ICE has used Mobile Fortify to identify immigrants and citizens alike over 100,000 times, by one estimate. It wasn’t built to work like that—and only got approved after DHS abandoned its own privacy rules. This article has been indexed from…
Microsoft Overhauls Security Leadership as AI Expands Enterprise Attack Surface
Microsoft brings back Hayete Gallot to lead Security while Charlie Bell moves to an engineering quality mandate, both reporting to CEO Satya Nadella. The post Microsoft Overhauls Security Leadership as AI Expands Enterprise Attack Surface appeared first on TechRepublic. This…
Substack says intruder lifted emails, phone numbers in months-old breach
Contact details were accessed in an intrusion that went undetected for months, the blogging outfit says Newsletter platform Substack has admitted that an intruder swiped user contact details months before the company noticed, forcing it to warn writers and readers…
New Clickfix variant ‘CrashFix’ deploying Python Remote Access Trojan
CrashFix crashes browsers to coerce users into executing commands that deploy a Python RAT, abusing finger.exe and portable Python to evade detection and persist on high‑value systems. The post New Clickfix variant ‘CrashFix’ deploying Python Remote Access Trojan appeared first…
IT Security News Hourly Summary 2026-02-05 21h : 4 posts
4 posts were published in the last hour 19:34 : Asia-based government spies quietly broke into critical networks across 37 countries 19:9 : All gas, no brakes: Time to come to AI church 19:9 : Top 7 reasons incident response…
Asia-based government spies quietly broke into critical networks across 37 countries
And their toolkit includes a new, Linux kernel rootkit A state-aligned cyber group in Asia compromised government and critical infrastructure organizations across 37 countries in an ongoing espionage campaign, according to security researchers.… This article has been indexed from The…
All gas, no brakes: Time to come to AI church
This week, Joe cautions the rush to adopt AI tools rife with truly awful security vulnerabilities. This article has been indexed from Cisco Talos Blog Read the original article: All gas, no brakes: Time to come to AI church
Top 7 reasons incident response plans fail
<p>Like the best-laid plans of mice and men, even the best-intentioned cybersecurity <a href=”https://www.techtarget.com/searchsecurity/definition/incident-response”>incident response</a> plans can go awry. When they do, the consequences can be ugly, as many organizations have discovered in recent years.</p> <p>A 2025 survey of 1,700…
One of Europe’s largest universities knocked offline for days after cyberattack
An alleged ransomware attack has taken down the systems of the Sapienza University of Rome. This article has been indexed from Security News | TechCrunch Read the original article: One of Europe’s largest universities knocked offline for days after cyberattack
Top 19 contact center platforms of 2026
<p>Contact center software has existed since the dawn of digital contact centers decades ago. But, in recent years, the contact center software industry has changed significantly.</p> <p>New technologies, such as generative AI, have spawned powerful and innovative contact center features.…
Keeper Security Announces 2026 MSP Partner Program
Keeper Security has announced the launch of its 2026 Managed Service Provider (MSP) Partner Program. The program helps managed service providers to deliver enterprise-grade privileged access management while growing their recurring revenue. This new launch is aligned with Keeper’s strategy…
AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
The distributed denial-of-service (DDoS) botnet known as AISURU/Kimwolf has been attributed to a record-setting attack that peaked at 31.4 Terabits per second (Tbps) and lasted only 35 seconds. Cloudflare, which automatically detected and mitigated the activity, said it’s part of…
Hitachi Energy XMC20
View CSAF Summary Hitachi Energy is aware of a vulnerability that affects XMC20 product versions listed in this document. Successful exploitation of this vulnerability can lead to forgery attacks potentially causing impact on confidentiality, integrity and availability for the product.…
o6 Automation GmbH Open62541
View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to cause a denial-of-service condition and memory corruption. The following versions of o6 Automation GmbH Open62541 are affected: Open62541 >=1.5-rc1|<1.5-rc2 (CVE-2026-1301) CVSS Vendor Equipment Vulnerabilities v3 5.7 o6…
Hitachi Energy FOX61x
View CSAF Summary Hitachi Energy is aware of a vulnerability that affects FOX61x product versions listed in this document. Successful exploitation of this vulnerability can lead to forgery attacks potentially causing impact on confidentiality, integrity and availability for the product.…
Mitsubishi Electric MELSEC iQ-R Series
View CSAF Summary Successful exploitation of this vulnerability may allow an attacker to read device data or part of a control program from the affected product, write device data in the affected product, or cause a denial-of-service condition on the…
TP-Link Systems Inc. VIGI Series IP Camera
View CSAF Summary Successful exploitation of this vulnerability could result in unauthorized users gaining administrative access to affected closed circuit television cameras. The following versions of TP-Link Systems Inc. VIGI Series IP Camera are affected: VIGI Cx45 Series Models C345,…
Salt Security warns autonomous AI agents are the next major security blind spot
Experiments involving autonomous AI agents coordinating, sharing code and acting without human supervision have captured plenty of attention in recent weeks. Platforms such as Moltbook and tools like Clawdbot have been framed as glimpses into a future where AI systems…
Threat Group Running Espionage Operations Against Dozens of Governments
Unit 42 researchers say an Asian threat group behind what they call the Shadow Campaigns has targeted government agencies in 37 countries in a wide-ranging global cyberespionage campaign that has involved phishing attacks and the exploitation of a more than…
The security implementation gap: Why Microsoft is supporting Operation Winter SHIELD
Most security incidents happen in the gap between knowing what matters and actually implementing security controls consistently. Read how Microsoft is helping organizations close this implementation gap. The post The security implementation gap: Why Microsoft is supporting Operation Winter SHIELD…
OpenClaw and the Growing Security Risks of Agentic AI
OpenClaw’s rise shows how agentic AI can expand attack surfaces and introduce new enterprise security risks. The post OpenClaw and the Growing Security Risks of Agentic AI appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…
AI and Regulation Redefine Application Security, New Global Study Finds
Artificial intelligence has overtaken all other forces shaping application security, according to a major new industry study that shows organisations racing to secure AI-generated code while responding to growing regulatory pressure. The 16th edition of the Building Security In Maturity…
Attackers Use Legitimate Forensic Driver to Disable Endpoint Security, Huntress Warns
Cybercriminals are increasingly turning trusted software against defenders, according to new research from Huntress, which has uncovered a real-world attack in which threat actors used a legitimate but vulnerable driver to disable endpoint security tools before deploying further malicious activity.…
Proton Warns European Startups: No One Is Too Small to Be Targeted by Hackers
Swiss privacy company Proton is urging European startups to rethink their cybersecurity approach after new research based on dark-web breach monitoring found that early-stage companies are increasingly targeted by cybercriminals, with significant consequences for innovation, data protection, and business continuity.…