Information security

[ follow ]
#data-breach
fromTechCrunch
1 day ago
Information security

Data breach at Canadian airline WestJet affects 1.2M passengers | TechCrunch

fromIT Pro
3 days ago
Information security

Kido nursery hackers threaten to release more details - along with the personal data of 100 employees

fromTechCrunch
1 day ago
Information security

Data breach at Canadian airline WestJet affects 1.2M passengers | TechCrunch

fromIT Pro
3 days ago
Information security

Kido nursery hackers threaten to release more details - along with the personal data of 100 employees

#cybersecurity-training
fromTheregister
1 hour ago
Information security

Pentagon relaxes military cybersecurity training

The Pentagon ordered reductions and automation to cut mandatory cybersecurity, CUI, and Privacy Act training to prioritize warfighting focus and reduce training frequency.
fromTalentLMS Blog
16 hours ago
Information security

10 Essential Cybersecurity Topics for Employee Training

Comprehensive cybersecurity training for all employees prevents breaches, protects data, preserves customer trust, and reduces financial, legal, and reputational damage.
#cybersecurity
fromSecurityWeek
1 day ago
Information security

Cybersecurity Awareness Month 2025:Prioritizing Identity to Safeguard Critical Infrastructure

fromTechCrunch
2 days ago
Information security

A breach every month raises doubts about South Korea's digital defenses | TechCrunch

Information security
fromSecurityWeek
2 days ago

CISO Conversations: John 'Four' Flynn, VP of Security at Google DeepMind

John Flynn's early computer obsession and experiences growing up in violent locations directed him toward cybersecurity and led to a master's in computer science.
Information security
fromwww.bbc.com
3 days ago

Why burnout is a growing problem in cybersecurity

Cybersecurity professionals face widespread burnout from relentless incident-preparation and response demands, causing sleep disruption, workplace avoidance, and declining job satisfaction.
fromSecurityWeek
1 day ago
Information security

Cybersecurity Awareness Month 2025:Prioritizing Identity to Safeguard Critical Infrastructure

fromTechCrunch
2 days ago
Information security

A breach every month raises doubts about South Korea's digital defenses | TechCrunch

#ransomware
fromTechzine Global
12 hours ago

Red Hat hit by GitHub breach: 570GB stolen, including client info

Data from 28,000 internal projects at Red Hat has been stolen. The hacker group Crimson Collective claims to have stolen nearly 570GB of data. The stolen information is not only affecting Red Hat: BleepingComputer reports that customer data from around 800 Customer Engagement Reports has also been stolen. The hackers claim that the breach took place around two weeks ago. Customer Engagement Reports (CERs) are documents that contain infrastructure details, configuration data, authentication keys, and other sensitive customer information.
Information security
Information security
fromIT Pro
14 hours ago

Foreign states ramp up cyber attacks on EU with AI-driven phishing and DDoS campaigns

EU public administration faces intense state-aligned cyberespionage; phishing drives initial intrusions, hacktivist DDoS dominates incident counts, and vulnerability exploitation remains significant.
Information security
fromTheregister
14 hours ago

Red Hat repos raided, claims cybercrew, files stolen

Claimed breach of Red Hat private GitHub repos exposed ~570GB including CERs with architecture diagrams, configuration details, authentication tokens, and potential downstream customer compromises.
Information security
fromwww.techzine.eu
13 hours ago

Exabeam Nova guides security teams with peer benchmark data

Exabeam Nova adds anonymous benchmarking, AI-driven continuous security maturity scores, business-aware risk scoring, MITRE ATT&CK coverage visibility, and agent behavior analytics for insider threats.
Information security
fromSecuritymagazine
23 hours ago

Building Bridges: Overcoming Silos to Bring Organizations to the Next Level

Organizational silos in security create blind spots, reduce operational efficiency, and increase compliance and crisis-response risks across physical and cyber domains.
#smishing
Information security
fromThe Hacker News
11 hours ago

Automating Pentest Delivery: 7 Key Workflows for Maximum Impact

Automate penetration test finding delivery to enable real-time remediation, faster insights, cleaner handoffs, and consistent workflows for scalable exposure management.
#oracle-e-business-suite
fromIT Pro
13 hours ago
Information security

Google warns executives are being targeted for extortion with leaked Oracle data

fromIT Pro
13 hours ago
Information security

Google warns executives are being targeted for extortion with leaked Oracle data

fromThe Hacker News
11 hours ago

ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More

From unpatched cars to hijacked clouds, this week's Threatsday headlines remind us of one thing - no corner of technology is safe. Attackers are scanning firewalls for critical flaws, bending vulnerable SQL servers into powerful command centers, and even finding ways to poison Chrome's settings to sneak in malicious extensions. On the defense side, AI is stepping up to block ransomware in real time, but privacy fights over data access and surveillance are heating up just as fast.
Information security
#clop
fromTechCrunch
8 hours ago
Information security

Hackers are sending extortion emails to executives after claiming Oracle apps' data breach | TechCrunch

fromTechCrunch
8 hours ago
Information security

Hackers are sending extortion emails to executives after claiming Oracle apps' data breach | TechCrunch

Information security
fromTheregister
6 hours ago

Kodex outage blamed on AWS social engineering attack

Social engineering against AWS froze Kodex Global's domain, causing service outages and risking email interception despite Kodex claiming no internal breach.
#intel-sgx
#soc
Information security
fromThe Hacker News
11 hours ago

Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware

A high-volume extortion campaign, possibly linked to Cl0p and using compromised accounts tied to FIN11/TA505, targets executives claiming Oracle E-Business Suite data theft.
Information security
fromThe Hacker News
8 hours ago

Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware

Confucius targeted Pakistan using spear-phishing and malicious files to deploy WooperStealer and the Python backdoor Anondoor via DLL side-loading.
fromThe Hacker News
9 hours ago

Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown

JFrog said in an analysis. The executable ("_AUTORUN.EXE") is a compiled Go file that, besides including a SOCKS5 implementation as advertised, is also designed to run PowerShell scripts, set firewall rules, and relaunch itself with elevated permissions. It also carries out basic system and network reconnaissance, including Internet Explorer security settings and Windows installation date, and exfiltrates the information to a hard-coded Discord webhook.
Information security
fromThe Hacker News
13 hours ago

Warning: Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro

Slovak cybersecurity company ESET said the malicious apps are distributed via fake websites and social engineering to trick unsuspecting users into downloading them. Once installed, both the spyware malware strains establish persistent access to compromised Android devices and exfiltrate data. "Neither app containing the spyware was available in official app stores; both required manual installation from third-party websites posing as legitimate services," ESET researcher Lukáš Štefanko said. Notably, one of the websites distributing the ToSpy malware family mimicked the Samsung Galaxy Store, luring users into manually downloading and installing a malicious version of the ToTok app.
Information security
Information security
fromSecuritymagazine
1 day ago

3 Ways to Bolster Security This Cybersecurity Awareness Month

Increase AI and agentic AI visibility, strengthen identity security, and realign organizational security priorities to defend against modern cyber threats.
Information security
fromThe Hacker News
1 day ago

2025 Cybersecurity Reality Check: Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising

Widespread pressure to hide breaches, rising living-off-the-land attacks exploiting internal tools, and urgent prioritization of attack surface reduction and defensive hardening.
Information security
fromSecurityWeek
1 day ago

NIST Publishes Guide for Protecting ICS Against USB-Borne Threats

USB and other removable media in OT environments create significant malware risk; SP 1334 prescribes procedural, physical, technical, transportation and sanitization controls.
Information security
fromThe Hacker News
1 day ago

OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps

A OneLogin IAM vulnerability (CVE-2025-59363) exposes OIDC client secrets to attackers with valid API credentials, enabling application impersonation and lateral movement.
#phishing
fromZDNET
2 days ago
Information security

4 better ways to protect your business than dreaded (and useless) anti-phishing training

fromZDNET
2 days ago
Information security

4 better ways to protect your business than dreaded (and useless) anti-phishing training

fromDataBreaches.Net
1 day ago

AI-driven medical benefits servicer hit with data breach - DataBreaches.Net

Healthcare Interactive, a company that develops AI-based medical insurance benefit enrollment and billing solutions, confirmed last week that it experienced a data breach that involved personal data from customers being moved offsite by hackers. The exact number of impacted individuals was not revealed. However, the company said stolen data included names, dates of birth, Social Security numbers, contact information and health insurance enrollment data-including ID numbers.
Information security
Information security
fromTheregister
1 day ago

'Delightful' Red Hat OpenShift AI bug allows full takeover

A severe OpenShift AI vulnerability allows an authenticated low-privilege user to escalate to cluster administrator, risking data theft, service disruption, and full platform compromise.
Information security
fromTechzine Global
1 day ago

Databricks launches Data Intelligence for Cybersecurity

Databricks offers a unified lakehouse-based Data Intelligence for Cybersecurity platform to consolidate fragmented security data and enable AI agents with improved visibility and faster detection.
fromSecurityWeek
1 day ago

Chinese APT 'Phantom Taurus' Targeting Organizations With Net-Star Malware

A Chinese state-sponsored hacking group tracked as 'Phantom Taurus' has been targeting government and telecommunications organizations for espionage for more than two years, Palo Alto Networks reports. Initially observed in 2023, the APT was only recently linked to Chinese hacking groups through shared infrastructure, as its tactics, techniques and procedures (TTPs) differ from those typically associated with threat actors operating out of China. "These enable the group to conduct highly covert operations and maintain long-term access to critical targets," says Palo Alto Networks.
Information security
#cve-2025-41244
fromSecurityWeek
1 day ago

OpenSSL Vulnerabilities Allow Private Key Recovery, Code Execution, DoS Attacks

Two of the vulnerabilities have been assigned a 'moderate severity' rating. One of them is CVE-2025-9231, which may allow an attacker to recover the private key. OpenSSL is used by many applications, websites and services for securing communications and an attacker who can obtain a private key may be able to decrypt encrypted traffic or conduct a man-in-the-middle (MitM) attack.
Information security
Information security
fromNextgov.com
1 day ago

Attorneys scramble to advise clients after lapse of key cyber info-sharing law

Expiration of the 2015 Cybersecurity Information Sharing Act reduces legal protections for threat data sharing, discouraging exchanges and forcing contractual workarounds that slow cyberdefense coordination.
Information security
fromIT Pro
1 day ago

Cybersecurity leaders must stop seeing resilience as a "tick box exercise" to achieve meaningful protection, says Gartner expert

Businesses need business-function level BIAs, cross-team collaboration, and full asset and third-party visibility to embed effective cyber resilience.
#cisa
fromFast Company
1 day ago
Information security

U.S. cybersecurity was bad during the first Trump administration. Somehow, it's getting worse.

fromFast Company
1 day ago
Information security

U.S. cybersecurity was bad during the first Trump administration. Somehow, it's getting worse.

#windows-11
fromComputerWeekly.com
1 day ago

Cato extends zero trust access to SASE platform | Computer Weekly

The continued surge in hybrid work, bring your own device (BYOD) and contractor reliance has undeniably made businesses more agile and flexible, but it has also introduced a wave of unmanaged devices into enterprise environments that frequently lack security controls, creating exposure to data loss and regulatory risk. To mitigate these issues, Cato Networks has launched Browser Extension, what it calls "a lightweight onramp" to the company's core secure access service edge (SASE) platform.
Information security
Information security
fromTheregister
1 day ago

Beijing-backed burglars target government web servers

China-backed Phantom Taurus uses novel .NET-based NET-STAR malware to target IIS servers and pursue military, diplomatic, and government intelligence across Asia, Middle East, Africa.
Information security
fromSecurityWeek
1 day ago

Battering RAM Attack Breaks Intel and AMD Security Tech With $50 Device

Battering RAM is a physical-access hardware attack using a low-cost interposer to bypass Intel SGX and AMD SEV-SNP memory protections.
fromwww.bbc.com
1 day ago

Hackers delete children's pictures and data after nursery attack backlash

Hackers who attempted to extort a nursery chain by posting stolen images and data about children on the darknet have removed the posts and claim to have deleted the information. The criminals began posting profiles of the children to their website last Thursday, adding another 10 children days later and vowing to continue until Kido Schools paid a ransom in Bitcoin. The criminals also contacted parents directly with threatening phone calls whilst trying to get their ransom paid.
Information security
Information security
fromThe Hacker News
1 day ago

New Android Banking Trojan "Klopatra" Uses Hidden VNC to Control Infected Smartphones

Klopatra Android banking trojan has compromised over 3,000 devices using VNC and dynamic overlays to enable remote control, credential theft, and fraudulent transactions.
Information security
fromThe Hacker News
1 day ago

Hackers Exploit Milesight Routers to Send Phishing SMS to European Users

Milesight cellular routers with exposed SMS APIs are being abused to send phishing SMS smishing campaigns across European countries since February 2022.
#cyberattack
fromTechCrunch
2 days ago
Information security

Japan's beer-making giant Asahi stops production after cyberattack | TechCrunch

fromTechCrunch
2 days ago
Information security

Japan's beer-making giant Asahi stops production after cyberattack | TechCrunch

fromBitcoin Magazine
1 day ago

Remote Node Runner Pitfalls

Thanks to modern wallets and managed platforms, getting up and running can be low friction, secure and even enjoyable. But the moment you decide to take on the role of routing payments for others - hoping to earn satoshis from fees - the game changes completely. The Hidden Pitfalls of Running a Remote Lightning Node Running a remote Lightning node can be a powerful way to participate in the Bitcoin ecosystem.
Information security
fromIT Pro
1 day ago

HPE ProLiant Compute DL360 Gen12 review: A versatile Xeon 6 rack-optimised power plant

Businesses seeking a powerful rack-optimised server will find HPE's ProLiant Compute DL360 Gen12 could be just what they're looking for. Supporting up to 144-core Xeon 6 CPUs, this dual-socket 1U server targets a diverse range of high-performance workloads such as server consolidation, hybrid cloud, databases, VDI, data analytics, and virtualization. The Gen12 portfolio comprises eight servers and introduces a wealth of new features, including enhanced platform security.
Information security
#cloud-security
fromInfoWorld
2 days ago
Information security

When personal ambitions undermine enterprise security

Security professionals prioritizing career advancement over cloud security increase organizational risk of breaches and operational failures.
fromTechzine Global
2 days ago
Information security

Check Point and Wiz launch integrated cloud security

Integrated Check Point and Wiz solution provides real-time visibility and AI-driven prevention to secure cloud environments and reduce gateway configuration risks.
Information security
fromBusiness Matters
3 days ago

From Awareness to Enforcement: Building a GenAI-Secure Organization

Enforceable security controls are essential to transform Generative AI awareness into safe, practical, and measurable enterprise deployments.
Information security
fromSecurityWeek
2 days ago

New Guidance Calls on OT Operators to Create Continually Updated System Inventory

OT organizations must build and maintain definitive, continually updated records using asset inventories, SBOMs and prioritized processes to enable holistic risk assessment and controls.
Information security
fromSecurityWeek
2 days ago

High-Severity Vulnerabilities Patched in VMware Aria Operations, NSX, vCenter

Broadcom released patches fixing six VMware vulnerabilities—including four high-severity flaws—that affect Aria Operations, NSX, vCenter, VMware Tools, and related platforms.
Information security
fromSecurityWeek
2 days ago

Call for Presentations Open for 2025 CISO Forum Virtual Summit

SecurityWeek's 2025 CISO Forum Virtual Summit invites vendor-neutral virtual presentation submissions through Oct 10, 2025; presenters must meet technical and neutrality requirements.
#harrods
fromIT Pro
3 days ago
Information security

Harrods rejects contact with hackers, after 430,000 customer records stolen from third-party provider

fromIT Pro
3 days ago
Information security

Harrods rejects contact with hackers, after 430,000 customer records stolen from third-party provider

Information security
fromAbove the Law
2 days ago

When Ransomware Meets AI: The Next Frontier Of Cyber Extortion - Above the Law

Generative AI dramatically lowers the technical barrier to ransomware, creating fast, automated attacks that pose legal, operational, and reputational threats to law firms and clients.
Information security
fromSecurityWeek
2 days ago

Organizations Warned of Exploited Sudo Vulnerability

A critical Sudo local privilege escalation (CVE-2025-32463) allows any user to gain root privileges and has been exploited, requiring urgent patching.
Information security
fromThe Hacker News
2 days ago

Evolving Enterprise Defense to Secure the Modern AI Supply Chain

Enterprises must adopt continuous discovery, real-time monitoring, adaptive risk assessment, and governance to secure AI usage, data, and supply chains amid rapid Gen-AI adoption.
Information security
fromTheregister
2 days ago

50K Cisco firewalls remain vulnerable to advanced attacks

Nearly 50,000 internet-facing Cisco ASA and FTD devices remain potentially exploitable by CVE-2025-20333 and CVE-2025-20362, with over 19,000 in the US.
Information security
fromTheregister
2 days ago

Socket will block it with free malicious package firewall

Socket released Socket Firewall Free, a free CLI that blocks malicious dependencies at install time across npm, yarn, pnpm, pip, uv, and cargo.
Information security
fromThe Hacker News
2 days ago

Microsoft Expands Sentinel Into Agentic Security Platform With Unified Data Lake

Microsoft expanded Sentinel into a unified agentic SIEM with GA Sentinel data lake and previews of Sentinel Graph and Model Context Protocol server.
Information security
fromThe Hacker News
2 days ago

Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware

Phantom Taurus conducts stealthy, persistent cyber espionage against government and telecommunications targets across Africa, the Middle East, and Asia.
fromTheregister
2 days ago

North Korea's fake IT workers targeting healthcare, finance

The North Korean IT worker threat extends well beyond tech companies, with fraudsters interviewing at a "surprising" number of healthcare orgs, according to Okta Threat Intelligence. In research published Tuesday, the identity services provider said nearly half of the companies (48 percent) targeted by the scam fall outside the IT sector, and fraudsters are increasingly applying for remote jobs in finance, healthcare, public administration and professional services.
Information security
Information security
fromDataBreaches.Net
2 days ago

Georgia Tech Research Corporation Agrees to Pay $875,000 to Resolve Civil Cyber-Fraud Litigation - DataBreaches.Net

Georgia Tech Research Corporation agreed to pay $875,000 over allegations of failing required DoD cybersecurity controls in Air Force and DARPA contracts.
Information security
fromThe Hacker News
2 days ago

Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits

Three now-patched vulnerabilities in Google's Gemini AI could have allowed prompt and search-injection attacks and user data exfiltration across cloud services and browsing tools.
fromIT Pro
2 days ago

Organizations around the world are unprepared for the threat from bad bots - and UK businesses are some of the worst performers

The UK is one of the world's worst performers when it comes to protecting against bots - though most countries are pretty poor. That's according to DataDome, which states that only 1.8% of large UK domains are fully protected against bots, compared with a Europe-wide average of 2.5% and a global average of 2.8%. Bigger organizations are no better than smaller ones, with only 2% of domains with more than 30 million monthly visits fully protected.
Information security
Information security
fromThe Verge
2 days ago

Microsoft's new Security Store is like an app store for cybersecurity

Microsoft launches a Security Store offering SaaS security solutions and customizable Security Copilot AI agents integrated with Microsoft Defender, Sentinel, Entra, and Purview.
Information security
fromThe Hacker News
2 days ago

$50 Battering RAM Attack Breaks Intel and AMD Cloud Security Protections

A low-cost DDR4 interposer enables attackers to bypass Intel SGX and AMD SEV-SNP memory encryption, exposing confidential cloud workloads to plaintext read/write.
fromArs Technica
2 days ago

Intel and AMD trusted enclaves, the backbone of network security, fall to physical attacks

In the age of cloud computing, protections baked into chips from Intel, AMD, and others are essential for ensuring confidential data and sensitive operations can't be viewed or manipulated by attackers who manage to compromise servers running inside a data center. In many cases, these protections-which work by storing certain data and processes inside encrypted enclaves known as TEEs ( Trusted Execution Enclaves)-are essential for safeguarding secrets stored in the cloud by the likes of Signal Messenger and WhatsApp.
Information security
Information security
fromNextgov.com
2 days ago

DOD would curtail long-term intelligence work during government shutdown

DOD will maintain tactical, mission-critical intelligence during a government shutdown while pausing longer-term political, economic, and weapons-acquisition analysis until funding resumes.
Information security
fromZDNET
2 days ago

Can't upgrade your Windows 10 PC? You have 2 weeks to act - and 5 options

Windows 10 support ends Oct 14, 2025; incompatible PCs require upgrade, paid or free extended security updates, or replacement — doing nothing is unsafe.
fromThe Hacker News
3 days ago

The State of AI in the SOC 2025 - Insights from Recent Study

A comprehensive survey of 282 security leaders at companies across industries reveals a stark reality facing modern Security Operations Centers: alert volumes have reached unsustainable levels, forcing teams to leave critical threats uninvestigated. You can download the full report here. The research, conducted primarily among US-based organizations, shows that AI adoption in security operations has shifted from experimental to essential as teams struggle to keep pace with an ever-growing stream of security alerts.
Information security
fromTechzine Global
3 days ago

Akira ransomware strikes within an hour

Researchers at Arctic Wolf are sounding the alarm about a ransomware campaign that has been ongoing since July 2025 and is still claiming victims. What started as a series of breaches via SonicWall firewalls has now grown into one of the fastest and most dangerous attacks currently in circulation. New research shows that even devices with the latest firmware remain vulnerable.
Information security
[ Load more ]