🔒

Cybersecurity

Threat intelligence, breaches, enterprise security, and the hacker ecosystem.

Google: Hackers used AI to develop zero-day exploit for web admin tool

Google's Threat Intelligence Group has reported that hackers utilized AI to create a zero-day exploit for a widely used open-source web administration tool. This development highlights the growing intersection of artificial intelligence and cybersecurity threats, raising concerns about the potential for AI to enhance malicious activities.

BleepingComputerabout 2 hours ago·
aicybersecurityzero-day

Hackers Use AI for Exploit Development, Attack Automation

Cyber adversaries are increasingly leveraging large language models to enhance their capabilities in exploit development and attack automation. This trend marks a significant evolution in the tactics employed by hackers, allowing for more sophisticated and complex cyber attacks.

Dark Readingabout 2 hours ago·
aicybersecurityhackers

Webinar this week: Prevention alone is not enough against modern attacks

The upcoming webinar will address the necessity for organizations to enhance their cybersecurity strategies by integrating security measures, backup solutions, and recovery planning. It emphasizes that relying solely on prevention is insufficient to mitigate the effects of contemporary cyber threats.

BleepingComputerabout 3 hours ago·
cybersecuritywebinardata-recovery

Cyber Espionage Group Targets Aviation Firms to Steal Map Data

A cyber espionage group has been identified as targeting aviation firms, specifically aerospace and drone operators, to steal critical geospatial data. The attackers are exfiltrating GIS files, terrain models, and GPS data, which could provide them with strategic insights into adversaries' operations and environments. This campaign highlights the ongoing risks faced by the aviation sector in the realm of cybersecurity.

Dark Readingabout 3 hours ago·
cyber-espionageaviationgis

OpenAI in talks with EU over access to new cyber model but Anthropic still holding out on Mythos

OpenAI is currently in discussions with the European Union regarding the provision of access to its new cybersecurity model, which has been made available to select cybersecurity teams for preview. Meanwhile, Anthropic has not yet agreed to provide access to its own cybersecurity model, Mythos, indicating a competitive landscape in the AI-driven cybersecurity sector.

CNBC Technologyabout 4 hours ago·
openaicybersecurityeu

Hackers abuse Google ads, Claude.ai chats to push Mac malware

A new malvertising campaign is exploiting Google Ads and Claude.ai shared chats to distribute malware targeting Mac users. When individuals search for 'Claude mac download,' they may encounter deceptive sponsored links that mislead them into downloading harmful software instead of the legitimate service. This highlights ongoing vulnerabilities in online advertising and the need for increased cybersecurity vigilance.

BleepingComputerabout 21 hours ago·
malwaregoogle-adsclaude-ai

Police shut down reboot of Crimenetwork marketplace, arrest admin

German authorities have successfully shut down a reboot of the criminal marketplace 'Crimenetwork', which had reportedly generated over 3.6 million euros. The operation also led to the arrest of the marketplace's administrator, highlighting ongoing efforts to combat cybercrime and illegal online activities.

BleepingComputer1 day ago·
cybercrimemarketplacelaw-enforcement

JDownloader site hacked to replace installers with Python RAT malware

The JDownloader website was recently hacked, leading to the distribution of compromised installers for both Windows and Linux users. The Windows version specifically contained a Python-based remote access trojan (RAT), posing significant security risks to those who downloaded it.

BleepingComputer2 days ago·
jdownloadermalwarecyberattack

Hacking Time: Spoofing Atomic Clocks with Audio Harmonics

The article explores a novel method of spoofing atomic clocks using audio harmonics, highlighting potential vulnerabilities in timekeeping systems. This technique could have significant implications for cybersecurity and the integrity of time-sensitive applications. Researchers emphasize the need for enhanced security measures to protect against such attacks.

Hacker News2 days ago·
cybersecurityatomic-clocksspoofing

Fake OpenAI repository on Hugging Face pushes infostealer malware

A fraudulent repository on Hugging Face has been identified, masquerading as OpenAI's 'Privacy Filter' project to distribute infostealer malware targeting Windows users. This incident highlights the ongoing risks associated with open-source platforms and the importance of verifying the authenticity of software before use.

BleepingComputer2 days ago·
malwarehugging-faceopenai

Palo Alto Networks says in its testing, three weeks of frontier AI-assisted analysis matched a full year of manual penetration testing, with broader coverage (Sam Rubin/Palo Alto Networks Blog)

Palo Alto Networks has conducted tests demonstrating that three weeks of AI-assisted analysis can achieve results comparable to a full year of manual penetration testing, offering broader coverage in the process. This finding highlights the potential of frontier AI models in enhancing cybersecurity measures and efficiency in threat detection.

Techmeme2 days ago·
aipenetration-testingcybersecurity

Most Beginners Approach Bug Bounty Completely Wrong

Tariq Davis, a cybersecurity student, highlights the misconceptions surrounding bug bounty programs, particularly for beginners. He notes that much of the available information is either overly technical or assumes prior knowledge, making it difficult for newcomers to navigate. Davis aims to create a straightforward guide that demystifies the process and provides practical insights into how bug bounty programs operate.

Dev.to3 days ago·
bug-bountycybersecurityvulnerabilities

Scaling Trusted Access for Cyber with GPT‑5.5 and GPT‑5.5‑Cyber

The article discusses the advancements in trusted access solutions for cybersecurity, leveraging the capabilities of GPT-5.5 and its specialized variant, GPT-5.5-Cyber. These models aim to enhance security protocols and streamline access management in digital environments, addressing the growing complexities of cyber threats.

Hacker News3 days ago·
gpt-5.5cybersecuritytrusted-access

Security news weekly round-up - 8th May 2026

This week's security news highlights a critical vulnerability in the Apache HTTP/2 protocol, identified as CVE-2026-23918, which poses risks of denial-of-service (DoS) and potential remote code execution (RCE). The flaw, with a CVSS score of 8.8, has been addressed in version 2.4.67, but raises ongoing questions about the nature of system security and the need for proper enforcement of security measures. The article encourages readers to reflect on the complexities of securing systems in the face of such vulnerabilities.

Dev.to3 days ago·
apachehttp2vulnerability

Polish intelligence warns hackers attacked water treatment control systems

Polish intelligence has issued a warning regarding cyberattacks targeting water treatment control systems, highlighting the growing threat to critical infrastructure. These attacks underscore the vulnerabilities in essential services and the need for enhanced cybersecurity measures to protect public utilities from malicious actors.

Hacker News3 days ago·
cybersecurityhackersinfrastructure

A New Era of Security: Frontier AI Defense

The article discusses the emergence of Frontier AI Defense, a new approach to cybersecurity that leverages advanced artificial intelligence technologies to enhance security measures. This innovative defense mechanism aims to proactively identify and mitigate threats, marking a significant shift in how organizations protect their digital assets. As cyber threats evolve, the integration of AI into security protocols is becoming increasingly vital.

Hacker News3 days ago·
aicybersecuritythreat-detection

Poland says hackers breached water treatment plants, and the U.S. is facing the same threat

Poland's intelligence agency has reported that Russian hackers have breached water treatment plants, raising concerns about the security of critical infrastructure. This incident highlights a growing threat that the U.S. may also face, as cyberattacks on essential services become more prevalent. The implications of such breaches underscore the need for enhanced cybersecurity measures across both nations.

TechCrunch3 days ago·
cybersecurityhackinginfrastructure

The Subdomain Vulnerabilities Most Developers Don't Know Exist

The article highlights the prevalent issue of unmonitored ghost subdomains that pose significant security risks to organizations. Many developers and companies are unaware of the vulnerabilities associated with these forgotten subdomains, which can be easily exploited by attackers. It emphasizes the importance of identifying and managing these subdomains to enhance cybersecurity measures.

Dev.to3 days ago·
subdomainsvulnerabilitiescybersecurity

US defense contractor who sold hacking tools to Russian broker ordered to pay $10M to former employers

Peter Williams, a former cybersecurity executive, has been ordered to pay $10 million to his former employers after selling hacking tools worth $1.3 million to a Russian broker linked to the Kremlin. This case highlights significant concerns regarding cybersecurity and the potential for sensitive technologies to fall into the hands of adversarial entities.

TechCrunch3 days ago·
cybersecurityhackingdefense

Top Cybersecurity Marketers and CMOS to Follow in 2026

The article highlights influential cybersecurity marketers and CMOs to watch in 2026, showcasing their strategies and contributions to the industry. It emphasizes the importance of effective marketing in the rapidly evolving cybersecurity landscape, where awareness and education are crucial for businesses and consumers alike.

Hacker News3 days ago·
cybersecuritymarketingCMO

Mythos set off a cybersecurity 'hysteria.' Experts say threat was already here

The recent cybersecurity concerns surrounding Mythos have sparked widespread panic, but experts argue that the threats posed by such vulnerabilities have been present for some time. This situation highlights the need for organizations to remain vigilant and proactive in their cybersecurity measures, rather than reacting to isolated incidents. Understanding the ongoing risks is crucial for developing effective defense strategies.

Hacker News3 days ago·
cybersecuritymythosthreats

Why Uploading Your Bank Statement to Random PDF Compressors Is a Financial Privacy Risk

The article highlights the financial privacy risks associated with uploading sensitive documents like bank statements to random PDF compressors. Many users overlook the potential dangers of sharing their financial information, which can include personal details such as account numbers and transaction histories. This practice poses significant risks, as these documents can be exploited if they fall into the wrong hands.

Dev.to3 days ago·
financial-privacypdf-compressiondata-security

Dutch authorities take down Motherless, porn site known for sexual abuse videos

Dutch authorities have successfully taken down Motherless, a pornographic website notorious for hosting videos related to sexual abuse. This action highlights ongoing efforts to combat online exploitation and protect vulnerable individuals from abuse. The closure of such platforms underscores the importance of regulatory measures in the digital space.

Hacker News3 days ago·
online-safetysexual-abuseregulation

International cyber attack disrupts swathe of universities and schools

A significant international cyber attack has targeted numerous universities and schools, leading to widespread disruptions in educational institutions. The attack has raised concerns about the security of academic networks and the potential impact on students and faculty. Authorities are investigating the incident and urging institutions to bolster their cybersecurity measures.

Hacker News3 days ago·
cyber-attackeducationsecurity

CISA gives feds four days to patch Ivanti flaw exploited as zero-day

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent directive for federal agencies to patch a critical vulnerability in Ivanti's software, which has been actively exploited as a zero-day. Agencies are given a tight deadline of four days to implement the necessary updates to safeguard against potential attacks. This move underscores the ongoing challenges in maintaining cybersecurity within federal systems.

Hacker News3 days ago·
cisaivantizero-day

OpenAI is rolling out GPT-5.5-Cyber, a security-focused variant of the model, in a limited preview capacity to vetted cybersecurity teams (Sam Sabin/Axios)

OpenAI has announced the limited preview rollout of GPT-5.5-Cyber, a variant of its language model tailored for cybersecurity applications. This development has ignited discussions among industry leaders and policymakers regarding the potential risks of advanced AI models falling into the wrong hands, highlighting the ongoing challenges in AI governance and security.

Techmeme4 days ago·
openaigpt-5.5-cybercybersecurity

MIT Canvas goes down after cybercrime group breaches Instructure

MIT's Canvas learning management system experienced downtime following a breach by a cybercrime group targeting Instructure, the platform's parent company. The incident raises concerns about the security of educational tools and the potential impact on students and faculty relying on these systems for online learning.

Hacker News4 days ago·
cybersecurityinstructurecanvas

Cybercrime group crashes Penn's Canvas system

A cybercrime group has successfully compromised and crashed the Canvas system used by the University of Pennsylvania, disrupting online classes and administrative functions. This incident highlights ongoing vulnerabilities in educational technology platforms and raises concerns about cybersecurity measures in academic institutions.

Hacker News4 days ago·
cybercrimecanvasuniversity

Hackers deface school login pages after claiming another Instructure hack

The cybercrime group ShinyHunters has reportedly hacked Instructure once more, leading to the defacement of login pages for multiple schools that use the platform. The group left an extortion message, raising concerns about the security of educational institutions relying on Instructure's services.

TechCrunch4 days ago·
cybercrimehackingeducation

US reportedly charges Scattered Spider hacker arrested in Finland

The U.S. has reportedly filed charges against the hacker known as Scattered Spider, who was recently apprehended in Finland. This case highlights ongoing international efforts to combat cybercrime and the complexities involved in prosecuting hackers across borders.

Hacker News4 days ago·
hackercybercrimeinternational-law

More PayPal emails hijacked to deliver tech support scams

Recent reports indicate an increase in the hijacking of PayPal emails to facilitate tech support scams. Cybercriminals are exploiting compromised accounts to deceive users into providing personal information under the guise of legitimate tech support. This trend highlights the ongoing challenges in cybersecurity and the need for enhanced protective measures against such fraudulent activities.

Hacker News4 days ago·
paypalemail-hijackingtech-support-scam

60% of MD5 password hashes are crackable in under an hour

A recent study reveals that 60% of MD5 password hashes can be cracked in under an hour, highlighting significant security vulnerabilities in the use of this outdated hashing algorithm. The findings underscore the urgent need for developers and organizations to adopt stronger cryptographic practices to protect sensitive data. As cyber threats continue to evolve, reliance on MD5 poses a substantial risk to user security.

Hacker News4 days ago·
md5passwordssecurity

Hackers hack victims hacked by other hackers

A new wave of hackers is targeting victims already compromised by the cybercrime group TeamPCP. This unknown group not only breaches these systems but also expels TeamPCP and eliminates its hacking tools, raising questions about the evolving landscape of cybercrime and the motivations behind these secondary attacks.

TechCrunch4 days ago·
cybercrimehackingteamPCP

How Anthropic’s Mythos has rewritten Firefox’s approach to cybersecurity

Mozilla's security researchers have reported that Anthropic's Mythos has significantly improved the identification of high-severity bugs in Firefox, leading to a revamped approach to cybersecurity within the browser. This collaboration highlights the potential of advanced AI tools in enhancing software security and addressing vulnerabilities more effectively.

TechCrunch4 days ago·
anthropicmythosfirefox

The Intolerable Hypocrisy of Cyberlibertarianism

The article critiques the contradictions inherent in cyberlibertarianism, particularly how its advocates often promote freedom and privacy while simultaneously supporting systems that undermine these values. It explores the tension between the ideals of decentralized technology and the realities of corporate influence and government surveillance. This examination raises important questions about the true impact of cyberlibertarian principles in today's digital landscape.

Hacker News4 days ago·
cyberlibertarianismprivacyfreedom

Police arrest SMS blaster crew that sent malicious messages to thousands across Toronto

Toronto police have arrested a crew responsible for sending malicious SMS messages to thousands of residents, marking the first known instance of an SMS blaster being utilized in Canada. This incident highlights the growing concerns around cybersecurity and the potential for misuse of communication technologies in the region.

TechCrunch4 days ago·
smscybersecuritymalware

The Chinese Realtime Deepfake Software Powering Scams Around the World

A new Chinese deepfake software is being exploited globally to facilitate scams, raising significant concerns about its implications for security and trust in digital communications. This technology, which allows for the real-time creation of convincing fake videos, poses a serious threat to individuals and organizations alike. As the software becomes more accessible, the potential for misuse continues to grow, prompting calls for stricter regulations and safeguards.

Hacker News4 days ago·
deepfakescamssecurity

LLM-driven security reports disrupt coordinated disclosure

The emergence of LLM-driven security reports is transforming the landscape of coordinated disclosure in cybersecurity. These advanced models are streamlining the process of identifying and reporting vulnerabilities, potentially leading to faster resolutions and improved security practices. However, this shift raises questions about the reliability and accountability of automated reporting systems.

Hacker News4 days ago·
llmsecurityvulnerabilities

Deepfakes Are Coming for Your Bank Account

The rise of deepfake technology poses significant risks to financial security, as malicious actors could use these tools to impersonate individuals and gain unauthorized access to bank accounts. As deepfakes become more sophisticated, the potential for fraud increases, prompting a need for enhanced security measures in the banking sector. This article explores the implications of deepfake technology on personal finance and the urgent need for protective strategies.

Hacker News4 days ago·
deepfakefraudbanking

Student stops fоur Taiwan high-speed trains with software defined radios

A student successfully halted four high-speed trains in Taiwan using software-defined radios, showcasing a significant security vulnerability in the country's rail system. This incident raises concerns about the potential for similar exploits in other critical infrastructure and highlights the need for improved cybersecurity measures in transportation. The use of such technology for malicious purposes underscores the importance of safeguarding against unauthorized access to essential services.

Hacker News4 days ago·
cybersecuritysoftware-defined-radiotransportation

AI in the Breach: How an Adversary Leveraged AI to Target a Water Utility's OT

The article discusses a recent incident where an adversary utilized artificial intelligence to exploit vulnerabilities in the operational technology (OT) of a water utility. This breach highlights the growing risks associated with AI in cybersecurity, particularly in critical infrastructure sectors. It underscores the need for enhanced security measures to protect against AI-driven attacks.

Hacker News4 days ago·
aicybersecuritywater-utility

Lazarus Group Uses Git Hooks to Hide Malware

The Lazarus Group, a notorious cybercrime organization, has employed Git hooks to conceal their malware within legitimate software development processes. This innovative technique allows them to evade detection by security systems, highlighting the evolving tactics used by cybercriminals. The use of such developer tools underscores the need for enhanced security measures in software development environments.

Hacker News4 days ago·
lazarus-groupmalwaregit-hooks

Unpacking Russian-Iranian Private-Sector Cyber Connections

The article explores the growing cyber connections between Russian and Iranian private sectors, highlighting collaborations that may enhance their cyber capabilities. It discusses the implications of these partnerships for global cybersecurity and geopolitical dynamics. As both nations face international sanctions, their cooperation in technology and cyber operations is becoming increasingly significant.

Hacker News4 days ago·
cybersecurityrussiairan

ADT says customer data stolen in cyber intrusion

ADT has reported a cyber intrusion that resulted in the theft of customer data, raising concerns about the security of personal information. The incident highlights the ongoing challenges companies face in protecting sensitive data from cyber threats. ADT is likely to face scrutiny regarding its cybersecurity measures and response to the breach.

Hacker News5 days ago·
cyber-intrusiondata-breachcustomer-data

Iran cybersnoops still LARPing as ransomware crooks in espionage ops

Iranian cyber operatives are reportedly masquerading as ransomware criminals while conducting espionage activities. This tactic allows them to blend in with the growing ransomware landscape, potentially evading detection and attributing their actions to criminal motives rather than state-sponsored espionage. The dual role of these operatives highlights the evolving nature of cyber threats and the complexities of cybersecurity.

Hacker News5 days ago·
irancybersecurityespionage

DOJ says ransomware gang tapped into Russian government databases

U.S. prosecutors have revealed that a ransomware gang has infiltrated Russian government databases, contributing to corruption within the government. This access has reportedly enabled the gang's leaders to evade taxes and avoid the military draft, highlighting the intersection of cybercrime and state affairs in Russia.

TechCrunch5 days ago·
ransomwarecybercrimegovernment