European Space Agency says data may have been stolen from external servers, after hacker offers files for sale This article has been indexed from Silicon UK Read the original article: ESA Confirms External Servers Affected By Hack
Tag: EN
Eaton Vulnerabilities Let Attackers Execute Arbitrary Code On the Host System
A critical security advisory addressing multiple vulnerabilities discovered in the Eaton UPS Companion (EUC) software. These security flaws, if exploited, could allow attackers to execute arbitrary code on the host system, potentially giving them complete control over affected devices. The…
Silent Authentication: Redefining Security, Flexibility and Customer Engagement
Silent authentication strengthens security while reducing friction for customers and employees, protecting accounts without disrupting the user experience. The post Silent Authentication: Redefining Security, Flexibility and Customer Engagement appeared first on Security Boulevard. This article has been indexed from Security…
Bitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act
Ilya Lichtenstein, who was sentenced to prison last year for money laundering charges in connection with his role in the massive hack of cryptocurrency exchange Bitfinex in 2016, said he has been released early. In a post shared on X…
Grok Chatbot Publishes Sexualised Images Of Minors
xAI’s Grok chatbot generates and publishes sexualised images of people including minors on platform X, drawing official scrutiny This article has been indexed from Silicon UK Read the original article: Grok Chatbot Publishes Sexualised Images Of Minors
Will Agentic AI Hurt or Help Your Security Posture?
Agentic AI is transforming cybersecurity with autonomous reasoning and action—but it also expands the attack surface. Learn how it reshapes enterprise security. The post Will Agentic AI Hurt or Help Your Security Posture? appeared first on Security Boulevard. This article…
Experts Trace $35m in Stolen Crypto to LastPass Breach
TRM Labs says it has recorded $35m drained from users’ wallets following 2022 LastPass breach This article has been indexed from www.infosecurity-magazine.com Read the original article: Experts Trace $35m in Stolen Crypto to LastPass Breach
DeepSeek Proposes Tweak For AI Efficiency
Proposed tweak to AI model architecture, called mHC, potentially allows training scalability without increasing compute costs This article has been indexed from Silicon UK Read the original article: DeepSeek Proposes Tweak For AI Efficiency
VVS Stealer, a new python malware steals Discord credentials
VVS Stealer is a Python-based malware that steals Discord credentials and tokens and has been sold on Telegram since at least April 2025. Palo Alto Networks researchers uncovered VVS Stealer, a Python-based malware that steals Discord credentials and tokens and…
New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code
Cybersecurity researchers have disclosed details of a new Python-based information stealer called VVS Stealer (also styled as VVS $tealer) that’s capable of harvesting Discord credentials and tokens. The stealer is said to have been on sale on Telegram as far…
London Council Says Hackers Took Sensitive Data
Westminster City Council says likely that sensitive and personal information ‘copied and taken’ in November cyber-attack This article has been indexed from Silicon UK Read the original article: London Council Says Hackers Took Sensitive Data
GHOSTCREW – AI-based Red Team Toolkit for Penetration Testing Invoking Metasploit, Nmap and Other Tools
GHOSTCREW emerges as a game-changing open-source toolkit for red teamers and penetration testers. This AI-powered assistant leverages large language models, integrates the MCP protocol, and supports the optional RAG architecture to orchestrate security tools via natural-language prompts. Developed by GH05TCREW,…
Threat Actor Allegedly Claim Leak of NordVPN Salesforce Database with Source Codes
A threat actor operating under the identifier 1011 has publicly claimed to have obtained and leaked sensitive data from NordVPN’s development infrastructure on a dark web forum. The breach reportedly exposes over ten database source codes, along with critical authentication…
A week in security (December 29 – January 4)
A list of topics we covered in the week of December 29 2025 to January 4 of 2026 This article has been indexed from Malwarebytes Read the original article: A week in security (December 29 – January 4)
Palo Alto AI warning, Resecurity hack fiasco, Christmas ColdFusion attack
Palo Alto Networks boss calls AI agents biggest insider threat Hackers claim Resecurity hack, firm says it was a honeypot Thousands of ColdFusion exploit attempts spotted during Christmas holiday Huge thanks to our sponsor, Hoxhunt A small tip for CISOs:…
BYD Tops Tesla As World’s Biggest EV Maker
China’s BYD beats Tesla for first time on full-year sales, as pioneering US automaker sees biggest ever annual sales slump This article has been indexed from Silicon UK Read the original article: BYD Tops Tesla As World’s Biggest EV Maker
Sedgwick discloses data breach after TridentLocker ransomware attack
Sedgwick confirmed a cyber incident at its federal contractor unit after TridentLocker claimed to steal 3.4GB of data. Sedgwick is a leading global claims management and risk services provider operating in the insurance and risk solutions sector. It employs roughly…
Multiple Vulnerabilities in QNAP Tools Let Attackers Obtain Secret Data
QNAP has patched multiple security vulnerabilities in its License Center application that could allow attackers to access sensitive information or disrupt services on affected NAS devices. The issues, tracked as CVE-2025-52871 and CVE-2025-53597, were disclosed on January 3, 2026. QNAP rated the flaws as Moderate severity and confirmed that the issues have…
California’s DROP Platform Launches: What Enterprise B2B SaaS Companies Need to Know About Data Deletion Compliance
How California’s groundbreaking data deletion law signals a fundamental shift in enterprise identity lifecycle management—and why your SSO infrastructure matters more than ever The post California’s DROP Platform Launches: What Enterprise B2B SaaS Companies Need to Know About Data Deletion…
AI security risks are also cultural and developmental
Security teams spend much of their time tracking vulnerabilities, abuse patterns, and system failures. A new study argues that many AI risks sit deeper than technical flaws. Cultural assumptions, uneven development, and data gaps shape how AI systems behave, where…