Information security

[ follow ]
fromZDNET
1 hour ago

Is your smart home an easy target? 6 ways experts lock theirs down

Most of us have some internet of things (IoT) devices at home, whether it's a phone, a tablet, or a collection of security cameras and sensors. When you learn that 120,000 home security cameras were hacked in South Korea for sexploitation footage, it makes you think twice about adding such devices to your home, which is your most sacred space for privacy.
Information security
Information security
fromZDNET
1 hour ago

Need to encrypt Mac files? I found a free app that makes it super easy

Encrypto for macOS simplifies AES-256 file encryption, sharing, password hints, and cross-platform compatibility with Windows.
#react2shell
fromThe Hacker News
5 days ago
Information security

ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit - and 20 More Stories

fromThe Hacker News
5 days ago
Information security

ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit - and 20 More Stories

Information security
fromThe Hacker News
14 hours ago

Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure

GRU-linked APT44 ran a 2021–2025 campaign targeting Western critical infrastructure, exploiting misconfigured network edge devices and known software vulnerabilities.
Information security
fromTheregister
4 hours ago

China's Ink Dragon hides out in European government networks

Ink Dragon expanded espionage into European government networks, using compromised servers as relay nodes, stealing credentials and updating backdoors to blend with Microsoft cloud activity.
#data-breach
fromTechCrunch
11 hours ago
Information security

Hacking group says it's extorting Pornhub after stealing users' viewing data | TechCrunch

fromForbes
4 days ago
Information security

4.3 Billion Work Profiles Exposed: Scammers Now Know Where You Work

fromTechCrunch
4 days ago
Information security

Flaw in photo booth maker's website exposes customers' pictures | TechCrunch

fromTechCrunch
11 hours ago
Information security

Hacking group says it's extorting Pornhub after stealing users' viewing data | TechCrunch

fromForbes
4 days ago
Information security

4.3 Billion Work Profiles Exposed: Scammers Now Know Where You Work

fromTechCrunch
4 days ago
Information security

Flaw in photo booth maker's website exposes customers' pictures | TechCrunch

Information security
fromThe Hacker News
11 hours ago

Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data

A malicious NuGet package impersonating Tracer.Fody stole Stratis cryptocurrency wallet files and passwords, exfiltrating them to a Russian-hosted server.
fromThe Hacker News
16 hours ago

Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass

Cybersecurity company Arctic Wolf said it observed active intrusions involving malicious single sign-on (SSO) logins on FortiGate appliances on December 12, 2025. The attacks exploit two critical authentication bypasses (CVE-2025-59718 and CVE-2025-59719, CVSS scores: 9.8). Patches for the flaws were released by Fortinet last week for FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager. "These vulnerabilities allow unauthenticated bypass of SSO login authentication via crafted SAML messages, if the FortiCloud SSO feature is enabled on affected devices," Arctic Wolf Labs said in a new bulletin.
Information security
Information security
fromThe Hacker News
9 hours ago

Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign

Threat actors use compromised AWS IAM credentials and novel persistence methods to deploy widespread crypto-mining across ECS and EC2, evading detection and extending operations.
fromTheregister
22 hours ago

SoundCloud bounces some VPNs as it cleans up cyberattack

"SoundCloud recently detected unauthorized activity in an ancillary service dashboard," opens a Monday post from the company. "Upon making this discovery, we immediately activated our incident response protocols and promptly contained the activity. We also engaged leading third-party cybersecurity experts to assist in a thorough investigation and response." Not long after SoundCloud and its hired help contained the incident, the site became the subject of multiple denial of service attacks.
Information security
#phishing
fromIT Pro
16 hours ago
Information security

Complacent Gen Z and Millennial workers are more likely to be duped by social engineering attacks

fromIT Pro
16 hours ago
Information security

Complacent Gen Z and Millennial workers are more likely to be duped by social engineering attacks

Information security
fromTheregister
8 hours ago

SantaStealer bags credentials and crypto wallets

SantaStealer is a modular credential- and wallet-stealing infostealer advertised as undetectable despite samples lacking robust anti-analysis and evasion techniques.
#holiday-scams
fromZDNET
12 hours ago
Information security

Beware of 'gift card draining' and two other top holiday scams, US Treasury warns

fromZDNET
12 hours ago
Information security

Beware of 'gift card draining' and two other top holiday scams, US Treasury warns

Information security
fromChannelPro
19 hours ago

Tapping into the 'touch grass' movement in cybersecurity

Organizations are adopting offline, air-gapped, and paper-based recovery measures to improve resilience and reduce dependence on always-on cloud connectivity.
Information security
fromIT Pro
14 hours ago

Google is scrapping its dark web report feature - here's everything you need to know and some alternative options

Google will discontinue its dark web report tool, ending scans January 15 and deleting all related data by February 16 while promoting other security tools.
Information security
fromTechzine Global
16 hours ago

CrowdStrike expands Falcon with security for AI interactions

Falcon AIDR protects the AI interaction layer—prompts, agents, and responses—by logging, correlating telemetry, and blocking risky interactions like prompt injection.
Information security
fromTechzine Global
17 hours ago

Let's Encrypt drastically shortens certificate lifespans

Let's Encrypt is switching to Generation Y roots and shorter-lived server-only certificates while removing TLS client authentication and offering short-lived and IP support.
Information security
fromNextgov.com
8 hours ago

Quantum cryptography implementation timelines must be shortened, industry CEO to tell Congress

Combining AI and quantum computing threatens current encryption, creating new cyber fault lines that demand comprehensive, network-wide quantum-resistant protections.
Information security
fromEngadget
1 day ago

Google is retiring its free dark web monitoring tool next year

Google will discontinue its free dark web reports, ending monitoring on January 15, 2026 and removing report access on February 16, 2026.
Information security
fromTechzine Global
22 hours ago

Database administrator in 2025: how DBAs are reinventing themselves

DBAs must adapt to decentralized data, rising security and governance complexity, and automation demands as organizations prioritize rapid innovation over timely data controls.
fromWordtothewise
10 hours ago

IPv4 and IPv6

The Old Internet is built on Internet Protocol version 4. This was first used on ARPANET in 1983. It's the IP version that launched the modern Internet. It's what we - or at least the general public - think of as an IP address. Under the covers it's a 32 bit long identifier, but it's always displayed as four decimal numbers separated by periods, e.g. "208.87.129.176".
Information security
fromBusiness Matters
2 days ago

How Blockchain and Crypto Are Changing the Online Casino Industry

The online casino industry has always been driven by innovation, but no technological shift has been as transformative as the rise of blockchain and cryptocurrency. What started as an experimental payment method has now evolved into a powerful engine reshaping how players interact with gambling platforms. Even established brands like Win Olympia are adopting blockchain-driven features to stay ahead of the curve. From faster payments to unparalleled transparency, blockchain is not just enhancing the online casino experience-it is redefining it entirely.
Information security
Information security
fromThe Hacker News
1 day ago

Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More

Critical zero-day vulnerabilities in Apple and Google products and a .NET SOAPwn flaw are actively exploited; install updates and patch affected software immediately.
#cve-2025-55182
fromTheregister
1 day ago
Information security

React2Shell vuln exploited by China, Iran, Google warns

Multiple Chinese state-linked groups, Iran-associated actors, and criminals are exploiting React2Shell (CVE-2025-55182) to deploy backdoors, tunnelers, and cryptominers.
fromThe Hacker News
4 days ago
Information security

React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation

Critical CVE-2025-55182 enables unauthenticated remote code execution via unsafe deserialization in React Server Components, prompting CISA to require patching by December 12, 2025.
fromThe Hacker News
4 days ago
Information security

React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation

Information security
fromTheregister
1 day ago

Amazon security boss blames Russia's GRU for energy hacks

Russia's GRU used stolen credentials and compromised misconfigured AWS-hosted network devices to maintain persistent access to Western energy and critical infrastructure networks.
fromThe Hacker News
1 day ago

FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE

CVE-2025-61675 (CVSS score: 8.6) - Numerous authenticated SQL injection vulnerabilities impacting four unique endpoints (basestation, model, firmware, and custom extension) and 11 affected parameters that enable read and write access to the underlying SQL database CVE-2025-61678 (CVSS score: 8.6) - An authenticated arbitrary file upload vulnerability that allows an attacker to exploit the firmware upload endpoint to upload a PHP web shell after obtaining a valid PHPSESSID and run arbitrary commands to leak the contents of sensitive files (e.g., "/etc/passwd")
Information security
Information security
fromComputerWeekly.com
1 day ago

What is driving the rise of infostealer malware? | Computer Weekly

Infostealer malware increasingly breaches credentials and session data, enabling account takeover, MFA bypass, fraud, and resale, driven by lax corporate and personal device security.
fromZDNET
1 day ago

Still running Windows 10? Here's why that's a bad idea

Hundreds of millions of computers worldwide are still running Windows 10, months after the one-time king of PC operating systems officially passed its end-of-support deadline. If you're responsible for one of those machines and you aren't ready to upgrade to Windows 11, you can sign up today for an Extended Security Updates (ESU) subscription -- consumers can get those updates free through October 2026, as I explain here: How to get free Windows 10 security patches on your PC - from now to October 2026.
Information security
#cybersecurity
#volklocker
Information security
fromTechzine Global
1 day ago

Windows patch causes multiple Message Queuing errors

December 2025 Windows security updates changed MSMQ folder permissions, requiring write access and causing MSMQ queues, IIS sites, and applications to fail on affected systems.
fromThe Hacker News
1 day ago

A Browser Extension Risk Guide After the ShadyPanda Campaign

A threat group dubbed ShadyPanda spent seven years playing the long game, publishing or acquiring harmless extensions, letting them run clean for years to build trust and gain millions of installs, then suddenly flipping them into malware via silent updates. In total, about 4.3 million users installed these once-legitimate add-ons, which suddenly went rogue with spyware and backdoor capabilities. This tactic was essentially a browser extension supply-chain attack. The ShadyPanda operators even earned featured and verified badges in the official Chrome Web Store and Microsoft Edge Add-ons site for some extensions, reinforcing user confidence. Because extension updates happen automatically in the background, the attackers were able to push out malicious code without users noticing a thing.
Information security
Information security
fromForbes
1 day ago

The Web Security Questions You Aren't Asking (But Should Be)

Unconfigured email authentication (DKIM/DMARC) allows domain spoofing, damaging brand reputation and preventing legitimate email delivery.
#cyber-deception
fromIT Pro
1 day ago
Information security

The NCSC touts honeypots and 'cyber deception' tactics as the key to combating hackers - but they could 'lead to a false sense of security'

Cyber deception tools like honeypots can boost visibility, detect novel threats, and disrupt attackers but require clear strategy, outcome-based metrics, and standardized terminology.
fromTheregister
2 days ago
Information security

NCSC finds cyber deception tools work, if deployed right

Cyber-deception tools like honeypots and decoy accounts improve visibility and disrupt attackers when deployed with clear strategy, proper configuration, and ongoing maintenance.
fromIT Pro
1 day ago
Information security

The NCSC touts honeypots and 'cyber deception' tactics as the key to combating hackers - but they could 'lead to a false sense of security'

fromTheregister
1 day ago

JLR: Payroll data stolen in cybercrime that shook UK economy

Jaguar Land Rover (JLR) has reportedly told staff the cyber-raid that crippled its operations in August didn't just bring production to a screeching halt - it also walked off with the personal payroll data of thousands of employees. The breach, which was pegged as one of the most costly in UK history, includes bank account details, tax codes, and other sensitive data related to staff salaries, benefits, and former employees. In an email to both current employees and former employees, seen by The Telegraph, JLR wrote: "While investigating, we have unfortunately identified that there has been unauthorised access to some personal data we process in the context of employment and some information needed to administer payroll, benefits and staff schemes to employees and dependents. This includes data of ex-JLR team members that has been stored."
Information security
Information security
fromTheregister
1 day ago

Legal protection for ethical hacking is only the first step

The UK is reforming the Computer Misuse Act to protect legitimate cybersecurity research and address modern cybercrime and state-sponsored digital attacks.
Information security
fromArs Technica
1 day ago

Microsoft will finally kill obsolete cipher that has wreaked decades of havoc

Microsoft gradually deprecated RC4 over a decade, facing deep compatibility and selection-rule challenges, while Active Directory's unsalted, single-round MD4 enables Kerberoasting attacks.
Information security
fromComputerworld
1 day ago

Emerging cyber threats: How businesses can bolster their defenses

Enterprises must understand evolving cyber threats from AI, quantum computing, and emerging biotechnologies to protect data, infrastructure, and privacy.
Information security
fromThe Hacker News
1 day ago

Featured Chrome Browser Extension Caught Intercepting Millions of Users' AI Chats

Urban VPN Proxy extension silently captures AI chatbot prompts, responses, session metadata, and exfiltrates them to remote servers.
Information security
fromChannelPro
1 day ago

HackerOne eyes enterprise growth with double C-suite appointment

HackerOne appointed Stephanie Furfaro as CRO and Stacy Leidwinger as CMO to accelerate growth in threat exposure management and AI-native security offerings.
Information security
fromTechzine Global
1 day ago

Nutanix launches Distributed Sovereign Cloud for greater control and flexibility

Distributed Sovereign Cloud provides control, security, offline management, and flexible governance across clouds and dark sites without merely blocking access.
Information security
fromZDNET
2 days ago

Stop using your router's USB port - what PC experts recommend instead

Router USB ports often rely on outdated, unencrypted protocols like FTP, creating vulnerabilities that make using them unsafe and unsuitable for central storage.
fromThe Hacker News
3 days ago

CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks

Details of the six-year-old flaw were publicly shared by Cisco Talos in April 2019, describing it as an exploitable remote code execution vulnerability in the ACEManager "upload.cgi" function of Sierra Wireless AirLink ES450 firmware version 4.9.3. Talos reported the flaw to the Canadian company in December 2018. "This vulnerability exists in the file upload capability of templates within the AirLink 450," the company said. "When uploading template files, you can specify the name of the file that you are uploading."
Information security
fromWIRED
3 days ago

AI Toys for Kids Talk About Sex, Drugs, and Chinese Propaganda

Two people allegedly linked to China's infamous Salt Typhoon espionage hacking group seem to have previously received training through Cisco's prominent, long-running networking academy. Meanwhile, warnings are increasingly emerging from United States lawmakers in Congress that safeguards on expanded US wiretap powers have been failing, allowing US intelligence agencies to access more of Americans' data without adequate constraints. If you've been having trouble keeping track of all of the news and data coming out about infamous sex offender Jeffrey Epstein,
Information security
Information security
fromZDNET
3 days ago

Should you ever turn off Windows Security? It's tricky, but here's my rule of thumb

Windows Security can be temporarily or permanently disabled on Windows 11 Home and Pro, and creating a System Restore point is recommended before doing so.
Information security
fromTechzine Global
4 days ago

Three new vulnerabilities discovered in React Server Components

React Server Components have three new vulnerabilities—two DoS and one source-code leak—requiring immediate updates to patched versions.
fromTechzine Global
4 days ago

Vulnerability in Notepad++ updater exploited for malware

A security vulnerability in the Notepad++ update mechanism has been exploited to spread malicious code. What began as a report within the Notepad++ community at the end of October was later confirmed to be a structural weakness in the updater. Analysis by BleepingComputer shows that attackers were able to execute malware via this mechanism. Notepad++ has since released a fix in version 8.8.9.
Information security
fromTheregister
4 days ago

Microsoft RasMan 0-day gets an unofficial patch and exploit

A Microsoft zero-day vulnerability that allows an unprivileged user to crash the Windows Remote Access Connection Manager (RasMan) service now has a free, unofficial patch - with no word as to when Redmond plans to release an official one - along with a working exploit circulating online. Researchers from 0patch, the micropatching site, uncovered the denial-of-service (DoS) bug while investigating CVE-2025-59230, a Windows RasMan privilege escalation vulnerability that Redmond fixed in October, but not before attackers found and exploited the vulnerability.
Information security
Information security
fromThe Hacker News
4 days ago

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Four new phishing kits — BlackForce, GhostFrame, InboxPrime AI, and Spiderman — enable large-scale credential theft and MFA bypass using MitB and evasion techniques.
fromThe Hacker News
4 days ago

Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads

Cybersecurity researchers are calling attention to a new campaign that's leveraging GitHub-hosted Python repositories to distribute a previously undocumented JavaScript-based Remote Access Trojan (RAT) dubbed PyStoreRAT. "These repositories, often themed as development utilities or OSINT tools, contain only a few lines of code responsible for silently downloading a remote HTA file and executing it via 'mshta.exe,'" Morphisec researcher Yonatan Edri said in a report shared with The Hacker News.
Information security
Information security
fromThe Hacker News
4 days ago

CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog

CVE-2025-58360 is an unauthenticated XXE in OSGeo GeoServer being exploited in the wild; affected versions require immediate patching to prevent file access, SSRF, and DoS.
Information security
fromIT Pro
4 days ago

A concerning number of Log4j downloads are still vulnerable four years on

Over 13% of Log4j downloads remain vulnerable to Log4Shell, and most vulnerable open-source components are still downloaded despite available fixed versions.
Information security
fromTechCrunch
4 days ago

Google and Apple roll out emergency security updates after zero-day attacks | TechCrunch

Apple and Google issued security updates to patch actively exploited zero-day vulnerabilities tied to a likely government-backed hacking campaign targeting specific users.
#bug-bounty
fromTechzine Global
4 days ago

Why did so many security vendors abandon MITRE's stresstest?

This year, MITRE made headlines primarily because its leading vulnerability database was in danger of being discontinued. For years, another issue has been plaguing the American non-profit. The voluntary ATT&CK evaluations in which security players participate are no longer popular. Below, we explain why and what MITRE plans to do to turn the tide. This year's list of participants is particularly disappointing, not in terms of caliber, but in the length of its participant list.
Information security
fromwww.itpro.com
4 days ago

LastPass hit with ICO fine after 2022 data breach exposed 1.6 million users here's how the incident unfolded

LastPass failed customers and fell short on expectations that the company would employ robust measures to protect personal data. Password managers are a safe and effective tool for businesses and the public to manage their numerous login details and we continue to encourage their use, he said. However, as is clear from this incident, businesses offering these services should ensure that system access and use is restricted to ensure risks of attack are significantly reduced,
Information security
Information security
fromComputerWeekly.com
4 days ago

What lies in store for cyber security skills in 2026? | Computer Weekly

Security success depends on human governance and continuous adversarial validation of autonomous AI systems, not on tool automation alone.
fromTechCrunch
4 days ago

Exclusive: Home Depot exposed access to internal systems for a year, says researcher

When he tested the token, Zimmermann said that it granted access to hundreds of private Home Depot source code repositories hosted on GitHub and allowed the ability to modify their contents. The researcher said the keys allowed access to Home Depot's cloud infrastructure, including its order fulfillment and inventory management systems, and code development pipelines, among other systems. Home Depot has hosted much of its developer and engineering infrastructure on GitHub since 2015, according to a customer profile on GitHub's website.
Information security
fromComputerWeekly.com
4 days ago

Quantum risk to quantum readiness: A PQC roadmap | Computer Weekly

No one knows exactly when quantum computing will arrive, but accelerating progress is prompting security and IT leaders to recognise the potential risks. With near-weekly breakthroughs in large-scale quantum computing, and with regulators and large cyber security players treating the issue as urgent, quantum-driven threats are now starting to appear on boardroom agendas. So how do organisations begin implementing post-quantum cryptography (PQC)? In this article, I'll outline a roadmap to post-quantum readiness and highlight the most common pitfalls senior decision makers encounter along the way.
Information security
Information security
fromComputerWeekly.com
4 days ago

Streisand effect: Businesses that pay ransomware gangs are more likely to hit the headlines | Computer Weekly

Paying ransomware demands increases the likelihood of negative publicity compared with refusing to pay.
Information security
fromTheregister
4 days ago

US sues ex-Accenture manager over Army cloud security claims

A former Accenture manager is accused of misleading federal auditors about security compliance of an Army-used cloud platform, allegedly overstating FedRAMP High and IL4/IL5 compliance.
fromSecuritymagazine
5 days ago

2025 Corporate Security Job Market Shifts

It has been a turbulent and transformative period defined by sweeping shifts in both job seeker behavior and employer expectations. Across the U.S., a wave of public sector professionals entered the private job market following major government agency restructurings, layoffs, and early retirement programs. Many of these candidates with specialized skill sets found themselves needing to quickly translate their government experience into private-sector language, just as the hiring landscape itself was rapidly evolving.
Information security
Information security
fromAzure DevOps Blog
4 days ago

Retirement of Global Personal Access Tokens in Azure DevOps - Azure DevOps Blog

Azure DevOps global Personal Access Tokens (PATs) will be retired; migrate to organization-level authentication or Microsoft Entra short-lived tokens before Dec 1, 2026.
Information security
fromSecuritymagazine
5 days ago

Cost Center to Value Driver: How Physical Security Is Transforming

Physical security is shifting from a cost center to a proactive value driver, collaborating with departments and IT to improve resilience and drive outcomes.
Information security
fromThe Hacker News
4 days ago

Securing GenAI in the Browser: Policy, Isolation, and Data Controls That Actually Work

Secure GenAI by enforcing browser-level controls and policies that prevent sensitive data exposure while enabling productivity.
Information security
fromIrish Independent
4 days ago

The phone trick to stop scam '+44' robocalls - experts warn that answering them puts you on more criminal databases

Answering unknown +44 robocalls risks confirming live mobile numbers to scammers, enabling resale and targeted fraud; do not answer unfamiliar numbers.
fromwww.standard.co.uk
4 days ago

London cinema chain Curzon warns customer data including card digits may have been exposed in technical glitch

Curzon cinema has admitted a major app failure that left dozens of customers' personal details exposed to complete strangers. The upmarket cinema chain which runs 10 venues across London plus its Curzon Home Cinema streaming service said the error meant other users could see people's names, emails, phone numbers, dates of birth, profile photos and membership tiers. In some cases, even the last four digits of saved bank cards were visible.
Information security
Information security
fromWIRED
4 days ago

This Group Pays Bounties to Repair Broken Devices-Even if the Fix Breaks the Law

Developers reverse-engineered device DRM to enable repairs and Fulu paid bounties, but legal risk led some contributors to withhold public fixes.
Information security
fromThe Hacker News
5 days ago

Active Attacks Exploit Gladinet's Hard-Coded Keys for Unauthorized Access and Code Execution

Hard-coded cryptographic keys in Gladinet CentreStack/Triofox allow decryption or forging of access tickets, enabling access to web.config and potential ViewState deserialization leading to remote code execution.
Information security
fromThe Hacker News
5 days ago

Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks

A critical file-overwrite vulnerability (CVE-2025-8110, CVSS 8.7) in Gogs enables symlink-based arbitrary code execution and has been actively exploited across 700+ instances.
fromChannelPro
5 days ago

The hidden cost of MFT vulnerabilities

When Fortra disclosed CVE-2025-10035 in GoAnywhere MFT, security teams would have experienced a familiar sinking feeling. Another critical vulnerability. Another emergency patch cycle. Another race against ransomware operators. Yet, this latest maximum-severity flaw revealed something more troubling than a single vendor's coding error. It exposed the fundamental fragility of how organizations handle their most sensitive data transfers. Unfortunately, the numbers don't lie. According to our research, Managed File Transfer (MFT) platforms carry a sky-high risk score (4.72), outpacing nearly every other data transfer technology.
Information security
Information security
fromTheregister
5 days ago

Google fixes super-secret 8th Chrome 0-day

Google released an emergency Chrome update to fix an actively exploited high-severity zero-day tracked as 466192044; users should update immediately.
Information security
fromThe Hacker News
5 days ago

Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw

Update Chrome immediately to patch a high-severity, actively exploited vulnerability and multiple other zero-day and medium-severity flaws.
fromTechzine Global
5 days ago

Docker Hub contains treasure trove of 10,000+ images with exposed secrets

Nearly half of the exposed images contained five or more secrets each. Flare's November 2025 scan of Docker Hub found 10,456 container images with exposed keys across 205 distinct namespaces. After filtering for high and critical severity findings, researchers successfully identified 101 companies behind the leaks. The exposed credentials ranged from AI model access tokens to cloud infrastructure keys and database passwords.
Information security
Information security
fromForbes
5 days ago

Do Not Install These Microsoft Teams Or Google Meet Updates

Oyster backdoor is distributed via fake meeting app installers and SEO-poisoned search results, enabling persistent remote access and likely remaining active through 2026.
Information security
fromSecuritymagazine
6 days ago

The Most Dangerous 6 Weeks of the Year

Holiday distractions and routine business patterns create windows for attackers to spoof vendor payments by altering bank details, leading to costly undetected invoice fraud.
Information security
fromSecuritymagazine
6 days ago

The Most Dangerous 6 Weeks of the Year

Holiday distractions and year-end transaction surges create ideal cover for attackers to alter routine vendor or payment details and bypass verification, causing costly fraud.
Information security
fromThe Hacker News
5 days ago

WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor

WIRTE (tracked as Ashen Lepus) conducts persistent espionage and destructive operations across Middle Eastern governments using the AshTag malware suite and SameCoin wiper.
Information security
fromThe Hacker News
5 days ago

NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems

NANOREMOTE is a Windows backdoor that uses the Google Drive API for stealthy C2, file transfer, and payload staging while sharing code with FINALDRAFT.
Information security
fromInfoWorld
5 days ago

Did your npm pipeline break today? Check your 'classic' tokens

Transitioning to tokenless OIDC and rotating granular tokens creates extra work for organizations and leaves MFA gaps that increase risk of package and account compromise.
Information security
fromIT Pro
5 days ago

Researchers claim Salt Typhoon masterminds learned their trade at Cisco Network Academy

Two former Cisco Network Academy trainees allegedly used insider product knowledge to help Salt Typhoon conduct large-scale telecom espionage, intercepting unencrypted calls and texts.
[ Load more ]