An in-depth exploration of how generative AI is transforming cyber defense, privacy protection, and digital resilience. This article has been indexed from CyberMaterial Read the original article: Generative AI for Cybersecurity and Privacy
RedHunt-OS
A Linux based threat hunting and DFIR operating system built for blue team operations and adversary detection. This article has been indexed from CyberMaterial Read the original article: RedHunt-OS
IT Security News Hourly Summary 2026-01-20 15h : 14 posts
14 posts were published in the last hour 13:37 : Hackathon Projects Show AI Wellness Apps Can Leak Sensitive User Info 13:37 : Apache Airflow Flaws Expose Sensitive Workflow Data to Potential Attackers 13:37 : Gootloader Malware With Low Detection…
Hackathon Projects Show AI Wellness Apps Can Leak Sensitive User Info
As emotional computing applications proliferate, the security threats they face require frameworks beyond traditional approaches. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the original article: Hackathon Projects Show AI Wellness Apps…
Apache Airflow Flaws Expose Sensitive Workflow Data to Potential Attackers
Apache Airflow has patched two separate credential-exposure vulnerabilities in versions before 3.1.6. The flaws could allow attackers to extract sensitive authentication data embedded in proxy configurations and templated workflow fields through log files and the web UI, potentially compromising network infrastructure and…
Gootloader Malware With Low Detection Rate Evades Most Security Tools
Gootloader malware has resurfaced, employing sophisticated evasion techniques to exploit malformed ZIP archives and obfuscation mechanisms to bypass security detection systems. The Gootloader malware campaign, tracked as a partnership between Storm-0494 and Vanilla Tempest, has returned in late 2025 with…
Raaga Confirms Major Data Breach Exposing Personal Information of 10.2Million Users
Indian music streaming platform Raaga has become the latest victim of a significant cybersecurity incident after sensitive user data was posted for sale on a popular hacking forum in December 2025. The breach has exposed personal information from over 10 million users,…
Initial access broker pleads guilty to selling access to 50 corporate networks
A 40-year-old Jordanian man has admitted to selling unauthorized access to computer networks of at least 50 companies, the US Attorney’s Office of the District of New Jersey has announced. Feras Khalil Ahmad Albashiti has pleaded guilty last Thursday to…
Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto
Cybersecurity researchers have disclosed details of a malware campaign that’s targeting software developers with a new information stealer called Evelyn Stealer by weaponizing the Microsoft Visual Studio Code (VS Code) extension ecosystem. “The malware is designed to exfiltrate sensitive information,…
The Hidden Risk of Orphan Accounts
The Problem: The Identities Left Behind As organizations grow and evolve, employees, contractors, services, and systems come and go – but their accounts often remain. These abandoned or “orphan” accounts sit dormant across applications, platforms, assets, and cloud consoles. The…
Linkedin Phishing Campaign Exploits Open-Source Pen Testing Tool to Compromise Business Execs
Cybersecurity Researchers at ReliaQuest warn of an ongoing campaign delivered to “high-value individuals” via LinkedIn messages This article has been indexed from www.infosecurity-magazine.com Read the original article: Linkedin Phishing Campaign Exploits Open-Source Pen Testing Tool to Compromise Business Execs
Police Bust Thai Based Voice Phishing Ring
Authorities in Seoul recently dismantled a Thailand-based voice phishing organization responsible for stealing approximately 7 billion won from dozens of victims. This article has been indexed from CyberMaterial Read the original article: Police Bust Thai Based Voice Phishing Ring
RansomHouse Claims Data Breach at Major Apple Contractor Luxshare
RansomHouse claims to have breached Apple contractor Luxshare, but no evidence has been released. Links are offline and the breach remains unverified. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the original…
Anthropic quietly fixed flaws in its Git MCP server that allowed for remote code execution
Prompt injection for the win Anthropic has fixed three bugs in its official Git MCP server that researchers say can be chained with other MCP tools to remotely execute malicious code or overwrite files via prompt injection.… This article has…
NCSC Warns of Increased Russian Hacktivist Threat to UK Online Services
National Cyber Security Centre says these ideologically motivated attackers are moving beyond simple website disruptions. The post NCSC Warns of Increased Russian Hacktivist Threat to UK Online Services appeared first on TechRepublic. This article has been indexed from Security Archives…
For the price of Netflix, crooks can now rent AI to run cybercrime
Group-IB says crims forking out for Dark LLMs, deepfakes, and more at subscription prices Cybercrime has entered its AI era, with criminals now using weaponized language models and deepfakes as cheap, off-the-shelf infrastructure rather than experimental tools, according to researchers…
Endace pushes packet capture into real-time security workflows
Endace has announced the release of OSm 7.3, a major software update that makes network packet data faster, more affordable, and more user-friendly. Faster search, API-driven automation, and instant forensics With threats evolving at unprecedented speed and regulations like DORA,…
WPair Scanner Released to Detect WhisperPair Flaw in Google’s Fast Pair Protocol
An open-source Android application designed to identify and test devices vulnerable to CVE-2025-36911, a critical authentication bypass flaw in Google’s Fast Pair Bluetooth protocol. The vulnerability, commonly referred to as WhisperPair, affects millions of Bluetooth audio devices worldwide, enabling unauthorised…
New Study Finds GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale
Advanced large language models can autonomously develop working exploits for zero-day vulnerabilities, marking a significant shift in the offensive cybersecurity landscape. The research demonstrates that artificial intelligence systems can now perform complex exploit development tasks that previously required specialized human…
OPNsense 25.7.11 Enhances Network Visibility With Host Discovery Feature
The OPNsense team has started the new year with the release of version 25.7.11, bringing a notable networking enhancement: a native host discovery service that deepens visibility into connected devices and tightens policy control across the firewall. Native host discovery improves network visibility. The…
Spear-Phishing Campaign Abuses Argentine Federal Court Rulings to Deliver Covert RAT
Seqrite Labs has uncovered a sophisticated spear-phishing campaign targeting Argentina’s judicial sector with a multi-stage infection chain designed to deploy a stealthy Rust-based Remote Access Trojan (RAT). The campaign primarily targets Argentina’s judicial institutions, legal professionals, justice-adjacent government bodies, and…
Google will pay $8.25m to settle child data-tracking allegations
Google-owned AdMob allegedly collected kids’ data for ads without parental consent—including IP addresses, usage data, and exact locations. This article has been indexed from Malwarebytes Read the original article: Google will pay $8.25m to settle child data-tracking allegations
APT-Grade PDFSider Malware Used by Ransomware Groups
Providing cyberespionage and remote code execution capabilities, the malware is executed via DLL sideloading. The post APT-Grade PDFSider Malware Used by Ransomware Groups appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: APT-Grade PDFSider…
AI Supercharges Attacks in Cybercrime’s New ‘Fifth Wave’
Weaponized AI is fueling a new wave of cybercrime, said Group-IB in its latest report This article has been indexed from www.infosecurity-magazine.com Read the original article: AI Supercharges Attacks in Cybercrime’s New ‘Fifth Wave’