360 Digital Security Group claims to have uncovered 1,000 vulnerabilities using AI, including at the Tianfu Cup hacking contest. The post Chinese Cybersecurity Firm’s AI Hacking Claims Draw Comparisons to Claude Mythos appeared first on SecurityWeek. This article has been…
Aqua Compass MCP server enables real-time investigation and containment of runtime threats
Aqua Security has announced Aqua Compass, a Model Context Protocol (MCP) server that enables agentic investigation, containment and remediation of runtime incidents, and new runtime risk dashboards. These capabilities help security teams move beyond identifying risk and focus on containing…
IP Fabric MCP server adds governance and control to enterprise AIOps workflows
IP Fabric has launched a new Model Context Protocol (MCP) server that removes key barriers to enterprise AIOps adoption, combining secure in-platform deployment with a built-in prompt library for network operations. While MCP servers and AI integrations are increasingly common,…
Apple Fixes iOS Notification Bug Exposing Deleted Messages
Apple patches iOS flaw that retained deleted notifications, exposing message data This article has been indexed from www.infosecurity-magazine.com Read the original article: Apple Fixes iOS Notification Bug Exposing Deleted Messages
New Attacks on AI Assistants
Cybersecurity researchers at Forcepoint have identified a new type of attack targeting AI assistants, specifically focusing on GitHub Copilot. This article has been indexed from CyberMaterial Read the original article: New Attacks on AI Assistants
Trigona Ransomware Uses Custom Exfiltration Tool
The Trigona ransomware group has adopted a new strategy by employing a custom-developed tool for data exfiltration in their recent attacks. This article has been indexed from CyberMaterial Read the original article: Trigona Ransomware Uses Custom Exfiltration Tool
Rituals Discloses Data Breach
Luxury cosmetics brand Rituals has announced a data breach that has compromised the personal information of its My Rituals members. This article has been indexed from CyberMaterial Read the original article: Rituals Discloses Data Breach
Checkmarx Supply Chain Security Incident
Checkmarx has reported a supply chain security incident affecting several of its products, including DockerHub KICS images, GitHub actions, and VS Code extensions. This article has been indexed from CyberMaterial Read the original article: Checkmarx Supply Chain Security Incident
Cyber-Attacks Surge 63% in Education Sector
Educational institutions globally are facing a significant surge in cyber-attacks, with a 63% increase in incidents over the past year, as reported by Quorum Cyber. This article has been indexed from CyberMaterial Read the original article: Cyber-Attacks Surge 63% in…
IT Security News Hourly Summary 2026-04-23 15h : 11 posts
11 posts were published in the last hour 12:32 : Hackers Use Outlook Mailboxes to Hide Linux GoGra Backdoor Communications 12:32 : Hybrid clouds have two attack surfaces and you’re not paying enough attention to either 12:32 : Google brings…
Hackers Use Outlook Mailboxes to Hide Linux GoGra Backdoor Communications
A nation-state-linked hacking group has found a clever way to hide its malicious activity inside Microsoft Outlook mailboxes, making its attacks much harder to detect by standard security tools. The Harvester APT group, believed to be a nation-state-backed threat actor…
Hybrid clouds have two attack surfaces and you’re not paying enough attention to either
Windows Admin Center flaws mean on-prem can attack cloud, and vice-versa Black Hat Asia Israeli researchers found a series of flaws in Microsoft’s Windows Admin Center (WAC) and suggest this shows hybrid cloud management tools are a two-way attack surface…
Google brings instant email verification to Android, no OTP needed
Google has introduced cryptographically verified email credentials for Android through the Credential Manager API. This API aligns with the W3C Digital Credential API standard. It provides a unified way for apps to request and retrieve user credentials for authentication and…
Project Glasswing Proved AI Can Find the Bugs. Who’s Going to Fix Them?
Last week, Anthropic announced Project Glasswing, an AI model so effective at discovering software vulnerabilities that they took the extraordinary step of postponing its public release. Instead, the company has given access to Apple, Microsoft, Google, Amazon, and a coalition…
[Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speed
Imagine a world where hackers don’t sleep, don’t take breaks, and find weak spots in your systems instantly. Well, that world is already here. Thanks to AI, attackers are now launching automated, large-scale exploits faster than ever before. The time…
GitLab Fixes Flaws That Could Allow Attackers to Hijack User Sessions
GitLab has released emergency security patches addressing 11 vulnerabilities across its Community Edition (CE) and Enterprise Edition (EE), including three high-severity flaws that could allow attackers to execute malicious code, forge requests, and steal user session tokens. On April 22, 2026,…
Surveillance vendors caught abusing access to telcos to track people’s phone locations, researchers say
The Citizen Lab found two separate surveillance vendors abusing the backbone of cellular networks to spy on several victims across the world. This article has been indexed from Security News | TechCrunch Read the original article: Surveillance vendors caught abusing…
NIS-2 in Practice: How a Managed SOC Supports Compliance with Regulatory Requirements
Implementing the requirements of the NIS 2 Directive involves more than just introducing new tools: it requires effective processes, continuous monitoring of IT systems, and specialized IT security expertise. This is precisely where the challenge lies for many companies. A…
Rogue users allegedly access Anthropic’s restricted Claude Mythos model
Unsanctioned users have allegedly accessed Anthropic’s controversial Claude Mythos Preview AI frontier model although the company has limited the businesses that can use it. The group, who have yet to be named, had apparently made many attempts to access Mythos since it debuted earlier this month. They finally gained access via a…
Rilian Raises $17.5 Million for AI-Native Security Orchestration
The company will hire new talent and expand operations across the US and other allied countries. The post Rilian Raises $17.5 Million for AI-Native Security Orchestration appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Google Introduces Unique AI Agent Identities in New Gemini Enterprise Platform
Google Cloud will attribute a unique cryptographic ID every AI agent that will be tied to “traceable and auditable” authorization policies This article has been indexed from www.infosecurity-magazine.com Read the original article: Google Introduces Unique AI Agent Identities in New…
Outlook Mailboxes Abused to Conceal Linux GoGra Backdoor Traffic
The Harvester APT group has quietly expanded its espionage arsenal with a new Linux variant of its GoGra backdoor, one that cleverly hides its command-and-control (C2) traffic within Microsoft Outlook mailboxes, making it significantly harder to detect with traditional network…
Defending Against China-Nexus Covert Networks of Compromised Devices
Defending against china-nexus covert networks of compromised devices executive summary Defending against China-nexus covert networks of compromised devices Explaining the widespread shift in tactics, techniques and procedures (TTPs) towards networks of compromised infrastructure, and how to defend against it Summary…
FBI Extracts Deleted Signal Messages from iPhone Notification Database
404 Media reports (alternate site): The FBI was able to forensically extract copies of incoming Signal messages from a defendant’s iPhone, even after the app was deleted, because copies of the content were saved in the device’s push notification database….…