BleepingComputer May 12, 2026, 07:46 PM (UTC)
Read
IT teams often struggle to quickly coordinate responses across disparate systems during network incidents. This upcoming webinar explores how automation and AI-assisted workflows can reduce response times and help prevent outages. [...]
BleepingComputer May 12, 2026, 07:40 PM (UTC)
Read
Signal has introduced new in-app confirmations and warning messages as additional safeguards against phishing and social engineering attempts that could lead to various forms of fraud. [...]
BleepingComputer May 12, 2026, 06:58 PM (UTC)
Read
Microsoft has released the Windows 10 KB5087544 extended security update to fix the May 2026 Patch Tuesday vulnerabilities and resolve an issue with the new Remote Desktop warnings. [...]
BleepingComputer May 12, 2026, 06:23 PM (UTC)
Read
Fortinet has released security patches for two critical vulnerabilities in FortiSandbox and FortiAuthenticator that could enable attackers to run commands or arbitrary code. [...]
BleepingComputer May 12, 2026, 06:09 PM (UTC)
Read
Microsoft has released Windows 11 KB5089549 and KB5087420 cumulative updates for versions 25H2/24H2 and 23H2 to fix security vulnerabilities, bugs, and add new features. [...]
BleepingComputer May 12, 2026, 06:08 PM (UTC)
Read
Today is Microsoft's May 2026 Patch Tuesday, with security updates for 120 flaws and no zero-days disclosed this month. [...]
SecurityWeek May 12, 2026, 06:07 PM (UTC)
Read
Fresh security updates resolve critical flaws in Azure, Windows, Dynamics 365, and the SSO Plugin for Jira & Confluence. The post Microsoft Patches 137 Vulnerabilities appeared first on SecurityWeek.
SecurityWeek May 12, 2026, 05:23 PM (UTC)
Read
Exaforce has raised a total of $200 million and plans on using the latest investment for product development and international expansion. The post Exaforce Raises $125 Million for Agentic SOC Platform appeared first on SecurityWeek.
BleepingComputer May 12, 2026, 05:07 PM (UTC)
Read
Škoda Auto, a wholly owned subsidiary of the Volkswagen Group, has disclosed a data breach after attackers hacked its online shop and stole the personal information of an undisclosed number of customers. [...]
BleepingComputer May 12, 2026, 05:00 PM (UTC)
Read
Android 17, expected to roll out next month, will introduce several security and privacy features focused on device theft, threat detection, and banking scam calls. [...]
SecurityWeek May 12, 2026, 04:47 PM (UTC)
Read
While none of the flaws have been exploited in the wild, many of them could lead to arbitrary code execution. The post Adobe Patches 52 Vulnerabilities in 10 Products appeared first on SecurityWeek.
The Hacker News May 12, 2026, 04:44 PM (UTC)
Read
Exim has released security updates to address a severe security issue affecting certain configurations that could enable memory corruption and potential code execution. Exim is an open-source Mail Transfer Agent (MTA) designed for Unix-like systems to receive,…
SecurityWeek May 12, 2026, 03:40 PM (UTC)
Read
The startup will invest in accelerating product development, hiring new talent, and expanding its customer base. The post White Circle Raises $11 Million for AI Control Platform appeared first on SecurityWeek.
Infosecurity Magazine May 12, 2026, 03:15 PM (UTC)
Read
With Daybreak, OpenAI wants its frontier AI models to be used to deploy secure by design software from the ground up
The Hacker News May 12, 2026, 02:47 PM (UTC)
Read
RubyGems, the standard package manager for the Ruby programming language, has temporarily paused account sign ups following what has been described as a "major malicious attack." "We're dealing with a major malicious attack on Ruby Gems right now," Maciej Mens…
Infosecurity Magazine May 12, 2026, 02:45 PM (UTC)
Read
Mini Shai-Hulud compromises TanStack npm packages and spreads across PyPI
SecurityWeek May 12, 2026, 02:30 PM (UTC)
Read
Threat actors obtained names and contact information for an unspecified number of BWH Hotels guests. The post BWH Hotels Says Hackers Had Access to Reservation Data for 6 Months appeared first on SecurityWeek.
SecurityWeek May 12, 2026, 01:46 PM (UTC)
Read
CRPx0 is a complex, stealthy malware campaign that targets macOS and Windows systems, and appears to have Linux capabilities in development. The post Free OnlyFans Lure Used to Spread Cross-Platform CRPx0 Malware appeared first on SecurityWeek.
SecurityWeek May 12, 2026, 01:26 PM (UTC)
Read
The company that operates online learning system Canvas said it struck a deal with hackers to delete the data they pilfered in a cyberattack that created chaos for students, many of them in the middle of finals. The post Deal Reached With Hackers to Delete Dat…
Cybersecurity Ventures May 12, 2026, 01:01 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 12, 2026 – Watch the YouTube video The Women in Cybersecurity Report, a 7-minute video hosted by Cybercrime Magazine Deputy Editor Amanda Glassner, highlights the lates…
Infosecurity Magazine May 12, 2026, 01:00 PM (UTC)
Read
Apple begins rolling out end-to-end encrypted RCS messaging between iPhone and Android in iOS 26.5
SecurityWeek May 12, 2026, 12:59 PM (UTC)
Read
The company took systems offline globally after hackers exfiltrated data and deployed file-encrypting ransomware. The post West Pharmaceutical Services Hit by Disruptive Ransomware Attack appeared first on SecurityWeek.
The Hacker News May 12, 2026, 12:50 PM (UTC)
Read
Cybersecurity researchers have flagged a new version of the TrickMo Android banking trojan that uses The Open Network (TON) for command-and-control (C2). The new variant, observed by ThreatFabric between January and February 2026, has been observed actively ta…
SecurityWeek May 12, 2026, 12:37 PM (UTC)
Read
The tech giant has also ported the patch for a recent deleted chats recovery issue to older versions of iOS. The post Apple Patches Dozens of Vulnerabilities in macOS, iOS appeared first on SecurityWeek.
SecurityWeek May 12, 2026, 12:13 PM (UTC)
Read
The flaws could allow attackers to inject malicious code, leading to information disclosure and code execution. The post SAP Patches Critical S/4HANA, Commerce Vulnerabilities appeared first on SecurityWeek.
Infosecurity Magazine May 12, 2026, 12:00 PM (UTC)
Read
Exploitation of open-source tools allows attackers to maintain persistent access after initial social engineering, warn ReliaQuest researchers
The Hacker News May 12, 2026, 11:58 AM (UTC)
Read
Why do the Riskiest SOC Alerts Go Unanswered? Security operations teams are drowning in alerts. But the real problem isn't always alert volume; it's the blind spots. The most dangerous alerts are the ones no one is investigating. A recent report from The Hacke…
The Hacker News May 12, 2026, 11:46 AM (UTC)
Read
TeamPCP, the threat actor behind the recentsupply chain attack spree, has been linked to the compromise of the npm and PyPI packages from TanStack, UiPath, Mistral AI, OpenSearch, and Guardrails AI as part of a fresh Mini Shai-Hulud campaign. The affected npm…
BleepingComputer May 12, 2026, 11:29 AM (UTC)
Read
Hundreds of packages across npm and PyPI have been compromised in a new Shai-Hulud supply-chain campaign delivering credential-stealing malware targeting developers. [...]
BleepingComputer May 12, 2026, 11:04 AM (UTC)
Read
SAP has released the May 2026 security updates addressing 15 vulnerabilities across multiple products, including two critical flaws in the Commerce Cloud enterprise-grade e-commerce platform and the S/4HANA ERP suite. [...]
The Hacker News May 12, 2026, 10:30 AM (UTC)
Read
Agentic AI is already running in production environments across many organizations today. It is executing tasks, consuming data, and taking actions — most likely without meaningful involvement from the security team. The industry conversation has largely frame…
Infosecurity Magazine May 12, 2026, 09:30 AM (UTC)
Read
HiddenLayer reveals infostealer malware in a Hugging Face repository
BleepingComputer May 12, 2026, 09:23 AM (UTC)
Read
Instructure, the edtech giant behind the widely popular Canvas learning management system (LMS), has reached an "agreement" with the ShinyHunters extortion group to prevent the data stolen in a recent breach from being leaked online. [...]
Infosecurity Magazine May 12, 2026, 08:30 AM (UTC)
Read
The ICO has fined South Staffordshire Water nearly £1m for a series of data protection failings
The Hacker News May 12, 2026, 07:37 AM (UTC)
Read
American educational technology company Instructure, the parent company of Canvas, said it reached an "agreement" with a decentralized cybercrime extortion group after it breached its network and threatened to leak stolen information from thousands of schools…
The Hacker News May 12, 2026, 06:55 AM (UTC)
Read
OpenAI has launched Daybreak, a new cybersecurity initiative that brings together frontier artificial intelligence (AI) model capabilities and Codex Security to help organizations identify and patch vulnerabilities before attackers find a way in using the same…
The Hacker News May 12, 2026, 05:18 AM (UTC)
Read
Apple on Monday officially released iOS 26.5 with support for end-to-end encryption (E2EE) to Rich Communication Services (RCS) in beta as part of a "cross-industry effort" to replace traditional SMS with a more secure alternative. To that end, E2EE RCS messag…
BleepingComputer May 11, 2026, 10:40 PM (UTC)
Read
California Attorney General Rob Bonta announced a proposed $12.75 million settlement agreement with General Motors (GM) over allegations that the company violated the California Consumer Privacy Act (CCPA). [...]
BleepingComputer May 11, 2026, 10:03 PM (UTC)
Read
Checkmarx warned over the weekend that a rogue version of its Jenkins Application Security Testing (AST) plugin had been published on the Jenkins Marketplace. [...]
BleepingComputer May 11, 2026, 10:02 PM (UTC)
Read
A security researcher has released a proof-of-concept tool named GhostLock that demonstrates how a legitimate Windows file API can be abused in attacks to block access to files stored locally or on SMB network shares. [...]
The Hacker News May 11, 2026, 06:30 PM (UTC)
Read
Checkmarx has confirmed that a modified version of the Jenkins AST plugin was published to the Jenkins Marketplace. "If you are using Checkmarx Jenkins AST plugin, you need to ensure that you are using the version 2.0.13-829.vc72453fa_1c16 that was published o…
The Hacker News May 11, 2026, 05:54 PM (UTC)
Read
A threat actor named Mr_Rot13 has been attributed to the exploitation of a recently disclosed critical cPanel flaw to deploy a backdoor codenamed Filemanager on compromised environments. The attack exploits CVE-2026-41940, a vulnerability impacting cPanel and…
The Hacker News May 11, 2026, 03:45 PM (UTC)
Read
Google on Monday disclosed that it identified an unknown threat actor using a zero-day exploit that it said was likely developed with an artificial intelligence (AI) system, marking the first time the technology has been put to use in the wild in a malicious c…
BleepingComputer May 11, 2026, 03:26 PM (UTC)
Read
Education technology giant Instructure has confirmed that a security vulnerability allowed hackers to modify Canvas login portals and leave an extortion message. [...]
Infosecurity Magazine May 11, 2026, 03:15 PM (UTC)
Read
ThreatFabric finds new TrickMo Android banking trojan variant routing C2 through The Open Network
Infosecurity Magazine May 11, 2026, 02:30 PM (UTC)
Read
Two new high-severity vulnerabilities, dubbed ’Dirty Frag’ when chained, have been found in the Linux kernel, affecting most Linux distributions
Infosecurity Magazine May 11, 2026, 02:00 PM (UTC)
Read
Ontinue uncovers fake Claude Code installer pushing PowerShell stealer abusing Chrome's IElevator2
Infosecurity Magazine May 11, 2026, 01:00 PM (UTC)
Read
Google Threat Intelligence Group details how cybercriminals attempted to launch a campaign based around an AI-developed Zero-Day targeting open-source software
The Hacker News May 11, 2026, 12:36 PM (UTC)
Read
Rough Monday. Somebody poisoned a trusted download again, somebody else turned cloud servers into public housing, and a few crews are still getting into boxes with bugs that should’ve died years ago — the same old holes, same lazy access paths, same “how the h…
Cybersecurity Ventures May 11, 2026, 12:26 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 11, 2026 – Read the full story from Enterprise Times The 2026 CISO Report from Cybersecurity Ventures in partnership with Sophos points out a structural imbalance in cy…
The Hacker News May 11, 2026, 11:30 AM (UTC)
Read
Defending a network at 2 am looks a lot like this: an analyst copy-pasting a hash from a PDF into a SIEM query. A red team script is being rewritten by hand so the blue team can use it. A patch waiting on a change-approval window that's longer than the exploit…
Infosecurity Magazine May 11, 2026, 11:00 AM (UTC)
Read
The same extension applies to security updates shipped to US-based users of foreign-made drones
Infosecurity Magazine May 11, 2026, 10:05 AM (UTC)
Read
ShinyHunters has escalated its Canvas extortion campaign, defacing hundreds of school login pages and threatening to leak stolen data unless institutions negotiate
Infosecurity Magazine May 11, 2026, 09:00 AM (UTC)
Read
ShinyHunters gets away with emails and other data on 200,000 Zara customers
Infosecurity Magazine May 11, 2026, 08:15 AM (UTC)
Read
Spanish police have arrested the suspected administrator of German dark web marketplace Crimenetwork
The Hacker News May 11, 2026, 07:05 AM (UTC)
Read
A malicious Hugging Face repository managed to take a spot in the platform's trending list by impersonating OpenAI's Privacy Filter open-weight model to deliver a Rust-based information stealer to Windows users. The project, named Open-OSS/privacy-filter, masq…
The Hacker News May 10, 2026, 12:41 PM (UTC)
Read
Cybersecurity researchers have disclosed a critical security vulnerability in Ollama that, if successfully exploited, could allow a remote, unauthenticated attacker to leak its entire process memory. The out-of-bounds read flaw, which likely impacts over 300,0…
The Hacker News May 9, 2026, 07:16 AM (UTC)
Read
cPanel has released updates to address three vulnerabilities in cPanel and Web Host Manager (WHM) that could be exploited to achieve privilege escalation, code execution, and denial-of-service. The list of vulnerabilities is as follows - CVE-2026-29201 (CVSS s…
The Hacker News May 8, 2026, 06:12 PM (UTC)
Read
Threat hunters have flagged a previously undocumented Brazilian banking trojan dubbed TCLBANKER that's capable of targeting 59 banking, fintech, and cryptocurrency platforms. The activity is being tracked by Elastic Security Labs under the moniker REF3076. The…
The Hacker News May 8, 2026, 03:08 PM (UTC)
Read
Cybersecurity researchers have discovered fraudulent apps on the official Google Play Store for Android that falsely claimed to offer access to call histories for any phone number, only to trick users into joining a subscription that provided fake data and inc…
Cybersecurity Ventures May 8, 2026, 02:09 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 8, 2026 – Read the full story from United States Cybersecurity Institute Personal legal liability, expanding scope, and constrained budgets have driven experienced prof…
The Hacker News May 8, 2026, 02:01 PM (UTC)
Read
The hardest part of cybersecurity isn't the technology, it’s the people. Every major breach you’ve read about lately usually starts the same way: one employee, one clever email, and one "Patient Zero" infection. In 2026, hackers are using AI to make these "fir…
The Hacker News May 8, 2026, 11:00 AM (UTC)
Read
A previously undocumented Linux implant codenamed Quasar Linux RAT (QLNX) is targeting developers' systems to establish a silent foothold as well as facilitate a broad range of post-compromise functionality, such as credential harvesting, keylogging, file mani…
Infosecurity Magazine May 8, 2026, 11:00 AM (UTC)
Read
ACSC warns over a campaign targeting organizations which uses ClickFix to deliver Vidar infostealer malware
The Hacker News May 8, 2026, 10:30 AM (UTC)
Read
The dark secret of enterprise security operations is that defenders have quietly institutionalized the practice of not looking. This is not just anecdotal, but rather backed by a recent report investigating more than 25 million security alerts, including infor…
Infosecurity Magazine May 8, 2026, 09:00 AM (UTC)
Read
SentinelOne believes the PCPJack campaign may be the brainchild of a former TeamPCP member
The Hacker News May 8, 2026, 08:41 AM (UTC)
Read
Cybersecurity researchers have disclosed details of a new Linux backdoor named PamDOORa that's being advertised on the Rehub Russian cybercrime forum for $1,600 by a threat actor called "darkworm." The backdoor is designed as a Pluggable Authentication Module…
The Hacker News May 8, 2026, 05:12 AM (UTC)
Read
Details have emerged about a new, unpatched local privilege escalation (LPE) vulnerability impacting the Linux kernel. Dubbed Dirty Frag, it has been described as a successor to Copy Fail (CVE-2026-31431, CVSS score: 7.8), a recently disclosed LPE flaw impacti…
Krebs on Security May 8, 2026, 02:58 AM (UTC)
Read
An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States today, after a cybercrime group defaced the service's login page with…
The Hacker News May 7, 2026, 05:55 PM (UTC)
Read
Ivanti is warning that a new security flaw impacting Endpoint Manager Mobile (EPMM) has been explored in limited attacks in the wild. The high-severity vulnerability, CVE-2026-6973 (CVSS score: 7.2), is a case of improper input validation affecting EPMM before…
The Hacker News May 7, 2026, 05:45 PM (UTC)
Read
Cybersecurity researchers have disclosed details of a new credential theft framework dubbed PCPJack that targets exposed cloud infrastructure and ousts any artifacts linked to TeamPCP from the environments. "The toolset harvests credentials from cloud, contain…
Infosecurity Magazine May 7, 2026, 02:50 PM (UTC)
Read
Traditional network security tools are undermining data protection, with Forrester and Capital One Software research warning AI adoption is impossible without rethinking data security
Infosecurity Magazine May 7, 2026, 02:30 PM (UTC)
Read
Oasis Security finds critical Cline kanban WebSocket flaw exposing AI coding agents to hijack
Infosecurity Magazine May 7, 2026, 02:00 PM (UTC)
Read
Commercial AI models were used to help plan and conduct cyber-attack against operational technology of a water and drainage facility, say researchers
The Hacker News May 7, 2026, 01:34 PM (UTC)
Read
Palo Alto Networks has disclosed that threat actors may have attempted to unsuccessfully exploit a recently disclosed critical security flaw as early as April 9, 2026. The vulnerability in question is CVE-2026-0300 (CVSS score: 9.3/8.7), a buffer overflow vuln…
Infosecurity Magazine May 7, 2026, 01:15 PM (UTC)
Read
Sophos finds fake Claude site spreading DonutLoader and a new Beagle backdoor via DLL sideloading
Cybersecurity Ventures May 7, 2026, 12:36 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 7, 2026 – Watch the YouTube video Cybercrime Magazine visited the Long Island Museum in Stony Brook, N.Y., and explored the most complete collection of Apple computers…
The Hacker News May 7, 2026, 11:33 AM (UTC)
Read
Bad week. Turns out the easiest way to get hacked in 2026 is still the same old garbage: shady packages, fake apps, forgotten DNS junk, scam ads, and stolen logins getting dumped into Discord channels like it’s normal. Some of these attack chains don’t even fe…
The Hacker News May 7, 2026, 10:54 AM (UTC)
Read
Having an incident response retainer, or even a pre-approved external incident response firm, is not the same as being ready for an incident. A retainer means someone will answer the phone. Operational readiness determines whether that team can do meaningful w…
Infosecurity Magazine May 7, 2026, 09:30 AM (UTC)
Read
A China-linked threat actor backdoored a version of Daemon Tools to infect thousands
The Hacker News May 7, 2026, 09:20 AM (UTC)
Read
Cybersecurity researchers have discovered three packages on the Python Package Index (PyPI) repository that are designed to stealthily deliver a previously unknown malware family called ZiChatBot on Windows and Linux systems. "While these wheel packages do imp…
Infosecurity Magazine May 7, 2026, 08:30 AM (UTC)
Read
Cofense has warned of a “significant” increase in phishing campaigns abusing Vercel platform
The Hacker News May 7, 2026, 04:15 AM (UTC)
Read
A dozen critical security vulnerabilities have been disclosed in the vm2 Node.js library that could be exploited by bad actors to break out of the sandbox and execute arbitrary code on susceptible systems. vm2 is an open-source library used to run untrusted Ja…
The Hacker News May 6, 2026, 08:21 PM (UTC)
Read
Cybersecurity researchers have exposed a new Mirai-derived botnet that self-identifies as xlabs_v1 and targets internet-exposed devices running Android Debug Bridge (ADB) to enlist them in a network capable of carrying out distributed denial-of-service (DDoS)…
Infosecurity Magazine May 6, 2026, 03:00 PM (UTC)
Read
Cisco Talos uncovers CloudZ RAT and Pheno plugin abusing Microsoft Phone Link to intercept SMS OTPs
Infosecurity Magazine May 6, 2026, 01:15 PM (UTC)
Read
CISA’s CI Fortify initiative aim for critical infrastructure operators to build isolation & recovery
The Hacker News May 6, 2026, 01:00 PM (UTC)
Read
The Iranian state-sponsored hacking group known as MuddyWater (aka Mango Sandstorm, Seedworm, and Static Kitten) has been attributed to a ransomware attack in what has been described as a "false flag" operation. The attack, observed by Rapid7 in early 2026, ha…
Infosecurity Magazine May 6, 2026, 01:00 PM (UTC)
Read
Rapid7 reveals an Iranian false flag operation masquerading as a Chaos ransomware attack
Cybersecurity Ventures May 6, 2026, 12:49 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 6, 2026 – Read the full story from BreachLock When Anthropic’s Mythos demonstrated it could autonomously surface critical software flaws that went undetected for decade…
The Hacker News May 6, 2026, 12:03 PM (UTC)
Read
For nearly 20 years, we at The Hacker News have mostly told scary stories about cyberspace — big hacks, broken systems, and new threats. But behind every headline, there’s a quieter, better story. It’s the story of leaders making tough calls under pressure, te…
The Hacker News May 6, 2026, 10:57 AM (UTC)
Read
Analysts recently confirmed what identity security teams have quietly feared: AI agents are being deployed faster than enterprises can govern them. In their inaugural Market Guide for Guardian Agents, Gartner states that “enterprise adoption of AI agents is ac…
The Hacker News May 6, 2026, 09:13 AM (UTC)
Read
Google has announced expanded Binary Transparency for Android as a way to safeguard the ecosystem from supply chain attacks. "This new public ledger ensures the Google apps on your device are exactly what we intended to build and distribute," Google's product…
Infosecurity Magazine May 6, 2026, 08:40 AM (UTC)
Read
Cifas says that 13% of employees admit selling company credentials to a former colleague
The Hacker News May 6, 2026, 08:34 AM (UTC)
Read
Cybersecurity researchers have disclosed details of an intrusion that involved the use of a CloudZ remote access tool (RAT) and a previous undocumented plugin dubbed Pheno with the aim of facilitating credential theft. "According to the functionalities of the…
The Hacker News May 6, 2026, 06:14 AM (UTC)
Read
Palo Alto Networks has released an advisory warning that a critical buffer overflow vulnerability in its PAN-OS software has been exploited in the wild. The vulnerability, tracked as CVE-2026-0300, has been described as a case of unauthenticated remote code ex…
The Hacker News May 5, 2026, 04:19 PM (UTC)
Read
The Apache Software Foundation (ASF) has released security updates to address several security vulnerabilities in the HTTP Server, including a severe vulnerability that could potentially lead to remote code execution (RCE). The vulnerability, tracked as CVE-20…
The Hacker News May 5, 2026, 04:07 PM (UTC)
Read
A newly identified supply chain attack targeting DAEMON Tools software has compromised its installers to serve a malicious payload, according to findings from Kaspersky. "These installers are distributed from the legitimate website of DAEMON Tools and are sign…
Infosecurity Magazine May 5, 2026, 04:00 PM (UTC)
Read
Microsoft researchers warn of a large-scale phishing campaign using fake compliance emails to steal credentials, targeting 35,000 users across 13,000 organizations worldwide
Infosecurity Magazine May 5, 2026, 03:00 PM (UTC)
Read
ESET warns that North Korean hackers compromised a Yanbian gaming site in a supply‑chain attack, trojanizing Windows and Android software to spy on users
The Hacker News May 5, 2026, 02:19 PM (UTC)
Read
A sophisticated China-nexus advanced persistent threat (APT) group has been attributed to attacks targeting government entities in South America since at least late 2024 and government agencies in southeastern Europe in 2025. The activity is being tracked by C…
Infosecurity Magazine May 5, 2026, 02:00 PM (UTC)
Read
Venomous#Helper attackers impersonate the US Social Security Administration to deploy signed RMM software and maintain persistent access across US networks
Cybersecurity Ventures May 5, 2026, 12:46 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 5, 2026 – Watch the YouTube video SOC teams are overwhelmed by the volume of threat alerts they must manage. A Forrester analysis found that just three attack scenarios…
The Hacker News May 5, 2026, 11:58 AM (UTC)
Read
Every AI tool, workflow automation, and productivity app your employees connected to Google or Microsoft this year left something behind: a persistent OAuth token with no expiration date, no automatic cleanup, and in most organizations, no one watching it. You…
The Hacker News May 5, 2026, 11:56 AM (UTC)
Read
Threat actors are actively exploiting a critical security flaw impacting an open-source content management system (CMS) known as MetInfo, according to new findings from VulnCheck. The vulnerability in question is CVE-2026-29014 (CVSS score: 9.8), a code inject…
Infosecurity Magazine May 5, 2026, 11:10 AM (UTC)
Read
ISACA report warns that while AI has become the norm, many organizations are yet to formally apply safety or security policies around its use
The Hacker News May 5, 2026, 10:30 AM (UTC)
Read
While the software industry has made genuine strides over the past few decades to deliver products securely, the furious pace of AI adoption is putting that progress at risk. Businesses are moving fast to self-host LLM infrastructure, drawn by the promise of A…
Infosecurity Magazine May 5, 2026, 09:40 AM (UTC)
Read
The UK's National Cyber Security Centre is urging organizations to prepare for glut of new software updates
The Hacker News May 5, 2026, 09:07 AM (UTC)
Read
The North Korea-aligned state-sponsored hacking group known as ScarCruft has compromised a video game platform in a supply chain espionage attack, trojanizing its components with a backdoor called BirdCallto likely target ethnic Koreans residing in China. Whil…
Infosecurity Magazine May 5, 2026, 08:55 AM (UTC)
Read
Security vendor Trellix has suffered a breach involving unauthorized access
The Hacker News May 5, 2026, 07:37 AM (UTC)
Read
A critical security vulnerability in Weaver (Fanwei) E-cology, an enterprise office automation (OA) and collaboration platform, has come under active exploitation in the wild. The vulnerability (CVE-2026-22679, CVSS score: 9.8) relates to a case of unauthentic…
The Hacker News May 5, 2026, 06:35 AM (UTC)
Read
Microsoft has disclosed details of a large-scale credential theft campaign that has leveraged a combination of code of conduct-themed lures and legitimate email services to direct users to attacker-controlled domains and steal authentication tokens. The multi-…
The Hacker News May 4, 2026, 06:06 PM (UTC)
Read
An active phishing campaign has been observed targeting multiple vectors since at least April 2025 with legitimate Remote Monitoring and Management (RMM) software as a way to establish persistent remote access to compromised hosts. The activity, codenamed VENO…
The Hacker News May 4, 2026, 04:34 PM (UTC)
Read
Progress Software has released updates to address two security flaws in MOVEit Automation, including a critical bug that could result in an authentication bypass. MOVEit Automation (formerly Central) is a secure, server-based managed file transfer (MFT) soluti…
The Hacker News May 4, 2026, 02:23 PM (UTC)
Read
This week, the shadows moved faster than the patches. While most teams were still triaging last month’s alerts, attackers had already turned control panels into kill switches, kernels into open doors, and open-source pipelines into silent delivery systems. The…
Cybersecurity Ventures May 4, 2026, 12:30 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 4, 2026 – Watch the YouTube video Step into the future of cybersecurity at Black Hat USA 2026, Aug. 1-6, in Las Vegas. REGISTER Now & Save with the CODE: CYBERCRIME. Th…
Infosecurity Magazine May 4, 2026, 12:00 PM (UTC)
Read
Team Cymru’s Stephen Campbell warned that small US defense contractors are not well prepared to face cyber intrusions through edge devices
Infosecurity Magazine May 4, 2026, 08:00 AM (UTC)
Read
OpenAI announced its intention to expand the Trusted Access for Cyber program for cyber defenders at the federal, state and local government levels
Cybersecurity Ventures May 1, 2026, 12:43 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 1, 2026 – Listen to the podcast A quarter-century old article in The Wall Street Journal reported in 1998 that Serge Humpich, a 37-year-old (at the time) programmer app…
Infosecurity Magazine May 1, 2026, 12:00 PM (UTC)
Read
Claude Security enters public beta, giving enterprises AI driven code scanning with no API integration or custom agents required
Infosecurity Magazine May 1, 2026, 11:30 AM (UTC)
Read
The cybersecurity workers used their knowledge and skills to conduct ransomware attacks for notorious gang, rather than protect victims against them
Infosecurity Magazine May 1, 2026, 10:45 AM (UTC)
Read
A researcher from offensive security firm Theori has found a nine-year-old flaw in the Linux kernel with the help of AI
Infosecurity Magazine Apr 30, 2026, 04:00 PM (UTC)
Read
Suspects accused of distributing malware and selling access to stolen Roblox accounts on Russian marketplaces
Infosecurity Magazine Apr 30, 2026, 03:00 PM (UTC)
Read
Deep#Door Python RAT uses tunneling and obfuscation to evade detection and steal credentials
Krebs on Security Apr 30, 2026, 02:04 PM (UTC)
Read
A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazil, KrebsOnSecurity h…
Infosecurity Magazine Apr 30, 2026, 02:00 PM (UTC)
Read
A new CISA‑led guide explains how zero‑trust security can be applied to operational technology, balancing cyber defence with safety and system availability
Infosecurity Magazine Apr 30, 2026, 01:30 PM (UTC)
Read
The British public education sector has faced the nation’s most dramatic increase in cyber breach prevalence over the past year
Cybersecurity Ventures Apr 30, 2026, 12:50 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 30, 2026 – Watch the YouTube video Flock Safety, an Atlanta, Ga.-based surveillance company, is facing increasing community pushback as it secures contracts with law en…
Infosecurity Magazine Apr 30, 2026, 10:00 AM (UTC)
Read
European police arrested 10 suspects after dismantling Albanian scam call centers linked to a €50m ($58m) online investment fraud operation
Infosecurity Magazine Apr 30, 2026, 09:10 AM (UTC)
Read
Marsh’s 2026 People Risks survey finds cyber‑related challenges dominate, as cyber‑threat literacy tops risks and cyber and AI skills shortages rise
Infosecurity Magazine Apr 29, 2026, 03:00 PM (UTC)
Read
Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at LayerX
Infosecurity Magazine Apr 29, 2026, 02:00 PM (UTC)
Read
Researchers uncover a malicious npm dependency linked to an AI‑assisted code commit that steals sensitive data and exposes crypto wallets
Cybersecurity Ventures Apr 29, 2026, 01:14 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 29, 2026 – Watch the YouTube video Executive risk management has evolved far beyond physical protection and travel security. Today, the most pressing threats to leaders…
Infosecurity Magazine Apr 29, 2026, 01:00 PM (UTC)
Read
KELA claims infostealers remained the primary access vector for attacks in 2025
Infosecurity Magazine Apr 29, 2026, 10:45 AM (UTC)
Read
The Vect 2.0 ransomware wipes large files instead of merely encrypting them, making recovery impossible – even for the attackers
Infosecurity Magazine Apr 29, 2026, 10:05 AM (UTC)
Read
RunSafe report reveals most attacks on medical devices disrupt patient care