Aggregator
Опухоли без гравитации, клетки без искажений, лекарства без догадок. Европа запускает первую орбитальную лабораторию для изучения рака
This Week in Scams: Netflix Phishing and QR Code Espionage
This week in scams, attackers are leaning hard on familiar brands, everyday tools, and routine behavior to trigger fast, unthinking reactions. From fake Netflix...
The post This Week in Scams: Netflix Phishing and QR Code Espionage appeared first on McAfee Blog.
Okta users under attack: Modern phishing kits are turbocharging vishing attacks
Threat actors who specialize in vishing (i.e., voice phishing) have started using phishing kits that can intercept targets’ login credentials while also allowing attackers to control the authentication flow in a targeted user’s browser in real-time. At least two custom-made phishing kits are currently used by a number of threat actors that go after credentials and authentication factors to gain access to corporate systems and assets. “These custom kits are made available on an as-a-service … More →
The post Okta users under attack: Modern phishing kits are turbocharging vishing attacks appeared first on Help Net Security.
智能化软件开发微访谈·第四十一期 从氛围编程到SDD:盘点AI辅助开发的2025
Hackers get $1,047,000 for 76 zero-days at Pwn2Own Automotive 2026
New Phishing Kit As-a-service Attacking Google, Microsoft, and Okta Users
A dangerous new generation of phishing kits designed specifically for voice-based attacks has emerged as a growing threat to enterprise users across major technology platforms. Okta Threat Intelligence discovered multiple custom phishing kits available on an as-a-service basis that criminals are using in coordinated campaigns. These sophisticated tools target employees at Google, Microsoft, Okta, and […]
The post New Phishing Kit As-a-service Attacking Google, Microsoft, and Okta Users appeared first on Cyber Security News.
Node.js Updated HackerOne Program to Require a Signal of 1.0 or Higher to Submit Vulnerability Reports
Node.js has updated its HackerOne vulnerability disclosure program to require a minimum Signal score of 1.0, aiming to reduce low-quality submissions and improve processing efficiency. Node.js has implemented a new threshold for vulnerability report submissions through its HackerOne program, mandating that researchers maintain a Signal score of 1.0 or higher to participate. Signal is HackerOne’s […]
The post Node.js Updated HackerOne Program to Require a Signal of 1.0 or Higher to Submit Vulnerability Reports appeared first on Cyber Security News.
The 2025 Phishing Surge Proved One Thing: Chasing Doesn’t Work
Let's get something out of the way: retrospectives can feel a bit like mandatory fun. Someone gathers up the year's events, packages them into neat categories, and delivers "key takeaways" that land somewhere between obvious and forgettable. This is not that.
The post The 2025 Phishing Surge Proved One Thing: Chasing Doesn’t Work appeared first on Security Boulevard.
Microsoft to Add Brand Impersonation Protection Warning to Teams Calls
A new security feature for Teams Calling now alerts users to suspicious external calls that try to impersonate trusted organizations. The feature will begin deployment in mid-February 2026 for Targeted Release customers, with general availability timelines to be communicated later. Brand Impersonation Protection is a proactive security safeguard that evaluates inbound Voice over IP (VoIP) […]
The post Microsoft to Add Brand Impersonation Protection Warning to Teams Calls appeared first on Cyber Security News.
«Это просто для тестов, никто не найдет». Админы крупнейших IT-компаний подарили хакерам ключи от облаков
Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls
ShinyHunters Leak Alleged Data of Millions From SoundCloud, Crunchbase and Betterment
Prinses Amalia rondt Algemene Militaire Opleiding af
76 Zero-day Vulnerabilities Uncovered by Hackers on Pwn2Own Automotive 2026
Security researchers at Pwn2Own Automotive 2026 demonstrated 76 unique zero-day vulnerabilities across electric vehicle chargers and in-vehicle infotainment systems. The three-day event in Tokyo awarded $1,047,000 USD total, with Fuzzware.io claiming the Master of Pwn title. Day One Activities Day One featured 30 entries targeting systems like Alpine iLX-F511, Kenwood DNR1007XR, and various EV chargers, […]
The post 76 Zero-day Vulnerabilities Uncovered by Hackers on Pwn2Own Automotive 2026 appeared first on Cyber Security News.
Under Armour Investigates Data Breach After 72 Million Records Allegedly Exposed
New Watering Hole Attacking EmEditor User with Stealer Malware
A major security threat has emerged targeting developers who use EmEditor, a popular text editor favored by Japanese programming communities. In late December 2025, the software’s official download page fell victim to a compromise that allowed attackers to distribute malicious versions of the installer to unsuspecting users. The attack demonstrates how trusted software platforms can […]
The post New Watering Hole Attacking EmEditor User with Stealer Malware appeared first on Cyber Security News.
AIs are Getting Better at Finding and Exploiting Internet Vulnerabilities
Really interesting blog post from Anthropic:
In a recent evaluation of AI models’ cyber capabilities, current Claude models can now succeed at multistage attacks on networks with dozens of hosts using only standard, open-source tools, instead of the custom tools needed by previous generations. This illustrates how barriers to the use of AI in relatively autonomous cyber workflows are rapidly coming down, and highlights the importance of security fundamentals like promptly patching known vulnerabilities.
[…]
A notable development during the testing of Claude Sonnet 4.5 is that the model can now succeed on a minority of the networks without the custom cyber toolkit needed by previous generations. In particular, Sonnet 4.5 can now exfiltrate all of the (simulated) personal information in a high-fidelity simulation of the Equifax data breach—one of the costliest cyber attacks in history—using only a Bash shell on a widely-available Kali Linux host (standard, open-source tools for penetration testing; not a custom toolkit). Sonnet 4.5 accomplishes this by instantly recognizing a publicized CVE and writing code to exploit it without needing to look it up or iterate on it. Recalling that the original Equifax breach happened by exploiting a publicized CVE that had not yet been patched, the prospect of highly competent and fast AI agents leveraging this approach underscores the pressing need for security best practices like prompt updates and patches. ...
The post AIs are Getting Better at Finding and Exploiting Internet Vulnerabilities appeared first on Security Boulevard.
Mass Data, Mass Surveillance, and the Erosion of Particularity: The Fourth Amendment in the Age of Geofence Warrants and Artificial Intelligence
The Supreme Court’s review of United States v. Chatrie puts geofence warrants and mass digital data seizures under Fourth Amendment scrutiny, raising urgent questions about particularity, AI-driven searches, and constitutional limits in the digital age.
The post Mass Data, Mass Surveillance, and the Erosion of Particularity: The Fourth Amendment in the Age of Geofence Warrants and Artificial Intelligence appeared first on Security Boulevard.