Tag: cyber
-
Attackers Exploit Amazon SES to Send Authenticated Phishing Emails
Attackers are increasingly abusing Amazon Simple Email Service (SES) to deliver highly convincing phishing emails that bypass traditional security controls, marking a growing trend in email-based threats. The primary goal of any phishing campaign is to evade detection while tricking victims into revealing sensitive data. To achieve this, threat actors continuously refine their techniques, using…
-
Educational tech firm Instructure data breach may have impacted 9,000 schools
Instructure, maker of the Canvas learning platform, is investigating a cyber incident that exposed users’ personal data. Instructure is a U.S.-based educational technology company best known for developing Canvas, one of the world’s most widely used learning management systems (LMS). The U.S. firm confirrmed a cybersecurity incident that exposed users’ personal information. The company is working with external…
-
New Attribution Framework Links APT Campaigns Across Key Layers
A new attribution framework is reshaping how cybersecurity analysts connect advanced persistent threat (APT) activity, moving beyond static group labels toward a dynamic, multi-layered model that reflects how modern adversaries actually operate. These profiles are built from observed tactics, techniques, procedures (TTPs), malware, and infrastructure. But this approach is increasingly strained. Threat actors evolve constantly…
-
Critical Android Zero-Click Vulnerability Enables Remote Shell Access
Google has released the Android Security Bulletin for May 2026, addressing a highly critical vulnerability that allows attackers to execute code remotely without any user interaction. Published on May 4, 2026, the latest security update focuses heavily on a severe flaw located within the Android System component. Threat actors can exploit this vulnerability to gain…
-
Fake “Notepad++ for Mac” Site May Pose Malware Risk for Mac Users
A deceptive website is circulating online that claims to offer an official “Notepad++ for Mac” download, and it has already misled some users and even tech media outlets into believing that Notepad++ has finally launched a native macOS version. The site operates under the domain notepad-plus-plus-mac[.]org. It is branded to look like an official extension…
-
Apache HTTP Server Vulnerability Exposes Millions to Remote Code Execution Threats
Tags: apache, cve, cyber, flaw, malicious, remote-code-execution, software, threat, update, vulnerabilityThe Apache Software Foundation has released an urgent security update for the Apache HTTP Server to patch a severe vulnerability. Tracked as CVE-2026-23918, this flaw could allow attackers to execute malicious code remotely on affected web servers, putting millions of websites at risk. Understanding the Vulnerability The newly discovered security flaw is classified as a…
-
pnpm 11 Enables Default Release-Age Guard to Curb npm Supply Chain Attacks
pnpm 11 has been released with a strong focus on reducing software supply chain risk, introducing security-first defaults that directly address modern package ecosystem threats. The most significant change in pnpm 11 is the introduction of a default Minimum Release Age of 24 hours (1440 minutes). This means newly published package versions are not eligible…
-
DigiCert Hacked in Screensaver-Based Attack to Fraudulently Obtain EV Code Signing Certificates
DigiCert, a major Certificate Authority, recently suffered a significant security breach where hackers used a malicious screensaver file to steal 60 Extended Validation (EV) Code Signing certificates. These highly trusted certificates were subsequently used to sign the >>Zhong Stealer<< malware, allowing the malicious files to bypass security warnings by appearing as legitimate software. The incident…
-
Microsoft Edge Found Storing Saved Passwords in Cleartext Memory at Startup
A new security finding reveals that Microsoft Edge loads every saved password into its process memory as cleartext the moment the browser launches. Even more surprising to security professionals is Microsoft’s official response to the disclosure, which states that this insecure behavior is entirely >>by design.<< How the Memory Flaw Works According to a recent…
-
Small Defense Firms Lack Network Data to Stop Nation-State Hackers, Analyst Says
Team Cymru’s Stephen Campbell warned that small US defense contractors are not well prepared to face cyber intrusions through edge devices First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/small-defense-firms-lack-network/
-
OpenAI To Extend Cyber Program to Government Agencies
OpenAI announced its intention to expand the Trusted Access for Cyber program for cyber defenders at the federal, state and local government levels First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/openai-extend-cyber-program/
-
Five Eyes Sound Alarm on Autonomous AI Security Risks
Guidance Warns Autonomous Systems Expand Enterprise Exposure. Federal and Five Eyes cyber agencies warn that agentic AI systems – capable of autonomous action across enterprise environments – are introducing identity, visibility and control risks that could outpace existing defenses without continuous monitoring, zero trust enforcement and human oversight. First seen on govinfosecurity.com Jump to article:…
-
NY Fines Delta Dental $2.25M Over 2023 MOVEit Hack
Investigators Find Violations of State Cyber Regulations. New York fined Delta Dental $2.25 million for the company’s response to the mass exploit of a zero-day vulnerability in Progress Software’ MOVEit file transfer application. Delta Dental is one of thousands of organizations caught up in the blast radius of an automated 2023 Memorial Day hack. First…
-
UK’s NCSC warns of ‘wave of patches’
Vulnerability discovery and mitigation continues to exercise the top minds at Britain’s NCSC as cyber experts continue to debate the impact of frontier AI models like Mythos. First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366642625/UKs-NCSC-warns-of-wave-of-patches
-
Exploit Cyber-Frenzy Threatens Millions via Critical cPanel Vulnerability
Shortly after the authentication-bypass flaw was disclosed multiple proof-of-concept exploits appeared, and one researcher claims there’s been zero-day activity for at least a month. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/exploit-cyber-frenzy-critical-cpanel-vulnerability
-
Educational company Infrastructure reports cyber incident
By Saturday, Infrastructure’s chief information security officer Steve Proud confirmed that the hackers gained access to information about users at some educational institutions, including names, email addresses, student ID numbers and messages between users. First seen on therecord.media Jump to article: therecord.media/infrastructure-education-company-canvas-incident
-
CAF Objectives Overview for UK SMEs: A Practical Guide to the NCSC Cyber Assessment Framework
CAF Objectives Overview for UK SMEs: A Practical Guide to the NCSC Cyber Assessment Framework If you are a UK SME, the NCSC Cyber Assessment Framework, usually shortened to CAF, can look more formal than it needs to be. In practice, it is a structured way to think about whether your cyber security is good……
-
Bluekit Phishing Kit Streamlines Domains, 2FA Lures, and Session Hijacking
A newly discovered phishing kit called “Bluekit” is reshaping how cybercriminals run phishing campaigns by combining multiple attack stages into a single, centralized platform. Instead, Bluekit integrates these capabilities into one operator panel, streamlining the entire attack lifecycle from setup to data exfiltration. This shift reflects a broader trend toward automation and ease of use…
-
Cisco Launches AI Provenance Tool to Strengthen Security and Compliance
Artificial intelligence models are integrated into countless enterprise applications, but knowing exactly where these models come from remains a major security hurdle. Cisco recently launched the Model Provenance Kit, an open-source tool for tracing the exact lineage of AI models. This release aims to bring transparency to complex AI supply chains and help organizations meet…
-
Canvas Confirms Data Breach Following ShinyHunters Claim
Instructure, the educational technology company behind the widely used Canvas Learning Management System (LMS), has officially confirmed a major data breach. This confirmation directly follows recent claims made by the notorious threat actor group known as ShinyHunters. Canvas is a critical platform for thousands of universities and K-12 schools, making this breach a significant concern…
-
Ubuntu and Canonical Web Services Hit by DDoS Attack
What happened Canonical, the company behind the Ubuntu Linux distribution, experienced widespread service disruptions across its core web infrastructure on May 1, 2026, following a coordinated DDoS attack. The hacktivist group identifying itself as the Islamic Cyber Resistance in Iraq, known as the 313 Team, claimed responsibility. Canonical acknowledged the outages via its status page…The…
-
Malicious TanStack Package Abuses Postinstall Script to Steal Developer Secrets
A malicious npm package named “tanstack” has been discovered deploying a stealthy data exfiltration campaign, targeting developers through a deceptive naming strategy and a hidden postinstall script. The package, impersonating the well-known TanStack ecosystem, was weaponized to steal sensitive environment files immediately after installation. The attacker registered the unscoped tanstack package name on npm, exploiting confusion with the legitimate @tanstack organization,…
-
Botnet Hijacks ADB-Exposed Android Devices to Target Minecraft Servers
New research has uncovered a Mirai-derived botnet called xlabs_v1 that turns Android devices with exposed Android Debug Bridge (ADB) into a distributed attack platform for knocking Minecraft servers and other game hosts offline. By abusing TCP port 5555 on poorly secured Android-based hardware, the operators are quietly building a rentable DDoS-for-hire service aimed at the gaming ecosystem.…
-
276 Arrested as Authorities Dismantle Crypto Scam Centers Targeting Americans
In an unprecedented international law enforcement operation, authorities have dismantled at least nine overseas cryptocurrency scam centers, resulting in the arrest of 276 individuals. The coordinated effort, led by the FBI, Dubai Police, and the Chinese Ministry of Public Security, targeted transnational criminal networks running sophisticated >>pig butchering<< investment fraud schemes against American citizens. Threat…
-
Cyber-Secure Philanthropy: Tech Infrastructure for Global Donations
Secure philanthropy needs hardened payments, API security, and compliance controls to protect global donations from fraud and attacks. First seen on hackread.com Jump to article: hackread.com/cyber-secure-philanthropy-tech-infrastructure-global-donations/
-
AI speeds flaw discovery, forcing rapid updates, UK NCSC warns
The UK cyber agency NCSC warns AI is speeding up vulnerability discovery, likely causing a “patch wave” of urgent software updates to fix exposed flaws. The UK’s National Cyber Security Centre (NCSC) warns that AI is rapidly accelerating the discovery of software vulnerabilities, increasing the risk of large-scale exploitation. CTO Ollie Whitehouse says skilled attackers…
-
CISA Flags Linux Kernel Vulnerability as Threat Actors Launch Attacks
Tags: attack, cisa, cve, cyber, cybersecurity, exploit, flaw, infrastructure, kev, linux, threat, update, vulnerabilityThe Cybersecurity and Infrastructure Security Agency (CISA) has officially added a high-severity Linux kernel vulnerability to its Known Exploited Vulnerabilities (KEV) catalog. Tracked as CVE-2026-31431, this flaw is currently being exploited in the wild by threat actors. This active exploitation has prompted urgent patching mandates for federal agencies and strong recommendations for private organizations worldwide.…
-
DOJ Sentences Two Americans for ALPHV BlackCat Ransomware Attacks
The U.S. Department of Justice (DOJ) has sentenced two American cybersecurity professionals to prison for their involvement in ALPHV BlackCat ransomware attacks that targeted multiple U.S. organizations in 2023. The case highlights the growing threat of insider expertise being misused in ransomware-as-a-service (RaaS) operations. Ryan Goldberg, 40, from Georgia, and Kevin Martin, 36, from Texas,…
-
Bessere Konnektivität im ÖPNV dank moderner & kompakter Technologie von Teldat
Tags: cyberDie H5-Rail Plattform für Schienenfahrzeuge integriert diverse Dienste in einer einzigen kompakten Plattform und bietet: Hochmoderne, integrierte Cyber Security-Funktionen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/bessere-konnektivitaet-im-oepnv-dank-moderner-kompakter-technologie-von-teldat/a44869/

