One of Russia’s most prolific cyber espionage groups has operated largely in the shadows for more than two decades, quietly shaping the global threat landscape by carrying out persistent and highly targeted digital intrusions using techniques that have been…
Israeli Cybersecurity Startup Torq Gets $140M Funding to Hit $1.2B Valuation
This latest funding brings Torq’s total raised capital to $332 million, and it has plans to hire an additional 200 employees in 2026. The post Israeli Cybersecurity Startup Torq Gets $140M Funding to Hit $1.2B Valuation appeared first on TechRepublic.…
Corrupting LLMs Through Weird Generalizations
Fascinating research: Weird Generalization and Inductive Backdoors: New Ways to Corrupt LLMs. AbstractLLMs are useful because they generalize so well. But can you have too much of a good thing? We show that a small amount of finetuning in narrow…
Ofcom officially investigating X as Grok’s nudify button stays switched on
Tech minister Liz Kendall says the government will back a robust regulatory response Ofcom is investigating X over potential violations of the Online Safety Act, Britian’s comms watchdog has confirmed.… This article has been indexed from The Register – Security…
Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities
APT28 was seen impersonating popular webmail and VPN services, including Microsoft OWA, Google, and Sophos VPN portals. The post Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Palo Alto Networks Defines SHIELD Framework to Secure Vibecoding
Discover Palo Alto Networks’ SHIELD framework for securing applications developed with vibecoding techniques, outlining essential best practices to mitigate cybersecurity risks. The post Palo Alto Networks Defines SHIELD Framework to Secure Vibecoding appeared first on Security Boulevard. This article has…
GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials
A new wave of GoBruteforcer attacks has targeted databases of cryptocurrency and blockchain projects to co-opt them into a botnet that’s capable of brute-forcing user passwords for services such as FTP, MySQL, PostgreSQL, and phpMyAdmin on Linux servers. “The current…
New OPCOPRO Scam Uses AI and Fake WhatsApp Groups to Defraud Victim
Meet OPCOPRO, an online scam that builds a fake AI-run world like The Truman Show using WhatsApp and apps to steal IDs via fake KYC and investments. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI,…
LLMs in Attacker Crosshairs, Warns Threat Intel Firm
Threat actors are hunting for misconfigured proxy servers to gain access to APIs for various LLMs. The post LLMs in Attacker Crosshairs, Warns Threat Intel Firm appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Analyzing a Multi-Stage AsyncRAT Campaign via Managed Detection and Response
Threat actors exploited Cloudflare’s free-tier infrastructure and legitimate Python environments to deploy the AsyncRAT remote access trojan, demonstrating advanced evasion techniques that abuse trusted cloud services for malicious operations. This article has been indexed from Trend Micro Research, News and…
Claude connects to more healthcare data under security oversight
Healthcare teams are evaluating a range of AI tools for workflows tied to coverage, coding, care coordination, and trials. Anthropic announced expanded healthcare and life sciences offerings for its Claude model with a set of connectors, task skills, and consumer…
There was no data breach, Instagram says
News of a possible Instagram data breach spread over the weekend after Malwarebytes reported that cybercriminals had stolen sensitive information from 17.5 million Instagram accounts, potentially leading to a surge in password reset requests. Users have been complaining last week…
Critical React Router Vulnerability Let Attackers Access or Modify Server Files
Security researchers have identified critical vulnerabilities in React Router that allow attackers to access or modify server files via directory traversal. The flaws affect multiple packages within the React Router ecosystem and carry a CVSS v3 score of 9.8, classifying…
Cybercriminal Cryptocurrency Transactions Peaked in 2025 Following Nation‑State Sanctions Evasion Moves
The cryptocurrency crime landscape reached an unprecedented milestone in 2025, with illicit cryptocurrency addresses receiving at least 154 billion dollars. This staggering figure represents a 162 percent increase compared to the previous year, driven largely by nation-states moving into cryptocurrency…
EU Sets February Deadline for Verdict on Google’s $32B Wiz Acquisition
The record-breaking deal has already received a green light from the US government. The post EU Sets February Deadline for Verdict on Google’s $32B Wiz Acquisition appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
IT Security News Hourly Summary 2026-01-12 12h : 5 posts
5 posts were published in the last hour 10:32 : Meta Calls for Calm Amidst Instagram Password Reset Panic 10:32 : Tories vow to boot under-16s off social media and ban phones in schools 10:32 : Cyber fraud network behind…
Meta Calls for Calm Amidst Instagram Password Reset Panic
Meta stated that there had been no breach of its systems and that Instagram accounts remained secure. The post Meta Calls for Calm Amidst Instagram Password Reset Panic appeared first on TechRepublic. This article has been indexed from Security Archives…
Tories vow to boot under-16s off social media and ban phones in schools
Opposition leader Kemi Badenoch pitches age limits and classroom curbs as fixes for behavior and mental health The Tories have pledged to kick under-16s off social media, betting that banning teens from TikTok and Instagram will fix what they see…
Cyber fraud network behind €5,93 million in losses dismantled in Spain
The Spanish National Police (Policía Nacional), working closely with the Bavarian State Criminal Police Office (Bayerisches Landeskriminalamt) and with support from Europol, has carried out an operation targeting the international criminal organization known as Black Axe. Black Axe is a…
Illicit Crypto Activity Hits Record $158bn in 2025
TRM Labs says illegal crypto flows into digital wallets increased to $158bn in 2025 This article has been indexed from www.infosecurity-magazine.com Read the original article: Illicit Crypto Activity Hits Record $158bn in 2025
How to stop insider-driven data loss in browser sessions
Midmarket teams turn to secure browsers capable of providing deep visibility and enforcing granular user controls during user browsing sessions, the goal being to prevent intentional or unintentional leaks without adding friction to the user experience. This article has been…
AI Is Changing Cyber Threats — Here’s How to Stay Protected
Artificial intelligence (AI) is changing the way cybercriminals plan, launch, and scale attacks. But the same technology can also help people and businesses stay safer… The post AI Is Changing Cyber Threats — Here’s How to Stay Protected appeared first…
Critical Apache Struts 2 Flaw Could Let Attackers Steal Sensitive Data
A newly disclosed vulnerability in Apache Struts 2’s XWork component could expose sensitive data and open the door to denial‑of‑service and server‑side request forgery (SSRF) attacks if left unpatched. The flaw, tracked as CVE-2025-68493, is rated Important and affects a wide range of…
Cybercriminal Crypto Transactions Surge to 2025 High
Illicit cryptocurrency transactions reached unprecedented levels in 2025 as nation-states weaponized digital assets to evade sanctions, transforming the cybercrime landscape into a geopolitical battleground with record-breaking financial volumes. According to blockchain analysis data, illicit cryptocurrency addresses received at least $154 billion in…