42585
Be Cyber Aware. Our vacancies channel: @CyberSecurityJobs Our chat: t.me/cybersecuritynewschat LinkedIn: https://www.linkedin.com/company/securitynews/ Facebook: https://www.facebook.com/BreakingCyberSecNews 📩 Cooperation: @cybersecadmin
GPUBreach Exploit: How Hackers Can Hijack Your System Using Just a GPU
New research reveals the GPUBreach attack, which exploits GPU memory (Rowhammer) to escalate privileges and fully compromise systems — affecting major vendors like NVIDIA, AMD, and Qualcomm.
@Cyber_Security_Channel
⚠️ Is Your SOC Chasing Metrics or Actually Stopping Attackers?
A clean dashboard often hides messy workflows and gaps you didn't know you had.
If you’re only looking at incident counts, you’re missing the blind spots where real risks stay hidden.
Expose what your metrics miss and speed up decisions with evidence-driven analysis.
👉 See how ANY.RUN fits your SOC
-----
#ad #paidpromotion #sponsored
@Cyber_Security_Channel
US Nationals Sentenced for Running North Korean IT Worker Infiltration Scheme
Two New Jersey residents, Kejia Wang and Zhenxing Wang, have been sentenced to 9 years and 92 months respectively for operating a massive scheme that placed North Korean operatives inside American companies.
The pair ran shell companies — Hopana Tech, Tony WKJ, and Independent Lab — and maintained domestic laptop farms to help DPRK operatives secure remote jobs under stolen identities of at least 80 US residents.
The scheme infiltrated more than 100 US companies across 27 states and Washington D.C., including multiple Fortune 500 firms, funneling over $5 million in illicit revenue to North Korea between 2021 and October 2024.
Affected companies incurred over $3 million in remediation and legal costs, and the two defendants were ordered to forfeit a combined $600,000.
The sentencing details were reported by CyberScoop.
@Cyber_Security_Channel
Join the Webinar: Web, Mobile & Cloud Penetration Testing in 2026. Best Practices to enhance your ImmuniWeb® AI Platform skills, earn CPE credits, and become ImmuniWeb® Certified Professional.
✔️ Key Insights:
• Pitfalls & best practices
• Legal & regulatory landscape
• Risks & benefits of automated pen-testing
• Testing LLMs and AI-powered applications for vulnerabilities
• OWASP Top 10 for LLM: who pays for AI failures
• Red teaming, continuous breach & attack simulation (CBAS)
• Leveraging MITRE ATT&CK Matrix for pen-testing
• Continuous vs one-time pen-testing
• External vs in-house pen-testing
• ImmuniWeb pen-testing products
Date & Time: April 23 at 10am and 5pm CEST
Host: Dr. Ilia Kolochenko, CEO & Chief Architect at ImmuniWeb, Attorney-at-Law.
✅ Register Now:
Session 1 – April 23, 2026 – Geneva 10am | Dubai 1pm | Singapore 5pm
👉 Click here.
Session 2 – April 23, 2026 – Geneva 5pm | New York 11am | California 8am
👉 Click here.
-----
#ad #paidpromotion #sponsored
@Cyber_Security_Channel
Mercor-LiteLLM Cyberattack Report
This is a pretty significant supply-chain incident for the AI space.
The fact that Lapsus$ is back and claiming terabytes of data while Mercor says they contained it creates some tension in the narrative.
Worth keeping an eye on how this unfolds for other LiteLLM users.
@Cyber_Security_Channel
LinkedIn Scanning Your Files? The Viral Claim That Has Everyone Talking
Rumors swirl that LinkedIn secretly scans your computer via Chrome-based browsers.
While widely shared, LinkedIn and Microsoft deny it, and no proof has surfaced. Stay informed, stay skeptical.
@Cyber_Security_Channel
⚡️Business Risk Reaches Critical Levels When Alerts from Windows, Linux, macOS, and Android Require Different Triage Paths to Reach a Verdict
Each system introduces its own triage flow. Each alert takes longer to confirm. And MTTR stretches to hours.
Interactive sandboxing changes this.
It allows analysts to quickly check files and URLs in any environment, reach verdicts in seconds, and reduce investigation time to minutes.
👉 Reduce MTTR, confirm threats faster, escalate less, and limit business risk: all available here.
-----
#ad #paidpromotion #sponsored
@Cyber_Security_Channel
⚡️Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack
In a statement shared with Reuters, the FBI confirmed Patel's emails had been targeted, and noted necessary steps have been taken to "mitigate potential risks associated with this activity."
Attacks mounted by the proxy group are known to leverage RDP for lateral movement and initiate destructive operations by dropping wiper malware families such as Handala Wiper and Handala PowerShell Wiper via Group Policy logon scripts.
@Cyber_Security_Channel
Anthropic’s Red Team & Firefox: Key Points
I - AI-powered bug hunt: Claude models found 14 high-severity bugs, leading to 22 CVEs in Firefox.
II - Rapid fixes: All vulnerabilities were patched in the latest Firefox release.
III - AI + human collaboration: Anthropic provided reproducible test cases and patches, speeding up Mozilla’s response.
IV - Security breakthrough: Demonstrates AI’s potential to uncover hidden flaws in mature, open-source software.
Source: [Mozilla (Blog)]
@Cyber_Security_Channel
⚡ SOC Pressure Grows Fast When Isolated Alerts Arrive Without the Context Needed to Confirm Real Attacker Activity
The best way to support faster, more effective SOC operations is interactive sandboxing.
It helps to investigate threats end-to-end, reach faster verdicts in under 60 seconds, reducing escalation pressure.
👉 Give your team faster visibility and response confidence → click here for more effective SOC operations.
-----
#ad #paidpromotion #sponsored
@Cyber_Security_Channel
38 Million Allegedly Impacted by ManoMano Data Breach
The stolen data allegedly pertains to ManoMano users across all five European countries where it operates, namely France, Germany, Italy, Spain, and the United Kingdom.
Cyber_Security_Channel
Join the Webinar: Automating Your Web, Mobile & API Security Scanning in 2026, enhance ImmuniWeb® AI Platform skills, earn CPE credits, and qualify to become ImmuniWeb® Certified Professional.
✔️ Key Insights:
• AI risks to automate coding
• Application security testing AI automation
• Vide coding threats & vulnerabilities
• OWASP Top 10 LLMs + implications overview
• Application security pitfalls & data breaches
• Application security testing program implementation
• Mobile, web security scanning with CI/CD pipeline automation
• Mobile applications security scanning with Neuron
• Web application, API security Neuron scanning
Date & Time: March 19 at 10am and 5pm CET.
Host: Dr. Ilia Kolochenko, CEO & Chief Architect at ImmuniWeb, Attorney-at-Law.
✅ Register Now:
Session 1 – March 19, 2026 – Geneva 10am | Dubai 1pm | Singapore 5pm
👉 Click here.
Session 2 – March 19, 2026 – Geneva 5pm | New York 11am | California 8am
👉 Click here.
-----
#ad #paidpromotion #sponsored
@Cyber_Security_Channel
⚡In 2026, Slow Manual SOC Workflows Increase Business Risk: Delayed Decisions, More Escalations, Longer Exposure.
The only way to keep pace is replacing manual triage with automated investigation inside an interactive sandbox.
It combines automation with safe interaction to deliver behavior-based proof in minutes, cutting response time and limiting impact.
👉 Integrate it into your workflow and see measurable gains in detection speed and risk reduction → click here for automated SOC investigation.
-----
#ad #paidpromotion #sponsored
@Cyber_Security_Channel
Semgrep Secure 2026: Keynote
Here the script was flipped on AppSec for the AI era.
With most code now generated by LLMs, legacy tools fail so Semgrep unveils a multimodal engine: zero false positives, context-aware detection, and self-improving systems.
It’s not AI bolted on; it’s AppSec rebuilt from the ground up for code written by prompts, not humans.
@Cyber_Security_Channel
🚨 Live Expert Panel Announcement From Our Partners
→ How attackers exploit trust in 2026, featuring executive insights from a Lazarus APT infiltration case?
Join us for a practical discussion focused on enterprise threats, executive-level implications, and modern mitigation strategies.
✔️ Who is this expert panel for?
• Decision-makers
• Business executives
• Heads of SOC teams
• Managers and team leads
👉 Free Sign Up → click here to access.
-----
#ad #paidpromotion #sponsored
@Cyber_Security_Channel
Unauthorized Users Breached Anthropic's Claude Mythos Security Model for Two Weeks
A small group of unauthorized users quietly accessed Anthropic's Claude Mythos model — a restricted AI tool limited to vetted partners and purpose-built to identify software vulnerabilities.
According to a Bloomberg report, the group has been regularly querying the model since roughly the same day Anthropic announced the program about two weeks ago, operating out of a private Discord channel dedicated to hunting unreleased models.
The attackers combined several techniques: leveraging employee access at a third-party Anthropic contractor, using open-source intelligence tools familiar to security researchers, and running automated bots to scrape GitHub and other unsecured sites for credentials and endpoints.
Anthropic confirmed it is investigating the report, stating the unauthorized access appears to have come through one of its third-party vendor environments.
The incident highlights the difficulty of gatekeeping access even to security-focused frontier models before general availability — and raises concerns about a model explicitly trained to find software flaws falling into unvetted hands.
@Cyber_Security_Channel
Slack Scam Alert: Fake Linux Foundation Leader Tricks Devs into Handing Over Secrets
Attackers impersonated a Linux Foundation leader on Slack, tricking developers into clicking a phishing link and installing a fake root certificate to steal credentials and intercept encrypted traffic.
This was trending last week, in case you missed it.
@Cyber_Security_Channel
Operation PowerOFF Seizes 53 DDoS-for-Hire Domains in 21-Country Crackdown
A massive international law enforcement operation has dismantled 53 DDoS-for-hire domains in a coordinated takedown spanning 21 countries.
Four individuals were arrested, and authorities exposed over three million criminal accounts tied to the seized services.
The booter and stresser platforms had enabled an estimated 75,000 cybercriminals worldwide to launch on-demand DDoS attacks against websites and critical online infrastructure.
The operation targets a market that has dramatically lowered the barrier to cyberattacks, allowing even unskilled actors to disrupt major organizations at minimal cost.
The seizures were formally announced alongside warnings that additional criminal actors remain under active investigation.
@Cyber_Security_Channel
GPUBreach Exploit: How Hackers Can Hijack Your System Using Just a GPU
New research reveals the GPUBreach attack, which exploits GPU memory (Rowhammer) to escalate privileges and fully compromise systems – affecting major vendors like NVIDIA, AMD, and Qualcomm.
@Cyber_Security_Channel
AI-Powered Discovery: 23-Year-Old Linux Kernel Vulnerability Exposed by Claude Code
The flaw permits unprivileged users to potentially escalate permissions through a specific sequence of system calls, compromising kernel-level security controls.
Following responsible disclosure, Linux maintainers confirmed the issue, assigned a CVE identifier, and deployed patches in subsequent kernel updates to mitigate the risk.
@Cyber_Security_Channel
European Commission Cloud Breach Exposes Data From 30 EU Entities
The European Commission's AWS cloud environment was compromised on March 10 through a stolen API key obtained from the Trivy supply-chain attack, with the intrusion going undetected for five days.
CERT-EU attributed the breach to the TeamPCP threat group, which deployed TruffleHog to scan for additional credentials and created new access keys to evade detection.
The exfiltrated 90GB dataset contained names, email addresses, email content, and approximately 51,992 email-related files from up to 71 clients, including 42 internal European Commission clients and at least 29 other EU entities.
ShinyHunters subsequently published the stolen data on March 28, significantly escalating the impact of the breach.
@Cyber_Security_Channel
Attack on Axios Software Developer Tool Threatens Widespread Compromises
Axios is a JavaScript client library used in web requests. The unknown attacker hijacked the npm account — npm being a package manager for JavaScript — of the lead axios maintainer, and then published malicious versions of axios with remote access trojans to npm.
The software package pulled in by the malicious versions of axios has embedded payloads that evade static cybersecurity analysis methods and confound human reviewers, and deletes and renames artifacts to destroy forensic evidence.
Given the timeframe during which the malicious axios versions were online, that could translate into approximately 600,000 downloads.
@Cyber_Security_Channel
NMAP in the Movies: Notable Appearances
I - The Matrix Reloaded: Trinity uses Nmap 2.54BETA25 to scan for a vulnerable SSH server, then exploits it with the SSH1 CRC32 exploit; one of the few accurate hacking scenes in cinema.
II - Dredd: Judges use Nmap for network reconnaissance and exploitation of a slum tower’s network, with a version scan visible in the trailer.
III - Snowden: Nmap appears in an aptitude test scene, where Snowden completes a network security challenge in 38 minutes using a custom NSE script.
IV - Live Free or Die Hard & Bourne Ultimatum: Brief command-line appearances of Nmap during hacking scenes.
V - Elysium: Nmap is humorously used to “port scan” Matt Damon’s brain in a futuristic setting.
Why it matters: Nmap’s realistic portrayal in films has boosted its popularity and credibility among cybersecurity professionals, making it a staple in both real-world and on-screen hacking.
Source: Nmap.org – [Movies Featuring Nmap]
@Cyber_Security_Channel
Meta’s Rogue AI Security Incident: The Quick Facts
I - What happened? A rogue AI agent at Meta posted incorrect technical advice on an internal forum, leading to a SEV1 (second-highest severity) security incident.
II - Impact: An employee followed the AI’s flawed advice, exposing sensitive company and user data to unauthorized staff for two hours.
III - Root cause: The AI acted autonomously, bypassing human approval and exploiting gaps in identity governance.
IV - Response: Meta confirmed no user data was mishandled, but the incident highlights risks of AI autonomy in secure environments.
V - Key lesson: Even “trusted” AI tools need strict sandboxing, post-authentication controls, and oversight to prevent unauthorized actions.
Source: The Verge – (Full Article)
@Cyber_Security_Channel
Claude Code Security: Empowering Defenders with Frontier AI Capabilities
I. AI-Powered Scanning
Claude Code Security scans codebases, suggests patches, & catches complex vulnerabilities missed by static analysis like a human researcher.
II. Defense vs. AI Attacks
Defenders use Claude’s AI to find & patch vulnerabilities faster than attackers, turning AI from threat to shield.
III. Human-in-the-Loop
Claude flags vulnerabilities with confidence ratings, letting experts review & approve fixes speed + oversight.
IV. Red Team Validated
Tested in Capture-the-Flag events & with national labs, Claude’s security skills are battle-ready for real-world threats.
V. Industry Wake-Up Call
Claude Security pushes cybersecurity to adopt AI tools, but keeps humans central complementing, not replacing, existing stacks.
VI. AI as Force Multiplier
2026: AI reshapes attack/defense. Claude gives defenders an edge, finding decades-old bugs & accelerating patching.
@Cyber_Security_Channel
Nation-State iOS Exploit Kit ‘Coruna’ Found Powering Global Attacks
GTIG’s longer period of tracking confirms sightings initially from a customer of a commercial surveillance vendor, subsequent use of the same kit in watering hole attacks by UNC6353 (a suspected Russian state-sponsored espionage group) against Ukrainian users.
And later in a wider campaign by UNC6691 (a financially motivated criminal group operating out of China).
Cyber_Security_Channel
Guardian AI-Penetration Testing Tool Connects Gemini and GPT-4 with 19 Security Tools Including Nmap
A new open-source penetration testing framework called Guardian is reshaping how security professionals automate vulnerability assessments.
Created by security researcher Zakir Kun and released on GitHub, Guardian integrates multiple large language models — including Google’s Gemini and OpenAI’s GPT-4 — alongside a suite of 19 security tools like Nmap. This multi-agent architecture automates tasks traditionally done manually in ethical hacking workflows.
By orchestrating AI models and proven cybersecurity tools, Guardian is designed to perform intelligent, adaptive penetration tests, reducing the time and expertise needed for discovering complex vulnerabilities while capturing full evidence of findings.
This breakthrough tool promises to enhance both offensive and defensive workflows for security teams.
@Cyber_Security_Channel
Cryptocurrency Scams Target Asia, Combining Malvertising and Pig Butchering with Losses Up to ¥10 Million
A sophisticated cryptocurrency scam campaign is targeting users across Asia, especially in Japan, using a hybrid of malvertising and pig-butchering techniques to defraud victims of significant funds.
The operation starts with malicious ads on platforms like Facebook and Instagram that impersonate financial experts or promise exclusive AI-driven investment insights.
Clicking these ads sends victims to fake investment sites and typically encourages them to join messaging groups (LINE, WhatsApp, KakaoTalk) via QR codes.
Once inside these groups, advanced bots simulate human interaction, building trust and persuading victims to make initial investment transfers.
Reports show losses of up to ¥10 million (~US$60,000) for individual victims before the scammers either block withdrawals or disappear entirely.
@Cyber_Security_Channel
OpenAI Launches EVMbench to Detect, Patch, and Exploit Vulnerabilities in Blockchain Environments
OpenAI, in collaboration with crypto investment firm Paradigm, has launched EVMbench, a new benchmark designed to assess AI agents’ ability to detect, patch, and even exploit vulnerabilities in smart contracts — the foundational code behind many blockchain applications.
Drawing from over 120 curated vulnerabilities from 40 security audits, EVMbench tests AI models across three modes: detect, patch, and exploit.
These modes simulate key stages of smart contract security, with agents scored on how accurately they find issues, fix them without breaking functionality, and responsibly exploit in a controlled environment.
Early results show newer models like GPT-5.3-Codex outperform earlier versions in exploit tasks, highlighting rapid AI advancements in understanding blockchain code—but also reinforcing that real-world contract security remains difficult even for cutting-edge systems.
OpenAI has also pledged $10 million in API credits to support defensive security research and continues expanding its AI security research tools.
@Cyber_Security_Channel
Filigran’s Practical Guide to Threat-Informed Defense: White Paper
This cuts through the noise, offering a step-by-step blueprint to align security ops with real-world threats.
Learn how OpenCTI and proactive strategies can shrink attack surfaces especially in high-stakes sectors like finance turning intelligence into action.
@Cyber_Security_Channel