Hundreds of Russian devices hit by Rare Werewolf crypto-mining attacks

The campaign has affected hundreds of Russian users, particularly targeting industrial enterprises and engineering schools, with additional victims reported in Belarus and Kazakhstan.

The Record from Recorded Future News – ​Read More

Hackers Stole 300,000 Crash Reports From Texas Department of Transportation

The Texas Department of Transportation has disclosed a data breach impacting the personal information included in 300,000 crash reports.

The post Hackers Stole 300,000 Crash Reports From Texas Department of Transportation appeared first on SecurityWeek.

SecurityWeek – ​Read More

Ongoing cyberattack at US grocery distributor giant UNFI affecting customer orders

United Natural Foods said it is “diligently managing through the cyber incident” that sparked disruption outages.

Security News | TechCrunch – ​Read More

Airlines Don’t Want You to Know They Sold Your Flight Data to DHS

A contract obtained by 404 Media shows that an airline-owned data broker forbids the feds from revealing it sold them detailed passenger data.

Security Latest – ​Read More

Vanta’s AI agent wants to run your compliance program — and it just might

Credit: VentureBeat made with Midjourney


Vanta launches autonomous AI agent that automates security compliance workflows, helping enterprises save 12+ hours weekly on policy management and audit preparation.Read More

Security News | VentureBeat – ​Read More

How Cisco plans to stop rogue AI agent attacks inside your network

As AI agents grow more powerful and unpredictable, Cisco unveils tools to lock down networks, track agent behavior, and prevent chaos before it spreads through your infrastructure.

Latest stories for ZDNET in Security – ​Read More

The Hidden Threat in Your Stack: Why Non-Human Identity Management is the Next Cybersecurity Frontier

Modern enterprise networks are highly complex environments that rely on hundreds of apps and infrastructure services. These systems need to interact securely and efficiently without constant human oversight, which is where non-human identities (NHIs) come in. NHIs — including application secrets, API keys, service accounts, and OAuth tokens — have exploded in recent years, thanks to an

The Hacker News – ​Read More

Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud

Security researchers uncover critical flaws and widespread misconfigurations in Salesforce’s industry-specific CRM solutions.

The post Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud appeared first on SecurityWeek.

SecurityWeek – ​Read More

Sensitive Information Stolen in Sensata Ransomware Attack

Sensor manufacturer Sensata said a ransomware group had access to its network for more than a week and stole personal information.

The post Sensitive Information Stolen in Sensata Ransomware Attack appeared first on SecurityWeek.

SecurityWeek – ​Read More

Getty Images Sues Stability AI for Using Its Photos to Train AI Models

Getty Images accuses Stability AI of illegally using its content to train AI models in a high-stakes London…

Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – ​Read More