European Commission president Ursula von der Leyen calls for action on ‘addictive’ social media, suggests proposal within weeks This article has been indexed from Silicon UK Read the original article: EU President Calls For Youth Social Media ‘Delay’
Critical Fortinet vulnerabilities fixed in FortiSandbox and FortiAuthenticator
Fortinet patched critical flaws in FortiSandbox and FortiAuthenticator that could let attackers remotely execute code on unpatched systems. Fortinet addressed two critical vulnerabilities affecting FortiSandbox and FortiAuthenticator. The flaws could allow attackers to execute arbitrary commands or code on unpatched…
Top 10 Best Data Loss Prevention Software in 2026
In 2026, data is the undisputed lifeblood of the modern enterprise. As organizations shift completely to decentralized, multi-cloud architectures, the challenge of securing sensitive information—such as Intellectual Property (IP), Personally Identifiable Information (PII), and Protected Health Information (PHI)—has grown exponentially.…
Microsoft Releases Cumulative Update for Windows 11, Version 25H2 and 24H2
Microsoft pushed out a significant cumulative update for Windows 11 on May 12, 2026, covering both version 25H2 and version 24H2. The update, identified as KB5089549, brings OS Builds 26200.8457 and 26100.8457 to users running these versions. It bundles the…
Hundreds of Malicious Packages Force RubyGems to Suspend Registrations
More than 500 packages were pushed during the attack, but the target appears to have been RubyGems itself rather than users. The post Hundreds of Malicious Packages Force RubyGems to Suspend Registrations appeared first on SecurityWeek. This article has been…
Versa CSPM brings continuous visibility to cloud risk and compliance exposure
Versa has announced Versa Cloud Security Posture Management (CSPM), extending the VersaONE Universal SASE Platform to provide continuous visibility, prioritization, and remediation of cloud risk across environments. With CSPM, Versa combines secure access protection and cloud posture risk on a…
Instructure’s agreement, Shai Hulud campaign, OpenAI’s Daybreak
Instructure reaches an “agreement” with ShinyHunters Shai Hulud campaign is back OpenAI launches Daybreak Get the show notes here: https://cisoseries.com/cybersecurity-news-instructures-agreement-shai-hulud-campaign-openais-daybreak/ Huge thanks to our episode sponsor, Doppel Social engineering attacks look trustworthy — a routine request, an internal email, a…
IT Security News Hourly Summary 2026-05-13 09h : 9 posts
9 posts were published in the last hour 7:2 : US Tech Firms Push White House Over EU Product Liability Rules 7:2 : Texas Sues Netflix Over Data Collection, Addictive Design 7:2 : eBay Rejects Surprise GameStop Takeover Bid 7:2…
US Tech Firms Push White House Over EU Product Liability Rules
US tech companies urge Trump administration to put pressure on EU over regulations that could expose them to lawsuits This article has been indexed from Silicon UK Read the original article: US Tech Firms Push White House Over EU Product…
Texas Sues Netflix Over Data Collection, Addictive Design
Texas attorney general sues streaming platform over data collection, ad targeting practices, saying autoplay encourages addictiveness This article has been indexed from Silicon UK Read the original article: Texas Sues Netflix Over Data Collection, Addictive Design
eBay Rejects Surprise GameStop Takeover Bid
eBay board says unsolicited $56bn takeover offer from much smaller ‘meme’ retailer GameStop ‘neither credible nor attractive’ This article has been indexed from Silicon UK Read the original article: eBay Rejects Surprise GameStop Takeover Bid
Q1 2026 Ransomware Attacks Hits 2,122 Orgs Amid Fewer, More Impactful Groups
Ransomware activity remained elevated in Q1 2026, continuing the trend established over the past year. The latest State of Ransomware Q1 2026 report reveals that 2,122 organizations were listed on ransomware data leak sites (DLS), marking the second-highest Q1 total on record.…
ICS Patch Tuesday: New Security Advisories From Siemens, Schneider, CISA
Many ICS vendors have not released new advisories for the May 2026 Patch Tuesday. The post ICS Patch Tuesday: New Security Advisories From Siemens, Schneider, CISA appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
[GUEST DIARY] Tearing apart website fraud to see how it works., (Wed, May 13th)
[This is a Guest Diary by Joshua Nikolson, an ISC Intern and part of the SANS.edu Bachelor's degree in Applied Cybersecurity (BACS) program.] This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: [GUEST…
Google Reports Confirmed First AI-Generated Zero-Day Exploit Used
A report from the Google Threat Intelligence Group (GTIG) has confirmed the first instances of threat actors using… The post Google Reports Confirmed First AI-Generated Zero-Day Exploit Used appeared first on Hackers Online Club. This article has been indexed from…
Malware crew TeamPCP open-sources its Shai-Hulud worm on GitHub
Where it’s been well and truly forked, seemingly without Microsoft’s code locker noticing This article has been indexed from www.theregister.com – Articles Read the original article: Malware crew TeamPCP open-sources its Shai-Hulud worm on GitHub
NetSPI AI-powered Continuous Pentesting identifies high-impact vulnerabilities
NetSPI launched AI-powered Continuous Pentesting offerings, designed to help organizations continuously identify, validate and reduce risk across dynamic external and cloud environments. Organizations are managing an expanding number of potential entry points as new internet-facing resources, including cloud assets, applications,…
Fake FinalShell and Xshell Sites Push Kong RAT Malware
Hackers are abusing fake download sites for popular tools like FinalShell and Xshell to deliver a new remote access trojan known as Kong RAT, in a highly staged and stealthy campaign that ran from at least May 2025 through March…
The evolution of cyber risk: Addressing geopolitical threats
Ransomware, data breaches, phishing schemes—cyber attacks can take many forms. Traditionally, the motive of these attackers can often be traced back to some sort of tangible goal. An attacker may want to extort some financial gain from a business, while…
Sandyaa: Open-source autonomous security bug hunter
Source code auditing has traditionally relied on static analyzers that flag long lists of potential issues, leaving engineers to sort bugs from noise. A new open-source project from offensive-security firm SecureLayer7 takes a different route, using LLMs to read a…
The hidden risk of non-human identities in AI adoption
An employee with persistent, unsupervised admin access across critical systems, with no audit trail, no clear owner, and no regular access reviews, would raise immediate concern in most organizations. Yet non-human identities and AI agents are often granted that same…
Researchers open-source a Wi-Fi cyber range for security training
Wireless security training programs lean heavily on generic network labs, with Wi-Fi appearing as a checkbox alongside Bluetooth, Zigbee, and cellular. Hands-on environments dedicated to IEEE 802.11 are uncommon, even as Wi-Fi remains the default on-ramp to corporate networks and…
Microsoft Teams Vulnerability Allows Hackers to Perform Spoofing Attacks
A newly disclosed security vulnerability in Microsoft Teams could allow attackers to spoof local devices, raising concerns for enterprises and individual users who rely on the platform for daily communications. Microsoft disclosed CVE-2026-32185 on May 12, 2026, as part of…
Canvas Breach ‘Deal’ With ShinyHunters, AI Zero-Day Warning, Checkmarx Hit Again
Cybersecurity Today examines a troubling set of new security developments affecting schools, software supply chains, and account security. Instructure says it reached an “agreement” with the ShinyHunters threat group after the massive Canvas breach that may have affected up to…