🔒

Cybersecurity

Threat intelligence, breaches, enterprise security, and the hacker ecosystem.

The Boring Stuff is Dangerous Now

The rise of AI agents that can identify and exploit hidden vulnerabilities poses significant risks, especially as developers generate large volumes of potentially flawed AI-generated code. This evolving landscape necessitates a shift in defensive strategies to protect against these emerging threats in cybersecurity.

Dark Readingin 3 days·
aicybersecurityvulnerabilities

AI agents show they can create exploits, not just find vulns

Recent research indicates that AI agents, such as those developed by Anthropic, OpenAI, and Google, are capable of not only identifying security vulnerabilities but also creating functional exploits. The study led by computer scientists from various institutions has resulted in the development of ExploitGym, a benchmark designed to evaluate the exploitative capabilities of AI models. This advancement raises important questions about the implications of AI in cybersecurity and the evolving threat landscape.

The Registerabout 3 hours ago·
aicybersecurityvulnerabilities

Predictions for the Next 30 Years of Cybersecurity (2018)

The article discusses anticipated developments in cybersecurity over the next three decades, highlighting the evolving threats and the need for advanced security measures. It emphasizes the importance of integrating artificial intelligence and machine learning into cybersecurity strategies to combat increasingly sophisticated attacks. The predictions also touch on the role of regulatory frameworks and the necessity for organizations to adapt to a rapidly changing digital landscape.

Hacker Newsabout 6 hours ago·
cybersecurityaimachine-learning

Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access

The Russian hacking group Turla has upgraded its Kazuar backdoor into a modular peer-to-peer botnet, enhancing its capabilities for stealth and persistent access to compromised systems. This development, noted by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), highlights Turla's connection to Russia's Federal Security Service (FSB) and underscores ongoing cybersecurity threats from state-sponsored actors.

The Hacker Newsabout 6 hours ago·
turlakazuarbotnet

A 0-click exploit chain for the Pixel 10

A new 0-click exploit chain has been discovered for the Pixel 10, highlighting significant security vulnerabilities in the device. This exploit allows attackers to gain access without any user interaction, raising concerns about the overall security of mobile devices. The findings emphasize the need for improved security measures in smartphone technology.

Hacker Newsabout 9 hours ago·
pixel10exploitsecurity

Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence

Cybersecurity researchers have identified four critical vulnerabilities in OpenClaw, collectively known as Claw Chain, which can be exploited to facilitate data theft, privilege escalation, and persistent access. These flaws allow attackers to gain a foothold within systems, expose sensitive information, and install backdoors, raising significant security concerns for users of the software.

The Hacker Newsabout 10 hours ago·
openclawcybersecurityvulnerabilities

What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface

The article discusses the hidden security risks within organizations, emphasizing that the most significant threats often stem from trusted administrative tools rather than traditional malware. It highlights how commonly used utilities like PowerShell and MSBuild can be exploited by threat actors, underscoring the need for vigilance in monitoring these tools. Bitdefender's analysis serves as a reminder that security must extend beyond conventional attack vectors.

The Hacker Newsabout 12 hours ago·
securitymalwareadministration

TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates

OpenAI has reported a supply chain attack affecting two of its employee devices due to vulnerabilities in TanStack. Fortunately, the company confirmed that no user data, production systems, or intellectual property were compromised. Following the incident, OpenAI promptly initiated an investigation and containment measures to mitigate any potential risks.

The Hacker Newsabout 12 hours ago·
supply-chainopenaitanstack

Akamai acquires Israeli cybersecurity startup LayerX Security, which develops a browser-based platform to secure employee use of AI tools, for ~$205M in cash (Meir Orbach/CTech)

Akamai Technologies has announced its acquisition of Israeli cybersecurity startup LayerX Security for approximately $205 million. LayerX specializes in a browser-based platform designed to secure employee interactions with AI tools, enhancing Akamai's Zero Trust strategy amid growing concerns over AI usage in enterprises.

Techmemeabout 13 hours ago·
cybersecurityai-toolszero-trust

Taiwan Incident Highlights Cybersecurity Gaps in Rail Systems

A recent incident in Taiwan, where a student used software-defined radio technology to halt three bullet trains, has exposed significant cybersecurity vulnerabilities within rail systems. The event prompted an anti-terrorism response, highlighting the urgent need for improved security measures in critical infrastructure.

Dark Readingabout 22 hours ago·
cybersecurityrail-systemssoftware-defined-radio

Apple Mac M5 System Exploited With Anthropic's Claude Mythos AI, Researchers Claim

Researchers from security startup Calif have reportedly utilized a preview version of Anthropic's Claude Mythos AI to develop an exploit targeting the Apple Mac M5 system's macOS kernel. This development raises significant concerns about the intersection of AI technology and cybersecurity vulnerabilities.

Decrypt1 day ago·
appleanthropicclaude-mythos

SecurityScorecard Snags Driftnet to Level Up Threat Intelligence

SecurityScorecard has acquired Driftnet to enhance its threat intelligence capabilities, particularly focusing on improving visibility into third-party ecosystems. This move comes in response to the growing concern over supply-chain attacks, which have become increasingly prevalent in the cybersecurity landscape.

Dark Reading1 day ago·
threat-intelligencesupply-chainacquisition

OpenAI Confirms Security Breach Linked to AI Malware Campaign

OpenAI has confirmed a security breach resulting from a malware campaign linked to the Shai-Hulud supply chain attack, which compromised internal repositories by infecting two employee devices. This incident raises significant concerns about cybersecurity in the AI sector and the potential vulnerabilities associated with emerging technologies.

Decrypt1 day ago·
openaimalwaresecurity-breach

18-year-old NGINX vulnerability allows DoS, potential RCE

A long-standing vulnerability in the NGINX open-source web server, present for 18 years, has been identified, allowing for potential denial of service and remote code execution under specific conditions. This flaw was uncovered through an autonomous scanning system, highlighting the ongoing security challenges in widely used software. Organizations using NGINX are urged to assess their systems and apply necessary patches to mitigate risks.

BleepingComputer1 day ago·
nginxvulnerabilitycybersecurity

KongTuke hackers now use Microsoft Teams for corporate breaches

The hacking group KongTuke has adapted its tactics by utilizing Microsoft Teams for social engineering attacks, enabling them to infiltrate corporate networks in as little as five minutes. This shift highlights the evolving nature of cyber threats and the need for organizations to bolster their security measures against such innovative approaches.

BleepingComputer1 day ago·
cybersecurityhackingmicrosoft-teams

Dell confirms its SupportAssist software causes Windows BSOD crashes

Dell has acknowledged that its SupportAssist software is responsible for blue-screen crashes on certain Windows systems, following numerous user complaints about unexpected reboots on Dell devices. This issue highlights potential vulnerabilities in the software that could affect system stability and user experience.

BleepingComputer1 day ago·
dellsupportassistwindows

Checkbox Assessments Aren't Fit to Measure to Risk

The article emphasizes that traditional checkbox assessments are inadequate for effectively measuring security risks. It highlights the emergence of new companies that are focusing on filling the gaps in risk management that current audit tools fail to address, advocating for a more proactive approach to security governance beyond mere compliance.

Dark Reading2 days ago·
risk-managementsecurity-governanceaudit-tools

Tables Turn on 'The Gentlemen' RaaS Gang With Data Leak

A recent data leak has exposed vulnerabilities within the ransomware-as-a-service (RaaS) group known as 'The Gentlemen'. The leak highlights the group's affiliate model, tactics, techniques, and procedures (TTPs), and its organizational structure, which contributed to its rise in the cybercrime landscape. This incident underscores the ongoing challenges in cybersecurity and the need for improved operational security among such groups.

Dark Reading2 days ago·
ransomwaredata-leakcybercrime

AI-driven cyberattacks will start to be the 'new norm' in months, Palo Alto warns

Palo Alto Networks has issued a warning that AI-driven cyberattacks are expected to become the 'new norm' within months, highlighting the growing sophistication of AI models. This trend is placing significant pressure on cybersecurity teams to enhance their defenses against these emerging threats.

CNBC Technology2 days ago·
aicybersecuritycyberattacks

AI Agents Generate Custom Hacking Tools on the Fly

Recent threat campaigns have utilized AI agents to create custom hacking tools in real-time, targeting organizations in Mexico and Brazil. This development highlights the increasing sophistication of cyberattacks and the role of artificial intelligence in facilitating them.

Dark Reading2 days ago·
aihackingcyberattacks

Foxconn confirms cyberattack claimed by Nitrogen ransomware gang

Foxconn has confirmed that it was the target of a cyberattack by the Nitrogen ransomware gang, affecting some of its North American factories. The company is now working to restore normal operations following the incident, highlighting ongoing vulnerabilities in the cybersecurity landscape for major manufacturers.

BleepingComputer2 days ago·
cyberattackransomwarefoxconn

73 Seconds to Breach, 24 Hours to Patch: The Case for Autonomous Validation

Picus Security highlights the urgent need for autonomous validation in cybersecurity, emphasizing that attackers can breach systems in as little as 73 seconds, while patching vulnerabilities can take much longer. This disparity underscores the importance of implementing automated solutions to enhance defense strategies and reduce response times to threats.

BleepingComputer2 days ago·
autonomous-validationcybersecuritythreat-response

Windows 11 KB5089549 & KB5087420 cumulative updates released

Microsoft has rolled out cumulative updates KB5089549 and KB5087420 for Windows 11, targeting versions 25H2/24H2 and 23H2. These updates address security vulnerabilities, resolve bugs, and introduce new features to enhance the operating system's performance and security.

BleepingComputer3 days ago·
windows11microsoftsecurity

Android 17 to expand banking scam call and privacy protections

Android 17 is set to enhance security and privacy for users with new features aimed at combating device theft and banking scam calls. The update will include improved threat detection mechanisms, reinforcing user protection against potential cyber threats. These advancements reflect a growing emphasis on cybersecurity within mobile operating systems.

BleepingComputer3 days ago·
androidprivacysecurity

Hugging Face Packages Weaponized With a Single File Tweak

A vulnerability in Hugging Face's tokenizer library allows malicious actors to manipulate AI model outputs and potentially exfiltrate sensitive data. This security flaw highlights the risks associated with AI model deployment and the importance of safeguarding against such exploits.

Dark Reading3 days ago·
hugging-faceai-securitydata-exfiltration

20 Leaders Who Built the CISO Era: 2 Decades of Change

This article celebrates the 20th anniversary of Dark Reading by profiling influential figures in the cybersecurity landscape, particularly Chief Information Security Officers (CISOs). It highlights how these leaders, along with researchers and policymakers, have transformed the enterprise risk management framework over the past two decades. The piece reflects on the evolution of cybersecurity practices and the key players who have shaped the field.

Dark Reading3 days ago·
cisoenterprise-riskcybersecurity-leaders

Shai Hulud attack ships signed malicious TanStack, Mistral npm packages

A significant software supply-chain attack has been reported, involving the 'Shai-Hulud' malware that has compromised numerous packages within open-source software ecosystems. The attack specifically targeted malicious TanStack and Mistral npm packages, raising concerns about the security of software supply chains and the potential for widespread impact on developers and organizations relying on these packages.

BleepingComputer3 days ago·
malwaresupply-chainopensource

Worm Redux: Fresh Mini Shai-Hulud Infections Bite Supply Chain

A new self-propagating worm, identified as Mini Shai-Hulud, has infected hundreds of npm packages, particularly those associated with the open source TanStack ecosystem. This malware, developed by TeamPCP, poses significant risks by stealing credentials and potentially compromising supply chain security.

Dark Reading4 days ago·
npmmalwaresupply-chain

GM agrees to $12.75M California settlement over sale of drivers’ data

General Motors (GM) has reached a proposed settlement of $12.75 million with California authorities following allegations of violating the California Consumer Privacy Act (CCPA) regarding the sale of drivers' data. California Attorney General Rob Bonta announced the settlement, highlighting the importance of consumer privacy protections in the automotive industry.

BleepingComputer4 days ago·
privacydata-protectionccpa

OpenAI Launches Daybreak as AI Firms Expand Into Cybersecurity

OpenAI has introduced its Daybreak initiative, leveraging artificial intelligence to assist companies in identifying software vulnerabilities and enhancing their cyber defense mechanisms. This move reflects a broader trend among AI firms to expand their offerings into the cybersecurity sector, addressing the growing need for robust security solutions in an increasingly digital landscape.

Decrypt4 days ago·
openaidaybreakcybersecurity

Official CheckMarx Jenkins package compromised with infostealer

Checkmarx has issued a warning regarding a compromised version of its Jenkins Application Security Testing (AST) plugin that was found on the Jenkins Marketplace. This rogue plugin is designed to steal information, raising significant security concerns for users relying on Jenkins for application security. The incident highlights the ongoing risks associated with third-party software integrations in development environments.

BleepingComputer4 days ago·
checkmarxjenkinsinfostealer

FCC Softens Ban on Foreign-Made Routers

The Federal Communications Commission (FCC) has relaxed certain restrictions and extended deadlines for foreign-made router manufacturers while maintaining an overall ban. This decision reflects a balancing act between national security concerns and the need for technological innovation in the router market.

Dark Reading4 days ago·
fccroutersforeign-manufacturing

Tech Can't Stop These Threats — Your People Can

The article discusses the limitations of security controls in combating cyber threats and emphasizes the critical role of employees as the first line of defense. It highlights four specific types of attacks where human vigilance is essential for effective cybersecurity. By focusing on employee awareness and training, organizations can better protect themselves against these threats.

Dark Reading4 days ago·
cybersecurityemployee-trainingcyber-attacks

Hackers Used AI to Build a Zero-Day Exploit That Bypasses Two-Factor Authentication: Google

Google's threat team has reported that cybercriminals have leveraged an AI model to create a zero-day exploit capable of bypassing two-factor authentication. This development highlights the growing sophistication of cyber threats and the potential for AI to be used in malicious ways, raising concerns about security in digital environments.

Decrypt4 days ago·
aicybersecuritytwo-factor-authentication

Google: Hackers used AI to develop zero-day exploit for web admin tool

Google's Threat Intelligence Group has reported that hackers utilized AI to create a zero-day exploit for a widely used open-source web administration tool. This development highlights the growing intersection of artificial intelligence and cybersecurity threats, raising concerns about the potential for AI to enhance malicious activities.

BleepingComputer4 days ago·
aicybersecurityzero-day

Hackers Use AI for Exploit Development, Attack Automation

Cyber adversaries are increasingly leveraging large language models to enhance their capabilities in exploit development and attack automation. This trend marks a significant evolution in the tactics employed by hackers, allowing for more sophisticated and complex cyber attacks.

Dark Reading4 days ago·
aicybersecurityhackers

Webinar this week: Prevention alone is not enough against modern attacks

The upcoming webinar will address the necessity for organizations to enhance their cybersecurity strategies by integrating security measures, backup solutions, and recovery planning. It emphasizes that relying solely on prevention is insufficient to mitigate the effects of contemporary cyber threats.

BleepingComputer4 days ago·
cybersecuritywebinardata-recovery

Cyber Espionage Group Targets Aviation Firms to Steal Map Data

A cyber espionage group has been identified as targeting aviation firms, specifically aerospace and drone operators, to steal critical geospatial data. The attackers are exfiltrating GIS files, terrain models, and GPS data, which could provide them with strategic insights into adversaries' operations and environments. This campaign highlights the ongoing risks faced by the aviation sector in the realm of cybersecurity.

Dark Reading4 days ago·
cyber-espionageaviationgis

OpenAI in talks with EU over access to new cyber model but Anthropic still holding out on Mythos

OpenAI is currently in discussions with the European Union regarding the provision of access to its new cybersecurity model, which has been made available to select cybersecurity teams for preview. Meanwhile, Anthropic has not yet agreed to provide access to its own cybersecurity model, Mythos, indicating a competitive landscape in the AI-driven cybersecurity sector.

CNBC Technology4 days ago·
openaicybersecurityeu

Hackers abuse Google ads, Claude.ai chats to push Mac malware

A new malvertising campaign is exploiting Google Ads and Claude.ai shared chats to distribute malware targeting Mac users. When individuals search for 'Claude mac download,' they may encounter deceptive sponsored links that mislead them into downloading harmful software instead of the legitimate service. This highlights ongoing vulnerabilities in online advertising and the need for increased cybersecurity vigilance.

BleepingComputer5 days ago·
malwaregoogle-adsclaude-ai

Police shut down reboot of Crimenetwork marketplace, arrest admin

German authorities have successfully shut down a reboot of the criminal marketplace 'Crimenetwork', which had reportedly generated over 3.6 million euros. The operation also led to the arrest of the marketplace's administrator, highlighting ongoing efforts to combat cybercrime and illegal online activities.

BleepingComputer5 days ago·
cybercrimemarketplacelaw-enforcement

JDownloader site hacked to replace installers with Python RAT malware

The JDownloader website was recently hacked, leading to the distribution of compromised installers for both Windows and Linux users. The Windows version specifically contained a Python-based remote access trojan (RAT), posing significant security risks to those who downloaded it.

BleepingComputer6 days ago·
jdownloadermalwarecyberattack

Hacking Time: Spoofing Atomic Clocks with Audio Harmonics

The article explores a novel method of spoofing atomic clocks using audio harmonics, highlighting potential vulnerabilities in timekeeping systems. This technique could have significant implications for cybersecurity and the integrity of time-sensitive applications. Researchers emphasize the need for enhanced security measures to protect against such attacks.

Hacker News6 days ago·
cybersecurityatomic-clocksspoofing

Fake OpenAI repository on Hugging Face pushes infostealer malware

A fraudulent repository on Hugging Face has been identified, masquerading as OpenAI's 'Privacy Filter' project to distribute infostealer malware targeting Windows users. This incident highlights the ongoing risks associated with open-source platforms and the importance of verifying the authenticity of software before use.

BleepingComputer6 days ago·
malwarehugging-faceopenai

Palo Alto Networks says in its testing, three weeks of frontier AI-assisted analysis matched a full year of manual penetration testing, with broader coverage (Sam Rubin/Palo Alto Networks Blog)

Palo Alto Networks has conducted tests demonstrating that three weeks of AI-assisted analysis can achieve results comparable to a full year of manual penetration testing, offering broader coverage in the process. This finding highlights the potential of frontier AI models in enhancing cybersecurity measures and efficiency in threat detection.

Techmeme7 days ago·
aipenetration-testingcybersecurity

Most Beginners Approach Bug Bounty Completely Wrong

Tariq Davis, a cybersecurity student, highlights the misconceptions surrounding bug bounty programs, particularly for beginners. He notes that much of the available information is either overly technical or assumes prior knowledge, making it difficult for newcomers to navigate. Davis aims to create a straightforward guide that demystifies the process and provides practical insights into how bug bounty programs operate.

Dev.to7 days ago·
bug-bountycybersecurityvulnerabilities

Scaling Trusted Access for Cyber with GPT‑5.5 and GPT‑5.5‑Cyber

The article discusses the advancements in trusted access solutions for cybersecurity, leveraging the capabilities of GPT-5.5 and its specialized variant, GPT-5.5-Cyber. These models aim to enhance security protocols and streamline access management in digital environments, addressing the growing complexities of cyber threats.

Hacker News7 days ago·
gpt-5.5cybersecuritytrusted-access

Security news weekly round-up - 8th May 2026

This week's security news highlights a critical vulnerability in the Apache HTTP/2 protocol, identified as CVE-2026-23918, which poses risks of denial-of-service (DoS) and potential remote code execution (RCE). The flaw, with a CVSS score of 8.8, has been addressed in version 2.4.67, but raises ongoing questions about the nature of system security and the need for proper enforcement of security measures. The article encourages readers to reflect on the complexities of securing systems in the face of such vulnerabilities.

Dev.to7 days ago·
apachehttp2vulnerability

Polish intelligence warns hackers attacked water treatment control systems

Polish intelligence has issued a warning regarding cyberattacks targeting water treatment control systems, highlighting the growing threat to critical infrastructure. These attacks underscore the vulnerabilities in essential services and the need for enhanced cybersecurity measures to protect public utilities from malicious actors.

Hacker News7 days ago·
cybersecurityhackersinfrastructure