Information security

[ follow ]
Information security
fromThe Hacker News
38 minutes ago

Attacks are Evolving: 3 Ways to Protect Your Business in 2026

In 2025 cybercriminals shifted focus to small and medium-sized businesses, exploiting their limited defenses and repeatedly breaching SMBs to compensate for smaller paydays.
fromComputerWeekly.com
3 hours ago

Top 10 cyber crime stories of 2025 | Computer Weekly

Once again threat actors kept cyber pros on their toes in 2025 in a never-ending cat-and-mouse game. But amid the noise, there were some notable stories and incidents affecting household names in the UK - the likes of Marks & Spencer, Co-op, and Jaguar Land Rover - meaning that 2025 will undoubtedly live long in the memory. Here are Computer Weekly's top cyber crime stories of 2025
Information security
fromSecuritymagazine
12 hours ago

CISA Releases Guide for Stadium and Arena Security

The Cybersecurity and Infrastructure Security Agency (CISA) published a guide detailing venue security and disruption management. In this guide, venue owners and operators can review fundamental strategies to mitigate repercussions of possible disruptions to the critical lifeline sectors of: Communications Energy Transportation Water and Wastewater Systems While this guide serves as a broad catalog for support, it is not comprehensive. Security leaders in the event security space are encouraged to leverage the provided resources and consider them in the context of their venue's unique needs.
Information security
fromBusiness Matters
2 days ago

The Role of IT Support in Business Continuity

Robust IT systems support uninterrupted operations through resilience, security, and proactive monitoring. CIOs report that 87% of digital-first businesses rely on automated failover systems to reduce service disruption. Continuous monitoring helps detect failures before they impact users. Recovery plans activate system redundancies and restore functions with minimal input. Automated backup schedules and patch management prevent gaps in continuity. IT managers emphasise the role of configuration management and centralised monitoring tools.
Information security
Information security
fromChannelPro
4 hours ago

Keeper Security expands federal bench with latest senior hires

Keeper Security appointed Shannon Vaughn and Benjamin Parrish to federal leadership to strengthen identity security and advance zero-trust modernization across government agencies.
Information security
fromThe Hacker News
1 day ago

Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances

Critical RCE vulnerability CVE-2025-68613 in n8n can allow authenticated users to execute arbitrary code; apply patches immediately or restrict workflow editing.
#data-breach
fromTechCrunch
19 hours ago
Information security

US insurance giant Aflac says hackers stole personal and health data of 22.6 million | TechCrunch

fromTechCrunch
19 hours ago
Information security

US insurance giant Aflac says hackers stole personal and health data of 22.6 million | TechCrunch

#chrome-extension-malware
#prompt-injection
fromFortune
20 hours ago
Information security

OpenAI says AI browsers like ChatGPT Atlas may never be fully secure from hackers-and experts say the risks are 'a feature not a bug' | Fortune

fromFortune
20 hours ago
Information security

OpenAI says AI browsers like ChatGPT Atlas may never be fully secure from hackers-and experts say the risks are 'a feature not a bug' | Fortune

Information security
fromChannelPro
1 day ago

Why MSSPs must train smarter

MSSPs excel at detection and forensics but lack preventive and offensive skills, risking a reactive-only posture; embedding CTEM and capability development is essential.
Information security
fromTechCrunch
20 hours ago

France's postal and banking services disrupted by suspected DDoS attack | TechCrunch

La Poste's online and banking systems were knocked offline by a suspected DDoS attack causing major network disruption and unavailability of web and mobile services.
Information security
fromInfoWorld
1 day ago

WhatsApp API worked exactly as promised, and stole everything

Malicious proxy wrapped a legitimate WhatsApp WebSocket client to capture session tokens, intercept messages, and exfiltrate encrypted data using multi-layer obfuscation.
Information security
fromThe Hacker News
1 day ago

U.S. DoJ Seizes Fraud Domain Behind $14.6 Million Bank Account Takeover Scheme

DoJ seized web3adspanels.org used to host stolen bank credentials and facilitate bank account takeover fraud via fake search ads, causing millions in losses.
Information security
fromwww.bbc.com
1 day ago

Amazon says over 1,800 North Koreans blocked from applying for jobs

Amazon blocked over 1,800 suspected North Korean job applications that used stolen or fake identities to funnel wages back to fund regime programs.
fromComputerWeekly.com
1 day ago

Top 10 end user computing stories of 2025 | Computer Weekly

The biggest event of 2025 in the PC market has been the end of support for Windows 10. It was positioned as the last major release of the Windows operating system, which would be kept updated by over-the-air Windows updates. But when Windows 11 was launched in 2021, Microsoft set the date for the end of support for Windows 10 - October 5, 2025.
Information security
Information security
fromTechCrunch
21 hours ago

Exclusive: Inside Uzbekistan's nationwide license plate surveillance system

A nationwide Uzbek license-plate surveillance system was left publicly accessible, exposing vehicle and occupant tracking data and revealing significant privacy and security risks.
Information security
fromNextgov.com
21 hours ago

When data defense becomes national defense

Securing data systems is essential to national security because AI-enabled infrastructure depends on trustworthy data and resilient data pipelines.
fromTechCrunch
17 hours ago

Hackers stole over $2.7 billion in crypto in 2025, data shows | TechCrunch

Cybercriminals stole $2.7 billion in crypto this year, a new record for crypto-stealing hacks, according to blockchain monitoring firms. Once again, in 2025, there were dozens of crypto heists hitting several cryptocurrency exchanges and other web3 and decentralized finance (DeFi) projects. The biggest hack by far was the breach at Dubai-based crypto exchange Bybit, where hackers stole around $1.4 billion in crypto.
Information security
fromWIRED
1 day ago

Chinese Crypto Scammers on Telegram Are Fueling the Biggest Darknet Markets Ever

When black markets for drugs, guns, and all manner of contraband first sprang up on the dark web more than a decade ago, it seemed that cryptocurrency and the technical sophistication of the anonymity software Tor were the keys to carrying out billions of dollars worth of untouchable, illicit transactions online. Now, all of that looks a bit passé. In 2025, all it takes to get away with tens of billions of dollars in black-market crypto deals is a messaging platform willing to host scammers and human traffickers, enough persistence to relaunch channels and accounts on that service when they're occasionally banned, and fluency in Chinese.
Information security
#cybersecurity
fromThe Verge
20 hours ago

Dozens of Flock AI camera feeds were just out there

I watched a man leave his house in the morning in New York," Jordan says in his video.
Information security
fromThe Hacker News
2 days ago

Weekly Recap: Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More

Cyber threats last week showed how attackers no longer need big hacks to cause big damage. They're going after the everyday tools we trust most - firewalls, browser add-ons, and even smart TVs - turning small cracks into serious breaches. The real danger now isn't just one major attack, but hundreds of quiet ones using the software and devices already inside our networks. Each trusted system can become an entry point if it's left unpatched or overlooked.
Information security
Information security
fromThe Hacker News
1 day ago

Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens

A malicious npm package named 'lotusbail' functions as a WhatsApp API while stealing authentication tokens, messages, contacts, media, and creating persistent account access.
fromTheregister
1 day ago

Poisoned WhatsApp API package steals messages and accounts

In addition to working as advertised, the secret-stealing library, which is a fork of the legitimate @whiskeysockets/baileys package, uses WebSocket to communicate with WhatsApp. However, this means that every WhatsApp communication passes through the socket wrapper, allowing it to capture your credentials when you log in and intercept messages as they are sent and received. "All your WhatsApp authentication tokens, every message sent or received, complete contact lists, media files - everything that passes through the API gets duplicated and prepared for exfiltration," Admoni wrote.
Information security
Information security
fromTheregister
1 day ago

Spy turned startup CEO: 'The WannaCry of AI will happen'

AI has accelerated vulnerability weaponization so attackers exploit bugs faster than vendors patch them, producing a negative time-to-exploit and enabling widespread LLM-assisted weaponization.
fromThe Hacker News
2 days ago

Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale

"Previously, users received 'pure' Trojan APKs that acted as malware immediately upon installation," Group-IB said in an analysis published last week. "Now, adversaries increasingly deploy droppers disguised as legitimate applications. The dropper looks harmless on the surface but contains a built-in malicious payload, which is deployed locally after installation - even without an active internet connection."
Information security
fromNextgov.com
1 day ago

Three moves that can jumpstart cyber modernization - even wthout a full budget

Let's be honest: most agencies don't have a blank check to invest in cybersecurity modernization. But that doesn't mean they're stuck. You don't need a full rip-and-replace to make meaningful progress; you need clarity, urgency and smart prioritization. Whether you're working with a full budget or a shoestring one, there are moves you can make today that will strengthen your defenses tomorrow.
Information security
Information security
fromBusiness Insider
2 days ago

AI is creating a security problem most companies aren't staffed to handle, says an AI researcher

Cybersecurity teams lack the skills and approaches needed to secure AI systems; organizations need professionals experienced in both AI security and traditional cybersecurity.
Information security
fromZDNET
2 days ago

TSA's plea: Don't make these airport Wi-Fi and public charging mistakes this holiday

Public USB chargers and unsecured airport Wi‑Fi can expose devices to juice‑jacking and data interception; use power-only cables, power banks, data blockers, and VPNs.
Information security
fromSecuritymagazine
2 days ago

Product Spotlight: 2025 Year in Review

Integrated security platforms unify access control, audio, video, and emergency response permissions to streamline school, retail, and healthcare operations and improve responder coordination.
Information security
fromTechzine Global
2 days ago

Docker removes paywall for hardened images

Docker is releasing Docker Hardened Images as free, Apache 2.0–licensed, Debian/Alpine-based pre-secured container images accessible to developers, teams, and organizations without license fees.
Information security
fromChannelPro
1 day ago

How to MFA everywhere

Online identity equals the proofs systems accept, and inconsistent MFA allows attackers to impersonate users; MSPs can unify and strengthen identity protections.
fromTechzine Global
2 days ago

SailPoint integrates with CrowdStrike Falcon for faster threat response

SailPoint has announced new integrations with the CrowdStrike Falcon platform to connect identity governance with endpoint security. The integrations enable shared data and automated workflows between identity and security systems to help organisations respond faster to identity-based threats. The integrations connect SailPoint's Identity Security Cloud with multiple Falcon platform components, including Falcon Next-Gen Identity Security, Falcon Next-Gen SIEM, and Falcon Fusion SOAR, now part of CrowdStrike Charlotte AI.
Information security
Information security
fromTheregister
2 days ago

South Korea to require face scans to buy a SIM

South Korea will require facial-recognition verification for new mobile subscribers to prevent account registration with stolen data and reduce phone-based scams.
Information security
fromThe Hacker News
3 days ago

Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence

Iranian APT Infy (Prince of Persia) remains active and is conducting widespread campaigns using updated Foudre and Tonnerre malware with DGA-based C2.
Information security
fromTheregister
2 days ago

Google sends Dark Web Report to its dead services graveyard

Google is ending its Dark Web Report because it provided limited actionable guidance and will instead prioritize clearer, practical account-protection tools and resources.
fromFuturism
2 days ago

Police Warn of Robot Crime Wave

But what would happen if such a technology were to land in the hands of terrorists and criminals, who aren't beholden to the norms of modern warfare at all? In a new report, pan-European police agency Europol's Innovation Lab has imagined a not-so-distant future in which criminals could hijack autonomous vehicles, drones, and humanoid robots to sow chaos - and how law enforcement will have to step up as a result.
Information security
Information security
fromWIRED
4 days ago

Hackers Stole Millions of PornHub Users' Data for Extortion

US border and law-enforcement agencies are expanding surveillance capabilities while AI tools enable sophisticated scams and a major breach exposed PornHub user data.
fromTech Times
4 days ago

Remote Work Security Solutions: Behavioral Access Control Enhances Workforce Protection

Traditional password-based protection is no longer sufficient, prompting organizations to adopt behavioral access control systems that continuously analyze user actions for anomalies. These platforms monitor keystrokes, mouse activity, application usage, and network patterns to detect suspicious behavior in real time. By combining machine learning, biometric verification, and zero-trust principles, companies enhance workforce protection while minimizing the risk of account compromise.
Information security
Information security
fromWIRED
4 days ago

7 Useful Tips for Anyone Connecting to Public Wi-Fi

Maximize public Wi‑Fi performance and safety by minimizing background processes, positioning near routers, preferring wired connections, and using protections like a VPN.
#hpe-oneview
fromwww.theregister.com
5 days ago
Information security

HPE OneView RCE bug scores a perfect 10

A critical unauthenticated remote code execution vulnerability (CVE-2025-37164) in HPE OneView allows attackers centralized control; customers must upgrade or apply hotfix immediately.
fromThe Hacker News
5 days ago
Information security

HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution

HPE OneView contains a maximum-severity RCE vulnerability (CVE-2025-37164) fixed in version 11.00; hotfixes are available for earlier releases.
Information security
fromInfoWorld
5 days ago

React2Shell is the Log4j moment for front end development

A Flight protocol validation failure in React Server Components and Next.js (React2Shell, CVE-2025-55182) enables unauthenticated remote code execution and rapid ransomware deployment.
Information security
fromTechzine Global
4 days ago

HPE OneView requires patch for vulnerability with highest CVE score

Hewlett Packard Enterprise OneView had a critical unauthenticated remote code execution vulnerability (CVE-2025-37164) fixed in version 11.00 with hotfixes for older releases.
#watchguard
fromTheregister
4 days ago
Information security

Critical-rated WatchGuard Firebox flaw under active attack

A critical unauthenticated remote code execution vulnerability (CVE-2025-32978) in WatchGuard Firebox IKE service is being actively exploited; apply firmware updates immediately.
fromThe Hacker News
5 days ago
Information security

WatchGuard Warns of Active Exploitation of Critical Fireware OS VPN Vulnerability

WatchGuard fixed a critical out-of-bounds write vulnerability (CVE-2025-14733) in Fireware OS that enabled remote unauthenticated code execution and was actively exploited.
Information security
fromThe Hacker News
4 days ago

Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers

UNK_AcademicFlare used device-code phishing to steal Microsoft 365 credentials and conduct account takeovers targeting government, think tanks, higher education, and transportation since September 2025.
Information security
fromTechCrunch
4 days ago

Hundreds of Cisco customers are vulnerable to new Chinese hacking campaign, researchers say | TechCrunch

Chinese government-backed hackers are exploiting a zero-day (CVE-2025-20393) in Cisco Secure Email Gateway and related products, targeting enterprise customers.
Information security
fromTechCrunch
4 days ago

Hacks, thefts and disruption: The worst data breaches of 2025 | TechCrunch

2025 featured unprecedented cyberattacks: massive U.S. government data exfiltration by DOGE, state-sponsored intrusions, and widespread ransomware extortion against corporations.
fromThe Hacker News
5 days ago

New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards

UEFI and IOMMU are designed to enforce a security foundation and prevent peripherals from performing unauthorized memory accesses, effectively ensuring that DMA-capable devices can manipulate or inspect system memory before the operating system is loaded. The vulnerability, discovered by Nick Peterson and Mohamed Al-Sharifi of Riot Games in certain UEFI implementations, has to do with a discrepancy in the DMA protection status. While the firmware indicates that DMA protection is active, it fails to configure and enable the IOMMU during the critical boot phase.
Information security
fromNextgov.com
4 days ago

The cyberwarfare landscape is changing - here's how to prepare

Even incidents like the Colonial Pipeline ransomware attack, which showed us how the cyber world and our physical lives intersect, stopped far short of societal disruption. However, the threat of cyberwar has been building, influenced by advancements in AI and increased presence of actors in U.S. systems and telecommunication networks. A military conflict could escalate these attacks to scale, crippling critical infrastructure and public safety systems like power grids, transportation networks and emergency response, even disrupting military communications and undermining response.
Information security
Information security
fromThe Hacker News
5 days ago

Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks

Nigerian authorities arrested the alleged RaccoonO365 developer after collaboration with Microsoft and the FBI for credential-harvesting phishing operations.
#msmq
fromThe Hacker News
4 days ago

Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware

The campaign "uses CountLoader as the initial tool in a multistage attack for access, evasion, and delivery of additional malware families," Cyderes Howler Cell Threat Intelligence team said in an analysis. CountLoader was previously documented by both Fortinet and Silent Push, detailing the loader's ability to push payloads like Cobalt Strike, AdaptixC2, PureHVNC RAT, Amatera Stealer, and PureMiner. The loader has been detected in the wild since at least June 2025.
Information security
Information security
fromArs Technica
4 days ago

Riot Games is making an anti-cheat change that could be rough on older PCs

Vanguard may block high-rank players until motherboard BIOS updates are installed to mitigate a chipset firmware vulnerability affecting multiple Intel and AMD motherboard families.
Information security
fromHarvard Business Review
4 days ago

6 Cybersecurity Predictions for the AI Economy in 2026 - SPONSOR CONTENT FROM PALO ALTO NETWORKS

Autonomous AI agents will drive an AI-native economy, requiring proactive security and trustworthy data and identity to manage new insider and quantum risks.
fromAzure DevOps Blog
4 days ago

Work item linking for Advanced Security alerts now available - Azure DevOps Blog

Security vulnerabilities don't fix themselves. Someone needs to track them, prioritize them, and actually ship the fix. If you've ever tried to manage security alerts alongside your regular sprint work, though, you know the friction: you're looking at an alert in one tab, switching to your backlog in another, trying to remember which vulnerability you were supposed to file a bug for.
Information security
fromwww.theguardian.com
4 days ago

The Com: the growing cybercrime network behind recent Pornhub hack

Ransomware hacks, data theft, crypto scams and sextortion cover a broad range of cybercrimes carried out by an equally varied list of assailants. But there is also an English-speaking criminal ecosystem carrying out these activities that defies conventional categorisation. Nonetheless, it does have a name: the Com. Short for community, the Com is a loose affiliation of cyber-criminals, largely native English language speakers typically aged from 16 to 25.
Information security
fromTheregister
5 days ago

Ten mistakes marred firewall upgrade at Australian telco

Technicians working on a firewall upgrade made at least ten mistakes, contributing to two deaths, according to a report on a September incident that saw Australian telco Optus unable to route calls to emergency services. As The Register reported at the time, Australia's equivalent of the USA's 911 and the UK's 999 and 112 emergency contact number is 000 - Triple Zero - and local law requires all telcos to route emergency calls to that number.
Information security
fromwww.npr.org
4 days ago

4 common scams to watch out for this holiday season

In a frenzy of last-minute gift shopping and travel bookings, we can be more anxious, more distracted and more vulnerable. "There's a lot of hustle and bustle during the holiday season, so there's a lot more opportunities for scammers to steal from us," says Amy Nofziger, senior director of Fraud Victim Support at the AARP Fraud Watch Network, a fraud prevention service.
Information security
fromZacks
4 days ago

Pardon Our Interruption

As you were browsing something about your browser made us think you were a bot. There are a few reasons this might happen: You've disabled JavaScript in your web browser. You're a power user moving through this website with super-human speed. You've disabled cookies in your web browser. A third-party browser plugin, such as Ghostery or NoScript, is preventing JavaScript from running.
Information security
fromwww.housingwire.com
4 days ago

AI-driven wire fraud schemes reshape real estate security in 2025

Criminals increasingly combine AI-driven deepfakes, improved timing, contextual realism, and human patience to execute sophisticated wire fraud against title transactions.
Information security
fromFortune
5 days ago

An AT&T exec manifested his C-suite position when he was earning his MBA: 'I literally came up with a plan to become a CISO' | Fortune

Execute a deliberate career plan, develop technical and leadership experience, and demonstrate cybersecurity's value to earn CISO roles across organizations.
Information security
fromBusiness Matters
6 days ago

Choosing Security Providers: A Strategic Guide for Businesses

Choose security partners with full SIA compliance, comprehensive insurance, experienced personnel, advanced technology, and proven operational standards to ensure effective protection.
fromTheregister
5 days ago

China turns on a vast and very rapid experimental network

As reported in Chinese state media, tests of the network saw it shift 72 terabytes of data in 1.6 hours, across a distance of around 1,000 km between a radio telescope in Guizhou province and a university in Hubei. We think that's almost 100 Gbit/s, an impressive feat for a sustained long-distance data transfer even if it took place in a controlled environment.
Information security
Information security
fromThe Verge
4 days ago

Google sues web scraper for sucking up search results 'at an astonishing scale'

SerpApi circumvents Google's SearchGuard by masking hundreds of millions of automated queries to appear as human users, thereby violating federal law.
fromwww.mercurynews.com
4 days ago

Help! My two-factor authentication on Amazon stopped working

I've been an Amazon customer for 20 years, but after changing my phone number, I'm locked out of my account because two-factor authentication (2FA) still uses my old number. I've called Amazon six times, sent photos of my driver's license three times, and even emailed executives using your contacts but no one has fixed it. Amazon updated the phone number on my account, but 2FA remains broken.
Information security
Information security
fromComputerWeekly.com
5 days ago

Fortinet vulnerabilities prompt pre-holiday warnings | Computer Weekly

Two Fortinet SAML vulnerabilities allow bypassing FortiCloud SSO, enabling admin access and potential credential exposure across multiple Fortinet products; patches and mitigations available.
Information security
fromThe Hacker News
5 days ago

ThreatsDay Bulletin: WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories

Attackers increasingly repurpose existing tools and exploit exposed AI servers, leaked tokens, and social-engineering SMS scams, accelerating the cyber threat landscape.
Information security
fromThe Hacker News
6 days ago

Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances

A critical AsyncOS zero-day (CVE-2025-20393) enables remote root command execution when Spam Quarantine is internet-exposed, actively exploited by China-linked APT UAT-9686.
Information security
fromTheregister
6 days ago

React2Shell: Microsoft counts hundreds of hacked machines

Attackers exploited React2Shell (CVE-2025-55182) to compromise several hundred servers, execute arbitrary code, deploy malware, and in some cases deliver ransomware.
fromTheregister
5 days ago

Another bad week for SonicWall as SMA 1000 0-day exploited

SonicWall's official notice, published this week, says users should update to the latest hotfix versions immediately and restrict access to the Appliance Management Console to trusted networks. The vendor's PSIRT team says the issue affects only SMA 1000 appliances and does not impact other SonicWall firewall products or SSL VPN functions, but the fact that attackers have already begun exploiting the flaw underscores how exposed remote-access infrastructure remains.
Information security
fromThe Hacker News
6 days ago

CISA Flags Critical ASUS Live Update Flaw After Evidence of Active Exploitation

The vulnerability, tracked as CVE-2025-59374 (CVSS score: 9.3), has been described as an "embedded malicious code vulnerability" introduced by means of a supply chain compromise that could allow attackers to perform unintended actions. "Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise," according to a description of the flaw published in CVE.org. "The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met these conditions and installed the compromised versions were affected."
Information security
Information security
fromThe Hacker News
5 days ago

China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware

LongNosedGoblin uses Group Policy and cloud services for C2 to deploy custom C# malware, conducting cyber espionage against Southeast Asian and Japanese government entities.
Information security
fromThe Hacker News
6 days ago

North Korea-Linked Hackers Steal $2.02 Billion in 2025, Leading Global Crypto Theft

North Korean-linked threat actors stole at least $2.02 billion in cryptocurrency in 2025, driving a global surge and accounting for a record share of service compromises.
Information security
fromThe Hacker News
6 days ago

Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App

Kimsuky distributes a DocSwap Android RAT via QR-code phishing pages impersonating CJ Logistics, using deceptive prompts and embedded encrypted APKs.
Information security
fromComputerWeekly.com
6 days ago

Passwords to prompts: Identity and AI redefined cyber in 2025 | Computer Weekly

AI agents became the largest unmonitored attack surface, identity threats shifted to synthetic impersonation, and nation-states targeted AI models and training data.
Information security
fromTheregister
5 days ago

Your car's web browser may be on the road to cyber ruin

Embedded browsers in devices such as smart TVs, e-readers, and cars are often years out of date and expose users to known security vulnerabilities.
fromTheregister
5 days ago

Crypto crooks co-opt stolen AWS creds to mine coins

Your AWS account could be quietly running someone else's cryptominer. Cryptocurrency thieves are using stolen Amazon account credentials to mine for coins at the expense of AWS customers, abusing their Elastic Container Service (ECS) and their Elastic Compute Cloud (EC2) resources, in an ongoing operation that started on November 2. The illicit cryptocurrency-mining campaign abuses compromised valid AWS Identity and Access Management (IAM) credentials with "admin-like privileges" - it doesn't exploit a vulnerability -
Information security
fromTechCrunch
5 days ago

Tech provider for NHS England confirms data breach | TechCrunch

DXS International, a U.K.-based company that provides healthcare tech for England's National Health Service (NHS), disclosed a cyberattack in a statement on Thursday. In a filing with the London Stock Exchange, the company said it experienced a "a security incident affecting its office servers," discovered on December 14. The company said it "immediately" contained the breach working together with the NHS, and hired a cybersecurity firm to investigate "the nature and extent of the incident."
Information security
Information security
fromwww.aljazeera.com
6 days ago

New Somalia e-visa security flaw puts personal data of thousands at risk

Somalia's e-visa website is insecure, allowing mass downloads of e-visas that expose passport numbers, full names, and dates of birth.
Information security
fromTheregister
5 days ago

NHS tech supplier probes cyberattack on internal systems

DXS International experienced a contained cyberattack on office servers with minimal product impact while forensic and regulatory investigations proceed.
Information security
fromSecuritymagazine
6 days ago

630M Passwords Stolen, FBI Reveals: What This Says About Credential Value

A seized dataset of 630 million stolen credentials added to Have I Been Pwned included 46 million previously unseen vulnerable passwords, highlighting persistent credential risk.
fromThe Verge
5 days ago

Riot Games found a motherboard security flaw that helps PC cheaters

"had this issue gone unnoticed, it would have completely nullified all existing DMA detection and prevention tech currently on the market - including that of other gaming companies - due to the nature of this class of cheats running in a privileged area that anti-cheats typically do not run."
Information security
fromComputerworld
5 days ago

WhatsApp accounts targeted in 'GhostPairing' attack

A warning for WhatsApp users: cybercriminals have discovered an alarmingly simple way to access a user's conversations in real time by manipulating the app's device pairing or linking routine.
Information security
fromZDNET
6 days ago

The internet in 2025: Bigger, more fragile than ever - and 'fundamentally rewired' by AI

According to Cloudflare, the internet's second-largest content delivery network (CDN), global internet traffic grew nearly 20% in 2025. You and I watching more YouTube videos is not what's driving that growth. Much of this rise comes from bots, AI crawlers, and automated attacks rather than human users. At the same time, satellite connectivity, post-quantum encryption, and mobile-heavy use have reshaped how and where people access the internet.
Information security
#north-korea
fromFortune
5 days ago
Information security

North Korea stole a record amount of crypto-again: report estimates its hackers' 2025 haul at $2 billion | Fortune

fromFortune
5 days ago
Information security

North Korea stole a record amount of crypto-again: report estimates its hackers' 2025 haul at $2 billion | Fortune

Information security
fromZDNET
5 days ago

Did maintainers abandon your critical open-source tool? This rescue plan offers a lifeline

EmeritOSS provides stability-focused maintenance and security patches for mature, unmaintained open-source projects like Kaniko, Kubeapps, and Ingress-NGINX.
Information security
fromFast Company
6 days ago

Deepfakes are no longer just a disinformation problem. They are your next supply chain risk

Deepfakes have evolved into a systemic corporate threat capable of enabling enterprise-scale fraud, corrupting workflows, and undermining executive identity verification.
Information security
fromChannelPro
6 days ago

Platform consolidation is the solution for MSPs' growing pains

MSPs face expanding complexity and responsibilities while the MSP solutions market grows, creating opportunities alongside intensified pressure to scale and secure hybrid environments.
fromThe Hacker News
6 days ago

The Case for Dynamic AI-SaaS Security as Copilots Scale

The result is an explosion of AI capabilities across the SaaS stack, a phenomenon of AI sprawl where AI tools proliferate without centralized oversight. For security teams, this represents a shift. As these AI copilots scale up in use, they are changing how data moves through SaaS. An AI agent can connect multiple apps and automate tasks across them, effectively creating new integration pathways on the fly.
Information security
Information security
fromSecuritymagazine
6 days ago

No More Failures of Imagination: Future Proofing Airport Employee Screening

TSA requires larger airports to screen aviation workers and their belongings, prompting adoption of AI-enabled millimeter-wave screening to counter evolving insider and explosive threats.
Information security
fromWIRED
5 days ago

ICE Seeks Cyber Upgrade to Better Surveil and Investigate Its Employees

ICE is renewing a cybersecurity contract to expand monitoring, collection, and sharing of employee digital activity for security and internal investigations.
[ Load more ]