Cybersecurity researchers have discovered a new Lua-based malware created years before the notorious Stuxnet worm that aimed to sabotage Iran’s nuclear program by destroying uranium enrichment centrifuges. According to a new report published by SentinelOne, the previously undocumented cyber sabotage framework dates back to 2005, primarily targeting high-precision calculation software to tamper – Read More … Read More “Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software – The Hacker News” »
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added four vulnerabilities impacting SimpleHelp, Samsung MagicINFO 9 Server, and D-Link DIR-823X series routers to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is below – CVE-2024-57726 (CVSS score: 9.9) – A missing authorization vulnerability in – Read … Read More “CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline – The Hacker News” »
New ClickFix attack Hides in Native Windows Tools to Reduce Detection Risk – Hackread – Cybersecurity News, Data Breaches, AI and More
Fake CAPTCHA ClickFix attack tricks users into running malicious commands, using cmdkey and regsvr32 to maintain persistence and avoid detection on Windows – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
The latest attempt to re-up a controversial expiring surveillance law has failed to placate vocal critics on both the left and right of the political spectrum. Two House votes failed last week to extend the spying powers under Section 702 of the Foreign Intelligence Surveillance Act (FISA) for 18 months without changes, leading to Congress … Read More “Latest spy power reauthorization bill leaves critics unimpressed – CyberScoop” »
FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches – The Hacker News
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has revealed that an unnamed federal civilian agency’s Cisco Firepower device running Adaptive Security Appliance (ASA) software was compromised in September 2025 with malware called FIRESTARTER. FIRESTARTER, per CISA and the U.K.’s National Cyber Security Centre (NCSC), is assessed to be a backdoor designed for remote access … Read More “FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches – The Hacker News” »
TeamPCP Hijacks Bitwarden CLI, Uses Dependabot to Deploy Shai-Hulud Malware – Hackread – Cybersecurity News, Data Breaches, AI and More
GitGuardian uncovers TeamPCP attack on Bitwarden CLI, abusing GitHub Dependabot to spread Shai-Hulud and poison AI coding tools. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
The Office of Inspector General (OIG) of the U.S. National Aeronautics and Space Administration (NASA) has revealed how a Chinese national posed as a U.S. researcher as part of a spear-phishing campaign to obtain sensitive information from the space agency, as well as from government entities, universities, and private companies, in violation of export control … Read More “NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software – The Hacker News” »
UK government Minister confirms that breached health records of UK Biobank volunteers were up for sale on Chinese ecommerce platforms before being removed – Read More –
Cybersecurity researchers have discovered a set of malicious apps on the Apple App Store that impersonate popular cryptocurrency wallets in an attempt to steal recovery phrases and private keys since at least fall 2025. “Once launched, these apps redirect users to browser pages designed to look similar to the App Store and distribute trojanized versions … Read More “26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases – The Hacker News” »
Bridging the AI Agent Authority Gap: Continuous Observability as the Decision Engine – The Hacker News
The AI Agent Authority Gap – From Ungoverned to Delegation As discussed in our previous article, AI agents are exposing a structural gap in enterprise security, but the problem is often framed too narrowly. The issue is not simply that agents are new actors. It is that agents are delegated actors. They do not emerge … Read More “Bridging the AI Agent Authority Gap: Continuous Observability as the Decision Engine – The Hacker News” »
AI tools are not just creating new vulnerabilities, they are reviving old security failures, warned Jurgen Kutscher, VP of Mandiant Consulting – Read More –
French Police Arrest HexDex Hacker Over Mass Data Theft and Leaks – Hackread – Cybersecurity News, Data Breaches, AI and More
French police arrest HexDex hacker, a 20-year-old suspect accused of mass data theft and leaks targeting government, sports groups, and firms. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Chinese-speaking individuals are the target of a new campaign that uses a trojanized version of SumatraPDF reader to deploy the AdaptixC2 Beacon post-exploitation agent and ultimately facilitate the abuse of Microsoft Visual Studio Code (VS Code) tunnels for remote access. Zscaler ThreatLabz, which discovered the campaign last month, has attributed it with high confidence to … Read More “Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2 – The Hacker News” »
A high-severity security flaw in LMDeploy, an open-source toolkit for compressing, deploying, and serving LLMs, has come under active exploitation in the wild less than 13 hours after its public disclosure. The vulnerability, tracked as CVE-2026-33626 (CVSS score: 7.5), relates to a Server-Side Request Forgery (SSRF) vulnerability that could be exploited to access sensitive data. … Read More “LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure – The Hacker News” »
Malicious npm packages spread via worm-like propagation and steal developer credentials – Read More –
How a simple consumer data breach spiralled into a national security crisis in US-South Korea relations – Data and computer security | The Guardian
Washington’s focus on online retailer Coupang has led to accusations that the Trump administration is tying issues of national security to domestic corporate matters When South Korea’s biggest online retailer revealed last year that a data breach had compromised tens of millions of customer accounts, it appeared to be a corporate crisis. But five months … Read More “How a simple consumer data breach spiralled into a national security crisis in US-South Korea relations – Data and computer security | The Guardian” »
Vercel said the fallout from an attack on its internal systems hit more customers than previously known, as ongoing analysis uncovered additional evidence of compromise. The company, which makes tools and hosts cloud infrastructure for developers, maintains a “small number” of accounts were impacted, but it has yet to share a number or range of … Read More “Vercel attack fallout expands to more customers and third-party systems – CyberScoop” »
US, UK agencies warn hackers were hiding on Cisco firewalls long after patches were applied – CyberScoop
A state-sponsored hacking group has implanted a custom backdoor on Cisco network security devices that can survive firmware updates and standard reboots, U.S. and British cybersecurity authorities disclosed Thursday, marking a significant escalation in a campaign that has targeted government and critical infrastructure networks since at least late 2025. The Cybersecurity and Infrastructure Security Agency … Read More “US, UK agencies warn hackers were hiding on Cisco firewalls long after patches were applied – CyberScoop” »
A state-sponsored hacking group has implanted a custom backdoor on Cisco network security devices that can survive firmware updates and standard reboots, U.S. and British cybersecurity authorities disclosed Thursday, marking a significant escalation in a campaign that has targeted government and critical infrastructure networks since at least late 2025. The Cybersecurity and Infrastructure Security Agency … Read More “US, UK agencies warn hackers were hiding on Cisco firewalls long after patches were applied – CyberScoop” »
A state-sponsored hacking group has implanted a custom backdoor on Cisco network security devices that can survive firmware updates and standard reboots, U.S. and British cybersecurity authorities disclosed Thursday, marking a significant escalation in a campaign that has targeted government and critical infrastructure networks since at least late 2025. The Cybersecurity and Infrastructure Security Agency … Read More “US, UK agencies warn hackers were hiding on Cisco firewalls long after patches were applied – CyberScoop” »
Surveillance campaigns use commercial surveillance tools to exploit long-known telecom vulnerabilities – CyberScoop
Campaigns employing commercial surveillance vendors tracked targets by exploiting mobile phone network vulnerabilities in what researchers said Thursday was the first-ever linking of “real-world attack traffic to mobile operator signalling infrastructure.” The two unknown parties behind the campaigns mimicked the identities of mobile phone operators with customized surveillance tools, and manipulated signaling protocols and steered … Read More “Surveillance campaigns use commercial surveillance tools to exploit long-known telecom vulnerabilities – CyberScoop” »
One day AI may be capable of creating malware that threatens critical infrastructure. But that day was not earlier this month, when reports surfaced of a new piece of malware seemingly configured to search for and sabotage Israeli water infrastructure, according to industrial cybersecurity firm Dragos. The malware, called ZionSiphon, was first identified by AI … Read More “Dragos: Despite AI use, new malware targeting water plants is ‘hype’ – CyberScoop” »
A previously undocumented threat activity cluster known as UNC6692 has been observed leveraging social engineering tactics via Microsoft Teams to deploy a custom malware suite on compromised hosts. “As with many other intrusions in recent years, UNC6692 relied heavily on impersonating IT helpdesk employees, convincing their victim to accept a Microsoft Teams chat invitation from … Read More “UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware – The Hacker News” »
Adopting AI will require time, the development of new capabilities and careful oversight. – Read More – All Feed
Harvester APT Expands Spying Operations with New GoGra Linux Malware – Hackread – Cybersecurity News, Data Breaches, AI and More
New GoGra Linux malware linked to Harvester APT targets systems in South Asia, using fake PDFs and Microsoft APIs for covert command and control. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
A dozen allied agencies say China is building covert hacker networks out of everyday routers – CyberScoop
U.S. and international government agencies warned Thursday about a “widespread shift” in Chinese hacker methods toward the use of large-scale covert networks that compromise common devices to carry out a variety of attacks. The advisory details how those networks work, and defensive steps organizations should take. “Over the past few years there has been a … Read More “A dozen allied agencies say China is building covert hacker networks out of everyday routers – CyberScoop” »
A dozen allied agencies say China is building covert hacker networks out of everyday routers – CyberScoop
U.S. and international government agencies warned Thursday about a “widespread shift” in Chinese hacker methods toward the use of large-scale covert networks that compromise common devices to carry out a variety of attacks. The advisory details how those networks work, and defensive steps organizations should take. “Over the past few years there has been a … Read More “A dozen allied agencies say China is building covert hacker networks out of everyday routers – CyberScoop” »
Google Cloud’s COO advocated for combining general-purpose frontier large language models with task-specific AI agents – Read More –
In this excerpt of a TrendAI Research Services vulnerability report, Richard Chen and Lucas Miller of the TrendAI Research team detail a recently patched double free vulnerability in the Windows Internet Key Exchange (IKE) service. This bug was originally discovered by WARP & MORSE team at Microsoft. Successful exploitation could result in a crash of … Read More “CVE-2026-33824: Remote Code Execution in Windows IKEv2 – Zero Day Initiative – Blog” »
ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories – The Hacker News
You scroll past one incident and see another that feels familiar, like it should have been fixed years ago, but it still works with small changes. Same bugs. Same mistakes. The supply chain is messy. Packages you did not check are stealing data, adding backdoors, and spreading. Attacking the systems behind apps is easier than … Read More “ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories – The Hacker News” »
Bitwarden CLI has been compromised as part of the newly discovered and ongoing Checkmarx supply chain campaign, according to new findings from Socket. “The affected package version appears to be @bitwarden/[email protected], and the malicious code was published in ‘bw1.js,’ a file included in the package contents,” the application security company said. “The attack appears to … Read More “Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign – The Hacker News” »
Private health records of half a million Britons offered for sale on Chinese website – Data and computer security | The Guardian
Technology minister tells Commons ‘de-identified’ information from UK Biobank advertised for sale on Alibaba UK politics live – latest updates The confidential health records of half a million British volunteers have been offered for sale on Chinese website Alibaba, the UK government has confirmed. The data, belonging to participants in the UK Biobank project, was … Read More “Private health records of half a million Britons offered for sale on Chinese website – Data and computer security | The Guardian” »
Apple patches iOS flaw that retained deleted notifications, exposing message data – Read More –
Last week, Anthropic announced Project Glasswing, an AI model so effective at discovering software vulnerabilities that they took the extraordinary step of postponing its public release. Instead, the company has given access to Apple, Microsoft, Google, Amazon, and a coalition of others to find and patch bugs before adversaries can. Mythos Preview, the model that … Read More “Project Glasswing Proved AI Can Find the Bugs. Who’s Going to Fix Them? – The Hacker News” »
Imagine a world where hackers don’t sleep, don’t take breaks, and find weak spots in your systems instantly. Well, that world is already here. Thanks to AI, attackers are now launching automated, large-scale exploits faster than ever before. The time you have to fix a vulnerability before it gets attacked is shrinking to zero. We … Read More “[Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speed – The Hacker News” »
Google Cloud will attribute a unique cryptographic ID every AI agent that will be tied to “traceable and auditable” authorization policies – Read More –
Hackers Use Hidden Website Instructions in New Attacks on AI Assistants – Hackread – Cybersecurity News, Data Breaches, AI and More
Cybersecurity researchers at Forcepoint uncover new indirect prompt injection attacks that use hidden website code to exploit AI assistants like GitHub Copilot. – Read More – Hackread – Cybersecurity News, Data Breaches, AI and More
Organisations should map and baseline their edge device traffic, especially VPN and remote access connections, and adopt dynamic threat feed filtering that includes known covert network indicators. – Read More – All Feed
New advisory highlights how to defend against attacker tactics believed to be used by China-linked actors to hide malicious cyber activity. – Read More – All Feed
Explaining the widespread shift in tactics, techniques and procedures (TTPs) towards networks of compromised infrastructure, and how to defend against it – Read More – All Feed
Forcepoint has found 10 new indirect prompt injection attacks targeting AI agents – Read More –
Quorum Cyber report finds higher and further education institutions experienced 63% increase in attacks over a year – Read More –
Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic Case – The Hacker News
Apple has rolled out a software fix for iOS and iPadOS to address a Notification Services flaw that stored notifications marked for deletion on the device. The vulnerability, tracked as CVE-2026-28950 (CVSS score: N/A), has been described as a logging issue that has been addressed with improved data redaction. “Notifications marked for deletion could be … Read More “Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic Case – The Hacker News” »
Vercel on Wednesday revealed that it has identified an additional set of customer accounts that were compromised as part of a security incident that enabled unauthorized access to its internal systems. The company said it made the discovery after expanding its investigation to include an extra set of compromise indicators, alongside a review of requests … Read More “Vercel Finds More Compromised Accounts in Context.ai-Linked Breach – The Hacker News” »
China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors – The Hacker News
Mongolian governmental institutions have emerged as the target of a previously undocumented China-aligned advanced persistent threat (APT) group tracked as GopherWhisper. “The group wields a wide array of tools mostly written in Go, using injectors and loaders to deploy and execute various backdoors in its arsenal,” Slovakian cybersecurity company ESET said in a report shared … Read More “China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors – The Hacker News” »
The UK’s NCSC has fully backed passkeys as consumers’ first choice for login, citing progress with FIDO and successful use across the NHS – Read More –
The banking sector is entering a new era of cryptographic urgency. As quantum computing advances at a very fast… The post Inside CryptoBind: HSM, Vault & KMS Architecture for Quantum-Ready Banks appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Passkeys and other FIDO2 credentials offer a more usable, secure replacement for passwords and are already supported by most modern devices. – Read More – All Feed
Passkeys are the more secure and user-friendly login method and should be the default authentication option for consumers. – Read More – All Feed
Smashing Security podcast #464: Rockstar got hacked. The data was junk. The secrets it revealed were not – GRAHAM CLULEY
A company that ran anonymous tip lines for 35,000 American schools – handling reports of bullying, weapons, and self-harm – boasted on its website that it had suffered zero security breaches in over 20 years. A hacker called Internet Yiff Machine thought that sounded like a challenge, with predictable results… Meanwhile, Rockstar Games gets hacked … Read More “Smashing Security podcast #464: Rockstar got hacked. The data was junk. The secrets it revealed were not – GRAHAM CLULEY” »





