URL has been copied successfully!
Collecting Cyber-News from over 60 sources
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Cyber-Security-News

access ai android api apple attack authentication backdoor breach business ceo china cisa cisco ciso cloud compliance control credentials crypto cve cyber cyberattack cybercrime cybersecurity data data-breach defense detection email exploit finance flaw framework fraud germany google governance government group hacker hacking healthcare identity infrastructure intelligence Internet jobs law leak linux malicious malware microsoft monitoring network open-source password phishing privacy ransomware remote-code-execution resilience risk russia scam service software strategy supply-chain technology theft threat tool unclassified update usa vulnerability windows zero-day

  • Healthcare Cyber Research Programs Escape Budget Knife

    UPGRADE and DigiSeals Programs at ARPA-H Remain Fully Funded. A U.S. federal grant effort to develop autonomous medical device patching platforms for hospitals evaded the budget-cutting knife of the Trump administration. Program boosters hope to automate cyber defenses so that hospitals of any size can more quickly patch vulnerabilities. First seen on govinfosecurity.com Jump to…

  • Finance Chiefs Warn New AI Models May Rattle Global Banking

    Officials Warned New Models Could Accelerate Cyber Risks Faster Than Rules. Global finance officials meeting in Washington warned that advanced artificial intelligence models could expose structural weaknesses across banking and payment systems, speeding vulnerability discovery and cyber exploitation faster than regulators can build guardrails. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/finance-chiefs-warn-new-ai-models-may-rattle-global-banking-a-31457 also interesting: Rising…

  • US-sanctioned currency exchange says $15 million heist done by unfriendly states

    Grinex says needed hacking resources “available exclusively to … unfriendly states.” First seen on arstechnica.com Jump to article: arstechnica.com/security/2026/04/russia-friendly-exchange-says-western-special-service-behind-15-million-cyberattack/ also interesting: Hackers Use Blockchain to Hide Malware in Plain Sight CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat Hacker gets seven years for breaching Rotterdam and Antwerp ports Suspected Chinese Cyberespionage Operation Hits 53 Telecoms

  • How NIST’s Cutback of CVE Handling Impacts Cyber Teams

    Industry and ad hoc coalitions appear poised to help fill the gap created by NIST’s decision to cut back on CVE data enrichment. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/nist-cutbacks-nvd-handling-impacts-cyber-teams also interesting: Cybersecurity Snapshot: Prompt Injection and Data Disclosure Top OWASP’s List of Cyber Risks for GenAI LLM Apps CVE program faces swift end…

  • Critical Exploits, AI Shifts, and Major Breaches Redefine Cybersecurity This Week

    Weekly summary of Cybersecurity Insider newsletters First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/weekly-roundup/critical-exploits-ai-shifts-and-major-breaches-redefine-cybersecurity-this-week/ also interesting: The 2024 cyberwar playbook: Tricks used by nation-state actors Cybersecurity Snapshot: F5 Breach Prompts Urgent U.S. Gov’t Warning, as OpenAI Details Disrupted ChatGPT Abuses The Changing Threat Landscape for Retailers: Why is data security working harder than last year?…

  • Critical Exploits, AI Shifts, and Major Breaches Redefine Cybersecurity This Week

    Weekly summary of Cybersecurity Insider newsletters First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/weekly-roundup/critical-exploits-ai-shifts-and-major-breaches-redefine-cybersecurity-this-week/ also interesting: Your Network Is Showing Time to Go Stealth Only 49% of companies to increase cyber budget after a breach 71% of CISOs hit with third-party security incident this year The Changing Threat Landscape for Retailers: Why is data security…

  • Kyrgyzstan-based crypto exchange Grinex shuts down after $13.7M cyber heist, blames Western Intelligence

    Grinex halted operations after a $13.7M hack, blaming Western intelligence. Stolen funds came from wallets of Russian users on the platform. Kyrgyz crypto exchange Grinex halted operations after a threat actor stole $13.7 million in a cyber attack that the company attributes to Western intelligence agencies. The stolen funds belonged to Russian users, as the…

  • Flawed Cisco update threatens to stop APs from getting further patches

    This article originally appeared on NetworkWorld. First seen on csoonline.com Jump to article: www.csoonline.com/article/4160507/flawed-cisco-update-threatens-to-stop-aps-from-getting-further-patches-2.html also interesting: Cisco addresses a critical privilege escalation bug in Meeting Management Cisco IMC Virtual Keyboard Vulnerability Allows Attackers to Redirect Users to Malicious Websites Cisco admins urged to patch IOS, IOS XE devices Hackers Stole Millions of PornHub Users’ Data…

  • Clothing Retailer Patches Website Flaw Exposing Customer Data

    A clothing retailer patched a website flaw that exposed customer data via order links, highlighting risks associated with predictable URL structures. The post Clothing Retailer Patches Website Flaw Exposing Customer Data appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-clothing-retailer-data-exposure-order-link-flaw/ also interesting: The AI Security Dilemma: Navigating the High-Stakes World of Cloud…

  • Anthropic Releases Opus 4.7, Not as ‘Broadly Capable’ as Mythos AI

    Anthropic launches Opus 4.7 with improved coding and reasoning, as its more “broadly capable” Mythos AI remains restricted over security concerns. The post Anthropic Releases Opus 4.7, Not as ‘Broadly Capable’ as Mythos AI appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-anthropic-opus-4-7-mythos-ai/ also interesting: US Export Control Rules on AI Chips…

  • Founder Liquidity Without Compromising on Growth

    Founders can access liquidity without exiting by selling shares via secondary deals, reducing financial pressure while staying focused on long-term growth. First seen on hackread.com Jump to article: hackread.com/founder-liquidity-without-compromising-growth/ also interesting: Cybersecurity Insights with Contrast CISO David Lindner – 05/23/25 Nearly 300,000 people were impacted by cyberattack on Nova Scotia Power CISO Julie Chatman offers…

  • Man who hacked US Supreme Court filing system sentenced to probation

    Nicholas Moore hacked into three U.S. government networks using stolen credentials, and then bragged about it and posted victims’ personal data on Instagram under the handle @ihackedthegovernment. First seen on techcrunch.com Jump to article: techcrunch.com/2026/04/17/man-who-hacked-us-supreme-court-filing-system-sentenced-to-probation/ also interesting: Cybersecurity Snapshot: Study Raises Open Source Security Red Flags, as Cyber Agencies Offer Prevention Tips Against Telecom Spying…

  • Booking.com Breach Shows Exactly How Smishing Attacks Get Made

    Booking.com’s breach exposed names, phone numbers, and booking details now being used in targeted WhatsApp phishing. Constella explains how the PII-to-smishing pipeline works and what to do about it. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/booking-com-breach-shows-exactly-how-smishing-attacks-get-made/ also interesting: Is your perimeter having an identity crisis? 7 biggest cybersecurity stories of 2024 TDL001 – Cybersecurity…

  • prompted 2026 Kinetic Risk: Securing And Governing Physical Al In The Wild

    Author, Creator & Presenter: Padma Apparao, Architecting Al Solutions, Govt Agencies Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations’ YouTube Channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/unprompted-2026-kinetic-risk-securing-and-governing-physical-al-in-the-wild/ also interesting: Yahoo Finance: U.S. Lawmakers Push to Ban China’s DeepSeek AI…

  • We Need a Shared Responsibility Model for AI

    Over the past 6-8 months, researchers at my company discovered vulnerabilities across multiple AI tools that allowed external bad actors to steal data, exploit AI browsers, or poison the core memories of AI systems. As we responsibly disclosed these flaws, we found that AI vendors almost universally told us, “It’s not our problem.” In their..…

  • We Need a Shared Responsibility Model for AI

    Over the past 6-8 months, researchers at my company discovered vulnerabilities across multiple AI tools that allowed external bad actors to steal data, exploit AI browsers, or poison the core memories of AI systems. As we responsibly disclosed these flaws, we found that AI vendors almost universally told us, “It’s not our problem.” In their..…

  • Payouts King ransomware uses QEMU VMs to bypass endpoint security

    The Payouts King ransomware is using the QEMU emulator as a reverse SSH backdoor to run hidden virtual machines on compromised systems and bypass endpoint security. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/payouts-king-ransomware-uses-qemu-vms-to-bypass-endpoint-security/ also interesting: Top 7 zero-day exploitation trends of 2024 A new era of cyberthreats from sophisticated threat actors is here Microsoft…

  • New RecruitRat, SaferRat, Astrinox, Massiv Android Malware Found Targeting 800 Apps

    New research from Zimperium reveals four active Android malware campaigns, RecruitRat, SaferRat, Astrinox, and Massiv, targeting over 800 banking apps globally. First seen on hackread.com Jump to article: hackread.com/recruitrat-saferrat-astrinox-massiv-android-malware/ also interesting: New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials >>Crocodilus<< A New Malware Targeting Android Devices for Full Takeover Fake IPTV…

  • Four arrested in latest ‘PowerOFF’ DDoShire takedown

    More than 20 countries participated in a coordinated takedown of platforms selling cheap access to distributed denial-of-service (DDoS) attacks. First seen on therecord.media Jump to article: therecord.media/ddos-hire-europol-doj-crackdown also interesting: 8 tough trade-offs every CISO must navigate Operation PowerOFF: 53 DDoS domains seized and 3 Million criminal accounts uncovered Four arrested in latest ‘PowerOFF’ DDoShire takedown…

  • Four arrested in latest ‘PowerOFF’ DDoShire takedown

    More than 20 countries participated in a coordinated takedown of platforms selling cheap access to distributed denial-of-service (DDoS) attacks. First seen on therecord.media Jump to article: therecord.media/ddos-hire-europol-doj-crackdown also interesting: 8 tough trade-offs every CISO must navigate 9 things CISOs need know about the dark web TDL003 – Breaking Barriers: IPv6 Adoption and DNS Transformation with…

  • Four arrested in latest ‘PowerOFF’ DDoShire takedown

    More than 20 countries participated in a coordinated takedown of platforms selling cheap access to distributed denial-of-service (DDoS) attacks. First seen on therecord.media Jump to article: therecord.media/ddos-hire-europol-doj-crackdown also interesting: 8 tough trade-offs every CISO must navigate 9 things CISOs need know about the dark web TDL003 – Breaking Barriers: IPv6 Adoption and DNS Transformation with…

  • Ransomware attack continues to disrupt healthcare in London nearly two years later

    More than 18 months after a ransomware attack disrupted care at hospitals in South East London, documents show at least one NHS trust is still working without fully restored systems and managing large backlogs of delayed test results. First seen on therecord.media Jump to article: therecord.media/ransomware-nhs-cyberattack-disruption also interesting: UnitedHealth brings some Change Healthcare pharmacy services…

  • National Vulnerability Database (NVD) Shifts to Selective Enrichment as CVE Volume Surges

    Under a new model announced by the National Institute of Standards and Technology, NVD will no longer enrich every CVE. Instead, enrichment efforts will focus on a defined subset, including vulnerabilities in the CISA KEV catalog, software used by the federal government, and software designated as critical. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/national-vulnerability-database-nvd-shifts-to-selective-enrichment-as-cve-volume-surges/…

  • Bank cyber teams on red alert as Anthropic promises them Mythos next week

    Artificial intelligence supplier promises UK banks opportunity to review AI model, which has already revealed thousands of security flaws First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366641763/Bank-cyber-teams-on-red-alert-as-Anthropic-promises-them-Mythos-next-week also interesting: Smarter Threats Need Smarter Defenses: AI, APIs, and the Reality for Critical Infrastructure Security Smarter Threats Need Smarter Defenses: AI, APIs, and the Reality for Critical…

  • North Korean social engineering campaign targets macOS users

    A MacOS-focused social engineering campaign orchestrated by North Korea-based threat actor Sapphire Sleet has been exposed by Microsoft’s Threat Intelligence Unit. First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366641953/North-Korean-social-engineering-campaign-targets-macOS-users also interesting: ClickFix techniques evolve in new infostealer campaigns Hackers Manipulate Users Into Running PowerShell as Admin to Exploit Windows Modern supply-chain attacks and their real-world…

  • Maximizing Mythos Returns Requires AI Cybersecurity Pipeline

    Optimizing Value and Utility Hinges on AI Scaffolding, Says Aisle’s Ondrej Vlcek. While the world is in awe of how Mythos can find vulnerabilities and chain together exploits, the next step is to identify how to build the best cybersecurity pipelines and scaffolding to get maximum value from all AI models used inside an organization,…

  • ISMG Editors: Adapting to the Looming Mythos AI Onslaught

    Also: NY State Regs Test Resilience vs Compliance, OT Security Nears Breaking Point. In this week’s panel, four ISMG editors explore the industry’s response to Anthropic’s Mythos AI breakthrough, whether tighter New York state cybersecurity rules are driving real resilience or simply compliance, and why operational technology security is fast becoming a critical frontline concern.…

  • ISMG Editors: Adapting to the Looming Mythos AI Onslaught

    Also: NY State Regs Test Resilience vs Compliance, OT Security Nears Breaking Point. In this week’s panel, four ISMG editors explore the industry’s response to Anthropic’s Mythos AI breakthrough, whether tighter New York state cybersecurity rules are driving real resilience or simply compliance, and why operational technology security is fast becoming a critical frontline concern.…

  • Moving Toward Identity Intelligence in Fraud Detection

    Point Predictive’s Frank McKenna on Detecting Hidden Signals in Synthetic IDs. Fraud detection is moving beyond verification toward identity intelligence. Frank McKenna, co-founder and chief fraud strategist at Point Predictive says synthetic identities leave subtle signals such as thin profiles and behavioral traits that demand deeper analysis from fraud investigators. First seen on govinfosecurity.com Jump…

  • The Race to Quantum-Proof the Internet Has Already Begun

    The race to quantum-proof the internet is underway as experts warn of “harvest now, decrypt later” risks and slow migration to post-quantum security. First seen on hackread.com Jump to article: hackread.com/race-to-quantum-proof-the-internet/ also interesting: Car Subscription Features Raise Your Risk of Government Surveillance, Police Records Show Beijing may have breached US government systems before Cityworks plugged…

  • Hackers are abusing unpatched Windows security flaws to hack into organizations

    A security researcher published details of three security vulnerabilities in Windows Defender, and the code used to exploit them. Now, hackers are taking advantage of the vulnerabilities in real-life attacks, according to a cybersecurity firm. First seen on techcrunch.com Jump to article: techcrunch.com/2026/04/17/hackers-are-abusing-unpatched-windows-security-flaws-to-hack-into-organizations/ also interesting: The 2024 cyberwar playbook: Tricks used by nation-state actors Hackers…

  • The surveillance law Congress can’t quit, and can’t explain

    Congress overhauled Section 702 in 2024 with 56 changes. Now, as the law nears expiration, supporters and critics can’t even agree on what the numbers show. First seen on cyberscoop.com Jump to article: cyberscoop.com/section-702-fisa-surveillance-law-renewal-congress-debate/ also interesting: ViLE gang members sentenced for DEA portal breach, extortion Cyber information sharing law would get extension under shutdown deal…

  • Randall Munroe’s XKCD ‘Home Remedies’

    via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2026/04/randall-munroes-xkcd-home-remedies/ also interesting: Oxford City Council Hit by Cyberattack Exposing Employee Personal Data Dark Web Travel Agencies Exploit Cheap Deals to Steal Credit Card Data Data Breach at Doctors Imaging Group Exposes Sensitive Patient…

  • When Geopolitics Writes Your Compliance Roadmap

    Cyber policy has always lagged cyber reality. Regulations arrive after breaches, frameworks emerge after failures, and accountability structures materialize long after the damage lands on someone else’s balance sheet. NCC Group’s fifth edition of its Global Cyber Policy Radar suggests that cycle is finally breaking, not because governments have gotten smarter, but because the.. First…

  • The Wall Around Claude 4.7 Does Not Extend to Dread

    <div cla Anthropic released Claude Opus 4.7 on April 16, 2026 with automated cybersecurity safeguards and a Cyber Verification Program. Dark web intelligence from the same week, a cross-vendor prompt injection disclosure published the same morning, and the unanswered policy question of who decides which defenders deserve access to frontier AI all point to the…

  • The Wall Around Claude 4.7 Does Not Extend to Dread

    <div cla Anthropic released Claude Opus 4.7 on April 16, 2026 with automated cybersecurity safeguards and a Cyber Verification Program. Dark web intelligence from the same week, a cross-vendor prompt injection disclosure published the same morning, and the unanswered policy question of who decides which defenders deserve access to frontier AI all point to the…

  • NIST, Overrun by Massive Numbers of Submitted CVEs, Limits Analysis Work

    NIST said it overwhelmed by the surge in the number of CVEs submissions in recent years, so it is paring back the analysis work it does on the dangerous security flaws. Security experts say the number of new vulnerabilities detected will only grow during the AI era and that the private sector will need to…

  • Europe Spurs Digital Sovereignty With $213M Cloud Contract

    The European Union Is Cutting Ties With US Tech Companies. The European Commission made a significant move towards digital sovereignty by awarding a 180 million euro – approximately $213 million – cloud contract to a quartet of European providers. The deal will allow the commission and the EU Parliament and council to procure sovereign cloud…

  • Opsec oopsie: Dutch navy frigate location outed by mailing it a Bluetooth tracker

    Or, how public information and a Euro5 tracker exposed an avoidable opsec lapse First seen on theregister.com Jump to article: www.theregister.com/2026/04/17/dutch_navy_frigate_tracked/ also interesting: Data breach confirmed by Truist Bank following Sp1d3r claims Threat Actors Allegedly Claims Breach of EazyDiner Reservation Platform T-Mobile Sued by Washington State Over 2021 Data Breach Datenleck bei einem Finanzdienstleister in…

  • Opsec oopsie: Dutch navy frigate location outed by mailing it a Bluetooth tracker

    Or, how public information and a Euro5 tracker exposed an avoidable opsec lapse First seen on theregister.com Jump to article: www.theregister.com/2026/04/17/dutch_navy_frigate_tracked/ also interesting: Data Breach at Doctors Imaging Group Exposes Sensitive Patient Information OAuth token compromise hits Salesforce ecosystem again, Gainsight impacted Barts Health NHS Reveals Data Breach Linked to Oracle Zero-Day Exploited by Clop…

  • CISA tells feds to patch 13-year-old Apache ActiveMQ bug under active attack

    Bug hiding in plain sight for over a decade lands on KEV list First seen on theregister.com Jump to article: www.theregister.com/2026/04/17/cisa_tells_feds_to_patch/ also interesting: Wiz’s Security GraphDB vs. DeepTempo’s LogLM CVE-2025-64155: Exploit Code Released for Critical Fortinet FortiSIEM Command Injection Vulnerability Critical FortiCloud SSO zero”‘day forces emergency service disablement at Fortinet FAQ on CVE-2026-21514: OLE bypass…

  • ATLSECCON 2026: Context, Identity, and Restraint in Modern Security

    From AI agents to identity abuse, ATLSECCON 2026 focused on how security teams can reduce exposure, improve visibility, and make trust enforceable while moving ever faster. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/atlseccon-2026-context-identity-and-restraint-in-modern-security/ also interesting: 9 VPN alternatives for securing remote network access How AI Threats Have Broken Strong Authentication  Identity Security 2026: Four…

  • ATLSECCON 2026: Context, Identity, and Restraint in Modern Security

    From AI agents to identity abuse, ATLSECCON 2026 focused on how security teams can reduce exposure, improve visibility, and make trust enforceable while moving ever faster. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/atlseccon-2026-context-identity-and-restraint-in-modern-security/ also interesting: AI-generated deepfake attacks force companies to reassess cybersecurity Black Hat Europe preview: Cryptographic protocol attacks and AI in the…

  • prompted 2026 The Al Security Larsen Effect: How To Stop The Feedback Loop

    Author, Creator & Presenter: Maxim Kovalsky, Managing Director, Al Security CoE, Consortium Networks Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations’ YouTube Channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/unprompted-2026-the-al-security-larsen-effect-how-to-stop-the-feedback-loop/ also interesting: NDSS 2025 GAP-Diff: Protecting JPEG-Compressed Images From Diffusion-Based…

  • New IBM Security Services Aim to Counter Risks of Frontier AI Models

    IBM Consulting is using AI agents in its new services to help organizations protect themselves against the growing security threats advanced AI foundation models like Anthropic’s Mythos Preview and OpenAI’s GPT-5.4-Cyber pose. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/new-ibm-security-services-aim-to-counter-risks-of-frontier-ai-models/ also interesting: New IBM Security Services Aim to Counter Security Risks of AI Frontier Models…

  • New Phishing Attack Turns n8n Into On-Demand Malware Machine

    Hackers are abusing n8n workflows to deliver malware and evade detection, according to Cisco Talos, using trusted automation to bypass security defenses. The post New Phishing Attack Turns n8n Into On-Demand Malware Machine appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-hackers-abuse-n8n-workflows-malware-delivery/ also interesting: The Changing Threat Landscape for Retailers: Why is…

  • Anthropic-OpenAI Race Obscures The Real Cybersecurity Breakdown: Analysis

    As Anthropic and OpenAI pursue competing initiatives over vulnerability discovery, the question of who will win is the least of security teams’ concerns. First seen on crn.com Jump to article: www.crn.com/news/security/2026/anthropic-openai-race-obscures-the-real-cybersecurity-breakdown-analysis also interesting: AI programming copilots are worsening code security and leaking more secrets OpenAI Atlas Browser Vulnerability Lets Attackers Execute Malicious Scripts in ChatGPT…

  • TP-Link routers face exploitation attempt linked to high-severity flaw

    Researchers warn a potential botnet is targeting a vulnerability in end-of-life devices.; First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/tp-link-routers-exploitation-high-severity-flaw/817831/ also interesting: Exploited TP-Link Vulnerability Spawns Botnet Threats Multiple botnets exploiting one-year-old TP-Link flaw to hack routers Gayfemboy Botnet targets Four-Faith router vulnerability Mirai botnet weaponizes PoC to exploit Wazuh open-source XDR flaw

  • This old-school scam is still working

    We sent Tess to investigate a classic Nigerian advance-fee scam with a new twist. Sadly, these old scams are still in play because they work. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/this-old-school-scam-is-still-working/ also interesting: The heartbreak of watching a parent fall for fraud: ‘Dad, this is a scam have you given her money?’ |…