Hackers Exploit Critical Langflow Bug in Just 20 Hours Information Security Magazine 2 days 16 hours ago Sysdig details how threat actors exploited a critical CVE in Langflow in less than a day
NCA Boss Warns That Teens Are Being “Radicalized” Into Cybercrime Online Information Security Magazine 2 days 17 hours ago The National Crime Agency’s director general warns that technology is rapidly reshaping crime
Ransomware Affiliate Exposes Details of 'The Gentlemen' Operation Information Security Magazine 3 days 10 hours ago Hastalamuerte leaks The Gentlemen RaaS ops: FortiGate exploits, BYOVD evasion, Qilin split tactics
Financial Brands Targeted in Global Mobile Banking Malware Surge Information Security Magazine 3 days 12 hours ago Mobile banking malware targets over 1200 financial apps globally, shifting fraud to user devices
FCA Updates Cyber Incident and Third-Party Reporting Rules Information Security Magazine 3 days 16 hours ago The UK’s financial regulator has issued new rules to make incident and third-party reporting clearer
AWS Warns Hackers Have Abused Cisco Firewall Zero-Day Since January Information Security Magazine 3 days 17 hours ago Notorious ransomware group Interlock has been exploiting a Cisco zero-day bug since January, AWS says
UK: Regulation Drives Cyber Spending for Critical Infrastructure Orgs Information Security Magazine 3 days 17 hours ago 35% of security leaders working in the UK’s critical infrastructure said regulatory requirements are the primary influence on their security programs
New Ubuntu Flaw Enables Local Attackers to Gain Root Access Information Security Magazine 4 days 11 hours ago CVE-2026-3888 Ubuntu snap flaw lets local users escalate to root via timing-based exploit
Crypto Scam "ShieldGuard" Dismantled After Malware Discovery Information Security Magazine 4 days 12 hours ago ShieldGuard Chrome extension posed as a crypto security tool but stole wallets and drained user data
AI-Enabled Adversaries Compress Time-to-Exploit Following Vulnerability Disclosure Information Security Magazine 4 days 13 hours ago Rapid7 says median time from publication to CISA KEV inclusion dropped to five days
Vidar Stealer 2.0 Exploits GitHub, Reddit to Deliver Malware via Fake Game Cheats Information Security Magazine 4 days 15 hours ago The Vidar 2.0 infostealers is deployed through fake free game cheats on GitHub and Reddit
AI Issues Will Drive Half of Incident Response Efforts by 2028, Says Gartner Information Security Magazine 4 days 17 hours ago Gartner has urged security teams to get involved in AI projects from the start to avoid costly incident response
Android OS-Level Attack Bypasses Mobile Payment Security Information Security Magazine 5 days 10 hours ago Android’s LSPosed-based attack hijacks payment apps via runtime manipulation and SIM-binding bypass
'CursorJack’ Attack Path Exposes Code Execution Risk in AI Development Environment Information Security Magazine 5 days 11 hours ago CursorJack shows how malicious MCP deeplinks in Cursor IDE can trigger user-approved code execution
Surge in Nation State Attacks on UK Firms Amid Cyber Warfare Fears Information Security Magazine 5 days 14 hours ago Armis reveals that “mutually assured disruption” is no longer preventing state-backed attacks
Average Number of Daily API Attacks Up 113% Annually Information Security Magazine 5 days 16 hours ago Akamai says 87% of organizations suffered an API-related security incident last year
UK Cyber Monitoring Centre Sets Its Sights on US Expansion One Year After Launch Information Security Magazine 5 days 16 hours ago The US Cyber Monitoring Center should be operational in 2027, said the UK CMC leadership
Researchers Warn of Global Surge in Fake Shipment Tracking Scams Information Security Magazine 6 days 12 hours ago Some of these campaigns are linked to Darcula, a Chinese-language phishing-as-a-service platform
CrackArmor Flaws Expose Linux Systems to Privilege Escalation Information Security Magazine 6 days 12 hours ago CrackArmor AppArmor flaws let local Linux users gain root, break containers and enable DoS attacks
Security Flaw in AWS Bedrock Code Interpreter Raises Alarms Information Security Magazine 6 days 13 hours ago DNS-based attack in AWS Bedrock AgentCore lets AI sandboxes exfiltrate cloud data