The UK’s National Cyber Security Centre is urging organizations to prepare for glut of new software updates This article has been indexed from www.infosecurity-magazine.com Read the original article: NCSC Warns of an AI-Fuelled “Vulnerability Patch Wave”
IT Security News Hourly Summary 2026-05-05 12h : 16 posts
16 posts were published in the last hour 9:35 : New Mexico Seeks Billions In Meta Public Nuisance Claim 9:35 : ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows 9:35 : Beware of Fake ‘Notepad++ for…
New Mexico Seeks Billions In Meta Public Nuisance Claim
In second phase of trial, state attorney general seeks billions in fines and substantial changes to Meta apps over safety concerns This article has been indexed from Silicon UK Read the original article: New Mexico Seeks Billions In Meta Public…
ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows
The North Korea-aligned state-sponsored hacking group known as ScarCruft has compromised a video game platform in a supply chain espionage attack, trojanizing its components with a backdoor called BirdCallto likely target ethnic Koreans residing in China. While prior versions of…
Beware of Fake ‘Notepad++ for Mac’ Website, Possibly Could Harm your Machine
A fake website claiming to offer an official macOS version of the popular text editor Notepad++ has been making rounds online, raising serious cybersecurity concerns across the tech community. The site, operating under the domain notepad-plus-plus-mac.org, falsely presents itself as…
NHS to close-source hundreds of GitHub repos over AI, security concerns
Healthcare giant’s maintainers handed May deadline to enact the change The UK’s National Health Service (NHS) is ordering all of its technology leaders to temporarily wall off the organization’s open source projects over concerns relating to advanced AI and Anthropic’s…
WhatsApp Discloses File Spoofing, Arbitrary URL Scheme Vulnerabilities
The vulnerabilities were reported to Meta through its bug bounty program and were patched with updates released earlier this year. The post WhatsApp Discloses File Spoofing, Arbitrary URL Scheme Vulnerabilities appeared first on SecurityWeek. This article has been indexed from…
MetInfo, Weaver E-cology Vulnerabilities in Attackers’ Crosshairs
The security defects allow unauthenticated, remote attackers to execute arbitrary code through crafted requests. The post MetInfo, Weaver E-cology Vulnerabilities in Attackers’ Crosshairs appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: MetInfo, Weaver…
North Korean hackers trojanize gaming platform to spy on ethnic Koreans in China
A gaming platform built for ethnic Koreans in China has been serving backdoored Windows and Android software to its users since late 2024. The platform, sqgame[.]net, hosts traditional card and board games for a community that sits along the North…
SEC Fines Musk $1.5m Over Twitter Stake Disclosure
Entrepreneur Elon Musk to pay $1.5m in settlement with US regulator over failure to disclose large stake in Twitter ahead of buyout This article has been indexed from Silicon UK Read the original article: SEC Fines Musk $1.5m Over Twitter…
Attackers Exploit Amazon SES to Send Authenticated Phishing Emails
Attackers are increasingly abusing Amazon Simple Email Service (SES) to deliver highly convincing phishing emails that bypass traditional security controls, marking a growing trend in email-based threats. The primary goal of any phishing campaign is to evade detection while tricking…
Qualcomm Chipset Vulnerabilities Raise Alarm Over Remote Code Execution Risk
Qualcomm Technologies has released its May 2026 security bulletin, addressing a sweeping array of vulnerabilities across its proprietary and open-source software ecosystems. Threat actors could exploit these security gaps to compromise smartphones, automotive systems, and industrial Internet of Things devices…
Microsoft’s bad obsession is showing up in shabby services and slipshod software. Here’s proof
If you can’t bother to keep GitHub running, why should we bother with you? Opinion It’s been another shabby week for Microsoft, and a shabbier one for its users. We learnt that Windows 11’s epic habit of trying to corral…
Cybersecurity jobs available right now: May 5, 2026
Armis Security Specialist HCLTech | Ireland | On-site – View job details As an Armis Security Specialist, you will manage and optimize the Armis deployment to strengthen security across lab, OT, and IoT environments. You will maintain device visibility, refine…
One in four MCP servers opens AI agent security to code execution risk
Enterprise deployments of AI agents lean on two extension mechanisms that introduce risk at different layers of the stack. MCP servers expose deterministic code functions with structured, loggable invocations. Skills load textual instruction sets directly into a model’s reasoning context,…
Can your coding style predict whether your code is vulnerable?
Developers leave fingerprints in the code they write. Naming choices, indentation patterns, preferred APIs, and the way someone structures a loop or handles a pointer all carry traces of individual habit. Researchers have used these stylistic signals for years to…
Meta adds proof-based security to encrypted backups
Meta has updated its infrastructure for protecting password-based and end-to-end encrypted backups, introducing over-the-air fleet key distribution for Messenger and a commitment to publishing evidence of secure fleet deployments. How encrypted backups work These updates build on the company’s HSM-based…
Trellix Reveals Unauthorized Access to Source Code
Security vendor Trellix has suffered a breach involving unauthorized access This article has been indexed from www.infosecurity-magazine.com Read the original article: Trellix Reveals Unauthorized Access to Source Code
Banks Look To Offload AI Data Centre Debt
Large banks reportedly seeking to reduce exposure to hundreds of billions of dollars of debt funding AI data centres, amid unprecedented spending This article has been indexed from Silicon UK Read the original article: Banks Look To Offload AI Data…
Critical Android Zero-Click Vulnerability Enables Remote Shell Access
Google has released the Android Security Bulletin for May 2026, addressing a highly critical vulnerability that allows attackers to execute code remotely without any user interaction. Published on May 4, 2026, the latest security update focuses heavily on a severe…
New Attribution Framework Links APT Campaigns Across Key Layers
A new attribution framework is reshaping how cybersecurity analysts connect advanced persistent threat (APT) activity, moving beyond static group labels toward a dynamic, multi-layered model that reflects how modern adversaries actually operate. These profiles are built from observed tactics, techniques,…
Educational tech firm Instructure data breach may have impacted 9,000 schools
Instructure, maker of the Canvas learning platform, is investigating a cyber incident that exposed users’ personal data. Instructure is a U.S.-based educational technology company best known for developing Canvas, one of the world’s most widely used learning management systems (LMS). The U.S. firm…
China Court Rules AI Job Termination Illegal
Court in Hangzhou finds fintech company liable for terminating employee after telling him job could be performed by AI This article has been indexed from Silicon UK Read the original article: China Court Rules AI Job Termination Illegal
Critical Android Zero-Click Vulnerability Grants Remote Shell Access
Google has published the May 2026 Android Security Bulletin, alerting the ecosystem to a highly severe remote code execution (RCE) flaw. Tracked as CVE-2026-0073, this critical vulnerability resides deep within the core Android System component. It allows an attacker to…