Cybersecurity

185 stories from 26 sources

Dark Reading · 17h ago

Surge in Bomgar RMM Exploitation Demonstrates Supply Chain Risk

Surge in Bomgar RMM Exploitation Demonstrates Supply Chain Risk The critical remote code execution flaw (CVE-2026-1731) in the remote monitoring and management tool can be exploited to spread ransomware and compromise s…

impact 100
TheHackerNews · 8d ago

Your MTTD Looks Great. Your Post-Alert Gap Doesn't

Your MTTD Looks Great. Your Post-Alert Gap Doesn't Anthropic restricted its Mythos Preview model last week after it autonomously found and exploited zero-day vulnerabilities in every major operating system and browser.

impact 42
Recorded Future · 7d ago

Your Supply Chain Breach Is Someone Else's Payday

Your Supply Chain Breach Is Someone Else's Payday A supply chain attack by TeamPCP compromised trusted software tools to harvest credentials at scale, enabling payroll fraud, logistics theft, and ransomware extortion.

impact 42
Dark Reading · 18h ago

Google Fixes Critical RCE Flaw in AI-Based 'Antigravity' Tool

Google Fixes Critical RCE Flaw in AI-Based 'Antigravity' Tool The prompt-injection vulnerability in the agentic AI product for filesystem operations was a sanitization issue that allowed for sandbox escape and arbitrary…

impact 34
arXiv Security · 5h ago

"We are currently clean on OPSEC": Why JD Can't Encrypt

"We are currently clean on OPSEC": Why JD Can't Encrypt arXiv:2604.19711v1 Announce Type: new Abstract: We analyse the 2025 Signalgate leak of sensitive US military information by the Trump administration, addressing wh…

impact 30
Dark Reading · 11d ago

Hims Breach Exposes the Most Sensitive Kinds of PHI

Hims Breach Exposes the Most Sensitive Kinds of PHI Threat actors breached the telehealth brand, and now they may know patients' personal health details. What could they do with that information?

impact 29
Dark Reading · 1d ago

Vercel Employee's AI Tool Access Led to Data Breach

Vercel Employee's AI Tool Access Led to Data Breach Stolen OAuth tokens, which are at the root of these breaches, "are the new attack surface, the new lateral movement," a researcher notes.

impact 29
CoinTelegraph · just now

Lazarus-linked macOS malware hits crypto and fintech firms

Lazarus-linked macOS malware hits crypto and fintech firms Security researchers linked a new “Mach-O Man” malware kit to a Lazarus campaign that uses fake meeting invites and ClickFix prompts to steal credentials and ac…

impact 28
SecurityWeek · 18h ago

Third US Security Expert Admits Helping Ransomware Gang

Third US Security Expert Admits Helping Ransomware Gang Angelo Martino of Florida has pleaded guilty to collaborating with the BlackCat cybercrime group while working as a ransomware negotiator. The post Third US Securi…

impact 28
Kaspersky Securelist · 6d ago

Threat landscape for industrial automation systems in Q4 2025

Threat landscape for industrial automation systems in Q4 2025 The report contains industrial threat statistics for Q4 2025. It covers various infection vectors and malware types, as well as regional statistics and stati…

impact 28
Kaspersky Securelist · 2w ago

Financial cyberthreats in 2025 and the outlook for 2026

Financial cyberthreats in 2025 and the outlook for 2026 In this report, Kaspersky experts share their insights into the 2025 financial threat landscape, including regional statistics and trends in phishing, PC malware,…

impact 28
Recorded Future · 15w ago

New ransomware tactics to watch out for in 2026

New ransomware tactics to watch out for in 2026 Ransomware groups made less money in 2025 despite a 47% increase in attacks, driving new tactics: bundled DDoS services, insider recruitment, and gig worker exploitation.…

impact 28
Dark Reading · 12d ago

Russia's 'Fancy Bear' APT Continues Its Global Onslaught

Russia's 'Fancy Bear' APT Continues Its Global Onslaught Victims don't need to match the cyber espionage group's technical sophistication, experts say. But patching and some form of zero trust are now non-negotiable.

impact 28
Dark Reading · 6d ago

6-Year Ransomware Campaign Targets Turkish Homes & SMBs

6-Year Ransomware Campaign Targets Turkish Homes & SMBs While enterprises breaches make more headlines, smaller incidents tend to be under-reported, if at all, allowing campaigns to last longer with less disruption.

impact 28
Recorded Future · 14w ago

Best Ransomware Detection Tools

Best Ransomware Detection Tools Stop ransomware before encryption begins. Learn how intelligence-driven detection tools can help identify precursor behaviors and reduce false positives for faster response.

impact 28
Dark Reading · 21h ago

Chinese APT Targets Indian Banks, Korean Policy Circles

Chinese APT Targets Indian Banks, Korean Policy Circles China is spying on India's financial sector, for some reason, and it's not putting much effort into it, judging by some stale TTPs.

impact 27
Dark Reading · 12h ago

Ransomware Negotiator Pleads Guilty to BlackCat Scheme

Ransomware Negotiator Pleads Guilty to BlackCat Scheme A cautionary tale illustrates why the person negotiating should never be involved with any part of the ransom payment process.

impact 27
Apple Developer · 78w ago

Apple Push Notification service server certificate update

Apple Push Notification service server certificate update The Certification Authority (CA) for Apple Push Notification service (APNs) is changing. APNs will update the server certificates in sandbox on January 20, 2025,…

impact 26

All Categories