThe Hacker News
21 hours ago

Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group

China-linked Lotus Blossom compromised Notepad++ hosting to deliver the Chrysalis backdoor via tampered updates exploiting older update verification weaknesses.
fromSecurityWeek
14 hours ago

Hackers Leak 5.1 Million Panera Bread Records

The ShinyHunters extortion group has claimed the theft of roughly 14 million records from Panera Bread, after compromising a Microsoft Entra single-sign-on (SSO) code. The attack falls in line with recent ShinyHunters attacks that rely on voice phishing (vishing) and SSO authentication to access victim organizations' cloud-based software-as-a-service (SaaS) environments. Last week, ShinyHunters published on its Tor-based leak site a 760GB archive allegedly containing the sensitive information stolen from Panera Bread.
Information security
Information security
fromAxios
13 hours ago

Exclusive: Suspected Chinese hackers impersonate U.S. briefings in phishing lure

China-linked Mustang Panda used file-based phishing to infect diplomatic and election officials with data-stealing persistent malware, detected by an AI agent at Dream.
#notepad
fromTechCrunch
1 day ago
Information security

Notepad++ says Chinese government hackers hijacked its software updates for months | TechCrunch

fromTechCrunch
1 day ago
Information security

Notepad++ says Chinese government hackers hijacked its software updates for months | TechCrunch

Information security
fromSecurityWeek
11 hours ago

RapidFort Raises $42M to Automate Software Supply Chain Security

RapidFort raised $42 million to scale an automated platform that eliminates vulnerabilities by analyzing, hardening containers, supplying curated near-zero-CVE images, and reducing runtime attack surface.
#openclaw
fromAxios
12 hours ago
Information security

Moltbook shows rapid demand for AI agents. The security world isn't ready.

fromAxios
12 hours ago
Information security

Moltbook shows rapid demand for AI agents. The security world isn't ready.

Information security
fromTheregister
13 hours ago

Polish cops bail 20-year-old bedroom botnet operator

A 20-year-old in Lublin was arrested for operating a multi-layered botnet that carried out DDoS attacks on international and strategic websites, facing six charges.
#ransomware
fromdatabreaches.net
1 day ago
Information security

Ransomware attack compromised 377,000 people's Social Security and driver's license numbers from Texas gas station and convenience store chain

fromdatabreaches.net
1 day ago
Information security

Ransomware attack compromised 377,000 people's Social Security and driver's license numbers from Texas gas station and convenience store chain

#moltbook
fromInc
5 hours ago
Information security

Moltbook Promised an AIRun Social Network. What Happened Was Scary-and Then Very, Very Dumb

fromInc
5 hours ago
Information security

Moltbook Promised an AIRun Social Network. What Happened Was Scary-and Then Very, Very Dumb

fromBusiness Insider
9 hours ago

Why OpenClaw and Moltbook have security researchers worried

OpenClaw and Moltbot are the talk of the tech town right now, but cybersecurity researchers have flagged some concerns that you might want to think about. OpenClaw - first known as Clawdbot, then Moltbot, all in the same week - has got the tech world buzzing thanks to its abilities to autonomously perform tasks like managing a user'sschedule. Meanwhile, Moltbook has gone viral for its Reddit-style social network, where AI agents post and interact with one another. No humans allowed - apart from observing.
Information security
Information security
fromThe Hacker News
14 hours ago

When Cloud Outages Ripple Across the Internet

Cloud infrastructure outages can disable identity authentication and authorization, creating hidden single points of failure that cause broad operational and security impacts.
Information security
fromSecuritymagazine
1 day ago

How Banks Can Protect Their Most Valuable Asset: Customers

Banks must secure money, property, data, and reputation because incidents—crime, insider misuse, fraud, or IT failures—threaten safety, customer trust, regulatory standing, and brand.
Information security
fromInc
9 hours ago

Platforms Can't Stop Live Pirates with Yesterday's Tools

Real-time fraudulent live streams impersonate brands and executives to steal credentials and money, exploiting platforms' inadequate live-moderation and causing rapid financial and reputational harm.
Information security
fromEntrepreneur
9 hours ago

Crypto Builders Can't Ignore This Crucial Component Anymore

Outdated wallet infrastructure undermines crypto security and user trust, requiring a fundamental redesign for safe, user-friendly self-custodial management.
fromSecuritymagazine
1 day ago

Leveraging ISACA for Your CMMC Career

The Cybersecurity Maturity Model Certification (CMMC) is the definitive standard for DoW contractors to demonstrate security competence. Whether viewed as necessary progress or an audit burden, CMMC represents a strategic career investment - and a strong entry point for practitioners looking to specialize. It is poised to reshape cybersecurity roles in the defense sector, making certification a strategic move for advancement.
Information security
fromTheregister
5 hours ago

Sudo's maintainer needs resources to keep utility updated

Sudo, for those not familiar with Unix systems, is a command-line utility that allows authorized users to run specific commands as another user, typically the superuser, under tightly controlled policy rules. It is a foundational component of Unix and Linux systems: without tools like sudo, administrators would be forced to rely more heavily on direct root logins or broader privilege escalation mechanisms, increasing both operational risk and attack surface.
Information security
Information security
fromThe Hacker News
11 hours ago

[Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate

SOC teams suffer tool sprawl and noise; prioritize clear criteria for what to build, buy, or automate to simplify operations and improve outcomes.
Information security
fromTheregister
13 hours ago

Microsoft sends TLS 1.0 and 1.1 to the cloud retirement home

Azure Storage will stop supporting TLS 1.0 and 1.1 on February 3, 2026, with TLS 1.2 required and enforced at the storage account level.
fromDevOps.com
16 hours ago

What is OPA (Open Policy Agent)? - DevOps.com

A key advantage of using OPA is its ability to decouple policy decisions from the business logic in your services. With OPA, the engine determines the outcome of a policy, while your application takes responsibility for enforcing it. This separation makes it possible to manage all policies in a single location, instead of having to update business logic across multiple systems-systems that may be written in different languages and maintained by different teams.
Information security
fromNextgov.com
5 hours ago

AI info-sharing center is in development, CISA official says

We just want to make sure we've got the right elements of, how do we pull together people, and how do we take advantage of the leadership position that we have
Information security
Information security
fromThe Hacker News
1 day ago

Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats

Google disrupted the IPIDEA residential proxy network, seizing C2 domains and reducing millions of compromised devices to curb malicious traffic and attacks.
#cyberattack
fromSecurityWeek
1 day ago
Information security

Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities

Russia-linked hackers breached ICS at roughly 30 Polish energy sites, damaging some devices and targeting monitoring systems without causing power outages.
fromThe Hacker News
3 days ago
Information security

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

Coordinated destructive cyberattacks targeted over 30 renewable energy farms, a manufacturing company, and a major CHP, but failed to disrupt electricity or heat supply.
Information security
fromSecurityWeek
1 day ago

Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities

Russia-linked hackers breached ICS at roughly 30 Polish energy sites, damaging some devices and targeting monitoring systems without causing power outages.
#supply-chain-attack
Information security
fromSecurityWeek
1 day ago

Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack

GlassWorm was distributed via a compromised Open VSX publisher account to deliver a macOS-focused loader that steals browser data and cryptocurrency artifacts using Solana-based C2.
Information security
fromSecurityWeek
1 day ago

ShinyHunters-Branded Extortion Activity Expands, Escalates

ShinyHunters' extortion campaigns are expanding, using vishing and victim-branded credential harvesting to compromise SSO and bypass MFA in cloud and SaaS environments.
Information security
fromSecurityWeek
1 day ago

Notepad++ Supply Chain Hack Conducted by China via Hosting Provider

China-linked state-sponsored actor compromised a hosting provider to intercept and redirect Notepad++ update traffic, delivering malicious update manifests to select targeted users.
#cyberwarfare
Information security
fromThe Hacker News
1 day ago

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

eScan's update infrastructure was breached, allowing attackers to distribute a malicious update that installs a persistent downloader on enterprise and consumer systems.
Information security
fromTheregister
1 day ago

Notepad++ hijacking linked to Chinese Lotus Blossom crew

Lotus Blossom, a Chinese government-linked APT, hijacked Notepad++ updates to deploy a new backdoor called Chrysalis to targeted organizations.
fromZDNET
1 day ago

Massive 31.4 Tbps DDoS attack breaks records: How the 'apex' of botnets could be weaponizing your home devices

Also known as Kimwolf, Aisuru is one of the largest botnets currently in existence, powered by an estimated one to four million infected hosts worldwide, including home and consumer devices such as routers and online CCTV systems. Its operators scan the web for vulnerable devices, often with exposed ports or default credentials, and infect them to add them to a pool of devices that can be harnessed to launch a tsunami of fake traffic against a target service.
Information security
fromTechRepublic
1 day ago

Hugging Face Repositories Abused in New Android Malware Campaign

Cybersecurity researchers at Bitdefender have uncovered a massive campaign in which attackers are using Hugging Face's trusted infrastructure to host and spread a malicious Android Remote Access Trojan (RAT). By hiding their malicious code on a platform used by millions of developers, the attackers managed to fly under the radar of traditional security filters. The attack doesn't start with a shady link from a dark corner of the web.
Information security
Information security
fromSecurityWeek
1 day ago

Over 1,400 MongoDB Databases Ransacked by Threat Actor

1,416 of 3,100 internet-exposed MongoDB databases were compromised and replaced with ransom notes demanding about $500 in Bitcoin per incident.
Information security
fromTheregister
1 day ago

Techie's one ring brought darkness by shorting a server

A technician wearing a wedding ring shorted a server board, causing an outage, briefly concealed the failure, and service resumed after an unexpected reboot.
Information security
fromSecurityWeek
1 day ago

Microsoft Moves Closer to Disabling NTLM

NTLM authentication will be disabled by default in upcoming Windows Server and client releases, requiring explicit re-enablement and migration to Kerberos.
fromThe Hacker News
1 day ago

Securing the Mid-Market Across the Complete Threat Lifecycle

For mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential to protect an expanding attack surface. Combined with effective protection that blocks threats, they play a critical role in stopping cyberattacks before damage is done. The challenge is that many security tools add complexity and cost that most mid-market businesses can't absorb. With limited budgets and lean IT and security teams, organizations often focus on detection and response.
Information security
Information security
fromTheregister
1 day ago

McDonald's tells customers to use better passwords

Product names and leetspeak substitutions produce commonly breached passwords; users should choose unique, randomized passphrases and enable multifactor authentication.
Information security
fromZDNET
1 day ago

3 security gadgets I never leave home without (and don't break the bank)

Carry an inexpensive kit of physical security tools, like a USB data blocker, to protect devices from malicious chargers, cables, and data theft while traveling.
Information security
fromEntrepreneur
1 day ago

Protect Your Business From Rising Cyber Threats With This $50 Certification Training Bundle

Comprehensive cybersecurity training equips business owners and teams with practical skills to identify vulnerabilities, manage incidents, and reduce costly data breach risks.
Information security
fromSecuritymagazine
2 days ago

Ransomware Without Encryption: Why Pure Exfiltration Attacks Are Surging

Attackers shifted from encryption to pure exfiltration, enabling stealthy data theft, prolonged dwell time, and double/triple extortion that bypasses traditional defenses.
Information security
fromKotaku
1 day ago

Steam Hit People Playground Gets Hit With A Save Wiping Virus

People Playground's Steam Workshop was infected by a malicious mod that spread to other mods, wiping in-game saves and prompting immediate updates and mod deletion.
#cybersecurity
fromComputerWeekly.com
1 day ago
Information security

Canva uses 1Password to secure ID during growth phase | Computer Weekly

Canva experienced a major 2019 data breach, then invested heavily in security, partnered with 1Password, and scaled security amid rapid user and headcount growth.
fromTechCrunch
4 days ago
Information security

Russian hackers breached Polish power grid thanks to bad security, report says | TechCrunch

Russian government hackers exploited weak security to breach Polish wind, solar, and heat-and-power systems and deployed destructive wiper malware that disabled monitoring systems.
fromTechCrunch
4 days ago
Information security

Russian hackers breached Polish power grid thanks to bad security, report says | TechCrunch

Information security
fromComputerWeekly.com
1 day ago

Answers to key questions about AI in IT security | Computer Weekly

Generative AI supports security via content creation, knowledge articulation, and behavior modeling; LLM-powered chatbots aid research and documentation but adoption remains limited.
Information security
fromDataBreaches.Net
1 day ago

Threats: Results of a pilot survey on threats, and a new category on DataBreaches.net - DataBreaches.Net

A pilot survey of 112 respondents documented legal, criminal, and other threats faced by security researchers and journalists, calling for further research and action.
fromDataBreaches.Net
1 day ago

IA: Dallas County to pay $600,000 to security testers arrested in 2019 - DataBreaches.Net

Dallas County is paying $600,000 to two men who sued after they were arrested in 2019 while testing courthouse security for Iowa's Judicial Branch, their lawyer says. Gary DeMercurio and Justin Wynn were arrested Sept. 11, 2019, after breaking into the Dallas County Courthouse. They spent about 20 hours in jail and were charged with burglary and possession of burglary tools, though the charges were later dropped.
Information security
Information security
fromTheregister
1 day ago

Want more ads on your web pages? Try the AdBoost extension

AdBoost injects hardcoded, provocative ads into Chromium browsers and requires manual developer-mode installation from GitHub because it is not available in the Chrome Web Store.
Information security
fromTheregister
2 days ago

Too much open-source AI is exposing itself to the web

Exposed, homogenous Ollama open-source AI deployments form a monoculture vulnerable to zero-day exploits, remote compromise, resource hijacking, and unnoticed abuse.
fromMedium
1 month ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Firewalls can fail, passwords can be stolen, but strong encryption remains your last line of defense. InToday's digital world, protect sensitive personal details is more critical and important than ever. The AES algorithm (Advanced Encryption Standard) algorithm is one of the most trusted and widely used way or method for securing data against unauthorized access and frauded. Advanced Encryption Standard supports different levels like 128-bit, 192-bit, and 256-bit encryption, providing strong security for personal data and more.
Information security
Information security
fromTheregister
2 days ago

Deepfake job seeker applied to work for an AI security firm

Deepfake videos and fabricated profiles are increasingly used to apply for cybersecurity roles, deceiving experienced professionals and exploiting hiring platforms like LinkedIn.
Information security
fromMedium
1 month ago

Where DFIR Fits in NIST's Cyber AI Profile

DFIR is a cross-cutting capability essential to operationalizing the Cyber AI Profile's Secure, Defend, and Thwart focus areas.
fromFast Company
2 days ago

Bitwarden announced a price hike in the worst way possible

Bitwarden is one of the more likable tech companies. It offers a great password manager for free, charges modestly for its paid version, and has mostly stayed in its lane with its focus on security products. So it's disappointing that it isn't being more transparent about the first price hike in its 10-year history. Bitwarden's Premium version now costs $20 per year, up from $10 per year previously.
Information security
fromMedium
1 month ago

Linux Permissions Unleashed: A Deep Dive into Access Control Lists (ACLs)

But what happens when you need more granularity? How do you grant write access to a file to just one specific user who isn't the owner and isn't in the owning group? How do you allow two different groups read access, but only one of them write access? How do you ensure files created in a shared directory automatically get specific permissions for a certain team?
Information security
Information security
fromThe Hacker News
3 days ago

Mandiant Finds ShinyHunters Using Vishing to Steal MFA and Breach SaaS Platforms

ShinyHunters-linked actors use vishing and fraudulent credential sites to steal SSO and MFA credentials, access cloud SaaS data, and escalate extortion tactics.
fromThe Hacker News
3 days ago

Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists

A Farsi-speaking threat actor aligned with Iranian state interests is suspected to be behind a new campaign targeting non-governmental organizations and individuals involved in documenting recent human rights abuses. The activity, observed by HarfangLab in January 2026, has been codenamed RedKitten. It's said to coincide with the nationwide unrest in Iran that began towards the end of 2025, protesting soaring inflation, rising food prices, and currency depreciation.
Information security
#container-security
fromInfoQ
4 days ago
Information security

Chainguard Finds 98% of Container CVEs Lurking Outside the Top 20 Images

fromInfoQ
4 days ago
Information security

Chainguard Finds 98% of Container CVEs Lurking Outside the Top 20 Images

Information security
fromFortune
3 days ago

Moltbook, a social network where AI agents hang together, may be 'the most interesting place on the internet right now' | Fortune

Agentic AI assistants like Moltbot can boost productivity by acting autonomously while posing serious security risks by requiring access to personal credentials and files.
Information security
fromDataBreaches.Net
3 days ago

RINA Accountants & Advisors is creating $400K settlement fund to settle lawsuit over 2022 data breach - DataBreaches.Net

RINA Accountants & Advisors will pay $400,000 to settle a 2022 cyberattack that exposed thousands' personally identifiable records, including Social Security Numbers.
Information security
fromSecurityWeek
4 days ago

ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid

A cyberattack believed to be Russian targeted Poland's distributed energy resources, compromising RTUs and communication systems across about 30 sites and causing permanent ICS damage.
Information security
fromSecurityWeek
4 days ago

In Other News: Paid for Being Jailed, Google's $68M Settlement, CISA Chief's ChatGPT Leak

Mitsubishi Electric acquired Nozomi Networks; LastPass disrupted phishing infrastructure but attackers sent a new wave; CISA withdrew from RSA Conference.
fromThe Cyber Express
4 days ago

The Cyber Express Weekly Roundup: Jan 2026 Threats & Trends

On January 26, 2026, Delta, a Russian alarm and vehicle security provider, suffered a major cyberattack, disrupting alarms, vehicle systems, and company communications for tens of thousands of customers. While no confirmed customer data breach occurred, an unverified leak circulated online.
Information security
#ivanti-epmm
Information security
fromThe Hacker News
4 days ago

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

China-linked UAT-8099 targeted vulnerable IIS servers across Asia, focusing on Thailand and Vietnam, using web shells, PowerShell, GotoHTTP, and BadIIS for persistent access.
Information security
fromThe Hacker News
4 days ago

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

Malicious Chrome extensions hijack affiliate links, steal user data, and collect OpenAI ChatGPT authentication tokens across a 29-extension e-commerce-targeting cluster.
#android-malware
Information security
fromSecurityWeek
4 days ago

175,000 Exposed Ollama Hosts Could Enable LLM Abuse

175,000 exposed Ollama hosts operate without guardrails or monitoring, enabling code execution and external access—activity concentrated among ~23,000 hosts across 130 countries.
fromSecurityWeek
4 days ago

Aisy Launches Out of Stealth to Transform Vulnerability Management

"Smart people are burning out sifting through backlogs of unprioritized, low-value vulnerabilities, while the real critical pathways go unprotected," says Shlomie Liberow, founder and CEO of Aisy (and formerly head of hacker research and development at HackerOne). He doesn't see this changing for mid-tier and larger companies - partly because of the security industry itself. Each vulnerability tool competes with other vulnerability tools, and each one avoids the possibility of a competitor finding more issues than it does itself.
Information security
Information security
fromMail Online
4 days ago

Warning to Gmail users as scammers exploit Google's email update

Scammers exploit Gmail's new address-change feature to phish users and take over Google accounts by directing victims to fake login pages.
Information security
fromTechRepublic
4 days ago

SoundCloud Data Breach Exposes Nearly 30M User Accounts

SoundCloud experienced a data breach exposing private email addresses linked to public profile details for nearly 30 million users, increasing phishing and impersonation risks.
[ Load more ]