New version of Vidar infostealer spreads via fake CAPTCHAs, hides in JPEG and TXT files, uses fileless attacks and steals browser, crypto wallet data. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI and More Read…
Tag: EN
Easily Exploitable ‘Pack2TheRoot’ Linux Vulnerability Leads to Root Access
A race condition in PackageKit allows unprivileged users to escalate privileges when installing packages. The post Easily Exploitable ‘Pack2TheRoot’ Linux Vulnerability Leads to Root Access appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
ICO chief John Edwards steps back as workplace probe quietly unfolds
UK’s data watchdog confirms its boss has been off the job since February while an HR investigation runs The UK’s data watchdog is without its chief after John Edwards stepped aside from the Information Commissioner’s Office while an independent workplace…
US Launches Sweeping Crackdown on Southeast Asia Cyberscams and Sanctions Cambodian Senator
U.S. officials have announced a sweeping crackdown on Southeast Asian cyberscam operations as part of what U.S. Attorney Jeanine Pirro characterized Friday as a “new theater of war” launched by the Trump administration against Chinese transnational organized crime. The crackdown,…
OpenClaw Flaws Expose Systems to Policy Bypass Attacks
OpenClaw, a rapidly adopted open-source autonomous AI agent framework, has released critical security updates to address three moderate-severity vulnerabilities. Found in npm package versions before 2026.4.20, these complex flaws expose systems to severe policy bypasses, unauthorized local configuration modifications, and…
North Korean Hackers Target Pharma Firms with Malware-Laced Excel Attacks
North Korean state-backed hackers are using weaponized Excel-themed files to infect pharmaceutical and life science companies with malware, abusing Windows shortcut files, PowerShell, and cloud storage for stealthy data theft. The campaign begins with highly tailored spear‑phishing emails sent to…
‘fast16’ Malware with Sabotage Capabilities Attacking Ultra expensive Targets
The fast16 malware is a recently exposed sabotage‑capable threat designed to target extremely high‑value environments and ultra‑expensive systems with precision. It does not behave like common commodity malware that aims for broad infections, but instead focuses on select victims where…
Top 10 Best NDR (Network Detection and Response) Solutions in 2026
In the modern enterprise, the network is the ultimate source of ground truth. As organizations accelerate their digital transformation and adopt complex, cloud-native security architectures, the traditional perimeter has dissolved. Threat actors routinely bypass endpoint defenses using compromised credentials, living-off-the-land…
Attackers Can Backdoor CODESYS Applications by Chaining Vulnerabilities
Multiple vulnerabilities in the CODESYS Control runtime, one of the world’s most widely adopted software-based programmable logic controller (Soft PLC) platforms. According to Nozomi Networks Labs researchers, by chaining these security flaws, an authenticated attacker can replace a legitimate industrial…
Vidar Malware Hides Second-Stage Payloads in JPEG and TXT Files to Evade Detection
Vidar, one of the most active information-stealing malware families, has taken on a new shape in 2026. Researchers have found that its latest version now conceals second-stage payloads inside JPEG image files and TXT documents, making it much harder for…
TLS Connect gives SMBs a right-sized automated tool to manage TLS certificates
GMO GlobalSign today launched TLS Connect, a Certificate Lifecycle Management (CLM) tool designed specifically for SMBs. TLS Connect automates public trust TLS certificate deployment and renewal, allowing SMBs to strengthen security, maintain regulatory compliance and reduce business risk. The introduction…
Researchers Identify Fast16 Sabotage Malware That Pre-Dates Stuxnet
The “fast16” malware may have been used to target Iran’s nuclear program prior to Stuxnet This article has been indexed from www.infosecurity-magazine.com Read the original article: Researchers Identify Fast16 Sabotage Malware That Pre-Dates Stuxnet
When security becomes the attack surface: Why endpoint protection must evolve
When attackers target security tools, protection must be resilient, self-healing and always on. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: When security becomes the attack surface: Why endpoint protection must evolve
Critical Gemini CLI Flaw Raises Supply Chain Security Concerns
Google has rolled out urgent security updates for its Gemini CLI and the accompanying GitHub Action to address a critical vulnerability. Tracked as GHSA-wpqr-6v78-jr5g, this flaw exposes continuous integration and continuous deployment (CI/CD) pipelines to Remote Code Execution (RCE) attacks.…
Italy moves to extradite Chinese national to the U.S. over hacking charges
Italy plans to extradite Xu Zewei to the U.S. over alleged hacks on COVID-19 research tied to state-backed operations. Italy is moving to extradite Xu Zewei, the Chinese national arrested in 2025 at the request of U.S. authorities on cyber-espionage…
Fast16: Pre-Stuxnet malware that targeted precision engineering software
Fast16 is a pre-Stuxnet malware that tampered with precision software and spread itself. Evidence suggests links to U.S. operations during early cyber tensions. SentinelOne uncovered Fast16, a sabotage malware used in 2005, years before Stuxnet. The malicious code is written…
ADT – 5,488,888 breached accounts
In April 2026, home security firm ADT confirmed a data breach by ShinyHunters, which listed the company on its website as part of a “pay or leak” extortion attempt. The breach impacted 5.5M unique email addresses along with names, phone…
Firefox Vulnerability Allows Tor User Fingerprinting
The vulnerability is tracked as CVE-2026-6770 and it has been patched with the release of Firefox 150 and Tor 15.0.10. The post Firefox Vulnerability Allows Tor User Fingerprinting appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
FBI, Indonesian Authorities Team to Take Down Site Ripping Off Users for Millions
Phishing still hooks users around the world and coaxes them to hand over credentials. But on occasion the good guys take them down, like the FBI in collaboration with Indonesian law enforcement did with W3LLStore marketplace. The post FBI, Indonesian…
Aptori expands its platform with autonomous offensive testing to reduce security bottlenecks
Aptori has expanded its Runtime-Driven Validation Platform with autonomous offensive testing capabilities to address the growing gap between code output and security team capacity. By moving beyond passive scanning to active validation, the platform helps organizations identify, validate, and fix…