APIs are one of the most important technologies in digital business ecosystems. And yet, the responsibility for their security often falls to AppSec teams – and that’s a problem. This organizational mismatch creates systemic risk: business teams assume APIs are…
China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware
Cybersecurity researchers have discovered a new campaign attributed to a China-linked threat actor known as UAT-8099 that took place between late 2025 and early 2026. The activity, discovered by Cisco Talos, has targeted vulnerable Internet Information Services (IIS) servers located…
White House Scraps ‘Burdensome’ Software Security Rules
Two Biden-era memorandums have been revoked, but some of the resources they provide can still be used by government organizations. The post White House Scraps ‘Burdensome’ Software Security Rules appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Google Targets Residential Proxy Services Fueled by Malware Operations
The underlying ecosystem of legitimate proxy and VPN providers might appear to be fragmented at the surface, but as far as Google is concerned, there is something much more coordinated and deceptive below the surface. In a recent investigation…
SmarterTools patches critical SmarterMail flaw allowing code execution
SmarterTools fixed two SmarterMail flaws, including a critical bug (CVE-2026-24423) that could allow arbitrary code execution. SmarterTools fixed two security bugs in its SmarterMail email software, including a critical vulnerability, tracked as CVE-2026-24423 (CVSS score of 9.3) that could let…
From if to how: A year of post-quantum reality
For the last 5 years, post-quantum cryptography (PQC) has largely been discussed as a research topic. It was a question of if—if the standards are ratified, if the algorithms perform, if the threat is real.In 2025, Red Hat changed the…
How Banco do Brasil uses hyperautomation and platform engineering to drive efficiency
At the recent OpenShift Commons gathering in Atlanta, we had the opportunity to hear from Gustavo Fiuza, IT leader, and Welton Felipe, DevOps engineer, about the remarkable digital transformation at Banco do Brasil. As the second-largest bank in Latin America,…
GhostChat Spyware Attacking Android Users Via WhatsApp to Exfiltrate Sensitive Details
A new Android spyware campaign has emerged, targeting users in Pakistan through a sophisticated romance scam that uses fake dating profiles to steal personal information. The malicious application, known as GhostChat, disguises itself as a legitimate chat platform while secretly…
TikTok’s privacy update mentions immigration status. Here’s why.
TikTok updated its privacy policy to mention immigration status, sparking backlash—but the reality is more complicated. This article has been indexed from Malwarebytes Read the original article: TikTok’s privacy update mentions immigration status. Here’s why.
Microsoft sets new timeline for Sentinel transition to Defender portal
Microsoft has updated the timeline for transitioning the Microsoft Sentinel experience from the Azure portal to the Microsoft Defender portal from July 1, 2026 to March 31, 2027. The updated schedule extends access by nearly nine months. Microsoft said the…
Badges, Bytes and Blackmail
Behind the scenes of law enforcement in cyber: what do we know about caught cybercriminals? What brought them in, where do they come from and what was their function in the crimescape? Introduction: One view on the scattered fight against…
New AI-Developed Malware Campaign Targets Iranian Protests
The RedKitten campaign distributes lures designed to target people seeking information about missing persons or political dissidents in Iran This article has been indexed from www.infosecurity-magazine.com Read the original article: New AI-Developed Malware Campaign Targets Iranian Protests
U.S. CISA adds a flaw in Ivanti EPMM to its Known Exploited Vulnerabilities catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in Ivanti EPMM to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an Ivanti EPMM vulnerability, tracked as CVE-2026-1281 (CVSS score of 9.8), to its Known…
National Crime Agency and NatWest Issue Joint Warning Over Invoice Fraud Threat
Cyber fraudsters targeting corporate finance departments costs businesses millions a year This article has been indexed from www.infosecurity-magazine.com Read the original article: National Crime Agency and NatWest Issue Joint Warning Over Invoice Fraud Threat
Hugging Face Abused to Deploy Android RAT
Android users were lured to applications that served a malicious payload hosted in a Hugging Face repository. The post Hugging Face Abused to Deploy Android RAT appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Top 10 B2B Healthcare SaaS SSO Solutions in 2026
Discover the best B2B healthcare SaaS SSO solutions for 2026. Compare SAML, OIDC, pricing, and features for secure hospital logins. The post Top 10 B2B Healthcare SaaS SSO Solutions in 2026 appeared first on Security Boulevard. This article has been…
IT Security News Hourly Summary 2026-01-30 12h : 4 posts
4 posts were published in the last hour 10:34 : Ex-Google engineer found guilty of stealing AI secrets 10:5 : Comcast to Pay $117M in Security Breach Settlement 10:5 : Hackers Weaponized Open VSX Extension with Sophisticated Malware After Reaching…
Ex-Google engineer found guilty of stealing AI secrets
A federal jury in California convicted former Google software engineer Linwei Ding, also known as Leon Ding, on seven counts of economic espionage and seven counts of theft of trade secrets tied to AI technology. Ding faces a maximum sentence…
Comcast to Pay $117M in Security Breach Settlement
The breach was linked to a vulnerability known as “CitrixBleed,” a flaw affecting Citrix NetScaler Application Delivery Controller and Gateway appliances. The post Comcast to Pay $117M in Security Breach Settlement appeared first on TechRepublic. This article has been indexed…
Hackers Weaponized Open VSX Extension with Sophisticated Malware After Reaching 5060+ Downloads
A dangerous malware campaign has infiltrated the Open VSX extension marketplace, compromising over 5,000 developer workstations through a fake Angular Language Service extension. The malicious package disguised itself as legitimate development tooling, bundling authentic Angular and TypeScript components alongside encrypted…
Microsoft Teams New Feature to Flag Suspicious One-to-One Calls
A new security feature is being added to Teams to help organizations detect and stop voice-based scams and phishing attacks. The new “Report a Call” button will allow users to flag suspicious one-to-one calls directly from their Teams call history.…
Education-Themed Malicious Domains Linked to Bulletproof Hosting Infrastructure Exposed
Security researchers have uncovered a sophisticated traffic distribution network leveraging deceptive education-themed domains to deliver malware and phishing attacks. The operation, tracked under infrastructure indicators pointing to TOXICSNAKE, uses legitimate-looking university and educational institution branding to deceive users into visiting…
Critical Ivanti Endpoint Manager 0-day RCE Vulnerabilities Actively Exploited in Attacks
Two critical code-injection vulnerabilities have been disclosed in the Endpoint Manager Mobile (EPMM) platform, which are currently being actively exploited in real-world attacks. The security flaws, tracked as CVE-2026-1281 and CVE-2026-1340, allow unauthenticated attackers to execute arbitrary code remotely on…
ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid
Sandworm/Electrum hackers targeted communication and control systems at 30 sites. The post ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: ICS Devices Bricked…