11 posts were published in the last hour 16:34 : How deepfake scams are fueling a new wave of fraud 16:34 : Hackers abused React Native CLI flaw to deploy Rust malware before public disclosure 16:34 : Using AI Agents…
How deepfake scams are fueling a new wave of fraud
Scammers are using deepfake technology to replicate your child’s voice in a kidnapping hoax, catfish with AI-generated video dates, and impersonate executives to steal millions. Learn how to spot deepfake fraud, and use Avast Deepfake Guard to help verify what’s…
Hackers abused React Native CLI flaw to deploy Rust malware before public disclosure
Hackers exploit a critical React Native CLI flaw (CVE-2025-11953) to run remote commands and drop stealthy Rust malware, weeks before public disclosure. Attackers are actively exploiting a critical flaw in the React Native CLI Metro server, tracked as CVE-2025-11953. The…
Using AI Agents to Separate Real Risk From Vulnerability Noise
Snir Ben Shimol, CEO and co-founder of Zest Security, talks about why vulnerability and exposure management has become one of the most stubborn problems in security operations. Ben Shimol argues that the numbers are getting worse, not better. Exploitation has…
French Police Raid X Paris Office, Summons Musk Over Grok Deepfakes
French authorities raided the Paris office of X and summonsed Elon Musk to France for question regarding nonconsensual and sexually suggestive deepfakes generated by xAI’s chatbot and posted to X as the global firestorm surrounding them escalates. The post French…
SQL Injection Flaw Affects 40,000 WordPress Sites
40,000 WordPress sites are vulnerable to SQL injection in Quiz and Survey Master plugin This article has been indexed from www.infosecurity-magazine.com Read the original article: SQL Injection Flaw Affects 40,000 WordPress Sites
Hundreds of Malicious Crypto Trading Addons Found in Moltbot/OpenClaw
A security researcher found 386 malicious ‘skills’ published on ClawHub, a skill repository for the popular OpenClaw AI assistant project This article has been indexed from www.infosecurity-magazine.com Read the original article: Hundreds of Malicious Crypto Trading Addons Found in Moltbot/OpenClaw
PDFly Variant Uses Custom PyInstaller Modification, Forcing Analysts to Reverse-Engineer Decryption
A new variant of the PDFly malware has emerged with advanced techniques that challenge traditional analysis methods. The malware uses a modified PyInstaller executable that prevents standard extraction tools from working properly. This makes it difficult for security teams to…
Beware of New Compliance Emails Weaponizing Word/PDF Files to Steal Sensitive Data
A sophisticated phishing campaign targeting macOS users has emerged, using fake compliance emails as a delivery mechanism for advanced malware. Chainbase Lab recently detected this campaign, which impersonates legitimate audit and compliance notifications to deceive users. The attack chain combines…
Stronger Incident Prevention Takes Just One CISO Decision
There is a comforting illusion in cybersecurity leadership: when things get noisy, you add more people. More analysts. More shifts. More headcount. It feels decisive. It looks responsible. It even photographs well for internal reports. But SOC inefficiency is rarely a…
RADICL Raises $31 Million for vSOC
The company will use the investment to accelerate development of its autonomous virtual security operations center (vSOC). The post RADICL Raises $31 Million for vSOC appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
National cybersecurity strategies depend on public-private trust, report warns
An influential cybersecurity think tank urged governments to consult extensively with a wide variety of business stakeholders before making ambitious plans. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: National cybersecurity strategies depend…
Hundreds of Malicious Skills Found in OpenClaw’s ClawHub
Researchers found hundreds of malicious skills in OpenClaw’s ClawHub, revealing a coordinated AI supply chain attack. The post Hundreds of Malicious Skills Found in OpenClaw’s ClawHub appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…
Promptware Threats Turn LLM Attacks Into Multi-Stage Malware Campaigns
Large language models are now embedded in everyday workplace tasks, powering automated support tools and autonomous assistants that manage calendars, write code, and handle financial actions. As these systems expand in capability and adoption, they also introduce new security…
Russian hackers are exploiting recently patched Microsoft Office vulnerability (CVE-2026-21509)
Russian state-sponsored hackers Fancy Bear (aka APT 28) are exploiting CVE-2026-21509, a Microsoft Office vulnerability for which Microsoft released an emergency fix last week. The exploitation CVE-2026-21509 allows unauthorized attackers to bypass a security feature (OLE mitigations in Microsoft 365…
DockerDash Exposes AI Supply Chain Weakness In Docker’s Ask Gordon
DockerDash vulnerability allows RCE and data exfiltration via unverified metadata in Ask Gordon This article has been indexed from www.infosecurity-magazine.com Read the original article: DockerDash Exposes AI Supply Chain Weakness In Docker’s Ask Gordon
Cyber Briefing: 2026.02.03
APT groups exploit Office flaws, vishing steals MFA, ransomware hits airports, Iran-linked ops target NGOs, extortion rises, and law enforcement seizures expand. This article has been indexed from CyberMaterial Read the original article: Cyber Briefing: 2026.02.03
RapidFort Raises $42M to Automate Software Supply Chain Security
The company will use the latest capital to scale its go-to-market efforts and expand its platform’s capabilities. The post RapidFort Raises $42M to Automate Software Supply Chain Security appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Rhysida Ransomware Hits California Tribal Clinics, Leaks SSNs and Medical Data
A recent ransomware attack has disrupted healthcare services and exposed sensitive patient data at the MACT Health Board, which operates clinics serving American Indian communities in California’s Sierra Foothills. The cybercriminal group Rhysida has claimed responsibility for the November…
Gremlin launches Disaster Recovery Testing for zone, region, and datacenter failovers
Gremlin, the proactive reliability platform, launched Disaster Recovery Testing: a new product built to safely and efficiently test zone, region, and datacenter evacuations and failovers. These large-scale tests ensure businesses maintain digital resilience and business continuity when faced with cloud…
Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package
Threat actors have been observed exploiting a critical security flaw impacting the Metro Development Server in the popular “@react-native-community/cli” npm package. Cybersecurity company VulnCheck said it first observed exploitation of CVE-2025-11953 (aka Metro4Shell) on December 21, 2025. With a CVSS…
[Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate
Most security teams today are buried under tools. Too many dashboards. Too much noise. Not enough real progress. Every vendor promises “complete coverage” or “AI-powered automation,” but inside most SOCs, teams are still overwhelmed, stretched thin, and unsure which tools…
UK ICO Launches Investigation into X Over AI Generated Non-Consensual Sexual Imagery
UK Data Protection Watchdog has “serious concerns” over data privacy on Elon Musk’s social platform This article has been indexed from www.infosecurity-magazine.com Read the original article: UK ICO Launches Investigation into X Over AI Generated Non-Consensual Sexual Imagery
JFrog Researchers Surface Vulnerabilities in AI Automation Platform from n8n
JFrog security researchers have discovered a pair of critical vulnerabilities in a workflow automation platform from n8n that makes use of large language models (LLMs) to execute tasks. A CVE-2026-1470 vulnerability, rated 9.9, enables a malicious actor to remotely execute…