12 posts were published in the last hour 7:36 : FreeBSD Vulnerabilities Enable Attackers to Crash Entire System 7:36 : 1 Million Records from Dutch Telco Odido Leaked Online in Massive Data Breach 7:36 : Varist Hybrid Detection Engine protects…
FreeBSD Vulnerabilities Enable Attackers to Crash Entire System
The FreeBSD Project has disclosed a critical security vulnerability, tracked as CVE-2025-15576, which allows attackers to escape jail environments and gain unauthorized access to the full host filesystem. This flaw impacts FreeBSD versions 14.3 and 13.5, leaving unpatched systems exposed…
1 Million Records from Dutch Telco Odido Leaked Online in Massive Data Breach
The Dutch telecommunications company Odido suffered a massive data breach that exposed the personal information of nearly 700,000 customers. The incident, which included an extortion attempt, has raised serious concerns about customer privacy and data security in the telecom sector.…
Varist Hybrid Detection Engine protects against AI-assisted malware
Varist launched the Hybrid Detection Engine, creating an AI-scale malware detection solution that detects both known and zero-day threats. Built on proven technology used to perform more than 500 billion file scans per day for global customers, the Varist solution…
Android app uses Bluetooth signals to detect nearby smart glasses
Smart glasses with built-in cameras are showing up in more public spaces, and a growing number of people want a way to know when one is nearby. An Android app called Nearby Glasses, developed by Yves Jeanrenaud, attempts to fill…
N-able’s Anomaly Detection feature identifies credential-based threats
N-able expanded its Anomaly Detection capabilities in Cove Data Protection to combat the surge in identity-driven cyberattacks targeting backup environments. The new functionality delivers real-time alerts when suspicious or unauthorized changes to backup policies are detected, giving customers an early…
Oculeus 2FN authenticates calls in real time to stop CLI spoofing
Oculeus has launched its new Two Factor Network (2FN) solution. The 2FN solution provides a framework for telcos to trace the origin of traffic, verify caller identity, determine the roaming status of inbound calls, and prevent Caller Line Identification (CLI)…
Are Your Chrome Extensions Spying on You?
Chrome web browser extensions offer a range of useful tools to help manage your tabs, sharpen your writing, track deals online, and more. They seem… The post Are Your Chrome Extensions Spying on You? appeared first on Panda Security Mediacenter.…
Vshell Gains Popularity Among Cybercriminals as Cobalt Strike Alternative
A Go‑based remote administration tool known as Vshell is emerging as a favored alternative to Cobalt Strike among both red teams and threat actors. Though marketed as a legitimate network administration and security testing platform, recent analyses indicate that Vshell’s powerful post‑compromise…
OpenClaw Insights: A CISO’s Guide to Safe Autonomous Agents – FireTail Blog
Feb 27, 2026 – Alan Fagan – The “OpenClaw” crisis has board members asking, “Could this happen to us?” The answer isn’t to ban AI agents. It’s to govern them. By now, the dust is settling on the OpenClaw (aka…
DeVry University’s CISO on higher education cybersecurity risk
In this Help Net Security interview, Fred Kwong, VP, CISO at DeVry University, outlines how the university balances academic openness with cyber risk. He describes how systems for students are separated from back end operations to limit exposure. Kwong also…
Backblaze launches two tools to automate endpoint backup management
Backblaze announced two new tools for Backblaze Computer Backup designed to give IT teams greater control, consistency, and automation across endpoint deployments: the Advanced Installer and the Backblaze Command Line Interface (bzcli). Backblaze Computer Backup has long been known for…
Versa introduces cloud-based sovereign solution for enterprises of all sizes
Versa released Sovereign SASE-as-a-Service, a cloud-delivered SaaS offering in which the data, control, and management planes operate entirely within a region’s legal jurisdiction. Digital sovereignty has moved from a compliance consideration to a board-level decision. Across Europe and other regions,…
Microsoft Defender Enhances Security with URL Click Alerts for Microsoft Teams
Microsoft is expanding its threat detection capabilities by extending Microsoft Defender for Office 365 (MDO) URL click alerting into Microsoft Teams. This critical update allows security teams to detect, investigate, and respond to potentially malicious link clicks within Teams messages,…
Odido – 688,102 breached accounts
In February 2026, Dutch telco Odido was the victim of a data breach and subsequent extortion attempt. Following the incident, 1M records containing 317k unique email addresses were published, with the attackers threatening to leak additional data in the following…
1 Million Records from Dutch Telco Odido Published Online After Extortion Attempt
A major data breach has hit Odido, one of the Netherlands’ prominent telecommunications providers, with cybercriminals publishing over one million customer records online following a failed extortion attempt in February 2026. The threat actor group ShinyHunters is believed to be…
Claude Code Hacked to Achieve Full RCE and Hijacked Organization API keys
Critical vulnerabilities in Anthropic’s Claude Code, an AI-powered command-line development tool. The flaws could allow attackers to achieve Remote Code Execution (RCE) and exfiltrate Anthropic API keys by exploiting project configuration files. The issues were reported by Check Point Research…
The CISO role keeps getting heavier
Personal liability is becoming a routine part of the CISO job. In Splunk’s 2026 CISO Report, titled From Risk to Resilience in the AI Era, 78% of CISOs said they are concerned about their own liability for security incidents, up…
Microsoft Defender Discovers Trojanized Gaming Utility Campaign Stealing Data with RATs
Microsoft Defender researchers have uncovered a new campaign that abuses trojanized gaming utilities to deliver multi‑stage malware with remote access, data theft, and payload delivery capabilities. Attackers are masquerading as popular tools such as Xeno.exe and RobloxPlayerBeta.exe, tricking gamers into…
AI Theater, Real Risk: What Moltbook Reveals About API Security
In early 2026, a platform called Moltbook, later renamed OpenClaw, went viral for what appeared to be a startling development. Autonomous AI agents were posting, debating, upvoting, and forming communities without human participation. Basically, how most end-of-the-world sci-fi movies start.…
UK Solicitor Investigated After Uploading Client Files to ChatGPT
A UK solicitor is under investigation for allegedly violating client confidentiality and waiving legal privilege after they confessed to uploading their clients’ confidential documents to ChatGPT. This is in line with a warning issued by the Upper Tribunal that the…
North Korean APT37 Unleashes Novel Malware to Target Air-Gapped Systems
North Korean threat group APT37 is using a new multi‑stage toolset to jump air‑gaps and conduct deep surveillance by abusing removable media, Ruby, and cloud services in a campaign Zscaler ThreatLabz tracks as “Ruby Jumper.” The campaign’s main goal is…
Juniper Networks PTX Vulnerability Allows Full Router Takeover, Exposing Networks
Juniper Networks has issued an out-of-cycle critical security bulletin addressing a severe vulnerability affecting its PTX Series routers running Junos OS Evolved. The flaw allows an unauthenticated, network-based attacker to execute malicious code with root privileges, potentially leading to complete…
Industrial networks continue to leak onto the internet
Industrial operators continue to run remote access portals, building automation servers, and other operational technology services on public IP address ranges. Palo Alto Networks, Siemens, and Idaho National Laboratory describe the scope of that exposure in the Intelligence-Driven Active Defense…