Phishing returned as the leading method attackers used to break into organizations in the first quarter of 2026, accounting for over a third of engagements where initial access could be determined, according to Cisco Talos. It is the first quarter…
Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug
Microsoft has released out-of-band updates to address a security vulnerability in ASP.NET Core that could allow an attacker to escalate privileges. The vulnerability, tracked as CVE-2026-40372, carries a CVSS score of 9.1 out of 10.0. It’s rated Important in severity.…
IR Trends Q1 2026: Phishing reemerges as top initial access vector, as attacks targeting public administration persist
Phishing reemerged as the most observed means of gaining initial access, accounting for over a third of the engagements where initial access could be determined. Phishing has not been the top vertical for initial access since Q2 2025. This article has been indexed from Cisco…
When Wi-Fi Encryption Fails: Protecting Your Enterprise from AirSnitch Attacks
Unit 42 research reveals AirSnitch attacks bypass WPA2/3 Wi-Fi encryption and client isolation, exposing critical infrastructure vulnerabilities. The post When Wi-Fi Encryption Fails: Protecting Your Enterprise from AirSnitch Attacks appeared first on Unit 42. This article has been indexed from…
UK Tribunal Approves Microsoft Mass Cloud Lawsuit
UK Competition Appeal Tribunal says Microsoft must face mass lawsuit alleging overcharging for cloud software This article has been indexed from Silicon UK Read the original article: UK Tribunal Approves Microsoft Mass Cloud Lawsuit
Microsoft warns of fake IT worker identities infiltrating cloud environments
Microsoft is warning that North Korea‑aligned group Jasper Sleet is abusing remote hiring to slip fake IT workers into cloud environments by posing as legitimate staff and then abusing trusted access. Since the pandemic, many companies hire globally, verify identities…
1,370+ Microsoft SharePoint Servers Vulnerable to Spoofing Attacks Exposed Online
A critical spoofing vulnerability in Microsoft SharePoint Server, tracked as CVE-2026-32201, remains unpatched on over 1,370 internet-facing IP addresses worldwide, according to fresh scanning data from the Shadowserver Foundation, even as the flaw sits on CISA’s Known Exploited Vulnerabilities (KEV)…
Critical Atlassian Bamboo Data Center and Server Flaw Enables Command Injection Attacks
Atlassian has disclosed two significant security vulnerabilities affecting its Bamboo Data Center and Server product, including a critical OS command injection flaw and a high-severity denial-of-service issue tied to a third-party dependency. Organizations running affected versions are strongly urged to…
Google Antigravity in Crosshairs of Security Researchers, Cybercriminals
Researchers discovered a remote code execution vulnerability and cybercriminals are using its reputation to deliver malware. The post Google Antigravity in Crosshairs of Security Researchers, Cybercriminals appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Researchers Uncover ProxySmart Software Powering 90+ SIM Farms
Infrawatch says ProxySmart platform enables SIM farm activity at “industrial scale” This article has been indexed from www.infosecurity-magazine.com Read the original article: Researchers Uncover ProxySmart Software Powering 90+ SIM Farms
IT Security News Hourly Summary 2026-04-22 12h : 5 posts
5 posts were published in the last hour 9:36 : Wall Street Law Firm Apologises For AI Errors 9:7 : China Delivery Giants Fined £390m After Violent Clashes 9:7 : Auraboros RAT Adds Live Audio, Keylogging, and Cookie Theft via…
Wall Street Law Firm Apologises For AI Errors
Elite New York law firm Sullivan & Cromwell apologises to federal judge after fabricated AI content found in legal filing This article has been indexed from Silicon UK Read the original article: Wall Street Law Firm Apologises For AI Errors
China Delivery Giants Fined £390m After Violent Clashes
Market regulator imposes record fines on seven major delivery platforms as intense competition leads to violent tactics This article has been indexed from Silicon UK Read the original article: China Delivery Giants Fined £390m After Violent Clashes
Auraboros RAT Adds Live Audio, Keylogging, and Cookie Theft via Open C2 Panel
A fully exposed command-and-control (C2) panel for a previously undocumented remote access trojan (RAT) framework dubbed Auraboros, supporting live audio streaming, intensive keylogging, browser credential theft, and multi-cookie hijacking all accessible over the internet with zero authentication. Further inspection revealed “Auraboros…
CrowdStrike LogScale Vulnerability Allows Remote Attackers to Read Arbitrary Files from Server
CrowdStrike has issued an urgent security advisory for a critical unauthenticated path-traversal vulnerability (CVE-2026-40050) affecting its LogScale platform, warning that a remote attacker could exploit the flaw to read arbitrary files directly from the server’s filesystem without authentication. The vulnerability…
Oracle Patches 450 Vulnerabilities With April 2026 CPU
The company released 481 new security patches across 28 product families, including over 300 fixes for remotely exploitable, unauthenticated flaws. The post Oracle Patches 450 Vulnerabilities With April 2026 CPU appeared first on SecurityWeek. This article has been indexed from…
Chips With Everything: Securing the Silicon Future
Semiconductor shortages demand long-term strategy. Explore resilience, AI forecasting, supply diversification, and emerging risks shaping global supply. This article has been indexed from Silicon UK Read the original article: Chips With Everything: Securing the Silicon Future
Florida Opens Criminal Probe Into OpenAI
Florida attorney general says criminal investigation justified by mass shooting suspect’s use of ChatGPT to explore tactics This article has been indexed from Silicon UK Read the original article: Florida Opens Criminal Probe Into OpenAI
Oil crisis? What oil crisis? IT spending de-coupled from wider war shock
Gartner sees accelerating growth in IT spending, powered by cloud and AI infrastructure investment A day after the International Energy Agency (IEA) said the US/Israel/Iran war was creating the worst energy crisis ever faced by the world, Gartner increased its…
Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape
A critical security vulnerability has been disclosed in a Python-based sandbox called Terrarium that could result in arbitrary code execution. The vulnerability, tracked as CVE-2026-5752, is rated 9.3 on the CVSS scoring system. “Sandbox escape vulnerability in Terrarium allows arbitrary…
Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles
Cybersecurity researchers have discovered a new variant of a known malware called LOTUSLITE that’s distributed via a theme related to India’s banking sector. “The backdoor communicates with a dynamic DNS-based command-and-control server over HTTPS and supports remote shell access, file…
UK Faces a Cyber ‘Perfect Storm’ Driven by Tech Advances and Nation State Threats, NCSC Warns
The convergence of global tensions and rapid technological change is driving a new era of cyber risk, the NCSC warns This article has been indexed from www.infosecurity-magazine.com Read the original article: UK Faces a Cyber ‘Perfect Storm’ Driven by Tech…
Blue Origin’s New Glenn Grounded After Satellite Failure
New Glenn rocket launches suspended as company and FAA investigate failure that resulted in destruction of communications satellite This article has been indexed from Silicon UK Read the original article: Blue Origin’s New Glenn Grounded After Satellite Failure
DinDoor Backdoor Exploits Deno and MSI Installers to Slip Past Detection
DinDoor is a newly documented backdoor that abuses the Deno JavaScript runtime and MSI installer files to execute attacker‑controlled code while sidestepping traditional detection controls quietly. Hiding behind trusted runtimes and common Windows tooling gives threat actors a flexible way…