*Total Post : 15785 Cybersecurity News (auto update every day)
-
Discord migrates all users to end-to-end encryption by default
Discord announced that voice and video messages will now be end-to-end encrypted by default, with no opt-in required, across nearly all surfaces except stage channels. The move follows a broader industry split, as some platforms drop encryption while Google and Apple expand it, and Discord highlights its ability to support encrypted…
-
Highly Critical Drupal Core Flaw Exposes PostgreSQL Sites to RCE Attacks
Drupal has released security updates for CVE-2026-9082, a critical flaw in Drupal Core that can enable SQL injection on PostgreSQL-backed sites and may lead to information disclosure, privilege escalation, or remote code execution. The issue affects only Drupal sites using PostgreSQL and can be exploited by anonymous users, with fixes available…
-
GitHub Internal Repositories Breached via Malicious Nx Console VS Code Extension
GitHub confirmed its internal repositories were breached through an employee device compromised by a poisoned Nx Console VS Code extension, linked to the broader TanStack supply chain attack. The short-lived malicious extension was used by TeamPCP to steal credentials from developer systems and access sensitive services, prompting GitHub to rotate secrets…
-
Ukraine probes teen suspect in cyber theft scheme targeting California online shoppers
Ukrainian authorities say an 18-year-old suspect from Odesa is linked to an international cybercrime operation that compromised nearly 30,000 customer accounts at a U.S.-based online retailer and facilitated unauthorized purchases worth about $721,000. Investigators allege the group used info-stealing malware to harvest credentials and session data, then sold the stolen information…
-
FTC warns 12 major tech firms of violating Take It Down Act
The FTC has warned 12 major tech companies that they are not yet complying with the Take It Down Act, which requires platforms to provide an easy process for victims to request removal of nonconsensual intimate images within 48 hours. The agency said companies like Alphabet, Meta, X, and TikTok must…
-
Webworm Deploys EchoCreep and GraphWorm Backdoors Using Discord and MS Graph API
Webworm, a China-aligned threat actor active since at least 2022, has expanded its 2025 toolkit with EchoCreep and GraphWorm backdoors that use Discord and Microsoft Graph API for stealthy C2 communications. The group continues targeting government and enterprise victims across Asia and Europe while relying on custom proxies, SoftEther VPN, and…
-
Cybersecurity News | Daily Recap [20 May 2026]
Daily Recap, GitHub confirmed multiple internal repository compromises tied to a malicious VS Code extension, with claims of roughly 3,800–4,000 affected repositories and source code exposure impacting Grafana via a TanStack npm attack. The roundup also covered the Shai-Hulud npm supply-chain campaign targeting 600 packages (with Mini Shai-Hulud expanding further), plus Microsoft disruption of a malware-signing service linked to Fox Tempest, alongside fixes and advisories across Windows, Azure, Drupal, ChromaDB, Linux, and major fraud cases. #VSCode #Grafana #TanStack #TanStacknpm #ShaiHulud #MiniShaiHulud #FoxTempest #YellowKey #Drupal #ChromaDB #PinTheft #Trapdoor #ShinyHunters #7Eleven #Luxembourg #Huawei #CISA #Discord #DBIR2026
-
Identity Alone Isn’t Enough: Why Device Security Has to Share the Load
Identity-based security is no longer enough because attackers can steal session tokens, bypass MFA, and exploit trusted logins in real time. The article argues that Zero Trust must combine continuous identity verification with device trust to ensure access stays tied to a healthy, approved endpoint. #NISTSP800-207 #SpecopsDeviceTrust #SpecopsSoftware
-
Hackers bypass SonicWall VPN MFA due to incomplete patching
Threat actors brute-forced SonicWall Gen6 SSL-VPN credentials, bypassed MFA via CVE-2024-12802, and used the access to conduct reconnaissance and prepare ransomware-related tooling. ReliaQuest found the intrusions were likely carried out by an access broker, while SonicWall said Gen6 devices require more than a firmware update to fully fix the issue. #SonicWall #CVE-2024-12802 #ReliaQuest #CobaltStrike #Akira
-
Ukraine identifies infostealer operator tied to 28,000 stolen accounts
Ukrainian cyberpolice, working with U.S. law enforcement, identified an 18-year-old suspect from Odesa in an infostealer operation that targeted users of a California online store. The scheme allegedly stole browser sessions and credentials from 28,000 accounts, leading to unauthorized purchases and substantial losses. #Odesa #California #Infostealer #Telegram
-
Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks
Microsoft disrupted Fox Tempest’s malware-signing-as-a-service operation, OpFauxSign, which abused Artifact Signing to distribute trusted-looking malicious code and support ransomware activity worldwide. The scheme enabled signed malware and loaders such as Rhysida, Oyster, Lumma Stealer, and Vidar to evade defenses and target healthcare, education, government, and financial organizations. #FoxTempest #OpFauxSign #ArtifactSigning #Rhysida…
-
Microsoft Open-Sources RAMPART and Clarity to Secure AI Agents During Development
Microsoft has released two open-source tools, RAMPART and Clarity, to help developers test and shape the security of AI agents earlier in the development process. RAMPART focuses on Pytest-native safety testing and red teaming, while Clarity helps teams clarify design intent, assumptions, and decision-making before code is written. #Microsoft #RAMPART #Clarity…
-
Meet Rampart and Clarity, Microsoft’s new red team combo AI agents
Microsoft introduced Rampart and Clarity to help developers build more secure agentic software and to support incident responders during active breaches. Rampart continuously tests code for exploitable bugs and cross-prompt injection risks, while Clarity gives real-time security guidance and design-time risk analysis for AI-driven projects. #Rampart #Clarity #PyRIT #Microsoft
-
AI-Powered App Attacks Are Faster, More Frequent and Harder to Stop
AI, especially agentic AI, is rapidly reshaping app security by lowering the skill and cost needed for attackers to target more applications, including iOS and Android. Digital.ai’s 2026 report shows attack rates rising sharply across client-facing, automotive, and medical device apps, with the window from app release to first attack now…
-
Microsoft Rolls Out Mitigations for ‘YellowKey’ BitLocker Bypass
Microsoft has released mitigations for YellowKey, a public zero-day exploit that can bypass BitLocker protection on Windows systems with physical access. The flaw, tracked as CVE-2026-45585, allows an attacker using a USB drive and recovery mode to spawn a shell and access encrypted data. #YellowKey #CVE-2026-45585 #BitLocker #WinRE…
-
Quantum Bridge Raises $8 Million for Quantum-Safe Key Distribution Solution
Quantum Bridge, a Toronto-based company, raised $8 million in Series A funding to advance its quantum-safe key distribution platform, bringing total funding to $16 million. Its SDS product combines DSKE, post-quantum cryptography, and quantum key distribution to protect sectors like government, defense, finance, critical infrastructure, and communications. #QuantumBridge #DSKE #SDS…
-
Grafana breach caused by missed token rotation after TanStack attack
Grafana says its breach stemmed from a single GitHub workflow token that was missed during rotation after the TanStack npm supply-chain attack, allowing attackers to access private repositories and steal source code. The incident was tied to the Shai-Hulud malware campaign attributed to TeamPCP, though Grafana says no customer production systems or data were compromised. #Grafana #TanStack #ShaiHulud #TeamPCP
-
GitHub says internal repositories were impacted in poisoned VS Code extension attack
GitHub said internal repositories were exfiltrated after an employee device was compromised through a poisoned Visual Studio Code extension, and it has since contained the incident, removed the malicious version, and rotated critical secrets. The case highlights how third-party developer tools can expose source code, credentials, and build systems, with TeamPCP’s claims and the broader wave of attacks on software ecosystems underscoring the risk. #GitHub #VisualStudioCode #TeamPCP
-
Microsoft shares mitigation for YellowKey Windows zero-day
Microsoft has issued mitigations for YellowKey, a newly disclosed Windows BitLocker zero-day tracked as CVE-2026-45585 that can let attackers access protected drives. The flaw was publicly revealed by Nightmare Eclipse, who also disclosed other zero-days including BlueHammer, RedSun, GreenPlasma, and UnDefend. #YellowKey #CVE-2026-45585 #NightmareEclipse #BlueHammer #RedSun #GreenPlasma #UnDefend
-
GitHub confirms breach of 3,800 repos via malicious VSCode extension
GitHub confirmed that about 3,800 internal repositories were exfiltrated after an employee installed a malicious VS Code extension, and the company removed the trojanized add-on and secured the affected device. TeamPCP claimed responsibility for the access and attempted to sell the stolen GitHub source code and private repositories, but GitHub said there is no evidence customer data outside the affected repos was impacted. #GitHub #VSCode #TeamPCP
Cybersecurity News Sources
This site will aggregate Cybersecurity News from this sources:
- securityonline.info
- bleepingcomputer.com
- thehackernews.com
- darkreading.com
- + News from Cyware (Currated by Cyware)
- + Latest 100 cyberattacks referenced by Valéry Marchive
- + News from Immuniweb (Cybercrime Investigation and Prosecution)
- + Other hundreds of News Portal

Reference for Security News
Sorted by estimated “Number of Articles” per week. a/w = articles / week.
- malware.news (260 a/w)
- securityboulevard.com (140 a/w)
- ScMagazine.com (70 a/w)
- DarkReading.com (58 a/w)
- BankInfoSecurity.com (48 a/w)
- bleepingcomputer.com (47 a/w)
- CySecurity.news (40 a/w)
- SecurityWeek.com (40 a/w)
- BleepingComputer.com (40 a/w)
- Thecyberexpress.com (34 a/w)
- TheHackerNews.com.com (32 a/w)
- HelpNetSecurity.com (32 a/w)
- PacketStormSecurity.org (30 a/w)
- SecurityAffairs.com (29 a/w)
- Therecord.media (29 a/w)
- TheRegister.com (28 a/w)
- Infosecurity-Magazine.com (26 a/w)
- Securityonline.info (69 a/w)
- Csoonline.com/asean/security/ (19 a/w)
- Hackread.com (19 a/w)
- MalwareBytes.org (14 a/w)
- Cybersecuritydive.com (12 a/w)
- CyberScoop.com (11 a/w)
- Techrepublic.com/topic/security/ (11 a/w)
- ITSecurityGuru.org (9 a/w)
- Zdnet.com/topic/security/ (8 a/w)
- TripWire.com (6 a/w)
- Arstechnica.com/security/ (5 a/w)
- Latesthackingnews.com (5 a/w)
- Asec.ahnlab.com (4 a/w)
- Blog.polyswarm.io (3 a/w)
- Kroll.com/en/ (3 a/w)
- Mandiant.com (2 a/w)
- Bitdefender.com/blog/labs/ (1 a/w)
Check this also :
Update November 2024
“I have launched several social media platforms for updates on Security News”