Cloud Security Office Hours Banner

Cloud Security News

Latest news, vulnerabilities, and developments in cloud security. Stay informed about the rapidly evolving cloud threat landscape.

RSS Feed
Cloud security news velocity is high; signal-to-noise is low. This page is the curated middle. — what this feed is for
Adult reading a newspaper with breakfast in modern kitchen, morning sunlight
Photo by cottonbro studio on Pexels

Latest Articles

Security Affairs

RansomHouse says it breached Trellix and exposes internal systems

RansomHouse claimed responsibility for the Trellix breach, adding the security firm to its Tor data leak site and sharing screenshots of internal systems. The RansomHouse ransom... (Security Affairs)

Breach
SANS ISC

Another Universal Linux Local Privilege Escalation (LPE) Vulnerability: Dirty Frag, (Fri, May 8th)

Less than two weeks after the public disclosure of the Copy Fail vulnerability (CVE-2026-31431), another local privilege escalation (LPE) vulnerability in the Linux kernel has b... (SANS ISC)

Vulnerability
SecurityWeek

In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director Frontrunner

Other noteworthy stories that might have slipped under the radar: US gov targets 72-hour patch cycles, malware uses Windows Phone Link to steal OTPs, spy operation targets Euras... (SecurityWeek)

CISA
Security Affairs

Zara Data Breach: 197,000 Customers Exposed in Third-Party Security Incident

Nearly 200,000 Zara customers were exposed in a third-party breach linked to ShinyHunters, revealing emails, purchase history, and support data. Personal data belonging to nearl... (Security Affairs)

Breach
BleepingComputer

CISA gives feds four days to patch Ivanti flaw exploited as zero-day

CISA has given U.S. federal agencies four days to secure their networks against a high-severity vulnerability in Ivanti Endpoint Manager Mobile (EPMM) exploited in zero-day atta... (BleepingComputer)

CISA Vulnerability
The Hacker News

Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise

A previously undocumented Linux implant codenamed Quasar Linux RAT (QLNX) is targeting developers' systems to establish a silent foothold as well as facilitate a broad range of... (The Hacker News)

Supply Chain Scam
Infosecurity Magazine

Australian Cyber Security Centre Issues Alert Over ClickFix Attacks

ACSC warns over a campaign targeting organizations which uses ClickFix to deliver Vidar infostealer malware (Infosecurity Magazine)

Threat Research
Schneier on Security

Friday Squid Blogging: Giant Squid Live in the Waters of Western Australia

Evidence of them has been found by analyzing DNA in the seawater. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covere... (Schneier on Security)

Cloud Security
Wiz Blog

A Framework for AI Threat Readiness

AI models now find and exploit zero-days autonomously. This 4-pillar framework accelerates patching, analysis, and threat response. (Wiz Blog)

Vulnerability AI
Rapid7 Blog

Metasploit Wrap-Up 05/08/2026

Spring cleanup This week’s Metasploit updates focused on foundational improvements and expanded target reach. Key enhancements were made to the recently released Copy Fail explo... (Rapid7 Blog)

Cloud Security
Schneier on Security

Insider Betting on Polymarket

Insider trading is rife on Polymarket: Analysis by the Anti-Corruption Data Collective, a non-profit research and advocacy group, found that long-shot bets—­defined as wagers of... (Schneier on Security)

Cloud Security
The Register - Security

Worm rubs out competitor's malware, then takes control

All your compromised credentials are belong to us now instead of the other gang (The Register - Security)

Scam
CISA Current Activity

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-42208 BerriAI LiteLLM SQL Injectio... (CISA Current Activity)

CISA Vulnerability
BleepingComputer

NVIDIA confirms GeForce NOW data breach affecting Armenian users

NVIDIA has confirmed in a statement for BleepingComputer that GeForce NOW user information has been exposed in a data breach. [...] (BleepingComputer)

Breach
Orca Security Blog

Critical Apache HTTP Server HTTP/2 Vulnerability Could Enable Remote Code Execution

A high-severity vulnerability (CVE-2026-23918, CVSS 8.8) was disclosed affecting Apache HTTP Server, allowing attackers to potentially achieve remote code execution via speciall... (Orca Security Blog)

Vulnerability
The Hacker News

Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads

Cybersecurity researchers have discovered fraudulent apps on the official Google Play Store for Android that falsely claimed to offer access to call histories for any phone numb... (The Hacker News)

Scam
BleepingComputer

Why More Analysts Won’t Solve Your SOC’s Alert Problem

Attackers move faster than overwhelmed SOC teams can realistically investigate alerts. Prophet Security breaks down how AI can help analysts investigate alerts faster and focus... (BleepingComputer)

AI
GitGuardian Blog

GCSI 2026: AI Readiness in a City Built in Layers

GCSI 2026 showed why cyber readiness depends on visibility into vendors, AI tools, identities, workflows, and hidden business dependencies. (GitGuardian Blog)

AI
BleepingComputer

Trellix source code breach claimed by RansomHouse hackers

The attack on the Trellix source code repository disclosed last week has been claimed by the RansomHouse threat group, which leaked a small set of images as proof of the intrusi... (BleepingComputer)

Breach
Rapid7 Blog

Zero Chaos: Scaling Detection Engineering at the Speed of Software, with Detection As Code

Every engineering team in your organization ships code through a pipeline. They branch, test, review, and deploy. If something breaks, they roll back. If someone asks "what chan... (Rapid7 Blog)

Cloud Security
Wiz Blog

See and Secure Everything at the Edge with Wiz and Akamai

Akamai edge configurations are now visible on the Wiz Security Graph, giving teams a single understanding of risk from edge to runtime (Wiz Blog)

Cloud Security
SecurityWeek

Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants

The hackers gained the ability to modify equipment operational parameters, creating a direct risk to the public water supply. The post Polish Security Agency Reports ICS Breache... (SecurityWeek)

Breach
SecurityWeek

AI Firm Braintrust Prompts API Key Rotation After Data Breach

Hackers accessed one of the company’s AWS accounts and compromised AI provider secrets stored in Braintrust. The post AI Firm Braintrust Prompts API Key Rotation After Data Brea... (SecurityWeek)

AWS Breach AI
SecurityWeek

Cyberattack Hits Canvas System Used by Thousands of Schools as Finals Loom

A system that thousands of schools and universities use went offline due to a cyberattack, creating chaos as students tried to study for finals. The post Cyberattack Hits Canvas... (SecurityWeek)

Cloud Security
The Hacker News

One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk

The dark secret of enterprise security operations is that defenders have quietly institutionalized the practice of not looking. This is not just anecdotal, but rather backed by... (The Hacker News)

Cloud Security
Help Net Security

Google is turning Android Studio into a policy watchdog

Google has expanded Play Policy Insights in Android Studio to help developers catch policy issues while coding, including warnings for common problems such as missing login cred... (Help Net Security)

Cloud Security
Help Net Security

Helping North Korean IT remote workers is becoming a fast track to prison

Two U.S. nationals were sentenced to 18 months in prison for operating “laptop farms” that helped North Korean IT workers gain employment at nearly 70 American companies, genera... (Help Net Security)

Cloud Security
BleepingComputer

Former govt contractor convicted for wiping dozens of federal databases

A 34-year-old Virginia man was found guilty of conspiring to destroy dozens of government databases after getting fired from his job as a federal contractor. [...] (BleepingComputer)

Jobs
SecurityWeek

‘PCPJack’ Worm Removes TeamPCP Infections, Steals Credentials

The malware framework targets web applications and cloud environments, including AWS, Docker, Kubernetes, and more. The post ‘PCPJack’ Worm Removes TeamPCP Infections, Steals Cr... (SecurityWeek)

AWS Kubernetes Scam
Help Net Security

Snyk integrates Claude to advance AI-native application security

Snyk has announced it is leveraging Anthropic’s Claude models to advance software security. Snyk has integrated Claude into the Snyk AI Security Platform, enabling automated vul... (Help Net Security)

AI
Help Net Security

Avantra’s new AI can diagnose SAP failures in seconds

Avantra launched Avantra 26, an advancement in AI-driven operations, strengthening native integration with SAP Cloud ALM, and delivering automated visibility across SAP Business... (Help Net Security)

AI
Help Net Security

Securonix launches AI threat research agent and ThreatWatch validation tool

Securonix announced the Securonix Threat Research Agent and ThreatWatch for ThreatQ, expanding how security teams research threats, validate exposure, and turn intelligence into... (Help Net Security)

AI Threat Research
Help Net Security

OpenAI tunes GPT-5.5-Cyber for more permissive security workflows

OpenAI is rolling out GPT-5.5-Cyber, a variant of its latest AI model, in limited preview for verified cybersecurity professionals and organizations through its Trusted Access f... (Help Net Security)

AI
Security Affairs

AI, Cyberwarfare, and Autonomous Weapons: Inside America’s New Military Strategy

The Pentagon is integrating AI into military operations, transforming cybersecurity, targeting, and command systems into a unified warfare architecture. May 2026 marks a turning... (Security Affairs)

AI
Help Net Security

Transilience AI unveils Security Operating System for cloud remediation

Transilience AI has announced the general availability of its Full Stack Security Operating System for the cloud, platform designed to solve one of enterprise security’s most pe... (Help Net Security)

AI
Help Net Security

Object First Fleet Manager simplifies distributed backup storage

Object First released Object First Fleet Manager, a cloud-based service that simplifies the management of distributed Ootbi backup storage deployments for Veeam Software environ... (Help Net Security)

Cloud Security
SecurityWeek

Vulnerability in Claude Extension for Chrome Exposes AI Agent to Takeover

Lax extension permissions and improper trust implementation allow attackers to inject prompts in the Claude Chrome extension. The post Vulnerability in Claude Extension for Chro... (SecurityWeek)

Vulnerability AI
Help Net Security

New infosec products of the week: May 8, 2026

Here’s a look at the most interesting products from the past week LastPass, Operant AI, Sysdig, and VIAVI. Operant AI Endpoint Protector secures AI agents and MCP tools Operant... (Help Net Security)

AI
KrebsOnSecurity

Canvas Breach Disrupts Schools & Colleges Nationwide

An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the... (KrebsOnSecurity)

Breach
SANS ISC

ISC Stormcast For Friday, May 8th, 2026 https://isc.sans.edu/podcastdetail/9924, (Fri, May 8th)

(SANS ISC)

Cloud Security
Elastic Security Labs

Detecting Web Server Probing & Fuzzing in Traefik with Automated Cloudflare Response

This article shows how a customized Elastic Security ES|QL detection rule can identify web server probing and fuzzing activity in Traefik logs and automatically block the attack... (Elastic Security Labs)

Cloud Security
Datadog Security Labs

Kubernetes security fundamentals: Secrets

A look at how to secure Kubernetes secrets (Datadog Security Labs)

Kubernetes
Chainguard Unchained

Cyber resiliency in practice: Lessons from recent supply chain attacks

Learn how modern cyber resiliency helps organizations prevent, detect, and recover from supply chain attacks like Trivy, Axios, and LiteLLM. (Chainguard Unchained)

Supply Chain
BleepingComputer

New TCLBanker malware self-spreads over WhatsApp and Outlook

A new trojan named TCLBanker, which targets 59 banking, fintech, and cryptocurrency platforms, uses a trojanized MSI installer for Logitech AI Prompt Builder to infect systems.... (BleepingComputer)

AI
The Hacker News

Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access

Ivanti is warning that a new security flaw impacting Endpoint Manager Mobile (EPMM) has been explored in limited attacks in the wild. The high-severity vulnerability, CVE-2026-6... (The Hacker News)

Vulnerability
SecurityWeek

Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State Hacking

The cybersecurity firm has not explicitly accused China of being behind the attack, but the evidence suggests it was. The post Palo Alto Zero-Day Exploited in Campaign Bearing H... (SecurityWeek)

Vulnerability Threat Research
Infosecurity Magazine

Fake Claude AI Site Drops Beagle Backdoor on Windows Users

Sophos finds fake Claude site spreading DonutLoader and a new Beagle backdoor via DLL sideloading (Infosecurity Magazine)

AI
Security Affairs

Cisco patches high-severity flaws enabling SSRF, code execution attacks

Cisco fixed several high‑severity flaws in its enterprise products, including SSRF bugs in Unity Connection that could enable code execution or service disruption. Cisco release... (Security Affairs)

Cloud Security
Rapid7 Blog

Rapid7 and OpenAI: Helping Defenders Move at Machine Speed

Wade Woolwine is Senior Director, Product Security at Rapid7. Announcing OpenAI's Trusted Access for Cyber program CIOs and CISOs are telling us the same thing in different ways... (Rapid7 Blog)

Cloud Security
Cloudflare Blog

Building for the future

This afternoon, we sent the following email to our global team. One of our core values at Cloudflare is transparency, and we believe it's important that you hear this directly f... (Cloudflare Blog)

Cloud Security
The Register - Security

Anthropic response to 1-click pwn: Shouldn't have clicked 'ok'

Security biz Adversa AI argues users of AI tools need clearer warnings (The Register - Security)

AI
SecurityWeek

Worries About AI’s Risks to Humanity Loom Over the Trial Pitting Musk Against OpenAI’s Leaders

Musk said that he could have founded OpenAI as a for-profit company, just like the other companies he started or took over. “I deliberately chose this,” he said, “for the public... (SecurityWeek)

AI
AWS Security Blog

ICYMI: April 2026 @AWS Security

Read all about the latest AWS security features, compliance updates, and hands-on resources in our new, monthly digest posts. You’ll find expert blog posts, new service capabili... (AWS Security Blog)

AWS
Cisco Talos

Unplug your way to better code

Cybersecurity concepts — logs, packets, DNS exfiltration, and more — are usually intangible, and its practitioners are prone to mental fatigue, Amy takes a second to yell at you... (Cisco Talos)

Cloud Security
Help Net Security

What Mozilla learned running an AI security bug hunting pipeline on Firefox

Over the past several months, Mozilla ran an agentic harness powered by Claude Mythos Preview across Firefox’s source code, identifying 271 security bugs that were fixed in Fire... (Help Net Security)

AI
Help Net Security

$250 million cryptocurrency heist funded luxury fashion, nightclub parties, and private jets

20-year-old California resident Marlon Ferro, known online as “GothFerrari,” was sentenced to 78 months in prison for his role in a cryptocurrency theft operation tied to more t... (Help Net Security)

Cloud Security
SecurityWeek

Vendor Says Daemon Tools Supply Chain Attack Contained

The software developer has identified the impacted systems, removed potentially compromised files, and validated installation packages. The post Vendor Says Daemon Tools Supply... (SecurityWeek)

Supply Chain
Help Net Security

One keypress is all it takes to compromise four AI coding tools

Developers clone unfamiliar repositories all the time. Open-source projects, work from teammates, sample code from a tutorial, a library someone recommended on a forum. The conv... (Help Net Security)

AI
Help Net Security

Node.js 26 ships with Temporal API enabled by default

Developers managing JavaScript runtimes have a new major version to evaluate. Node.js 26.0.0 brings the long-awaited Temporal API to the platform alongside an updated V8 engine,... (Help Net Security)

Cloud Security
Help Net Security

Facial recognition arrives at the gates of Disney’s magic kingdom

Disney has equipped select entrance lanes at Disneyland Park and Disney California Adventure Park with facial recognition technology, saying the system is intended to streamline... (Help Net Security)

Cloud Security
Help Net Security

Kloudfuse 4.0 delivers AI-governed observability and scalable workload isolation

Kloudfuse has announced the general availability of Kloudfuse 4.0. The release helps enterprises meet rising compliance requirements, adopt AI-driven observability with producti... (Help Net Security)

AI
Help Net Security

Red Hat Enterprise Linux adds post-quantum security and AI-driven automation in latest releases

Red Hat has announced the upcoming general availability of Red Hat Enterprise Linux 10.2 and 9.8. Building on the innovation of Red Hat Enterprise Linux 10, the latest versions... (Help Net Security)

AI
AWS Security Blog

AWS achieves SNI 27017, SNI 27018, and SNI 9001 certifications for the AWS Asia Pacific (Jakarta) Region

Amazon Web Services (AWS) achieved three Standar Nasional Indonesia (SNI) certifications for the AWS Asia Pacific (Jakarta) Region: SNI ISO/IEC 27017:2015, SNI ISO/IEC 27018:201... (AWS Security Blog)

AWS
SecurityWeek

Boost Security Raises $4 Million for SDLC Defense Platform

The company is expanding its platform’s capabilities with the acquisition of SecureIQx and Korbit.ai. The post Boost Security Raises $4 Million for SDLC Defense Platform appeare... (SecurityWeek)

AI
Infosecurity Magazine

Legacy Security Tools Are Failing Data Protection, Capital One Software Report Finds

Traditional network security tools are undermining data protection, with Forrester and Capital One Software research warning AI adoption is impossible without rethinking data se... (Infosecurity Magazine)

AI
SecurityWeek

Claude Code OAuth Tokens Can Be Stolen Through Stealthy MCP Hijacking

Mitiga researchers say attackers can silently redirect Claude Code MCP traffic, intercept OAuth tokens, and maintain persistent access to connected SaaS platforms. The post Clau... (SecurityWeek)

Cloud Security
Infosecurity Magazine

Cline Kanban Flaw Lets Websites Hijack AI Coding Agents

Oasis Security finds critical Cline kanban WebSocket flaw exposing AI coding agents to hijack (Infosecurity Magazine)

AI
SecurityWeek

Chrome 148 Rolls Out With 127 Security Fixes

The fresh browser update resolves critical-severity integer overflow and use-after-free vulnerabilities. The post Chrome 148 Rolls Out With 127 Security Fixes appeared first on... (SecurityWeek)

Cloud Security
BleepingComputer

The Browser Is Breaking Your DLP: How Data Slips Past Modern Controls

Your security controls aren't failing, they're missing where most of today's work actually happens. Keep Aware shows how browser activity like copy/paste and AI prompts bypass t... (BleepingComputer)

AI
The Hacker News

One Click, Total Shutdown: The "Patient Zero" Webinar on Killing Stealth Breaches

The hardest part of cybersecurity isn't the technology, it’s the people. Every major breach you’ve read about lately usually starts the same way: one employee, one clever email,... (The Hacker News)

Breach
Infosecurity Magazine

OpenAI and Anthropic LLMs Used in Critical Infrastructure Cyber-Attack, Warns Dragos

Commercial AI models were used to help plan and conduct cyber-attack against operational technology of a water and drainage facility, say researchers (Infosecurity Magazine)

AI
SecurityWeek

Attackers Could Exploit AI Vision Models Using Imperceptible Image Changes

Cisco’s AI security researchers have analyzed ways to target vision-language models (VLMs) using pixel-level perturbation. The post Attackers Could Exploit AI Vision Models Usin... (SecurityWeek)

Vulnerability AI
Rapid7 Blog

Why Security in 2026 Requires Continuous Threat and Exposure Management (CTEM) at Scale

Let's be honest, the patching window just shrank to something no practitioner or organization can keep up with. Organizations now need to operate in an environment that must ass... (Rapid7 Blog)

Cloud Security
Cloudflare Blog

How Cloudflare responded to the “Copy Fail” Linux vulnerability

When a critical Linux kernel privilege escalation was publicly disclosed, Cloudflare's security and engineering teams detected, investigated, and mitigated the threat across our... (Cloudflare Blog)

Vulnerability
SecurityWeek

AI Coding Agents Could Fuel Next Supply Chain Crisis

“TrustFall” attack shows how AI coding agents can be manipulated into launching stealthy supply chain compromises. The post AI Coding Agents Could Fuel Next Supply Chain Crisis... (SecurityWeek)

Supply Chain AI
Dark Reading

World's First AI-Driven Cyberattack Couldn't Breach OT Systems

The most sophisticated AI-integrated campaign to date hit a brick wall in the form of a SCADA login screen. (Dark Reading)

Breach AI Threat Research
BleepingComputer

Webinar: Why modern attacks require both security and recovery

Modern attacks don't stop at initial compromise. This webinar explores why security and recovery must work together to reduce downtime and improve resilience. [...] (BleepingComputer)

Cloud Security
SecurityWeek

Webinar Today: Securing Identity Across Humans, Machines and AI

From service accounts to AI-driven processes, identity is evolving faster than most security programs can adapt. Discover strategies for reducing risk and regaining control. The... (SecurityWeek)

Identity AI
The Hacker News

ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories

Bad week. Turns out the easiest way to get hacked in 2026 is still the same old garbage: shady packages, fake apps, forgotten DNS junk, scam ads, and stolen logins getting dumpe... (The Hacker News)

Scam
The Hacker News

Day Zero Readiness: The Operational Gaps That Break Incident Response

Having an incident response retainer, or even a pre-approved external incident response firm, is not the same as being ready for an incident. A retainer means someone will answe... (The Hacker News)

Cloud Security
Security Affairs

From Android TVs to routers: the xlabs_v1 Mirai-based botnet built for DDoS attacks

A new Mirai‑based botnet, xlabs_v1, hijacks ADB‑exposed IoT devices for powerful DDoS attacks, with 21 flooding methods and DDoS‑for‑hire use. A new Mirai‑derived botnet called... (Security Affairs)

Breach
Infosecurity Magazine

Daemon Tools Developer Confirms Software Was Trojanized

A China-linked threat actor backdoored a version of Daemon Tools to infect thousands (Infosecurity Magazine)

Threat Research
The Hacker News

PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux

Cybersecurity researchers have discovered three packages on the Python Package Index (PyPI) repository that are designed to stealthily deliver a previously unknown malware famil... (The Hacker News)

Cloud Security
Infosecurity Magazine

Researchers Spot Uptick in Use of Vercel for Phishing Campaigns

Cofense has warned of a “significant” increase in phishing campaigns abusing Vercel platform (Infosecurity Magazine)

Phishing Threat Research
SecurityWeek

Claude AI Guided Hackers Toward OT Assets During Water Utility Intrusion

Dragos has published a report describing how threat actors used Claude AI in an attack on a water and drainage utility in Mexico. The post Claude AI Guided Hackers Toward OT Ass... (SecurityWeek)

AI Threat Research
Help Net Security

Open-source MCP server monitoring for Python apps

Pythonic Model Context Protocol servers handle tool calls, session events, module imports, and subprocess activity. BlueRock has released MCP Python Hooks, an open source runtim... (Help Net Security)

Cloud Security
Help Net Security

Multi-model AI is creating a routing headache for enterprises

Application teams are moving AI inference into production systems that support business operations. Enterprises are expanding traffic management, identity controls, observabilit... (Help Net Security)

Identity AI
SANS ISC

An Adaptive Cyber Analytics UI for Web Honeypot Logs [Guest Diary], (Wed, May 6th)

[This is a Guest Diary by Eric Roldan, an ISC intern as part of the SANS.edu BACS program] (SANS ISC)

Cloud Security
Rapid7 Blog

Critical Buffer Overflow in Palo Alto Networks PAN-OS User-ID Authentication Portal (CVE-2026-0300)

Overview On May 6, 2026, Palo Alto Networks published a security advisory for CVE-2026-0300 , a critical unauthenticated buffer overflow vulnerability affecting PAN-OS PA-Series... (Rapid7 Blog)

Vulnerability
The Hacker News

MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack

The Iranian state-sponsored hacking group known as MuddyWater (aka Mango Sandstorm, Seedworm, and Static Kitten) has been attributed to a ransomware attack in what has been desc... (The Hacker News)

Azure Ransomware Scam
Infosecurity Magazine

Iran-Linked APT Posed as Chaos Ransomware Member in Espionage Campaign

Rapid7 reveals an Iranian false flag operation masquerading as a Chaos ransomware attack (Infosecurity Magazine)

Ransomware Threat Research
Dark Reading

Attacks Abuse Windows Phone Link to Steal Texts & Bypass 2FA

In hard-to-detect attacks, hackers are dropping the CloudZ RAT and a fresh plug-in, Pheno, to hijack the Windows-based bridge between PCs and smartphones. (Dark Reading)

Cloud Security
Cisco Talos

Insights into the clustering and reuse of phone numbers in scam emails

Talos has recently started to collect and gather intelligence around phone numbers within emails as an additional indicator of compromise (IOC). In this blog, we discuss new ins... (Cisco Talos)

Scam
Infosecurity Magazine

One in Eight Workers Has Sold Their Corporate Logins

Cifas says that 13% of employees admit selling company credentials to a former colleague (Infosecurity Magazine)

Scam
Dark Reading

Middle East Cyber Battle Field Broadens — Especially in UAE

As the war with Iran continues, breach attempts targeting the United Arab Emirates tripled in a few weeks — many targeting critical infrastructure. (Dark Reading)

Breach
The Register - Security

India orders infosec red alert in case Mythos sparks crime spree

Securities regulator urges market players to develop new strategies and nail cyber-basics before AI models fuel mass attacks (The Register - Security)

AI
Rapid7 Blog

Muddying the Tracks: The State-Sponsored Shadow Behind Chaos Ransomware

Executive summary In early 2026, a sophisticated intrusion initially appearing to be a standard Chaos ransomware attack was assessed to be consistent with a targeted state-spons... (Rapid7 Blog)

Ransomware
CrowdStrike Blog

CrowdStrike Named a Leader in the First-Ever Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies

(CrowdStrike Blog)

Threat Research
Help Net Security

Teams calls are about to get a lot harder to fake

Microsoft Teams Calling is getting a new feature that will warn users about suspicious inbound VoIP calls from first-time external callers who might be impersonating trusted bra... (Help Net Security)

Azure
Help Net Security

Sysdig delivers cloud security that runs inside AI coding agents

Sysdig announced headless cloud security, a cyberdefense platform designed for the agentic AI era. Sysdig Headless Cloud Security enables customers to drop the traditional, one-... (Help Net Security)

AI
Security Affairs

Taiwan High-Speed Rail Emergency Braking Hack: How a Student Stopped the Trains and Exposed a Major Security Gap

Taiwan high‑speed rail was disrupted after a 23‑year‑old student spoofed signals and triggered an emergency alarm, stopping four trains for nearly an hour. Taiwan high‑speed rai... (Security Affairs)

Breach
BleepingComputer

Hackers abuse Google ads for GoDaddy ManageWP login phishing

A phishing campaign delivered through Google sponsored search results is targeting credentials for ManageWP, GoDaddy's platform for managing fleets of WordPress websites. [...] (BleepingComputer)

Phishing Scam Threat Research
Dark Reading

Yet Another Way to Bypass Google Chrome's Encryption Protection

Authors of the VoidStealer Trojan uncovered a way to get around Google's App-Bound Encryption (ABE), opening the door to infostealers. (Dark Reading)

Cloud Security
Dark Reading

Instructure Breach Exposes Schools' Vendor Dependence

ShinyHunters' attack on Instructure, which owns the widely used Canvas learning management system (LMS), carries big questions about the trust educational institutions put into... (Dark Reading)

Breach
AWS Security Blog

New compliance guide available: ISO/IEC 42001:2023 on AWS

We have released our latest compliance guide, ISO/IEC 42001:2023 on AWS, which provides practical guidance for organizations designing and operating an Artificial Intelligence M... (AWS Security Blog)

AWS
BleepingComputer

Critical vm2 sandbox bug lets attackers execute code on hosts

A critical vulnerability in the popular Node.js sandboxing library vm2 allows escaping the sandbox and executing arbitrary code on the host system. [...] (BleepingComputer)

Vulnerability
The Register - Security

Arctic Wolf kicks 250 employees out of the pack to save money for AI

Cuts appear to hit sales, product, and marketing, accounting for under 10% of staff (The Register - Security)

AI
BleepingComputer

New Cisco DoS flaw requires manual reboot to revive devices

Cisco patched a Crosswork Network Controller and Network Services Orchestrator denial-of-service vulnerability that requires manually rebooting targeted systems for recovery. [...] (BleepingComputer)

Vulnerability
The Register - Security

1 in 8 employees totally cool with selling work credentials

13% say they’ve sold logins or know someone who has, survey suggests (The Register - Security)

Scam
BleepingComputer

DAEMON Tools devs confirm breach, release malware-free version

Disc Soft Limited, the maker of DAEMON Tools Lite, confirmed that the software had been trojanized in a supply chain attack and released a new, malware-free version. [...] (BleepingComputer)

Breach Supply Chain
Wiz Blog

The Jenkins Threat Landscape

What usage patterns, plugin adoption, and configuration choices reveal about the Jenkins attack surface. (Wiz Blog)

Cloud Security
BleepingComputer

Why ransomware attacks succeed even when backups exist

Backups don't fail because they're missing, they fail because attackers destroy them first. Acronis explains how ransomware targets backup systems before encryption, leaving no... (BleepingComputer)

Ransomware
SentinelLabs

LABScon25 Replay | Please Connect to the Foreign Entity to Enhance Your User Experience

Joe FitzPatrick reveals how consumer imports of networked devices pose a real security risk to small businesses and critical infrastructure alike. (SentinelLabs)

Cloud Security
BleepingComputer

Webinar: Why network incidents escalate and how to fix response gaps

Most network incidents don't escalate due to a lack of alerts; they escalate when response breaks down. This webinar explores how to fix gaps in triage, enrichment, and coordina... (BleepingComputer)

Cloud Security
The Hacker News

The Hacker News Launches 'Cybersecurity Stars Awards 2026' — Submissions Now Open

For nearly 20 years, we at The Hacker News have mostly told scary stories about cyberspace — big hacks, broken systems, and new threats. But behind every headline, there’s a qui... (The Hacker News)

Cloud Security
Dark Reading

From Stuxnet to ChatGPT: 20 News Events That Shaped Cyber

As part of its 20th anniversary celebration, Dark Reading looks back on 20 of the biggest newsmaking events from the past two decades that influenced the risk landscape for toda... (Dark Reading)

Cloud Security
SecurityWeek

Romanian Man Extradited to US for Role in Hacking Scheme 17 Years Ago

Gavril Sandu, 53, was indicted in 2017, but was arrested and extradited to the United States only in 2026. The post Romanian Man Extradited to US for Role in Hacking Scheme 17 Y... (SecurityWeek)

Cloud Security
The Hacker News

Your AI Agents Are Already Inside the Perimeter. Do You Know What They're Doing?

Analysts recently confirmed what identity security teams have quietly feared: AI agents are being deployed faster than enterprises can govern them. In their inaugural Market Gui... (The Hacker News)

Identity AI
Help Net Security

Intel 471 speeds threat hunting and remediation with Retroactive Threat Detections

Intel 471 has announced Retroactive Threat Detections (RTD), a new capability within its Verity471 platform. RTD helps security teams quickly understand the impact of new threat... (Help Net Security)

Cloud Security
Schneier on Security

Rowhammer Attack Against NVIDIA Chips

A new rowhammer attack gives complete control of NVIDIA CPUs. On Thursday, two research teams, working independently of each other, demonstrated attacks against two cards from N... (Schneier on Security)

Cloud Security