A report by the Molly Rose Foundation warns of a global hacking network known as the Com that targets vulnerable children for extreme exploitation and self-harm. This article has been indexed from CyberMaterial Read the original article: Hacking Network Targets…
Former Google Engineer Convicted
A former Google engineer has been convicted of economic espionage and trade secret theft after stealing thousands of confidential AI-related documents to launch a startup in China. This article has been indexed from CyberMaterial Read the original article: Former Google…
Polish Grid Systems Targeted in Cyberattack Had Little Security, Per New Report
The hackers behind a cyberattack that targeted Poland's grid infrastructure met little resistance when they hit systems at a heat-and-power plant and wind and solar farms last month. The intruders were able to easily access numerous systems at the affected…
Match, Hinge, OkCupid, and Panera Bread breached by ransomware group
ShinyHunters claims to have stolen millions of records from Match Group dating apps and Panera Bread, with very different consequences for users. This article has been indexed from Malwarebytes Read the original article: Match, Hinge, OkCupid, and Panera Bread breached…
Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access
Cybersecurity researchers have discovered malicious Google Chrome extensions that come with capabilities to hijack affiliate links, steal data, and collect OpenAI ChatGPT authentication tokens. One of the extensions in question is Amazon Ads Blocker (ID: pnpchphmplpdimbllknjoiopmfphellj), which claims to be…
Two High Severity n8n Flaws Enable RCE
Security researchers recently uncovered two critical vulnerabilities in the n8n automation platform that could allow authenticated users to execute malicious code remotely. This article has been indexed from CyberMaterial Read the original article: Two High Severity n8n Flaws Enable RCE
Arc Raiders And The Finals Hit By DDoS
Embark Studios is currently battling extensive and coordinated DDoS attacks targeting both Arc Raiders and The Finals. This article has been indexed from CyberMaterial Read the original article: Arc Raiders And The Finals Hit By DDoS
Crypto Hackers Target Hinge And Match
The hacking group ShinyHunters claims to have leaked over 10 million user records from major dating platforms including Match, Hinge, and OKCupid. This article has been indexed from CyberMaterial Read the original article: Crypto Hackers Target Hinge And Match
Canada Computers Data Breach Leaks Info
Canada Computers and Electronics has confirmed a data breach involving customer personal data and credit card information, though the retailer has shared very few specifics about the event. This article has been indexed from CyberMaterial Read the original article: Canada…
FBI Seizes Site Catering To Online Crime
The FBI has successfully seized the domains of RAMP, a prominent cybercrime forum that specialized in the trade of ransomware services. This article has been indexed from CyberMaterial Read the original article: FBI Seizes Site Catering To Online Crime
Designing Irreversible Security Release at Hyper-Scale: Lessons Learned From Things You Can’t Undo
What Makes a Change Irreversible? Reverting a line of code is easy, and most of the time, firmware is backward-compatible. But what if a piece of hardware is specifically designed not to take older firmware, and the only option is…
IT Security News Hourly Summary 2026-01-30 15h : 9 posts
9 posts were published in the last hour 13:34 : Incentivizing Cybercrime Disruption: Inside Fortinet’s World Economic Forum Annual Meeting 2026 Panel 13:34 : Attackers Using Hugging Face Hosting to Deliver Android RAT Payload 13:34 : NVIDIA GPU Display Driver…
Incentivizing Cybercrime Disruption: Inside Fortinet’s World Economic Forum Annual Meeting 2026 Panel
At the World Economic Forum Annual Meeting 2026, the session Derek Manky contributed to explored how incentives and public-private partnerships can disrupt the cybercrime economy. This article has been indexed from Industry Trends & Insights Read the original article:…
Attackers Using Hugging Face Hosting to Deliver Android RAT Payload
A new Android threat campaign has emerged that uses social engineering combined with a legitimate machine learning platform to spread dangerous malware across devices. The attack begins when users see fake security alerts claiming their phones are infected and need…
NVIDIA GPU Display Driver Vulnerabilities Allows Code Execution and Privilege Escalation
NVIDIA has issued a critical security update addressing multiple high-severity vulnerabilities in its GPU Display Driver, vGPU software, and HD Audio components. That could enable attackers to execute arbitrary code and escalate privileges on affected systems. The vulnerabilities, disclosed on…
Attackers Hijacked 200+ Websites Exploiting Magento Vulnerability to Gain Root-level Access
A critical security breach has exposed multiple Magento e-commerce platforms worldwide as threat actors successfully exploited a severe authentication flaw to achieve complete system control. The attack campaign, identified in January 2026, represents one of the most significant waves of…
10 Best B2B Fintech SSO Solutions in 2026
Discover the best B2B fintech SSO solutions for 2026. Compare SAML, SCIM, SOC2-ready identity providers built for enterprise fintech needs. The post 10 Best B2B Fintech SSO Solutions in 2026 appeared first on Security Boulevard. This article has been indexed…
Why API Security Is No Longer an AppSec Problem – And What Security Leaders Must Do Instead
APIs are one of the most important technologies in digital business ecosystems. And yet, the responsibility for their security often falls to AppSec teams – and that’s a problem. This organizational mismatch creates systemic risk: business teams assume APIs are…
China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware
Cybersecurity researchers have discovered a new campaign attributed to a China-linked threat actor known as UAT-8099 that took place between late 2025 and early 2026. The activity, discovered by Cisco Talos, has targeted vulnerable Internet Information Services (IIS) servers located…
White House Scraps ‘Burdensome’ Software Security Rules
Two Biden-era memorandums have been revoked, but some of the resources they provide can still be used by government organizations. The post White House Scraps ‘Burdensome’ Software Security Rules appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Google Targets Residential Proxy Services Fueled by Malware Operations
The underlying ecosystem of legitimate proxy and VPN providers might appear to be fragmented at the surface, but as far as Google is concerned, there is something much more coordinated and deceptive below the surface. In a recent investigation…
SmarterTools patches critical SmarterMail flaw allowing code execution
SmarterTools fixed two SmarterMail flaws, including a critical bug (CVE-2026-24423) that could allow arbitrary code execution. SmarterTools fixed two security bugs in its SmarterMail email software, including a critical vulnerability, tracked as CVE-2026-24423 (CVSS score of 9.3) that could let…
From if to how: A year of post-quantum reality
For the last 5 years, post-quantum cryptography (PQC) has largely been discussed as a research topic. It was a question of if—if the standards are ratified, if the algorithms perform, if the threat is real.In 2025, Red Hat changed the…
How Banco do Brasil uses hyperautomation and platform engineering to drive efficiency
At the recent OpenShift Commons gathering in Atlanta, we had the opportunity to hear from Gustavo Fiuza, IT leader, and Welton Felipe, DevOps engineer, about the remarkable digital transformation at Banco do Brasil. As the second-largest bank in Latin America,…