Researchers at Acronis have discovered a malicious trojanized version of the Red Alert rocket warning app targeting Israeli Android users. Distributed via fake Home Front Command SMS messages, this spyware steals GPS data, SMS messages, and contact lists while maintaining…
Over 100 GitHub Repositories Distributing BoryptGrab Stealer
The malware targets browser and cryptocurrency wallet data, along with system information and user files. The post Over 100 GitHub Repositories Distributing BoryptGrab Stealer appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Over…
Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model
Anthropic on Friday said it discovered 22 new security vulnerabilities in the Firefox web browser as part of a security partnership with Mozilla. Of these, 14 have been classified as high, seven have been classified as moderate, and one has…
CBP Used Online Ad Data to Track Phone Locations
Plus: Proton helped the FBI identify a protester, the Leakbase cybercrime forum was busted in an international operation, and more. This article has been indexed from Security Latest Read the original article: CBP Used Online Ad Data to Track Phone…
Malicious imToken Chrome Extension Caught Stealing Mnemonics and Private Keys
Socket’s Threat Research Team has discovered a malicious Google Chrome extension named “lmΤoken Chromophore” that actively steals cryptocurrency wallet credentials. Masquerading as a harmless hex color visualizer, the extension actually impersonates the popular non-custodial wallet brand imToken. Since its launch…
Pentagon’s Chief Tech Officer Says He Clashed With AI Company Anthropic Over Autonomous Warfare
Pentagon CTO Emil Michael said the military is developing procedures for enabling different levels of autonomy in warfare depending on the risk posed. The post Pentagon’s Chief Tech Officer Says He Clashed With AI Company Anthropic Over Autonomous Warfare appeared…
OpenAI’s Codex Security Built to Automate Vulnerability Discovery and Remediation
OpenAI has officially introduced Codex Security, an advanced application security agent designed to automate vulnerability discovery and remediation. Formerly known as Aardvark, the tool is now available in a research preview. It aims to eliminate the bottleneck of manual security…
How Each Gulf Country Is Intercepting Iranian Missiles and Drones
As missiles and drones cross the region’s skies, the Gulf’s layered air-defense networks—from THAAD to Patriot batteries—are being tested in real time. This article has been indexed from Security Latest Read the original article: How Each Gulf Country Is Intercepting…
AI Auditability: Why Leaders Must Prove How AI Makes Decisions
AI Auditability: Why Leaders Must Prove How AI Makes Decisions We’ve officially entered the “production phase” of Artificial Intelligence. In just a few short years, AI has moved from experimental pilots to being embedded in nearly every major business function—by…
Malicious Browser Add‑on Targets imToken Users’ Private Keys
Socket’s Threat Research Team has uncovered a highly deceptive Google Chrome extension designed to steal private keys and seed phrases from cryptocurrency users. The malicious add-on, named “lmΤoken Chromophore” (extension ID bbhaganppipihlhjgaaeeeefbaoihcgi), disguises itself as a harmless hex color visualizer…
Iran-linked hackers target IP cameras across Israel and Gulf states for military intelligence
Researchers observed Iran-linked actors targeting IP cameras across Israel and Gulf countries, likely to support military intelligence and battle damage assessment. According to the Check Point Cyber Security Report 2026, cyber operations are increasingly used to support military activity and…
System Audit Reports in the Banking Sector: Key Expectations
In the fast-evolving world of banking, where digital transformation drives operational efficiency, the security and reliability of IT systems have become a key to organizational success. System audit reports have emerged as a critical tool to ensure that banks operate…
Newly Discovered WordPress Plugin Bug Enables Privilege Escalation to Admin
With WordPress, millions of websites depend on its convenience, but it also includes a complex web of extensions, which quietly handle everything from user onboarding to payment-based membership. In addition to simplifying site management and extending functionality, these plugins…
IT Security News Hourly Summary 2026-03-07 12h : 1 posts
1 posts were published in the last hour 10:9 : YARA-X 1.14.0 Release, (Sat, Mar 7th)
YARA-X 1.14.0 Release, (Sat, Mar 7th)
YARA-X's 1.14.0 release brings 4 improvements and 2 bugfixes. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: YARA-X 1.14.0 Release, (Sat, Mar 7th)
OpenAI Launches Codex Security that Discover, Validate and Patch Vulnerabilities
OpenAI has announced the launch of Codex Security, an application security agent engineered to autonomously identify, validate, and remediate complex vulnerabilities within enterprise and open-source codebases. Formerly known as Aardvark, the tool leverages frontier AI models to provide context-aware security…
Cybersecurity Today Month in Review: World In Turmoil
Cybersecurity Today Month in Review: Iran Conflict Cyber Spillover, IoT Cameras, AI Hacking Tools, and Resilience Planning In this weekend month-in-review episode, host Jim Love and panelists David Shipley, Laura Payne, Neil Bisson, and Chris “CJ” Johnson discuss cyber and…
IT Security News Hourly Summary 2026-03-07 06h : 1 posts
1 posts were published in the last hour 4:31 : Claude AI Exposes 22 Firefox Vulnerabilities in Just Two Weeks
Claude AI Exposes 22 Firefox Vulnerabilities in Just Two Weeks
Artificial intelligence has officially entered the realm of advanced vulnerability research, moving beyond simple code assistance to autonomous threat hunting. This highly accelerated discovery rate outpaces traditional manual research, with the AI uncovering more vulnerabilities in one month than human…
Hackers Exploit Two Vulnerabilities in Cisco SD-WAN Manager
Cisco Systems has confirmed that attackers are actively exploiting two security flaws affecting its Catalyst SD-WAN Manager platform, previously known as SD-WAN vManage. The company disclosed that both weaknesses are currently being abused in real-world attacks. The vulnerabilities are…
IT Security News Hourly Summary 2026-03-07 03h : 2 posts
2 posts were published in the last hour 1:32 : FBI Investigating ‘Suspicious’ Cyber Activity on System Holding Sensitive Surveillance Information 1:11 : What cybersecurity actually does for your business
FBI Investigating ‘Suspicious’ Cyber Activity on System Holding Sensitive Surveillance Information
The bureau is working to determine the scope and impact of the problem, according to a notification sent to members of Congress. The post FBI Investigating ‘Suspicious’ Cyber Activity on System Holding Sensitive Surveillance Information appeared first on SecurityWeek. This…
What cybersecurity actually does for your business
The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed This article has been indexed from WeLiveSecurity Read the original article: What cybersecurity actually does for your…
Attacks at the Speed of AI
AI-assisted cyberattacks are accelerating reconnaissance and techniques such as password spraying against exposed devices. Learn how attackers are using AI prompts to automate attacks and the steps organizations should take to protect their network. This article has been indexed…