15 posts were published in the last hour 10:2 : From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat 10:2 : AI-Generated Bug Submissions Create ‘Carnage’ 10:2 : Gentlemen Ransomware Targets Windows, Linux, NAS, BSD,…
From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat
Cisco Talos has uncovered a BadIIS variant — identifiable by its embedded “demo.pdb” strings — that functions as commodity malware, likely sold or shared among multiple Chinese-speaking cyber crime groups operating under a malware-as-a-service (MaaS) model for continuous monetization. This…
AI-Generated Bug Submissions Create ‘Carnage’
Platforms offering bounties for software flaws inundated with low-quality AI-generated submissions, as security adapts to new era This article has been indexed from Silicon UK Read the original article: AI-Generated Bug Submissions Create ‘Carnage’
Gentlemen Ransomware Targets Windows, Linux, NAS, BSD, and ESXi Systems
The Gentlemen ransomware operation has rapidly emerged as one of the most active and scalable cybercrime threats since its public appearance in the second half of 2025. The Gentlemen stands out for its ability to target a wide range of…
How to Make Apps and Websites Remove Your Nonconsensual Nudes
Starting May 19, tech platforms in the US will have to start complying with the Take It Down Act. Here’s how more than a dozen of the largest platforms are handling takedown demands for your nudes. This article has been…
Hackers Compromise @antv Packages in Mini Shai-Hulud npm Attack Wave
A sweeping supply chain attack has hit the npm ecosystem, compromising hundreds of widely used JavaScript packages tied to the @antv data visualization library. The attack, which unfolded in the early hours of May 19, 2026, injected malicious code into…
PoC Released for DirtyDecrypt Linux Kernel Vulnerability
Patched in April, the underlying vulnerability allows local attackers to elevate their privileges to root. The post PoC Released for DirtyDecrypt Linux Kernel Vulnerability appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: PoC…
Bank Says EV Expansion Faces Infrastructure, Insurance Barriers
Worldwide growth of EVs, supercharged by rising petrol costs, faces barriers in charging infrastructure, insurance, says BNP Paribas This article has been indexed from Silicon UK Read the original article: Bank Says EV Expansion Faces Infrastructure, Insurance Barriers
20-Year-Old PostgreSQL Flaw Gets Public PoC Exploit for Remote Code Execution
A newly released proof-of-concept (PoC) exploit for CVE-2026-2005 has brought renewed attention to a critical vulnerability in PostgreSQL’s pgcrypto extension, exposing systems to remote code execution (RCE). Security researchers warn that the flaw, rooted in legacy code paths dating back…
Kimsuky Uses LNK, JSE Lures to Target Recruiters, Crypto Users, Defense Officials
Kimsuky Hackers Use LNK and JSE Lures to Target Recruiters, Crypto Users, and Defense Officials. North Korea-linked threat group Kimsuky has launched at least four distinct spear-phishing campaigns in early 2026, targeting recruiters, cryptocurrency users, developers, defense personnel, and academic…
Massive MENA cybercrime Operation Ramz disrupts infrastructure and arrests 201 suspects
INTERPOL led Operation Ramz in MENA, resulting in 201 arrests and 382 suspects tied to cybercrime networks. INTERPOL coordinated Operation Ramz across the Middle East and North Africa, leading to 201 arrests and identifying 382 additional suspects. ” A first-of-its-kind cybercrime…
Poland shifts away from Signal following cyberattacks on officials’ accounts
Poland told officials to stop using the popular instant messaging app Signal after cyberattacks targeted government accounts. Poland has instructed government officials to stop using Signal for sensitive communications and move to a state-developed alternative. The decision follows repeated cyberattacks…
7-Eleven Notifies Franchise Applicants After Breach Exposes Personal Data
A security breach notification process has been initiated by 7-Eleven as a result of a security incident where an outside party was able to gain access to their systems containing franchisers’ information. According to a breach notification filed with the state of Maine, the company discovered that threat…
NCSC warns organisations not to rush into agentic AI
UK’s National Cyber Security Centre (NCSC) has advised businesses to proceed with caution when considering the implementation of agent-based AI, suggesting that agentic AI represents an entirely different kind of security problem compared to generative AI. According to a recent blog post and global guidance, produced in…
How EM is Boosting the Career Trajectory of VM Analysts
As organizations shift from vulnerability management (VM) to exposure management (EM), the role of the VM analyst must evolve or become outmoded. This necessary transition forces analysts to move beyond the job description of scanning and patching and into more…
Grafana Labs Confirms Hackers Stole Source Code
Open source tool maker Grafana says hackers stole codebase via GitHub breach This article has been indexed from www.infosecurity-magazine.com Read the original article: Grafana Labs Confirms Hackers Stole Source Code
UK Gov’t Saves Millions By Ending Palantir Contract
A government department says it saved millions a year in running costs after migrating from a Palantir system to a better one built in-house This article has been indexed from Silicon UK Read the original article: UK Gov’t Saves Millions…
PostgreSQL Flaws Expose Databases to Remote Code Execution and SQL Injection
PostgreSQL has released critical security updates addressing multiple high-impact vulnerabilities that could allow remote code execution (RCE), SQL injection, and denial-of-service (DoS) attacks across widely deployed database environments. The PostgreSQL Global Development Group announced the release of versions 18.4, 17.10,…
Four-Faith Industrial Routers Targeted in Botnet Hijacking Campaign
Four-Faith industrial cellular routers are being actively targeted in a growing botnet campaign exploiting a critical authentication bypass flaw tracked as CVE-2024-9643. Security researchers warn that attackers are rapidly weaponizing the vulnerability to hijack exposed devices and repurpose them as…
CISA Admin Exposes AWS GovCloud Credentials on Public GitHub Repository
A major security lapse has exposed highly sensitive U.S. government cloud credentials after a contractor working with the Cybersecurity and Infrastructure Security Agency (CISA) accidentally published them in a public GitHub repository. The repository, named “Private-CISA,” remained publicly accessible until…
Waymo Cars Flood Quiet Atlanta Cul-De-Sac
Dozens of automated Waymo cars filmed driving in and out of Atlanta dead-end street, as company blames ‘fleet positioning’ This article has been indexed from Silicon UK Read the original article: Waymo Cars Flood Quiet Atlanta Cul-De-Sac
Shai-Hulud worm copycats emerge after source code leak
Shai-Hulud worm copycats are already attacking NPM developers after its source code leaked, enabling fast supply chain exploitation. The first copycats of the Shai-Hulud worm have already started showing up online, only a few days after the malware’s source code…
Compromised Nx Console 18.95.0 Targeted VS Code Developers with Credential Stealer
Cybersecurity researchers have flagged a compromised version of the Nx Console extension that was published to the Microsoft Visual Studio Code (VS Code) Marketplace. The extension in question is rwl.angular-console (version 18.95.0), a popular user interface and plugin for code…
Hackers Bypass Security Tools to Target Users Directly
Bridewell report calls out emergence of “fix-style” attacks This article has been indexed from www.infosecurity-magazine.com Read the original article: Hackers Bypass Security Tools to Target Users Directly