#cybersecurity

[ follow ]
#supply-chain-attack
Information security
fromSecurityWeek
1 hour ago

Government, Scientific Entities Hit via Daemon Tools Supply Chain Attack

A sophisticated supply chain attack targets organizations through malicious code in Daemon Tools software, affecting multiple countries and sectors.
Information security
fromThe Hacker News
16 hours ago

DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware

A supply chain attack on DAEMON Tools has compromised installers to deliver malicious payloads, affecting users globally since April 2026.
Information security
fromSecurityWeek
1 hour ago

Government, Scientific Entities Hit via Daemon Tools Supply Chain Attack

A sophisticated supply chain attack targets organizations through malicious code in Daemon Tools software, affecting multiple countries and sectors.
Information security
fromThe Hacker News
16 hours ago

DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware

A supply chain attack on DAEMON Tools has compromised installers to deliver malicious payloads, affecting users globally since April 2026.
Artificial intelligence
fromExchangewire
1 hour ago

Digest: US Rethinks AI Safety Stance; Omnicom Data Chief Steps Down; Image AI Models Outpace Chatbots in App Growth

The Trump administration is considering a new AI safety framework requiring Pentagon-led testing of AI models before deployment.
Information security
fromThe Hacker News
2 hours ago

Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution

A critical buffer overflow vulnerability in Palo Alto Networks' PAN-OS allows unauthenticated remote code execution, affecting specific firewall versions.
#vulnerability
Information security
fromSecurityWeek
4 hours ago

Palo Alto Networks to Patch Zero-Day Exploited to Hack Firewalls

Palo Alto Networks is addressing a critical zero-day vulnerability in PAN-OS affecting certain firewall models, allowing unauthorized code execution.
Information security
fromThe Hacker News
1 day ago

Critical cPanel Vulnerability Weaponized to Target Government and MSP Networks

A new threat actor targets Southeast Asian government and military entities by exploiting a critical cPanel vulnerability.
Information security
fromSecurityWeek
4 hours ago

Palo Alto Networks to Patch Zero-Day Exploited to Hack Firewalls

Palo Alto Networks is addressing a critical zero-day vulnerability in PAN-OS affecting certain firewall models, allowing unauthorized code execution.
Information security
fromThe Hacker News
1 day ago

Critical cPanel Vulnerability Weaponized to Target Government and MSP Networks

A new threat actor targets Southeast Asian government and military entities by exploiting a critical cPanel vulnerability.
#ai
Information security
fromTheregister
7 hours ago

India orders infosec red alert in case Mythos sparks crime

India's Securities and Exchange Board urges immediate review of information security systems due to potential risks from AI-driven vulnerability identification tools.
Information security
fromFortune
14 hours ago

Jamie Dimon and Dario Amodei sidestep question about whether the AI cyber 'freakout' is warranted | Fortune

AI-enabled cyberattacks pose significant risks, with industry leaders acknowledging the potential dangers while discussing preparedness and solutions.
Information security
fromTheregister
1 day ago

Singapore boffins get diverse SIEMs singing in harmony

A new technique translates security rules across multiple SIEMs, simplifying cyber-defense for organizations with diverse systems.
EU data protection
fromTNW | Eu
1 day ago

Why the EU is now demanding access to Anthropic's Mythos

Anthropic's Mythos AI model can identify zero-day vulnerabilities, raising geopolitical concerns and prompting discussions among European finance ministers.
Information security
fromTheregister
7 hours ago

India orders infosec red alert in case Mythos sparks crime

India's Securities and Exchange Board urges immediate review of information security systems due to potential risks from AI-driven vulnerability identification tools.
Information security
fromFortune
14 hours ago

Jamie Dimon and Dario Amodei sidestep question about whether the AI cyber 'freakout' is warranted | Fortune

AI-enabled cyberattacks pose significant risks, with industry leaders acknowledging the potential dangers while discussing preparedness and solutions.
Information security
fromTheregister
1 day ago

Singapore boffins get diverse SIEMs singing in harmony

A new technique translates security rules across multiple SIEMs, simplifying cyber-defense for organizations with diverse systems.
EU data protection
fromTNW | Eu
1 day ago

Why the EU is now demanding access to Anthropic's Mythos

Anthropic's Mythos AI model can identify zero-day vulnerabilities, raising geopolitical concerns and prompting discussions among European finance ministers.
#phishing
Information security
fromEntrepreneur
16 hours ago

Why Trained Employees Are Still Falling for Phishing Attacks

AI-generated phishing messages are increasingly sophisticated, making them harder to detect and leading employees to fall for them despite training.
Information security
fromThe Hacker News
1 day ago

Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM Tools

An active phishing campaign using legitimate RMM software has targeted over 80 organizations since April 2025, enabling persistent remote access.
Information security
fromSecurityWeek
3 days ago

New Bluekit Phishing Kit Features AI Assistant

Bluekit is a sophisticated phishing kit with AI capabilities, automated domain registration, and extensive templates for various online services.
Information security
fromEntrepreneur
16 hours ago

Why Trained Employees Are Still Falling for Phishing Attacks

AI-generated phishing messages are increasingly sophisticated, making them harder to detect and leading employees to fall for them despite training.
Information security
fromThe Hacker News
1 day ago

Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM Tools

An active phishing campaign using legitimate RMM software has targeted over 80 organizations since April 2025, enabling persistent remote access.
Information security
fromSecurityWeek
3 days ago

New Bluekit Phishing Kit Features AI Assistant

Bluekit is a sophisticated phishing kit with AI capabilities, automated domain registration, and extensive templates for various online services.
Information security
fromEntrepreneur
15 hours ago

How AI Agents Are Creating a New Kind of Security Risk

Autonomous agents increase organizational attack surfaces by accessing sensitive data without human oversight or adequate security controls.
#malware
Information security
fromArs Technica
13 hours ago

Widely used Daemon Tools disk app backdoored in monthlong supply-chain attack

A minimalistic backdoor and a complex backdoor called QUIC RAT were identified in targeted attacks on various organizations.
Information security
fromTechCrunch
18 hours ago

Kaspersky suspects Chinese hackers planted a backdoor into Daemon Tools in 'widespread' attack | TechCrunch

A backdoor in Daemon Tools has been identified, allowing hackers to target thousands of Windows computers and plant additional malware.
Information security
fromComputerworld
22 hours ago

Stealthy malware abuses Microsoft Phone Link to siphon SMS OTPs from enterprise PCs

A new .NET trojan and Pheno plugin exploit Microsoft's Phone Link to capture mobile authentication codes from Windows systems without compromising phones.
Information security
fromSecurityWeek
4 days ago

Sophisticated Deep#Door Backdoor Enables Espionage, Disruption

A new Python-based backdoor framework, Deep#Door, enables persistent remote command execution and surveillance on Windows systems.
Information security
fromArs Technica
13 hours ago

Widely used Daemon Tools disk app backdoored in monthlong supply-chain attack

A minimalistic backdoor and a complex backdoor called QUIC RAT were identified in targeted attacks on various organizations.
Information security
fromTechCrunch
18 hours ago

Kaspersky suspects Chinese hackers planted a backdoor into Daemon Tools in 'widespread' attack | TechCrunch

A backdoor in Daemon Tools has been identified, allowing hackers to target thousands of Windows computers and plant additional malware.
Information security
fromComputerworld
22 hours ago

Stealthy malware abuses Microsoft Phone Link to siphon SMS OTPs from enterprise PCs

A new .NET trojan and Pheno plugin exploit Microsoft's Phone Link to capture mobile authentication codes from Windows systems without compromising phones.
Information security
fromSecurityWeek
4 days ago

Sophisticated Deep#Door Backdoor Enables Espionage, Disruption

A new Python-based backdoor framework, Deep#Door, enables persistent remote command execution and surveillance on Windows systems.
Privacy professionals
fromNextgov.com
15 hours ago

10 years after OPM data breach, identity protection benefits for affected feds start to expire

Identity theft protection services for federal workers affected by the 2015 OPM breach are expiring, marking the end of a decade-long federal response.
Washington DC
fromNextgov.com
15 hours ago

Trump admin floats policy language limiting contractor say on agency uses of technology

The federal government is drafting policies to clarify its control over private sector technology use without external stipulations.
Digital life
fromAbove the Law
17 hours ago

Your Clients Have Estate Plans. Their Digital Lives Probably Don't. - Above the Law

Digital assets require careful planning in estate management to prevent financial disruption and loss of important data for families after death.
#cisa
Information security
fromNextgov.com
17 hours ago

CISA unveils CI Fortify to help secure critical infrastructure during conflicts

CISA launched the CI Fortify project to help critical infrastructure defend against hackers and ensure continuity during geopolitical conflicts.
Information security
fromNextgov.com
17 hours ago

CISA unveils CI Fortify to help secure critical infrastructure during conflicts

CISA launched the CI Fortify project to help critical infrastructure defend against hackers and ensure continuity during geopolitical conflicts.
Privacy professionals
fromSecuritymagazine
1 day ago

Exclusive: What the Celebrity Stalkerware Breach Means for Executive Protection

A data exposure involving stalkerware targeted a celebrity, revealing sensitive information and highlighting risks for executives using personal devices for business.
Information security
fromThe Hacker News
17 hours ago

China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across Regions

A China-nexus APT group, UAT-8302, targets government entities in South America and southeastern Europe using advanced malware like NosyDoor.
#linux
Information security
fromThe Hacker News
3 days ago

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

A critical Linux vulnerability allows unprivileged users to gain root access, impacting various distributions and requiring immediate patching.
Information security
fromThe Hacker News
3 days ago

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

A critical Linux vulnerability allows unprivileged users to gain root access, impacting various distributions and requiring immediate patching.
#data-breach
fromTechCrunch
19 hours ago
Privacy professionals

Hackers steal students' data during breach at education tech giant Instructure | TechCrunch

Information security
fromFast Company
1 day ago

Your architecture is the ceiling on your AI strategy. Here's how to raise it in 90 days

A data breach at Vercel occurred due to an employee's use of a compromised AI tool, highlighting risks in legacy architectures for AI deployment.
Privacy professionals
fromTechCrunch
19 hours ago

Hackers steal students' data during breach at education tech giant Instructure | TechCrunch

Instructure confirmed a data breach involving students' private information, claimed by the hacking group ShinyHunters.
Information security
fromTechzine Global
1 day ago

Trellix reports data breach following unauthorized access to source code repository

Unauthorized access to Trellix's source code repository has been confirmed, prompting an investigation with external forensics support.
Information security
fromFast Company
1 day ago

Your architecture is the ceiling on your AI strategy. Here's how to raise it in 90 days

A data breach at Vercel occurred due to an employee's use of a compromised AI tool, highlighting risks in legacy architectures for AI deployment.
Information security
fromSecurityWeek
1 day ago

Trellix Source Code Repository Breached

Trellix experienced a breach of its source code repository but found no evidence of exploitation or impact on its source code distribution process.
Information security
fromTechRepublic
1 day ago

Canvas Breach May Put 275M Users, 9,000 Schools at Risk

Instructure confirmed a Canvas breach affecting user information and messages, with hackers claiming 275 million users and nearly 9,000 schools impacted.
Information security
fromThe Hacker News
20 hours ago

The Back Door Attackers Know About - and Most Security Teams Still Haven't Closed

OAuth tokens persist without expiration, creating significant security risks that many organizations fail to monitor effectively.
Information security
fromSecurityWeek
20 hours ago

Critical Bug Could Expose 300,000 Ollama Deployments to Information Theft

Ollama deployments are vulnerable to sensitive information theft due to a critical unauthenticated vulnerability affecting approximately 300,000 servers.
Information security
fromTechzine Global
22 hours ago

Popular Daemon Tools utility exploited in supply chain attack

Daemon Tools' official website is distributing trojanized installers, enabling a supply chain attack with remote control capabilities since April 8th.
#ai-governance
Information security
fromZDNET
23 hours ago

Trojan abuses Microsoft Phone Link app to steal your passwords

CloudZ Trojan targets Microsoft Phone Link to steal sensitive information through a plugin, posing a significant threat to users.
Information security
fromSecurityWeek
1 day ago

MetInfo, Weaver E-cology Vulnerabilities in Attackers' Crosshairs

Threat actors exploit critical vulnerabilities in MetInfo and Weaver E-cology for remote code execution without authentication.
#north-korea
Information security
fromThe Hacker News
23 hours ago

ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows

A North Korea-aligned hacking group compromised a gaming platform to target ethnic Koreans in China using a backdoor called BirdCall.
Information security
fromThe Hacker News
23 hours ago

ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows

A North Korea-aligned hacking group compromised a gaming platform to target ethnic Koreans in China using a backdoor called BirdCall.
Healthcare
fromTheregister
1 day ago

NHS to close-source GitHub repos over AI, security concerns

NHS is temporarily privatizing open source projects due to AI-related cybersecurity concerns.
Information security
fromThe Hacker News
1 day ago

Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries

A large-scale credential theft campaign targeted over 35,000 users using legitimate email services and code of conduct-themed lures.
#eu
Europe politics
fromwww.theguardian.com
2 days ago

EU forging closer ties with Armenia as it sends experts to help counter Russian interference

The EU is deploying experts to Armenia to combat Russian propaganda and support the country during a critical political period.
Europe politics
fromwww.theguardian.com
2 days ago

EU forging closer ties with Armenia as it sends experts to help counter Russian interference

The EU is deploying experts to Armenia to combat Russian propaganda and support the country during a critical political period.
#ai-security
Artificial intelligence
fromAxios
1 day ago

Trump administration considering safety review for new AI models

The White House is developing an AI security framework to assess vulnerabilities before public deployment of advanced AI models.
Information security
fromTechRepublic
1 day ago

Indirect Prompt Injection Is Now a Real-World AI Security Threat

AI agents are vulnerable to prompt injection attacks, leading to data breaches and security risks in enterprise systems.
Artificial intelligence
fromAxios
1 day ago

Trump administration considering safety review for new AI models

The White House is developing an AI security framework to assess vulnerabilities before public deployment of advanced AI models.
Information security
fromTechRepublic
1 day ago

Indirect Prompt Injection Is Now a Real-World AI Security Threat

AI agents are vulnerable to prompt injection attacks, leading to data breaches and security risks in enterprise systems.
Information security
fromNextgov.com
1 day ago

Operational technology providers are feeling 'annoyance' at exclusion from Anthropic's Mythos rollout, sources say

Operational technology providers seek access to Anthropic's Mythos model for cybersecurity, citing exclusion from initial rollout affecting critical infrastructure.
#ransomware
Information security
fromThe Hacker News
4 days ago

Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks

Two cybersecurity professionals were sentenced to four years for facilitating BlackCat ransomware attacks in 2023.
Information security
fromThe Hacker News
4 days ago

Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks

Two cybersecurity professionals were sentenced to four years for facilitating BlackCat ransomware attacks in 2023.
DevOps
fromZDNET
1 day ago

The future of IT service delivery is built on AI and automation

The traditional IT playbook is ineffective due to tool sprawl and operational inefficiencies, necessitating a more connected IT ecosystem.
#cpanel
Information security
fromTechCrunch
1 day ago

Hackers are still exploiting the cPanel bug to gain control of thousands of websites | TechCrunch

Hackers are actively exploiting a critical vulnerability in cPanel and WHM, affecting over 550,000 servers and leading to numerous compromises.
Information security
fromSecurityWeek
2 days ago

Over 40,000 Servers Compromised in Ongoing cPanel Exploitation

Over 40,000 servers have been compromised due to a critical cPanel zero-day vulnerability, CVE-2026-41940, allowing unauthorized administrative access.
Information security
fromTechCrunch
1 day ago

Hackers are still exploiting the cPanel bug to gain control of thousands of websites | TechCrunch

Hackers are actively exploiting a critical vulnerability in cPanel and WHM, affecting over 550,000 servers and leading to numerous compromises.
Information security
fromSecurityWeek
2 days ago

Over 40,000 Servers Compromised in Ongoing cPanel Exploitation

Over 40,000 servers have been compromised due to a critical cPanel zero-day vulnerability, CVE-2026-41940, allowing unauthorized administrative access.
Information security
fromThe Hacker News
1 day ago

Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE & More

Cyber attackers are increasingly exploiting vulnerabilities in SaaS environments, using sophisticated methods like vishing for data theft and control over systems.
Information security
fromInfoQ
2 days ago

Cloudflare Processes 10M+ Daily Insights with New Security Overview Dashboard

Cloudflare's new Security Overview dashboard consolidates security signals into actionable insights, prioritizing vulnerabilities for efficient risk management.
fromSecurityWeek
1 day ago

Cybersecurity M&A Roundup: 33 Deals Announced in April 2026

Airbus has entered into an agreement to acquire Quarkslab, a French cybersecurity company founded in 2011 with approximately 100 employees. The transaction is part of Airbus' broader strategy to build sovereign cybersecurity capabilities across Europe.
Information security
Information security
fromSecurityWeek
1 day ago

DigiCert Revokes Certificates After Support Portal Hack

DigiCert revoked certificates fraudulently obtained through a cyberattack targeting its support portal, affecting multiple customer accounts.
#cybercrime
Information security
fromThe Hacker News
1 day ago

2026: The Year of AI-Assisted Attacks

AI-assisted tools are enabling non-technical individuals to conduct sophisticated cybercrimes, significantly increasing the frequency and severity of attacks.
Information security
fromThe Hacker News
1 day ago

Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and Russia

A China-based cybercrime group is targeting organizations in Russia and India with a new malware called ABCDoor via phishing emails.
Information security
fromThe Hacker News
1 day ago

2026: The Year of AI-Assisted Attacks

AI-assisted tools are enabling non-technical individuals to conduct sophisticated cybercrimes, significantly increasing the frequency and severity of attacks.
Information security
fromThe Hacker News
1 day ago

Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and Russia

A China-based cybercrime group is targeting organizations in Russia and India with a new malware called ABCDoor via phishing emails.
#account-security
Privacy technologies
fromTechRepublic
4 days ago

OpenAI Introduces Password-Free Login for Millions of ChatGPT Users

OpenAI's Advanced Account Security replaces passwords with passkeys or security keys, enhancing protection against cyberattacks but limiting recovery options.
Privacy technologies
fromTechRepublic
4 days ago

OpenAI Introduces Password-Free Login for Millions of ChatGPT Users

OpenAI's Advanced Account Security replaces passwords with passkeys or security keys, enhancing protection against cyberattacks but limiting recovery options.
Business
fromwww.businessinsider.com
3 days ago

Berkshire Hathaway's first Q&A without Warren Buffett opened with a question from a deepfake Warren Buffett

Warren Buffett's likeness was used in a deepfake at Berkshire Hathaway's annual meeting to discuss the risks of cyberattacks and misinformation.
Privacy technologies
fromHarvard Gazette
4 days ago

Worried about how online firms use data they get from you? - Harvard Gazette

Keyring wallet allows users to verify identity while controlling personal information and reducing vulnerability to identity theft.
#ddos-attack
Information security
fromTechCrunch
4 days ago

Ubuntu services hit by outages after DDoS attack | TechCrunch

Hacktivists launched a DDoS attack on Ubuntu and Canonical, disrupting services and preventing users from updating the operating system.
Information security
fromTechCrunch
4 days ago

Ubuntu services hit by outages after DDoS attack | TechCrunch

Hacktivists launched a DDoS attack on Ubuntu and Canonical, disrupting services and preventing users from updating the operating system.
Information security
fromThe Hacker News
4 days ago

China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists

A new China-aligned espionage campaign targets government and defense sectors in Asia and Europe, exploiting vulnerabilities in Microsoft Exchange and IIS servers.
Information security
fromTechRepublic
5 days ago

New Global Scam Uses Fake Meeting Links to Run PowerShell Malware

BlueNoroff hackers exploit fake Zoom calls and fileless malware to steal credentials from Web3 and cryptocurrency organizations.
Information security
fromDeveloper Tech News
4 days ago

Open-source registries hit by 'Mini Shai-Hulud' supply chain attacks

The 'Mini Shai-Hulud' worm targets developer credentials across multiple ecosystems, exploiting vulnerabilities in popular packages to steal sensitive information.
Growth hacking
fromThe Hacker News
4 days ago

Top Five Sales Challenges Costing MSPs Cybersecurity Revenue

The managed security services market is set to grow significantly, but MSPs often fail to align technical expertise with business needs.
[ Load more ]