Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
From prompt injection to emergent behavior, todayβs curious AI models are quietly breaching trust boundaries. The post From Ex Machina to Exfiltration: When AI Gets Too Curious appeared first on SecurityWeek.
React conquered XSS? Think again. That's the reality facing JavaScript developers in 2025, where attackers have quietly evolved their injection techniques to exploit everything from prototype pollution to AI-generated code, bypassing the very frameworks designed to keep applications secure. Full 47-page guide with framework-specific defenses (PDF, free). JavaScript conquered the web, but with
Threat actors are exploiting a two-year-old vulnerability in PaperCut that allows them to execute arbitrary code remotely. The post Organizations Warned of Exploited PaperCut Flaw appeared first on SecurityWeek.
Not all browser add-ons are handy helpers β some may contain far more than you have bargained for
Fable Security has emerged from stealth mode with a solution designed to detect risky behaviors and educate employees. The post Fable Security Raises $31 Million for Human Risk Management Platform appeared first on SecurityWeek.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a high-severity security vulnerability impacting PaperCutNG/MF print management software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerability, tracked as CVE-2023-2533 (CVSS score: 8.4), is a cross-site request forgery (CSRF) bug that could
The number of concerning vulnerabilities may be much smaller than organizations think. This cybersecurity startup aims to narrow down the list to the most critical ones.
The findings are part of a growing list of instances where βagenticβ AI software has taken actions that are more akin to a malicious hacker than a helpful AI assistant. The post Researchers flag flaw in Googleβs AI coding assistant that allowed for βsilentβ code exfiltration appeared first on CyberScoop.
The company has yet to report an exact number of how many individuals were impacted by the breach and plans to start the notification process around Aug. 1.
Researchers detailed a newer double-extortion ransomware group made up of former members of BlackSuit, which was recently disrupted by international law enforcement.
The education sector is haunted by a significant fraud problem where fake students impersonate celebrities and employ other identity techniques to steal resources and money from legitimate students.
Bluesky thread. Hereβs the paper, from 1957. Note reference 3.
Enterprises can use the IaC Risk Index to identify vulnerable cloud resources in their infrastructure-as-code environments that are not managed or governed.
In what's the latest instance of a software supply chain attack, unknown threat actors managed to compromise Toptal's GitHub organization account and leveraged that access to publish 10 malicious packages to the npm registry. The packages contained code to exfiltrate GitHub authentication tokens and destroy victim systems, Socket said in a report published last week. In addition, 73 repositories
A new infostealing malware making the rounds can exfiltrate credentials and other system data even from browsing software considered more privacy-focused than mainstream options.
Itβs time for SpaceX to take strong action against scammers abusing the companyβs Starlink internet service, Sen. Maggie Hassan said in a letter to CEO Elon Musk on Monday. The New Hampshire Democrat cited evidence accumulating over the past two years that some Southeast Asian fraudsters scamming billions of dollars from U.S. citizens have leaned [β¦] The post Sen. Hassan wants to hear from SpaceX about scammers abusing...
Officials said thousands of people, typically between 11 and 25 years old, are engaged in a growing and evolving online threat to commit crime for money, retaliation, ideology, sexual gratification and notoriety. The post FBI alerts tie together threats of cybercrime, physical violence from The Com appeared first on CyberScoop.
Researchers in California contacted data brokers in their state to exercise their rights under the California Privacy Protection Act. Many didnβt reply, while others threw up barriers. The post Hundreds of registered data brokers ignore user requests around personal data appeared first on CyberScoop.
The rise of agentic AI means the battle of the machines is just beginning. To win, we'll need our own agents β human and machine β working together.
Root Evidence is developing fully integrated vulnerability scanning and attack surface management technology. The post Root Evidence Launches With $12.5 Million in Seed Funding appeared first on SecurityWeek.
Some risks donβt breach the perimeterβthey arrive through signed software, clean resumes, or sanctioned vendors still hiding in plain sight. This week, the clearest threats werenβt the loudestβthey were the most legitimate-looking. In an environment where identity, trust, and tooling are all interlinked, the strongest attack path is often the one that looks like it belongs. Security teams are
Allianz subsidiary said the information of customers, financial professionals and employees was compromised as a result of a hack. The post Allianz Life Data Breach Impacts Most of 1.4 Million US Customers appeared first on SecurityWeek.
Picture this: youβve hardened every laptop in your fleet with realβtime telemetry, rapid isolation, and automated rollback. But the corporate mailboxβthe front door for most attackersβis still guarded by what is effectively a 1990s-era filter. This isn't a balanced approach. Email remains a primary vector for breaches, yet we often treat it as a static stream of messages instead of a dynamic,
Chinese hackers are exploiting a high-severity vulnerability in Microsoft SharePoint to steal data worldwide: The vulnerability, tracked as CVE-2025-53770, carries a severity rating of 9.8 out of a possible 10. It gives unauthenticated remote access to SharePoint Servers exposed to the Internet. Starting Friday, researchers began warning of active exploitation of the vulnerability, which affects SharePoint Servers that...
The emerging Chaos ransomware appears to be a rebranding of BlackSuit, which had its leak site seized by law enforcement. The post BlackSuit Ransomware Group Transitioning to βChaosβ Amid Leak Site Seizure appeared first on SecurityWeek.
The tech giantβs model is built around anticompetitive practices, the head of the Coalition for Fair Software Licensing argues. The post Microsoftβs software licensing playbook is a national security risk appeared first on CyberScoop.
The Post SMTP email delivery WordPress plugin is affected by a critical vulnerability and half of websites using it remain unpatched. The post Flaw Allowing Website Takeover Found in WordPress Plugin With 400k Installations appeared first on SecurityWeek.
The notorious cybercrime group known as Scattered Spider is targeting VMware ESXi hypervisors in attacks targeting retail, airline, and transportation sectors in North America. "The group's core tactics have remained consistent and do not rely on software exploits. Instead, they use a proven playbook centered on phone calls to an IT help desk," Google's Mandiant team said in an extensive
Cybersecurity researchers have discovered over a dozen security vulnerabilities impacting Tridium's Niagara Framework that could allow an attacker on the same network to compromise the system under certain circumstances. "These vulnerabilities are fully exploitable if a Niagara system is misconfigured, thereby disabling encryption on a specific network device," Nozomi Networks Labs said in a
Yet another SQUID acronym: βStable Quasi-Isodynamic Design.β Itβs a stellarator for a fusion nuclear power plant.
Longtime CISO Melina Scotto joins Dark Reading to discuss career advice gleaned from her 30 years in the cyber industry.
Suspected China-nexus threat actors targeted virtual environments and used several tools and techniques to bypass security barriers and reach isolated portions of victims' networks.
AI malware is becoming less of a gimmick, with features that meet or exceed what traditional human-developed malware typically can do.
Arrests and indictments keep coming, but the North Korean fake IT worker scheme is only snowballing, and businesses can't afford to assume their applicant-screening processes are up to the task of weeding the imposters out.
The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) sanctioned a North Korean front company and three associated individuals for their involvement in the fraudulent remote information technology (IT) worker scheme designed to generate illicit revenues for Pyongyang. The sanctions target Korea Sobaeksu Trading Company (aka Sobaeksu United Corporation), and Kim Se Un, Jo