A real-world intrusion campaign leveraging publicly available Nightmare-Eclipse privilege escalation tooling, BlueHammer, RedSun, and UnDefend, following what appears to be unauthorized access through a compromised FortiGate SSL VPN. The incident marks the first confirmed in-the-wild deployment of these tools against…
AI-assisted intruders pwned Vercel via OAuth abuse and a pilfered employee account
CEO suspects silicon sidekick behind ‘surprising velocity’ breach – cyber crims shop stolen data for $2M Vercel’s CEO reckons the crooks behind its recent breach likely had a helping hand from AI, saying the attackers moved with “surprising velocity” and…
Progress Patches Multiple Vulnerabilities in MOVEit WAF, LoadMaster
The security defects could be exploited for remote code execution, OS command injection, and WAF detection bypass. The post Progress Patches Multiple Vulnerabilities in MOVEit WAF, LoadMaster appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
OpenAI’s Chronicle feature lets Codex read your screen, raising privacy concerns
OpenAI’s Chronicle is a feature designed to help Codex, an AI-powered coding assistant, better understand what users are working on by capturing context directly from their screens. It uses recent screen activity to build memories, allowing Codex to interpret references,…
ServiceNow acquires Armis for $7.75bn
ServiceNow has successfully completed its acquisition of Armis for $7.75 billion in cash, a strategic move aimed at bolstering its cybersecurity offerings. This article has been indexed from CyberMaterial Read the original article: ServiceNow acquires Armis for $7.75bn
PlayStation age-gating in UK
Sony has announced that it will begin enforcing age verification requirements for PlayStation users in the UK and Ireland as part of its compliance with the UK’s Online Safety Act. This article has been indexed from CyberMaterial Read the original…
Poste Italiane Fined €12.5M for Data Violations
The Italian Data Protection Authority has imposed significant fines on Poste Italiane and its subsidiary Postepay, totaling over €12.5 million, for unlawful processing of personal data. This article has been indexed from CyberMaterial Read the original article: Poste Italiane Fined…
AdvaMed Cybersecurity Summit
The AdvaMed Cybersecurity Summit brought together industry leaders, regulators, and cybersecurity experts to address the pressing challenges faced by the medical device sector. This article has been indexed from CyberMaterial Read the original article: AdvaMed Cybersecurity Summit
Free Summer Cyber and AI Experience Camps
The University of West Florida Center for Cybersecurity and AI is teaming up with Regions Foundation to provide free Summer Cyber and AI Experience Camps in 2026. This article has been indexed from CyberMaterial Read the original article: Free Summer…
Phishing and MFA exploitation: Targeting the keys to the kingdom
In 2025, attackers increasingly targeted weaknesses in multi-factor authentication (MFA) workflows, and phishing attacks leveraged valid, compromised credentials to launch lures from trusted accounts. The trends focused entirely on trust, or the lack thereof, in everyday business operations. This article…
Threat Intel Scraping Without Burning Your Cover or Your Stack
Threat Intel Scraping sounds simple until it isn’t, here’s how cybersecurity teams avoid blocks, bad data, and unnecessary risk. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read the original article: Threat Intel…
AI-Powered NGate Malware Evades Detection Inside NFC Payment Apps
A new NGate malware variant that hides inside a trojanized version of HandyPay, a legitimate NFC payment relay app for Android, to steal card data and PINs for ATM cash-outs and fraudulent payments. The injected code shows clear signs of…
Heimdal Expands AI Strategy with AI Wingman and Third-Party AI Containment
COPENHAGEN, Denmark, 21 April 2026 — Heimdal today unveiled the next phase of its AI strategy, expanding AI Wingman with three new layers – Assist, Triage and SOC – alongside the introduction of Third-Party AI Containment. Together, these capabilities build on…
Crook claims to leak ‘video surveillance footage’ of companies
Mexican IT services firm admits it was hacked, but says client operations weren’t affected A Mexican IT infrastructure and digital transformation biz is on clean-up duty after a criminal posted screenshots of what they claimed was company video surveillance footage…
AI Policy in 2026: The Missing Link Between AI Ambition and Execution
The uncomfortable truth about AI adoption Nearly 70% of organizations report piloting AI, but fewer than 20% have scaled it across the enterprise, according to…Read More The post AI Policy in 2026: The Missing Link Between AI Ambition and Execution…
Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution
Cybersecurity researchers have discovered a vulnerability in Google’s agentic integrated development environment (IDE), Antigravity, that could be exploited to achieve code execution. The flaw, since patched, combines Antigravity’s permitted file-creation capabilities with an insufficient input sanitization in Antigravity’s native file-searching…
NGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINs
Cybersecurity researchers have discovered a new iteration of an Android malware family calledNGate that has been found to abuse a legitimate application called HandyPay instead of NFCGate. “The threat actors took the app, which is used to relay NFC data, and…
No Exploit Needed: How Attackers Walk Through the Front Door via Identity-Based Attacks
The cybersecurity industry has spent the last several years chasing sophisticated threats like zero-days, supply chain compromises, and AI-generated exploits. However, the most reliable entry point for attackers still hasn’t changed: stolen credentials. Identity-based attacks remain a dominant initial access…
Claude Code, Gemini CLI, and GitHub Copilot Exposed to Prompt Injection via GitHub Comments
Comment and Control prompt injection vulnerabilities discovered in AI agents, including Claude Code Security Review, Google Gemini CLI Action, and GitHub Copilot Agent. The research, spearheaded by Aonan Guan and Johns Hopkins University researchers, highlights critical architectural flaws in how…
Mexican Surveillance Company
Grupo Seguritech is a Mexican surveillance company that is expanding into the US. This article has been indexed from Schneier on Security Read the original article: Mexican Surveillance Company
Data Breaches at Healthcare Organizations in Illinois and Texas Affect 600,000
Data breaches were disclosed by Southern Illinois Dermatology, Saint Anthony Hospital, and North Texas Behavioral Health Authority. The post Data Breaches at Healthcare Organizations in Illinois and Texas Affect 600,000 appeared first on SecurityWeek. This article has been indexed from…
Organizations Warned of Exploited Cisco, Kentico, Zimbra Vulnerabilities
CISA expanded the KEV catalog with eight flaws, but five of them have been flagged as exploited before. The post Organizations Warned of Exploited Cisco, Kentico, Zimbra Vulnerabilities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
CISA flags another Cisco Catalyst SD-WAN Manager bug as exploited (CVE-2026-20133)
CISA added eight new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including a Cisco Catalyst SD-WAN Manager vulnerability (CVE-2026-20133) that Cisco has yet to flag as exploited. Three Cisco Catalyst SD-WAN Manager vulnerabilities Alongside CVE-2026-20133, CISA has also listed…
The US NSA is using Anthropic’s Claude Mythos despite supply chain risk
Axios reports the National Security Agency uses Anthropic Mythos model despite Department of Defense concerns, blurring AI risk vs defense lines. The reported use of Anthropic’s Mythos model by the U.S. National Security Agency is a reminder that the line…