The new security feature makes it more difficult for police and malicious hackers to obtain a person’s precise location data from a cell phone company. This article has been indexed from Security News | TechCrunch Read the original article: Apple’s…
Clawdbot’s rename to Moltbot sparks impersonation campaign
This Moltbot impersonation campaign is a case study in supply-chain risk, brand hijacking, and what happens when open source goes viral. This article has been indexed from Malwarebytes Read the original article: Clawdbot’s rename to Moltbot sparks impersonation campaign
N8n Vulnerabilities Could Lead to Remote Code Execution
The two bugs impacted n8n’s sandbox mechanism and could be exploited via weaknesses in the AST sanitization logic. The post N8n Vulnerabilities Could Lead to Remote Code Execution appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Anthropic Cracks Down on Claude Code Spoofing, Tightens Access for Rivals and Third-Party Tools
Anthropic has rolled out a new set of technical controls aimed at stopping third-party applications from impersonating its official coding client, Claude Code, to gain cheaper access and higher usage limits to Claude AI models. The move has directly…
Cyberattack Paralyzes Russia’s Delta Security Systems
A massive cyberattack was launched against Delta, a leading Russian smart alarm system supplier for residential, commercial, and automotive use, on 26 January 2026, causing widespread operational disruptions across the country. The attack crippled Delta’s information technology systems, bringing…
Researchers Uncover Pakistan-Linked Cyber Activity Targeting India
A familiar, uneasy brink appears to be looming between India and Pakistan once again, where geopolitical tension spills over borders into less visible spheres and risks spilling over into more obscure regions. As the war intensified in May 2025,…
SK hynix Launches New AI Company as Data Center Demand Drives Growth
A surge in demand for data center hardware has lifted SK hynix into stronger market standing, thanks to limited availability of crucial AI chips. Though rooted in memory production, the company now pushes further – launching a dedicated arm…
eScan AV supply chain compromise: Users targeted with malicious updates
The update infrastructure for eScan antivirus, a product of Indian cybersecurity company MicroWorld Technologies, has been compromised by unknown attackers to deliver a persistent downloader to enterprise and consumer endpoints. The supply chain compromise also resulted in the eScan antivirus…
Virtue AI AgentSuite enables enterprises to test and secure AI agents
Virtue AI announced AgentSuite, a multi-layer security and compliance platform for enterprise AI agents. Organizations worldwide are deploying agents that modify databases, trigger payments, and access systems containing sensitive information. AgentSuite is the AI-native platform built specifically for this new…
Russian Hackers Behind Poland Grid Wiper
Recent investigations have identified the Russia-linked hacking group Sandworm as the culprit behind a December attempt to disrupt Poland’s electrical grid using destructive data-wiping malware. This article has been indexed from CyberMaterial Read the original article: Russian Hackers Behind Poland…
WhatsApp Improves Security For At Risk Users
WhatsApp has introduced a new security feature called Strict Account Settings designed to protect high-profile individuals like journalists and public figures from sophisticated cyberattacks. This article has been indexed from CyberMaterial Read the original article: WhatsApp Improves Security For At…
Cybersecurity and business needs: A CISO’s 2026 outlook
<p>CISOs have a lot on their plate — and it’s only going to get fuller in the coming year.</p> <p>The role traditionally defined as a threat defender <a href=”https://www.techtarget.com/searchsecurity/tip/The-CISO-evolution-From-security-gatekeeper-to-strategic-leader”>has evolved</a> to include that of a business strategist. Where once CISOs…
Scientists found a way to cool quantum computers using noise
Quantum computers need extreme cold to work, but the very systems that keep them cold also create noise that can destroy fragile quantum information. Scientists in Sweden have now flipped that problem on its head by building a tiny quantum…
Interlock Ransomware: New Techniques, Same Old Tricks
An in-depth analysis of an Interlock ransomware intrusion, detailing new malware tooling, defense evasion techniques, and high-ROI detection strategies. This article has been indexed from FortiGuard Labs Threat Research Read the original article: Interlock Ransomware: New Techniques, Same Old…
eSkimming Attacks Fuelled with Persistent Threats, Evolving Tactics, and Unfinished Recovery
eSkimming attacks, commonly known as Magecart attacks, continue to plague e-commerce websites across the globe, stealing payment card data from unsuspecting customers at checkout. These malicious campaigns inject JavaScript code into compromised websites, capturing sensitive financial information as users complete…
Hackers Exploiting FreePBX Vulnerability to Deploy Webshell and Gain Control of Systems
A sophisticated attack campaign leveraging a critical FreePBX vulnerability to deploy a persistent webshell dubbed “EncystPHP,” enabling threat actors to gain complete administrative control over compromised VoIP systems. The campaign, launched in early December 2025, exploits CVE-2025-64328, a post-authentication command-injection…
Cal.com Broken Access Controls Exposes Millions of Bookings and Leads to Complete Account Takeover
Cal.com, an open-source scheduling platform that millions of people use to book meetings and manage their calendars, recently faced a serious security problem. The platform provides an alternative to tools like Calendly, offering features like calendar syncing, team scheduling, and…
Microsoft 365 Outlook Add-ins Weaponized to Exfiltrate Sensitive Email Data Without Leaving Traces
A significant architectural blind spot in the Microsoft 365 ecosystem that allows threat actors to exfiltrate sensitive email data without leaving forensic traces. Dubbed “Exfil Out&Look,” this attack technique leverages the Outlook add-in framework to intercept outgoing communications stealthily. Unlike…
Google Disrupted World’s Largest IPIDEA Residential Proxy Network
Google and its partners launched a major operation this week to shut down what security experts consider one of the world’s largest residential proxy networks: IPIDEA. The proxy service operates by routing internet traffic through millions of everyday consumer devices…
France Travail fined €5 million for failing to protect job seeker data
France data protection authority CNIL has fined public employment agency France Travail €5 million for failing to ensure the security of personal data of job seekers. Attackers gained access to the organization’s systems through social engineering techniques that targeted accounts…
Druva Threat Watch offers continuous threat monitoring of backup data
Druva announced the launch of Threat Watch, a zero-touch, automated cloud-native solution for proactive threat monitoring of backup data. Threat Watch is designed to continuously scan backup snapshots to identify dormant threats and indicators of compromise (IOCs), empowering IT and…
Grist Core Flaw Enables Remote Code Execution
A critical security vulnerability known as Cellbreak has been discovered in Grist-Core, an open-source spreadsheet-database platform that uses Pyodide for formula execution. This article has been indexed from CyberMaterial Read the original article: Grist Core Flaw Enables Remote Code Execution
Kontigo Stablecoin Bank Hit By Cyberattack
US neobank Kontigo recently experienced a cybersecurity breach involving an authentication flaw that resulted in the theft of over 340,000 USDT from 1,005 user accounts. This article has been indexed from CyberMaterial Read the original article: Kontigo Stablecoin Bank Hit…
Cyberattack Disrupts Dresden Museum Systems
Germany’s Dresden State Art Collections has been targeted by a cyberattack that has disrupted its digital infrastructure and phone services. This article has been indexed from CyberMaterial Read the original article: Cyberattack Disrupts Dresden Museum Systems