The Hacker News May 9, 2026, 07:16 AM (UTC)
Read
cPanel has released updates to address three vulnerabilities in cPanel and Web Host Manager (WHM) that could be exploited to achieve privilege escalation, code execution, and denial-of-service. The list of vulnerabilities is as follows - CVE-2026-29201 (CVSS s…
The Hacker News May 8, 2026, 06:12 PM (UTC)
Read
Threat hunters have flagged a previously undocumented Brazilian banking trojan dubbed TCLBANKER that's capable of targeting 59 banking, fintech, and cryptocurrency platforms. The activity is being tracked by Elastic Security Labs under the moniker REF3076. The…
BleepingComputer May 8, 2026, 04:18 PM (UTC)
Read
NVIDIA has confirmed in a statement for BleepingComputer that GeForce NOW user information has been exposed in a data breach. [...]
The Hacker News May 8, 2026, 03:08 PM (UTC)
Read
Cybersecurity researchers have discovered fraudulent apps on the official Google Play Store for Android that falsely claimed to offer access to call histories for any phone number, only to trick users into joining a subscription that provided fake data and inc…
SecurityWeek May 8, 2026, 02:30 PM (UTC)
Read
Other noteworthy stories that might have slipped under the radar: US gov targets 72-hour patch cycles, malware uses Windows Phone Link to steal OTPs, spy operation targets Eurasian drone industry. The post In Other News: Train Hacker Arrested, PamDOORa Linux B…
Cybersecurity Ventures May 8, 2026, 02:09 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 8, 2026 – Read the full story from United States Cybersecurity Institute Personal legal liability, expanding scope, and constrained budgets have driven experienced prof…
BleepingComputer May 8, 2026, 02:02 PM (UTC)
Read
Attackers move faster than overwhelmed SOC teams can realistically investigate alerts. Prophet Security breaks down how AI can help analysts investigate alerts faster and focus on real threats. [...]
The Hacker News May 8, 2026, 02:01 PM (UTC)
Read
The hardest part of cybersecurity isn't the technology, it’s the people. Every major breach you’ve read about lately usually starts the same way: one employee, one clever email, and one "Patient Zero" infection. In 2026, hackers are using AI to make these "fir…
BleepingComputer May 8, 2026, 01:23 PM (UTC)
Read
The attack on the Trellix source code repository disclosed last week has been claimed by the RansomHouse threat group, which leaked a small set of images as proof of the intrusion. [...]
BleepingComputer May 8, 2026, 12:16 PM (UTC)
Read
CISA has given U.S. federal agencies four days to secure their networks against a high-severity vulnerability in Ivanti Endpoint Manager Mobile (EPMM) exploited in zero-day attacks. [...]
SecurityWeek May 8, 2026, 11:46 AM (UTC)
Read
The hackers gained the ability to modify equipment operational parameters, creating a direct risk to the public water supply. The post Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants appeared first on SecurityWeek.
SecurityWeek May 8, 2026, 11:14 AM (UTC)
Read
Hackers accessed one of the company’s AWS accounts and compromised AI provider secrets stored in Braintrust. The post AI Firm Braintrust Prompts API Key Rotation After Data Breach appeared first on SecurityWeek.
The Hacker News May 8, 2026, 11:00 AM (UTC)
Read
A previously undocumented Linux implant codenamed Quasar Linux RAT (QLNX) is targeting developers' systems to establish a silent foothold as well as facilitate a broad range of post-compromise functionality, such as credential harvesting, keylogging, file mani…
Infosecurity Magazine May 8, 2026, 11:00 AM (UTC)
Read
ACSC warns over a campaign targeting organizations which uses ClickFix to deliver Vidar infostealer malware
SecurityWeek May 8, 2026, 10:43 AM (UTC)
Read
A system that thousands of schools and universities use went offline due to a cyberattack, creating chaos as students tried to study for finals. The post Cyberattack Hits Canvas System Used by Thousands of Schools as Finals Loom appeared first on SecurityWeek.
BleepingComputer May 8, 2026, 10:42 AM (UTC)
Read
Hackers who gained access to the databases of Spanish fast-fashion retailer Zara stole data belonging to more than 197,000 customers, according to data breach notification service Have I Been Pwned. [...]
The Hacker News May 8, 2026, 10:30 AM (UTC)
Read
The dark secret of enterprise security operations is that defenders have quietly institutionalized the practice of not looking. This is not just anecdotal, but rather backed by a recent report investigating more than 25 million security alerts, including infor…
Infosecurity Magazine May 8, 2026, 09:00 AM (UTC)
Read
SentinelOne believes the PCPJack campaign may be the brainchild of a former TeamPCP member
BleepingComputer May 8, 2026, 08:45 AM (UTC)
Read
A 34-year-old Virginia man was found guilty of conspiring to destroy dozens of government databases after getting fired from his job as a federal contractor. [...]
The Hacker News May 8, 2026, 08:41 AM (UTC)
Read
Cybersecurity researchers have disclosed details of a new Linux backdoor named PamDOORa that's being advertised on the Rehub Russian cybercrime forum for $1,600 by a threat actor called "darkworm." The backdoor is designed as a Pluggable Authentication Module…
SecurityWeek May 8, 2026, 08:32 AM (UTC)
Read
The malware framework targets web applications and cloud environments, including AWS, Docker, Kubernetes, and more. The post ‘PCPJack’ Worm Removes TeamPCP Infections, Steals Credentials appeared first on SecurityWeek.
SecurityWeek May 8, 2026, 07:58 AM (UTC)
Read
RansomHouse has published several screenshots to demonstrate access to internal Trellix services. The post Ransomware Group Takes Credit for Trellix Hack appeared first on SecurityWeek.
BleepingComputer May 8, 2026, 07:45 AM (UTC)
Read
A new Linux zero-day exploit, named Dirty Frag, allows local attackers to gain root privileges on most major Linux distributions with a single command. [...]
SecurityWeek May 8, 2026, 06:53 AM (UTC)
Read
Lax extension permissions and improper trust implementation allow attackers to inject prompts in the Claude Chrome extension. The post Vulnerability in Claude Extension for Chrome Exposes AI Agent to Takeover appeared first on SecurityWeek.
SecurityWeek May 8, 2026, 05:41 AM (UTC)
Read
CVE-2026-6973 is a high-severity vulnerability that allows an attacker who has admin privileges to execute arbitrary code. The post Ivanti Patches EPMM Zero-Day Exploited in Targeted Attacks appeared first on SecurityWeek.
The Hacker News May 8, 2026, 05:12 AM (UTC)
Read
Details have emerged about a new, unpatched local privilege escalation (LPE) vulnerability impacting the Linux kernel. Dubbed Dirty Frag, it has been described as a successor to Copy Fail (CVE-2026-31431, CVSS score: 7.8), a recently disclosed LPE flaw impacti…
Krebs on Security May 8, 2026, 02:58 AM (UTC)
Read
An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States today, after a cybercrime group defaced the service's login page with…
BleepingComputer May 7, 2026, 10:36 PM (UTC)
Read
The ShinyHunters extortion gang has breached education technology giant Instructure again, this time exploiting another vulnerability to deface Canvas login portals for hundreds of colleges and universities. [...]
BleepingComputer May 7, 2026, 10:06 PM (UTC)
Read
A new trojan named TCLBanker, which targets 59 banking, fintech, and cryptocurrency platforms, uses a trojanized MSI installer for Logitech AI Prompt Builder to infect systems. [...]
SecurityWeek May 7, 2026, 07:10 PM (UTC)
Read
Musk said that he could have founded OpenAI as a for-profit company, just like the other companies he started or took over. “I deliberately chose this,” he said, “for the public good.” The post Worries About AI’s Risks to Humanity Loom Over the Trial Pitting M…
BleepingComputer May 7, 2026, 06:35 PM (UTC)
Read
A new malware framework called PCPJack is stealing credentials from exposed cloud infrastructure while actively removing TeamPCP's access to the systems. [...]
BleepingComputer May 7, 2026, 06:00 PM (UTC)
Read
The Australian Cyber Security Center (ACSC) is warning organizations of an ongoing malware campaign using the ClickFix social engineering technique to distribute the Vidar Stealer info-stealing malware. [...]
The Hacker News May 7, 2026, 05:55 PM (UTC)
Read
Ivanti is warning that a new security flaw impacting Endpoint Manager Mobile (EPMM) has been explored in limited attacks in the wild. The high-severity vulnerability, CVE-2026-6973 (CVSS score: 7.2), is a case of improper input validation affecting EPMM before…
The Hacker News May 7, 2026, 05:45 PM (UTC)
Read
Cybersecurity researchers have disclosed details of a new credential theft framework dubbed PCPJack that targets exposed cloud infrastructure and ousts any artifacts linked to TeamPCP from the environments. "The toolset harvests credentials from cloud, contain…
SecurityWeek May 7, 2026, 03:31 PM (UTC)
Read
The cybersecurity firm has not explicitly accused China of being behind the attack, but the evidence suggests it was. The post Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State Hacking appeared first on SecurityWeek.
BleepingComputer May 7, 2026, 03:20 PM (UTC)
Read
Ivanti warned customers today to patch a high-severity remote code execution vulnerability in Endpoint Manager Mobile (EPMM) exploited in zero-day attacks. [...]
Infosecurity Magazine May 7, 2026, 02:50 PM (UTC)
Read
Traditional network security tools are undermining data protection, with Forrester and Capital One Software research warning AI adoption is impossible without rethinking data security
Infosecurity Magazine May 7, 2026, 02:30 PM (UTC)
Read
Oasis Security finds critical Cline kanban WebSocket flaw exposing AI coding agents to hijack
BleepingComputer May 7, 2026, 02:01 PM (UTC)
Read
Your security controls aren't failing, they're missing where most of today's work actually happens. Keep Aware shows how browser activity like copy/paste and AI prompts bypass traditional protections. [...]
Infosecurity Magazine May 7, 2026, 02:00 PM (UTC)
Read
Commercial AI models were used to help plan and conduct cyber-attack against operational technology of a water and drainage facility, say researchers
BleepingComputer May 7, 2026, 01:45 PM (UTC)
Read
Two U.S. nationals were sentenced to 18 months in prison each for operating so-called laptop farms that helped North Korean IT workers fraudulently obtain remote employment at nearly 70 American companies. [...]
The Hacker News May 7, 2026, 01:34 PM (UTC)
Read
Palo Alto Networks has disclosed that threat actors may have attempted to unsuccessfully exploit a recently disclosed critical security flaw as early as April 9, 2026. The vulnerability in question is CVE-2026-0300 (CVSS score: 9.3/8.7), a buffer overflow vuln…
Infosecurity Magazine May 7, 2026, 01:15 PM (UTC)
Read
Sophos finds fake Claude site spreading DonutLoader and a new Beagle backdoor via DLL sideloading
Cybersecurity Ventures May 7, 2026, 12:36 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 7, 2026 – Watch the YouTube video Cybercrime Magazine visited the Long Island Museum in Stony Brook, N.Y., and explored the most complete collection of Apple computers…
BleepingComputer May 7, 2026, 12:11 PM (UTC)
Read
A 20-year-old California man was sentenced to 78 months in prison for serving as a home invader and money launderer in a criminal ring that stole over $250 million in cryptocurrency. [...]
The Hacker News May 7, 2026, 11:33 AM (UTC)
Read
Bad week. Turns out the easiest way to get hacked in 2026 is still the same old garbage: shady packages, fake apps, forgotten DNS junk, scam ads, and stolen logins getting dumped into Discord channels like it’s normal. Some of these attack chains don’t even fe…
The Hacker News May 7, 2026, 10:54 AM (UTC)
Read
Having an incident response retainer, or even a pre-approved external incident response firm, is not the same as being ready for an incident. A retainer means someone will answer the phone. Operational readiness determines whether that team can do meaningful w…
Infosecurity Magazine May 7, 2026, 09:30 AM (UTC)
Read
A China-linked threat actor backdoored a version of Daemon Tools to infect thousands
The Hacker News May 7, 2026, 09:20 AM (UTC)
Read
Cybersecurity researchers have discovered three packages on the Python Package Index (PyPI) repository that are designed to stealthily deliver a previously unknown malware family called ZiChatBot on Windows and Linux systems. "While these wheel packages do imp…
Infosecurity Magazine May 7, 2026, 08:30 AM (UTC)
Read
Cofense has warned of a “significant” increase in phishing campaigns abusing Vercel platform
The Hacker News May 7, 2026, 04:15 AM (UTC)
Read
A dozen critical security vulnerabilities have been disclosed in the vm2 Node.js library that could be exploited by bad actors to break out of the sandbox and execute arbitrary code on susceptible systems. vm2 is an open-source library used to run untrusted Ja…
The Hacker News May 6, 2026, 08:21 PM (UTC)
Read
Cybersecurity researchers have exposed a new Mirai-derived botnet that self-identifies as xlabs_v1 and targets internet-exposed devices running Android Debug Bridge (ADB) to enlist them in a network capable of carrying out distributed denial-of-service (DDoS)…
Infosecurity Magazine May 6, 2026, 03:00 PM (UTC)
Read
Cisco Talos uncovers CloudZ RAT and Pheno plugin abusing Microsoft Phone Link to intercept SMS OTPs
Infosecurity Magazine May 6, 2026, 01:15 PM (UTC)
Read
CISA’s CI Fortify initiative aim for critical infrastructure operators to build isolation & recovery
The Hacker News May 6, 2026, 01:00 PM (UTC)
Read
The Iranian state-sponsored hacking group known as MuddyWater (aka Mango Sandstorm, Seedworm, and Static Kitten) has been attributed to a ransomware attack in what has been described as a "false flag" operation. The attack, observed by Rapid7 in early 2026, ha…
Infosecurity Magazine May 6, 2026, 01:00 PM (UTC)
Read
Rapid7 reveals an Iranian false flag operation masquerading as a Chaos ransomware attack
Cybersecurity Ventures May 6, 2026, 12:49 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 6, 2026 – Read the full story from BreachLock When Anthropic’s Mythos demonstrated it could autonomously surface critical software flaws that went undetected for decade…
The Hacker News May 6, 2026, 12:03 PM (UTC)
Read
For nearly 20 years, we at The Hacker News have mostly told scary stories about cyberspace — big hacks, broken systems, and new threats. But behind every headline, there’s a quieter, better story. It’s the story of leaders making tough calls under pressure, te…
The Hacker News May 6, 2026, 10:57 AM (UTC)
Read
Analysts recently confirmed what identity security teams have quietly feared: AI agents are being deployed faster than enterprises can govern them. In their inaugural Market Guide for Guardian Agents, Gartner states that “enterprise adoption of AI agents is ac…
The Hacker News May 6, 2026, 09:13 AM (UTC)
Read
Google has announced expanded Binary Transparency for Android as a way to safeguard the ecosystem from supply chain attacks. "This new public ledger ensures the Google apps on your device are exactly what we intended to build and distribute," Google's product…
Infosecurity Magazine May 6, 2026, 08:40 AM (UTC)
Read
Cifas says that 13% of employees admit selling company credentials to a former colleague
The Hacker News May 6, 2026, 08:34 AM (UTC)
Read
Cybersecurity researchers have disclosed details of an intrusion that involved the use of a CloudZ remote access tool (RAT) and a previous undocumented plugin dubbed Pheno with the aim of facilitating credential theft. "According to the functionalities of the…
The Hacker News May 6, 2026, 06:14 AM (UTC)
Read
Palo Alto Networks has released an advisory warning that a critical buffer overflow vulnerability in its PAN-OS software has been exploited in the wild. The vulnerability, tracked as CVE-2026-0300, has been described as a case of unauthenticated remote code ex…
The Hacker News May 5, 2026, 04:19 PM (UTC)
Read
The Apache Software Foundation (ASF) has released security updates to address several security vulnerabilities in the HTTP Server, including a severe vulnerability that could potentially lead to remote code execution (RCE). The vulnerability, tracked as CVE-20…
The Hacker News May 5, 2026, 04:07 PM (UTC)
Read
A newly identified supply chain attack targeting DAEMON Tools software has compromised its installers to serve a malicious payload, according to findings from Kaspersky. "These installers are distributed from the legitimate website of DAEMON Tools and are sign…
Infosecurity Magazine May 5, 2026, 04:00 PM (UTC)
Read
Microsoft researchers warn of a large-scale phishing campaign using fake compliance emails to steal credentials, targeting 35,000 users across 13,000 organizations worldwide
Infosecurity Magazine May 5, 2026, 03:00 PM (UTC)
Read
ESET warns that North Korean hackers compromised a Yanbian gaming site in a supply‑chain attack, trojanizing Windows and Android software to spy on users
The Hacker News May 5, 2026, 02:19 PM (UTC)
Read
A sophisticated China-nexus advanced persistent threat (APT) group has been attributed to attacks targeting government entities in South America since at least late 2024 and government agencies in southeastern Europe in 2025. The activity is being tracked by C…
Infosecurity Magazine May 5, 2026, 02:00 PM (UTC)
Read
Venomous#Helper attackers impersonate the US Social Security Administration to deploy signed RMM software and maintain persistent access across US networks
Cybersecurity Ventures May 5, 2026, 12:46 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 5, 2026 – Watch the YouTube video SOC teams are overwhelmed by the volume of threat alerts they must manage. A Forrester analysis found that just three attack scenarios…
The Hacker News May 5, 2026, 11:58 AM (UTC)
Read
Every AI tool, workflow automation, and productivity app your employees connected to Google or Microsoft this year left something behind: a persistent OAuth token with no expiration date, no automatic cleanup, and in most organizations, no one watching it. You…
The Hacker News May 5, 2026, 11:56 AM (UTC)
Read
Threat actors are actively exploiting a critical security flaw impacting an open-source content management system (CMS) known as MetInfo, according to new findings from VulnCheck. The vulnerability in question is CVE-2026-29014 (CVSS score: 9.8), a code inject…
Infosecurity Magazine May 5, 2026, 11:10 AM (UTC)
Read
ISACA report warns that while AI has become the norm, many organizations are yet to formally apply safety or security policies around its use
The Hacker News May 5, 2026, 10:30 AM (UTC)
Read
While the software industry has made genuine strides over the past few decades to deliver products securely, the furious pace of AI adoption is putting that progress at risk. Businesses are moving fast to self-host LLM infrastructure, drawn by the promise of A…
Infosecurity Magazine May 5, 2026, 09:40 AM (UTC)
Read
The UK's National Cyber Security Centre is urging organizations to prepare for glut of new software updates
The Hacker News May 5, 2026, 09:07 AM (UTC)
Read
The North Korea-aligned state-sponsored hacking group known as ScarCruft has compromised a video game platform in a supply chain espionage attack, trojanizing its components with a backdoor called BirdCallto likely target ethnic Koreans residing in China. Whil…
Infosecurity Magazine May 5, 2026, 08:55 AM (UTC)
Read
Security vendor Trellix has suffered a breach involving unauthorized access
The Hacker News May 5, 2026, 07:37 AM (UTC)
Read
A critical security vulnerability in Weaver (Fanwei) E-cology, an enterprise office automation (OA) and collaboration platform, has come under active exploitation in the wild. The vulnerability (CVE-2026-22679, CVSS score: 9.8) relates to a case of unauthentic…
The Hacker News May 5, 2026, 06:35 AM (UTC)
Read
Microsoft has disclosed details of a large-scale credential theft campaign that has leveraged a combination of code of conduct-themed lures and legitimate email services to direct users to attacker-controlled domains and steal authentication tokens. The multi-…
The Hacker News May 4, 2026, 06:06 PM (UTC)
Read
An active phishing campaign has been observed targeting multiple vectors since at least April 2025 with legitimate Remote Monitoring and Management (RMM) software as a way to establish persistent remote access to compromised hosts. The activity, codenamed VENO…
The Hacker News May 4, 2026, 04:34 PM (UTC)
Read
Progress Software has released updates to address two security flaws in MOVEit Automation, including a critical bug that could result in an authentication bypass. MOVEit Automation (formerly Central) is a secure, server-based managed file transfer (MFT) soluti…
The Hacker News May 4, 2026, 02:23 PM (UTC)
Read
This week, the shadows moved faster than the patches. While most teams were still triaging last month’s alerts, attackers had already turned control panels into kill switches, kernels into open doors, and open-source pipelines into silent delivery systems. The…
Cybersecurity Ventures May 4, 2026, 12:30 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 4, 2026 – Watch the YouTube video Step into the future of cybersecurity at Black Hat USA 2026, Aug. 1-6, in Las Vegas. REGISTER Now & Save with the CODE: CYBERCRIME. Th…
Infosecurity Magazine May 4, 2026, 12:00 PM (UTC)
Read
Team Cymru’s Stephen Campbell warned that small US defense contractors are not well prepared to face cyber intrusions through edge devices
The Hacker News May 4, 2026, 11:58 AM (UTC)
Read
On December 4, 2025, a 17-year-old was arrested in Osaka under Japan’s Unauthorized Access Prohibition Act. The young man had run malicious code to extract the personal data of over 7 million users of Kaikatsu Club, Japan's largest internet cafe chain. When as…
The Hacker News May 4, 2026, 11:57 AM (UTC)
Read
The China-based cybercrime group known as Silver Fox (aka Monarch, SwimSnake, The Great Thief of Valley, UTG-Q-1000, and Void Arachne) has been linked to a new campaign targeting organizations in Russia and India with a new malware called ABCDoor. The activity…
The Hacker News May 4, 2026, 09:27 AM (UTC)
Read
A previously unknown threat actor has been observed targeting government and military entities in Southeast Asia, alongside a smaller cluster of managed service providers (MSPs) and hosting providers in the Philippines, Laos, Canada, South Africa, and the U.S.…
Infosecurity Magazine May 4, 2026, 08:00 AM (UTC)
Read
OpenAI announced its intention to expand the Trusted Access for Cyber program for cyber defenders at the federal, state and local government levels
The Hacker News May 4, 2026, 05:59 AM (UTC)
Read
A coordinated international operation involving U.S. and Chinese authorities has arrested at least 276 suspects and shut down nine scam centers used for cryptocurrency investment fraud schemes targeting Americans, resulting in millions of dollars in losses. Th…
The Hacker News May 3, 2026, 06:26 AM (UTC)
Read
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.…
The Hacker News May 2, 2026, 06:41 AM (UTC)
Read
Cybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized access to a "portion" of its source code. It said it "recently identified" the compromise of its source code repository and that it began working with "leading fore…
The Hacker News May 1, 2026, 06:09 PM (UTC)
Read
A newly discovered Vietnamese-linked operation has been observed using a Google AppSheet as a "phishing relay" to distribute phishing emails with an aim to compromise Facebook accounts. The activity has been codenamed AccountDumpling by Guardio, with the schem…
The Hacker News May 1, 2026, 02:26 PM (UTC)
Read
Cybersecurity researchers are warning of two cybercrime groups that are carrying out "rapid, high-impact attacks" operating almost within the confines of SaaS environments, while leaving minimal traces of their actions. The clusters, Cordial Spider (aka BlackF…
The Hacker News May 1, 2026, 02:02 PM (UTC)
Read
Cybersecurity researchers have disclosed details of a new China-aligned espionage campaign targeting government and defense sectors across South, East, and Southeast Asia, along with one European government belonging to NATO. Trend Micro has attributed the act…
Cybersecurity Ventures May 1, 2026, 12:43 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. 1, 2026 – Listen to the podcast A quarter-century old article in The Wall Street Journal reported in 1998 that Serge Humpich, a 37-year-old (at the time) programmer app…
Infosecurity Magazine May 1, 2026, 12:00 PM (UTC)
Read
Claude Security enters public beta, giving enterprises AI driven code scanning with no API integration or custom agents required
Infosecurity Magazine May 1, 2026, 11:30 AM (UTC)
Read
The cybersecurity workers used their knowledge and skills to conduct ransomware attacks for notorious gang, rather than protect victims against them
Infosecurity Magazine May 1, 2026, 10:45 AM (UTC)
Read
A researcher from offensive security firm Theori has found a nine-year-old flaw in the Linux kernel with the help of AI
The Hacker News May 1, 2026, 10:30 AM (UTC)
Read
The managed security services market is projected to grow from $38.31 billion in 2025 to $69.16 billion by 2030[1], with cybersecurity being the fastest-growing sector[2]. Despite this opportunity, many MSPs leave revenue on the table because their go-to-marke…
The Hacker News May 1, 2026, 09:56 AM (UTC)
Read
The U.S. Department of Justice (DoJ) on Thursday announced the sentencing of two cybersecurity professionals to four years each in prison for their role in facilitating BlackCat ransomware attacks in 2023. Ryan Goldberg, 40, of Georgia, and Kevin Martin, 36, o…
The Hacker News May 1, 2026, 09:43 AM (UTC)
Read
A new software supply chain attack campaign has been observed using sleeper packages as a conduit to subsequently push malicious payloads that enabled credential theft, GitHub Actions tampering, and SSH persistence. The activity has been attributed to the GitH…
The Hacker News Apr 30, 2026, 04:31 PM (UTC)
Read
In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two malicious versions to conduct credential theft. According to Aikido Security, OX Security, Socket, and StepSecurity, the two…
Infosecurity Magazine Apr 30, 2026, 04:00 PM (UTC)
Read
Suspects accused of distributing malware and selling access to stolen Roblox accounts on Russian marketplaces
Infosecurity Magazine Apr 30, 2026, 03:00 PM (UTC)
Read
Deep#Door Python RAT uses tunneling and obfuscation to evade detection and steal credentials
Krebs on Security Apr 30, 2026, 02:04 PM (UTC)
Read
A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazil, KrebsOnSecurity h…
Infosecurity Magazine Apr 30, 2026, 02:00 PM (UTC)
Read
A new CISA‑led guide explains how zero‑trust security can be applied to operational technology, balancing cyber defence with safety and system availability
The Hacker News Apr 30, 2026, 01:55 PM (UTC)
Read
The internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to send scam texts, while some developers are accidentally downloading tools that peek into their private files during a simple install. It is definitely a…
Infosecurity Magazine Apr 30, 2026, 01:30 PM (UTC)
Read
The British public education sector has faced the nation’s most dramatic increase in cyber breach prevalence over the past year
Cybersecurity Ventures Apr 30, 2026, 12:50 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 30, 2026 – Watch the YouTube video Flock Safety, an Atlanta, Ga.-based surveillance company, is facing increasing community pushback as it secures contracts with law en…
The Hacker News Apr 30, 2026, 12:36 PM (UTC)
Read
Cybersecurity researchers have disclosed details of a stealthy Python-based backdoor framework called DEEP#DOOR that comes with capabilities to establish persistent access and harvest a wide range of sensitive information from compromised hosts. "The intrusion…
The Hacker News Apr 30, 2026, 11:30 AM (UTC)
Read
Intro A sophisticated, high-resilience malicious campaign was identified by Atos Threat Research Center (TRC) in March 2026. This operation specifically targets the high-privilege professional accounts of enterprise administrators, DevOps engineers, and securi…
Infosecurity Magazine Apr 30, 2026, 10:00 AM (UTC)
Read
European police arrested 10 suspects after dismantling Albanian scam call centers linked to a €50m ($58m) online investment fraud operation
Infosecurity Magazine Apr 30, 2026, 09:10 AM (UTC)
Read
Marsh’s 2026 People Risks survey finds cyber‑related challenges dominate, as cyber‑threat literacy tops risks and cyber and AI skills shortages rise
Infosecurity Magazine Apr 29, 2026, 03:00 PM (UTC)
Read
Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at LayerX
Infosecurity Magazine Apr 29, 2026, 02:00 PM (UTC)
Read
Researchers uncover a malicious npm dependency linked to an AI‑assisted code commit that steals sensitive data and exposes crypto wallets
Cybersecurity Ventures Apr 29, 2026, 01:14 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 29, 2026 – Watch the YouTube video Executive risk management has evolved far beyond physical protection and travel security. Today, the most pressing threats to leaders…
Infosecurity Magazine Apr 29, 2026, 01:00 PM (UTC)
Read
KELA claims infostealers remained the primary access vector for attacks in 2025
Infosecurity Magazine Apr 29, 2026, 10:45 AM (UTC)
Read
The Vect 2.0 ransomware wipes large files instead of merely encrypting them, making recovery impossible – even for the attackers
Infosecurity Magazine Apr 29, 2026, 10:05 AM (UTC)
Read
RunSafe report reveals most attacks on medical devices disrupt patient care
Infosecurity Magazine Apr 28, 2026, 03:30 PM (UTC)
Read
Medtronic confirms IT breach as ShinyHunters claims millions of records accesseda
Infosecurity Magazine Apr 28, 2026, 01:00 PM (UTC)
Read
Ransomware groups 0APT and KryBit have doxxed each other online
Cybersecurity Ventures Apr 28, 2026, 12:53 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 28, 2026 – Read the report Media outlets globally have been covering the 2026 CISO Report from Cybersecurity Ventures in collaboration with Sophos, and the main message…
Infosecurity Magazine Apr 28, 2026, 12:30 PM (UTC)
Read
Extradition links alleged MSS-directed hacker to Silk Typhoon and COVID-19 espionage
Infosecurity Magazine Apr 28, 2026, 08:30 AM (UTC)
Read
The National Cyber Security Centre has warned against measuring SOCs with ticket-based metrics
Infosecurity Magazine Apr 28, 2026, 08:00 AM (UTC)
Read
Arctic Wolf attributed this large-scale spear-phishing campaign to BlueNoroff, a financially motivated subgroup of the Lazarus Group
Infosecurity Magazine Apr 27, 2026, 03:00 PM (UTC)
Read
US sanctions target Cambodian scam networks tied to crypto fraud and trafficking
Infosecurity Magazine Apr 27, 2026, 02:00 PM (UTC)
Read
Itron confirmed a cyber incident but does not believe it is likely to have a material impact on the company
Infosecurity Magazine Apr 27, 2026, 01:30 PM (UTC)
Read
Dozens of browser extensions openly sell user data via privacy policy disclosures
Cybersecurity Ventures Apr 27, 2026, 12:48 PM (UTC)
Read
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. 27, 2026 – Cybercrime Magazine YouTube Shorts The award-winning Cybercrime Magazine YouTube Channel, which has more than 1.2 million subscribers and many more viewers g…
Infosecurity Magazine Apr 27, 2026, 11:40 AM (UTC)
Read
A new report by global technology recruitment firm, Harvey Nash, found that three quarters of cybersecurity staff are pessimistic on pay and half are looking for a new job
Infosecurity Magazine Apr 27, 2026, 09:10 AM (UTC)
Read
The “fast16” malware may have been used to target Iran’s nuclear program prior to Stuxnet
Infosecurity Magazine Apr 27, 2026, 08:15 AM (UTC)
Read
Researchers uncover a new data theft and extortion group dubbed “BlackFile”