Information security

[ follow ]
Information security
fromTechCrunch
4 hours ago

Indian pharmacy chain giant exposed customer data and internal systems | TechCrunch

A security lapse allowed outsiders full administrative control of DavaIndia Pharmacy's platform, exposing customer orders and sensitive drug-control functions.
Information security
fromComputerworld
6 hours ago

AI will likely shut down critical infrastructure on its own, no attackers required

Misconfigured AI controlling cyber-physical systems can unintentionally shut down national critical infrastructure in a G20 country by 2028.
#shadow-ai
Information security
fromSecurityWeek
21 hours ago

CISA Warns of Exploited SolarWinds, Notepad++, Microsoft Vulnerabilities

CISA warns multiple newly disclosed vulnerabilities in SolarWinds, Notepad++, and Apple have been exploited in the wild and are added to its KEV list.
Information security
fromThe Hacker News
21 hours ago

Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability

Critical BeyondTrust RCE CVE-2026-1731 is being actively exploited; apply provided RS and PRA patches immediately to prevent unauthorized access and data exfiltration.
Information security
fromSecurityWeek
16 hours ago

In Other News: Google Looks at AI Abuse, Trump Pauses China Bans, Disney's $2.7M Fine

Threat actors increasingly use AI across attack stages while critical infrastructure faces authentication and vulnerability gaps, prompting government responses and legal action.
#ransomware
#cve-2026-1731
fromSecurityWeek
20 hours ago
Information security

BeyondTrust Vulnerability Targeted by Hackers Within 24 Hours of PoC Release

Threat actors began exploiting CVE-2026-1731 in BeyondTrust Remote Support and Privileged Remote Access soon after a public PoC, targeting thousands of exposed instances.
fromSecurityWeek
3 days ago
Information security

BeyondTrust Patches Critical RCE Vulnerability

Critical unauthenticated RCE (CVE-2026-1731, CVSS 9.9) affects BeyondTrust RS and PRA; patches are available and many internet-accessible on-prem deployments are likely exposed.
#defense-industrial-base
fromSecurityWeek
1 day ago
Information security

Hacktivists, State Actors, Cybercriminals Target Global Defense Industry, Google Warns

fromSecurityWeek
1 day ago
Information security

Hacktivists, State Actors, Cybercriminals Target Global Defense Industry, Google Warns

#patch-tuesday
Information security
fromThe Hacker News
14 hours ago

Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

A Russian-affiliated actor uses CANFAIL malware and LLM-generated phishing lures to target Ukrainian defense, energy, aerospace, and related organizations.
fromSecurityWeek
1 day ago

China Revives Tianfu Cup Hacking Contest Under Increased Secrecy

Tianfu Cup was launched as an alternative to the Zero Day Initiative's Pwn2Own competition, which regularly pays out more than $1 million to white hat hackers who demonstrate critical vulnerabilities in consumer and enterprise hardware and software, industrial control systems, and automotive products. Tianfu Cup made headlines in 2021, when participants earned a total of $1.9 million for exploits targeting Windows, Ubuntu, iOS, Microsoft Exchange, Chrome, Safari, Adobe Reader, Asus routers, and various virtualization products.
Information security
fromSecurityWeek
23 hours ago

Chrome 145 Patches 11 Vulnerabilities

Google on Tuesday announced the release of Chrome 145 to the stable channel with fixes for 11 vulnerabilities, including three high-severity bugs. First in line is CVE-2026-2313, a high-severity use-after-free issue in CSS that earned the reporting researchers an $8,000 bug bounty reward. The two other high-severity defects, tracked as CVE-2026-2314 and CVE-2026-2315, were found and reported by Google and are described as a heap buffer overflow in Codecs and an inappropriate implementation in WebGPU, respectively.
Information security
Information security
fromTechzine Global
15 hours ago

Major hack of Dutch telco Odido was a classic case of social engineering

Phishing and phone-based social engineering allowed attackers to bypass MFA, access Odido's Salesforce accounts, and scrape up to 6.2 million customer records.
fromThe Hacker News
15 hours ago

UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

"This threat actor seems to have been active since 2019, although they have not necessarily used VoidLink over the duration of their activity," researchers Nick Biasini, Aaron Boyd, Asheer Malhotra, and Vitor Ventura said. "UAT-9921 uses compromised hosts to install VoidLink command-and-control (C2), which are then used to launch scanning activities both internal and external to the network."
Information security
Information security
fromThe Hacker News
19 hours ago

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

CL Suite Chrome extension exfiltrates Meta Business Suite and Facebook Business Manager TOTP seeds, 2FA codes, contact lists, and analytics to attacker-controlled servers.
fromComputerworld
15 hours ago

Four new reasons why Windows LNK files cannot be trusted

The number of ways that Windows shortcut (.LNK) files can be abused just keeps growing: A cybersecurity researcher has documented four new techniques to trick Windows users into running malicious actions through innocent-looking shortcuts. Wietze Beukema demonstrated how to spoof the visible LNK destination, hide command-line arguments, and execute a different program than the one shown to the user, potentially offering attackers new vectors for phishing, USB-borne attacks, or initial access operations.
Information security
Information security
fromSecurityWeek
19 hours ago

Dutch Carrier Odido Discloses Data Breach Impacting 6 Million

Odido data breach exposed names, contact details, dates of birth, customer and bank account numbers, and passport/driver's license information for about 6.2 million customers.
Information security
fromSecuritymagazine
1 day ago

Valentine's Day 2026: Inside the Industrial-Scale Romance Scam Economy

Over 630,000 professional cybercriminals operate romance scams at industrial scale, leveraging dating platforms and crypto to defraud victims, causing billions in losses.
#data-breach
Information security
fromTechzine Global
22 hours ago

Check Point acquires security startups Cyclops, Cyata, and Rotate

Check Point acquired three cybersecurity startups for about $150 million to expand capabilities in security data analytics, AI-agent controls, and MSP-focused risk management.
Information security
fromTheregister
1 day ago

Enforcing piracy policy earned helpdesk worker death threats

A desktop-support technician reported a colleague for widespread software piracy, leading to threats and later the former colleague committing murder.
Information security
fromInfoQ
1 day ago

Teleport Launches Agentic Identity Framework to Secure AI Agents Across Enterprise Infrastructure

Enterprises must treat autonomous AI agents as cryptographically secured identities, replacing static credentials with ephemeral, zero-trust identities to reduce risk and ensure secure agent deployments.
fromSecuritymagazine
1 day ago

Plenty of Associations, But Not Enough Association

I belong to six professional organizations. Or maybe it's 13, 19, 26, or 47. I can't be sure. The ones where I pay dues or volunteer I know well: ASIS International, the Life Safety Alliance, Chartered Security Professionals, and a couple of others. Then come the niche and industry-specific associations like the International Council of Shopping Centers, public-private partnerships such as OSAC and Infragard, and the countless ASIS Communities.
Information security
#microsoft-security-updates
fromTechRepublic
1 day ago
Information security

Microsoft's February Patch Tuesday Fixes 6 Zero-Days Under Attack

Microsoft released patches for 58 vulnerabilities, including six actively exploited zero-days affecting Windows, Office, and Remote Desktop components.
fromThe Hacker News
2 days ago
Information security

Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days

Microsoft released patches for 59 vulnerabilities, including six actively exploited flaws, with several rated Critical or Important across Windows, Office, and Edge.
Information security
fromThe Hacker News
1 day ago

ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories

Attackers increasingly exploit trusted tools, simple entry points, and overlooked exposures to maintain persistent, value-driven access across cybercrime and espionage.
Information security
fromTheregister
1 day ago

Supply chain breaches fuel cybercrime cycle, report says

Cybercriminals are industrializing supply chain attacks into a self-reinforcing ecosystem combining package compromise, credential theft, identity attacks, and ransomware.
Information security
fromThe Hacker News
1 day ago

Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

North Korea-linked Lazarus Group used fake recruitment campaigns to distribute malicious npm and PyPI packages embedded via dependencies in coding-assessment repositories.
Information security
fromThe Hacker News
1 day ago

83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure

A single PROSPERO-hosted IP (193.24.123[.]42) was responsible for roughly 83% of observed exploitation attempts targeting critical Ivanti EPMM vulnerabilities, using automated tooling.
Information security
fromTheregister
1 day ago

Ransomware crews abuse bossware to blend into networks

Threat actors are abusing legitimate employee monitoring and RMM software to hide in corporate networks and attempt ransomware deployment.
Information security
fromThe Hacker News
2 days ago

First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

A malicious Outlook add-in hijacked an abandoned add-in's domain, served a fake Microsoft login, and stole over 4,000 credentials in a supply chain takeover.
fromThe Hacker News
1 day ago

Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial intelligence (AI) model Gemini to conduct reconnaissance on its targets, as various hacking groups continue to weaponize the tool for accelerating various phases of the cyber attack life cycle, enabling information operations, and even conducting model extraction attacks. "The group used Gemini to synthesize OSINT and profile high-value targets to support campaign planning and reconnaissance,"
Information security
Information security
fromTechzine Global
1 day ago

Lumma Stealer back despite previous police action

Lumma Stealer infections are increasing, using ClickFix social-engineering and memory-only CastleLoader to deploy credential-stealing malware that exfiltrates passwords, wallets, and system data.
fromTheregister
2 days ago

Google: China's APT31 used Gemini to plan US cyberattacks

A Chinese government hacking group that has been sanctioned for targeting America's critical infrastructure used Google's AI chatbot, Gemini, to auto-analyze vulnerabilities and plan cyberattacks against US organizations, the company says. While there's no indication that any of these attacks were successful, "APT groups like this continue to experiment with adopting AI to support semi-autonomous offensive operations," Google Threat Intelligence Group chief analyst John Hultquist told The Register. "We anticipate that China-based actors in particular will continue to build agentic approaches for cyber offensive scale."
Information security
Information security
fromComputerworld
1 day ago

'Dead' Outlook add-in hijacked to phish 4,000 Microsoft Office Store users

Microsoft-signed add-ins can be hijacked via orphaned subdomains, allowing attackers to serve phishing content and gain permissions like reading and modifying user emails.
Information security
fromThe Hacker News
1 day ago

The CTEM Divide: Why 84% of Security Programs Are Falling Behind

Organizations implementing CTEM achieve markedly better visibility, higher solution adoption, and stronger threat awareness, creating a growing performance gap between adopters and non-adopters.
Information security
fromSecurityWeek
1 day ago

Microsoft to Enable 'Windows Baseline Security' With New Runtime Integrity Safeguards

Windows Baseline Security Mode will enable runtime integrity safeguards by default, allowing only properly signed apps, drivers, and services to run while permitting administrator overrides.
Information security
fromTheregister
1 day ago

30+ Chrome extensions disguised as AI chatbots steal secrets

Malicious Chrome extensions posing as AI assistants steal API keys, emails, and personal data while using a shared codebase and remote iframe control.
Information security
fromwww.socialmediatoday.com
2 days ago

Google Says That Scam Tactics Are Evolving Through AI Usage

AI tools dramatically enhance attackers' productivity, enabling more convincing phishing, model-extraction corporate espionage, and nation-state use for technical research and targeted campaigns.
Information security
fromDevOps.com
1 day ago

Bridging the Dev-Security Gap With Smarter Authorization - DevOps.com

Engineering and security must jointly define and enforce real-time authorization policies for LLMs and agents to prevent overpermissioning and AI-driven privilege escalation.
Information security
fromTechzine Global
1 day ago

Google sees increase in AI abuse by cybercriminals

Malicious actors are actively integrating generative AI into attacks, using model distillation, AI-assisted phishing, and automated code generation to increase efficiency and evade detection.
Information security
fromBitcoin Magazine
1 day ago

Bitcoin Advances Toward Quantum Resistance With BIP 360

BIP 360 proposes Pay-to-Merkle-Root (P2MR) to reduce quantum vulnerability while maintaining Tapscript compatibility and enabling future post-quantum signature upgrades.
Information security
fromDevOps.com
1 day ago

Secure DevOps at Scale: Integrating SRE, DevSecOps and Compliance - DevOps.com

Integrate security into DevOps and SRE to automate compliance and resilience within cloud-native SaaS pipelines from the start.
fromComputerworld
1 day ago

11 steps to smarter Google account security

While you're thinking about third-party add-ons for your computer and phone, take a moment to review everything you have installed on both fronts and consider how many of those programs you actually still use. The fewer cracked windows you allow on your Google account, the better - and if you aren't even using something, there's no reason to keep it connected.
Information security
Information security
fromTechCrunch
1 day ago

Hacker linked to Epstein removed from Black Hat cyber conference website | TechCrunch

Vincenzo Iozzo has been removed from Black Hat and Code Blue review boards amid revelations linking him to Jeffrey Epstein in DOJ-released documents.
fromTechzine Global
1 day ago

Palo Alto completes $25 billion acquisition of CyberArk

Palo Alto Networks has officially completed its $25 billion acquisition of CyberArk. Identity security will now become a core pillar of Palo Alto's platform offering. The deal, announced in July 2025, was completed faster than expected due to German approval. The acquisition adds more than 10,000 CyberArk customers to Palo Alto's customer base. These organizations use the platform for identity security, with a focus on Privileged Access Management. The offering focuses on securing human, machine, and AI identities.
Information security
Information security
fromSecurityWeek
3 days ago

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, Phoenix Contact

Multiple industrial control and OT vendors released Patch Tuesday advisories for critical and high-severity vulnerabilities affecting ICS/OT products, with patches and mitigations provided.
#windows
fromTechCrunch
2 days ago
Information security

Microsoft says hackers are exploiting critical zero-day bugs to target Windows and Office users | TechCrunch

fromTechCrunch
2 days ago
Information security

Microsoft says hackers are exploiting critical zero-day bugs to target Windows and Office users | TechCrunch

fromSecurityWeek
2 days ago

Ivanti Patches Endpoint Manager Vulnerabilities Disclosed in October 2025

Ivanti on Tuesday announced patches for over a dozen vulnerabilities in Endpoint Manager (EPM), including issues that were first disclosed in October 2025. In a new advisory, the company warns of a high-severity bug and a medium-severity flaw resolved in EPM, both of which could be exploited remotely. Tracked as CVE-2026-1603, the high-severity weakness is described as an authentication bypass leading to the exposure of credential data.
Information security
Information security
fromComputerWeekly.com
2 days ago

The world's default productivity tool is becoming a national security liability | Computer Weekly

Dependence on a default productivity platform concentrates systemic risk as state-backed groups like APT28 rapidly weaponize Office vulnerabilities, turning spreadsheets into tools of cyber warfare.
Information security
fromTechRepublic
2 days ago

Microsoft Patches Windows Flaw Causing VPN Disruptions

A patched RasMan vulnerability (CVE-2026-215) allowed local attackers to crash Windows Remote Access Connection Manager, disrupting VPN and remote access services.
#microsoft-patch-tuesday
Information security
fromComputerworld
2 days ago

Windows shortcut files targeted by ransomware gang Global Group

Phishing campaigns now weaponize Windows .lnk shortcut files to silently deploy Global Group ransomware via 'Your document' email attachments.
fromThe Hacker News
2 days ago

SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits

"The toolset blends stealth helpers with legacy-era Linux exploitation: Alongside log cleaners (utmp/wtmp/lastlog tampering) and rootkit-class artifacts, the actor keeps a large back-catalog of Linux 2.6.x-era exploits (2009-2010 CVEs)," cybersecurity company Flare said. "These are low value against modern stacks, but remain effective against 'forgotten' infrastructure and long-tail legacy environments." SSHStalker combines IRC botnet mechanics with an automated mass-compromise operation that uses an SSH scanner and other readily available scanners to co-opt susceptible systems into a network and enroll them in IRC channels.
Information security
fromThe Hacker News
2 days ago

APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities

Indian defense sector and government-aligned organizations have been targeted by multiple campaigns that are designed to compromise Windows and Linux environments with remote access trojans capable of stealing sensitive data and ensuring continued access to infected machines. The campaigns are characterized by the use of malware families like Geta RAT, Ares RAT, and DeskRAT, which are often attributed to Pakistan-aligned threat clusters tracked as SideCopy and APT36 (aka Transparent Tribe).
Information security
Information security
fromComputerWeekly.com
2 days ago

CVE volumes may plausibly reach 100,000 this year | Computer Weekly

Disclosed CVEs may exceed 50,000 in 2026, with realistic scenarios reaching 70,000–100,000 and an urgent need to scale and prioritise vulnerability response.
Information security
fromTheregister
2 days ago

Infosec researchers mull curious case of Telnet ancient flaw

Tier-1 transit operators likely applied port 23 filtering after advance warning of a critical GNU InetUtils telnetd flaw (CVE-2026-24061), collapsing Telnet traffic.
fromThe Hacker News
3 days ago

North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from Windows and macOS systems with the ultimate goal of facilitating financial theft. "The intrusion relied on a social engineering scheme involving a compromised Telegram account, a fake Zoom meeting, a ClickFix infection vector, and reported usage of AI-generated video to deceive the victim," Google Mandiant researchers Ross Inman and Adrian Hernandez said.
Information security
Information security
fromTheregister
2 days ago

Notepad's new Markdown powers served with a side of RCE

Notepad's Markdown support contains a vulnerability (CVE-2026-20841) that can achieve remote code execution when users open a malicious Markdown file and click a link.
fromArs Technica
2 days ago

Once-hobbled Lumma Stealer is back with lures that are hard to resist

A core part of the resurgence is the use of CastleLoader, a separate piece of malware that's installed initially. It runs solely in memory, making it much harder to detect than malware that resides on a hard drive. Its code is heavily obfuscated, making it hard to spot its malice even when malware scanners can see it. CastleLoader also provides a flexible and full-featured command-and-control communication mechanism that users can customize to meet their specific needs.
Information security
fromTheregister
3 days ago

Claude add-on turns Google Calendar into malware courier

Claude Desktop Extensions, recently renamed MCP Bundles, are packaged applications that extend the capabilities of Claude Desktop using the Model Context Protocol, a standard way to give generative AI models access to other software and data. Stored as .dxt files (with Anthropic transitioning the format to .mcpb), they are ZIP archives that package a local MCP server alongside a manifest.json file describing the extension's capabilities.
Information security
fromThe Verge
2 days ago

Microsoft fixes Notepad flaw that could trick users into clicking malicious Markdown links

Microsoft has fixed a serious security vulnerability affecting Markdown files in Notepad. In the company's Tuesday patch notes, Microsoft says a bad actor could carry out a remote code execution attack by tricking users "into clicking a malicious link inside a Markdown file opened in Notepad," as reported earlier by The Register. Clicking the link would "launch unverified protocols," allowing attackers to remotely load and execute malicious files on a victim's computer, according to the patch notes.
Information security
Information security
fromTheregister
2 days ago

Payroll pirates conned the help desk, stole employee's pay

Attackers used compromised shared-mailbox credentials and a help-desk MFA reset via social engineering to divert a physician's salary into the attacker's account.
Information security
fromSecurityWeek
2 days ago

Google-Intel Security Audit Reveals Severe TDX Vulnerability Allowing Full Compromise

Google and Intel's joint review of Intel TDX uncovered five vulnerabilities and 35 bugs, leading to patches for privilege escalation and information disclosure issues.
Information security
fromThe Hacker News
2 days ago

Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments

Exposed intentionally vulnerable training applications in active cloud accounts can provide attackers an initial foothold to access and compromise broader cloud infrastructure.
fromSecurityWeek
2 days ago

Microsoft to Refresh Windows Secure Boot Certificates in June 2026

Renewed Secure Boot certificates will be rolled out to Windows systems starting in June, as the old certificates are reaching the end of their lifecycle, Microsoft announced on Tuesday. Since 2011, Secure Boot has been providing protections against sophisticated threats by ensuring that only trusted, digitally signed software is executed from the moment the device is powered on, even before Windows starts.
Information security
Information security
fromTheregister
2 days ago

Posting AI caricatures on social media is bad for security

Posting AI-generated work caricatures publicly can expose personal and employer information, increasing risk of social engineering, LLM account takeovers, and sensitive data theft.
fromSecurityWeek
2 days ago

Zast.AI Raises $6 Million for AI-Powered Code Security

Founded in 2024, Seattle-based Zast.AI relies on AI agents to identify and validate software vulnerabilities before reporting them, to eliminate false positives. Relying on an "automated PoC generation + validation" architecture, the company performs deep code analysis, generating proof-of-concept (PoC) exploits and executing them to confirm security defects. This 'zero false positive' approach, the startup says, also reduces alert fatigue and allows security teams to focus on real risks.
Information security
Information security
fromTechCrunch
2 days ago

DOJ says Trenchant boss sold exploits to Russian broker capable of accessing 'millions of computers and devices' | TechCrunch

A former Trenchant executive stole and sold eight hacking tools enabling potential global surveillance and cyberattacks, pleaded guilty, and faces prison, fines, and restitution.
Information security
fromZDNET
3 days ago

Can you trust LastPass in 2026? Inside the multimillion-dollar quest to rebuild its security culture

LastPass used the 2022 data breach as a catalyst to substantially strengthen security controls and prioritize consumer security beyond typical program standards.
Information security
fromSecurityWeek
2 days ago

Webinar Today: Identity Under Attack - Strengthen Your Identity Defenses

Adopt an identity-first security strategy to protect sensitive data, meet compliance requirements, and balance security, user experience, and operational efficiency against identity threats.
Information security
fromSecurityWeek
2 days ago

GitGuardian Raises $50 Million for Secrets and Non-Human Identity Security

GitGuardian raised $50 million to advance non-human identity governance and AI agent security, expanding globally and enhancing secrets management and agent-focused engineering.
Information security
from24/7 Wall St.
2 days ago

Surviving the SaaS-pocalypse: JPMorgan's 3 Top Cyber Stocks Ready to Surge

AI-enabled plug-ins triggered a near-$1 trillion SaaS sell-off before fears eased, while CrowdStrike’s AI-native Falcon platform positions it for sustained growth.
Information security
fromSecurityWeek
2 days ago

Nevada Unveils New Statewide Data Classification Policy Months After Cyberattack

Nevada implemented a four-tier data classification policy—public, sensitive, confidential, restricted—to standardize state data privacy and assign agencies responsibility for classification and compliance.
Information security
fromSecurityWeek
2 days ago

Hacker Conversations: Professional Hacker Douglas Day

A hacker uses systems in unintended ways; computer hacking can be a professional, bug-bounty–funded occupation and applies beyond computers.
Information security
fromComputerWeekly.com
2 days ago

CIOs discuss friction between legacy IT and innovation | Computer Weekly

CIOs must balance adopting AI-driven innovation with securing deeply embedded legacy systems and regulatory compliance while maintaining business continuity.
Information security
fromComputerWeekly.com
3 days ago

Researchers delve inside new SolarWinds RCE attack chain | Computer Weekly

Attackers exploited SolarWinds Web Help Desk deserialization vulnerability (CVE-2025-40551) to gain RCE, deploy Zoho ManageEngine RMM, and use Velociraptor for C2.
Information security
fromTechzine Global
3 days ago

Attackers exploit SolarWinds vulnerability to deploy ransomware

Attackers exploited SolarWinds Web Help Desk vulnerabilities to deploy RMM agents and Velociraptor as C2 infrastructure, conduct reconnaissance, and prepare systems for ransomware.
Information security
fromTheregister
3 days ago

Microsoft's Valentine's gift to admins: 6 zero-day fixes

Six Microsoft vulnerabilities were exploited as zero-days before February Patch Tuesday, including three publicly disclosed flaws enabling remote code execution and security feature bypasses.
Information security
fromSecurityWeek
3 days ago

SAP Patches Critical CRM, S/4HANA, NetWeaver Vulnerabilities

SAP released 27 security notes including two critical vulnerabilities (CVE-2026-0488 and CVE-2026-0509) enabling database compromise and unauthorized background remote function calls.
Information security
fromZero Day Initiative
3 days ago

Zero Day Initiative - The February 2026 Security Update Review

Adobe released nine bulletins fixing 44 CVEs; After Effects and Substance 3D Stager received the most Critical fixes, with no publicly known exploits.
Information security
fromThe Hacker News
4 days ago

Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution

Critical SQL injection in FortiClientEMS (CVE-2026-21643, CVSS 9.1) allows unauthenticated attackers to execute arbitrary code; affected versions require immediate upgrade.
fromTechRepublic
3 days ago

10K Claude Desktop Users Exposed by Zero-Click Vulnerability

LayerX researchers found that a single malicious Google Calendar event can trigger remote code execution on Claude Desktop systems, enabling silent takeover at scale. "If exploited by a bad actor, even a benign prompt ("take care of it"), coupled with a maliciously worded calendar event, is sufficient to trigger arbitrary local code execution that compromises the entire system," said LayerX researchers in their analysis.
Information security
[ Load more ]