Found 37294 bookmarks
Newest
Critical infra Honeywell CCTVs vulnerable to auth bypass flaw
Critical infra Honeywell CCTVs vulnerable to auth bypass flaw
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning of a critical vulnerability in multiple Honeywell CCTV products that allows unauthorized access to feeds or account hijacking.
·bleepingcomputer.com·
Critical infra Honeywell CCTVs vulnerable to auth bypass flaw
Notepad++ patches flaw used to hijack update system
Notepad++ patches flaw used to hijack update system
Notepad++ patched a vulnerability that attackers used to hijack its update system and deliver malware to targeted users.
·securityaffairs.com·
Notepad++ patches flaw used to hijack update system
AI platforms can be abused for stealthy malware communication
AI platforms can be abused for stealthy malware communication
AI assistants like Grok and Microsoft Copilot with web browsing and URL-fetching capabilities can be abused to intermediate command-and-control (C2) activity.
·bleepingcomputer.com·
AI platforms can be abused for stealthy malware communication
Github tente d'apaiser la colère des modérateurs open-source face à l'IA - Numerama
Github tente d'apaiser la colère des modérateurs open-source face à l'IA - Numerama
Dans un article publié le 18 février 2026, le média britannique The Register revient sur l'exaspération de nombreux modérateurs open source confrontés au fait de devoir vérifier et corriger des demandes de modification de code boostées par IA. Une gronde qui pousse bon nombre de projets à adopter des mesures de
·numerama.com·
Github tente d'apaiser la colère des modérateurs open-source face à l'IA - Numerama
Microsoft: Anti-phishing rules mistakenly blocked emails, Teams messages
Microsoft: Anti-phishing rules mistakenly blocked emails, Teams messages
Microsoft says an Exchange Online issue that mistakenly quarantined legitimate emails last week was triggered by faulty heuristic detection rules designed to block credential phishing campaigns.
·bleepingcomputer.com·
Microsoft: Anti-phishing rules mistakenly blocked emails, Teams messages
Telegram channels expose rapid weaponization of SmarterMail flaws
Telegram channels expose rapid weaponization of SmarterMail flaws
Underground Telegram channels shared SmarterMail exploit PoCs and stolen admin credentials within days of disclosure. Flare explains how monitoring these communities reveals rapid weaponization of CVE-2026-24423 and CVE-2026-23760 tied to ransomware activity.
·bleepingcomputer.com·
Telegram channels expose rapid weaponization of SmarterMail flaws
Threat groups using AI to speed up and scale cyberattacks
Threat groups using AI to speed up and scale cyberattacks
A report from Palo Alto Networks finds hackers are increasingly using stolen identities and exploiting critical vulnerabilities within minutes of disclosure.
·cybersecuritydive.com·
Threat groups using AI to speed up and scale cyberattacks
Building a faster YARA engine in pure Go
Building a faster YARA engine in pure Go
We built a pure Go YARA engine that's 6.8x faster for text-based scanning, with no C dependencies. It now processes over 57,000 scans per day in production, ...
·sansec.io·
Building a faster YARA engine in pure Go
Data breach at fintech firm Figure affects nearly 1 million accounts
Data breach at fintech firm Figure affects nearly 1 million accounts
Hackers have stolen the personal and contact information of nearly 1 million accounts after breaching the systems of Figure Technology Solutions, a self-described blockchain-native financial technology company.
·bleepingcomputer.com·
Data breach at fintech firm Figure affects nearly 1 million accounts
Objective-See: Blog
Objective-See: Blog
Posts about macOS malware, exploits, and tools
·objective-see.org·
Objective-See: Blog
Token Sprawl in the AI Era | CSA
Token Sprawl in the AI Era | CSA
Explore how AI accelerates token sprawl, why legacy IAM struggles, and practical steps to shrink non-human identity risk.
·cloudsecurityalliance.org·
Token Sprawl in the AI Era | CSA
The Playbook For Organized Cybercrime
The Playbook For Organized Cybercrime
This week in cybersecurity from the editors at Cybercrime Magazine
·cybersecurityventures.com·
The Playbook For Organized Cybercrime
Objective-See: Blog
Objective-See: Blog
Posts about macOS malware, exploits, and tools
·objective-see.org·
Objective-See: Blog
“Good enough” emulation: Fuzzing a single thread to uncover vulnerabilities
“Good enough” emulation: Fuzzing a single thread to uncover vulnerabilities
A Talos researcher used targeted emulation of the Socomec DIRIS M-70 gateway’s Modbus thread to uncover six patched vulnerabilities, showcasing efficient tools and methods for IoT security testing.
·blog.talosintelligence.com·
“Good enough” emulation: Fuzzing a single thread to uncover vulnerabilities
Microsoft says bug causes Copilot to summarize confidential emails
Microsoft says bug causes Copilot to summarize confidential emails
Microsoft says a Microsoft 365 Copilot bug has been causing the AI assistant to summarize confidential emails since late January, bypassing data loss prevention (DLP) policies that organizations rely on to protect sensitive information.
·bleepingcomputer.com·
Microsoft says bug causes Copilot to summarize confidential emails
AI Found Twelve New Vulnerabilities in OpenSSL - Schneier on Security
AI Found Twelve New Vulnerabilities in OpenSSL - Schneier on Security
The title of the post is”What AI Security Research Looks Like When It Works,” and I agree: In the latest OpenSSL security release> on January 27, 2026, twelve new zero-day vulnerabilities (meaning unknown to the maintainers at time of disclosure) were announced. Our AI system is responsible for the original discovery of all twelve, each found and responsibly disclosed to the OpenSSL team during the fall and winter of 2025. Of those, 10 were assigned CVE-2025 identifiers and 2 received CVE-2026 identifiers. Adding the 10 to the three we already found in the ...
·schneier.com·
AI Found Twelve New Vulnerabilities in OpenSSL - Schneier on Security