DockerDash Flaw in Docker AI Assistant Leads to RCE, Data Theft

The critical vulnerability exists in the contextual trust in MCP Gateway architecture, as instructions are passed without validation.

The post DockerDash Flaw in Docker AI Assistant Leads to RCE, Data Theft appeared first on SecurityWeek.

SecurityWeek – ​Read More

The best ERP software of 2026: Expert tested and reviewed

Learn about the best ERP software available right now, including SAP S/4HANA, Oracle NetSuite ERP, and Microsoft Dynamics 365.

Latest news – ​Read More

Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

An innovative approach to discovering, analyzing, and governing identity usage beyond traditional IAM controls.
The Challenge: Identity Lives Outside the Identity Stack
Identity and access management tools were built to govern users and directories.
Modern enterprises run on applications. Over time, identity logic has moved into application code, APIs, service accounts, and custom authentication

The Hacker News – ​Read More

Google Looker Bugs Allow Cross-Tenant RCE, Data Exfil

Attackers could even have used one vulnerable Lookout user to gain access to other GCP tenants’ environments.

darkreading – ​Read More

Exposed AWS Credentials Lead to AI-Assisted Cloud Breach in 8 Minutes

Researchers recently tracked a high-speed cloud attack where an intruder gained
full admin access in just eight minutes. Discover how AI automation and a simple
storage error led to a major security breach.

Hackread – Cybersecurity News, Data Breaches, AI and More – ​Read More

Cryptominers, Reverse Shells Dropped in Recent React2Shell Attacks

Two IP addresses accounted for the majority of the 1.4 million exploitation attempts observed over the past week.

The post Cryptominers, Reverse Shells Dropped in Recent React2Shell Attacks appeared first on SecurityWeek.

SecurityWeek – ​Read More

Microsoft and ServiceNow’s exploitable agents reveal a growing – and preventable – AI security crisis

Once deployed on corporate networks, AI agents can become every threat actor’s fantasy. Lesson one for cybersecurity pros: limit privileges.

Latest news – ​Read More

Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers

Microsoft has warned that information-stealing attacks are “rapidly expanding” beyond Windows to target Apple macOS environments by leveraging cross-platform languages like Python and abusing trusted platforms for distribution at scale.
The tech giant’s Defender Security Research Team said it observed macOS-targeted infostealer campaigns using social engineering techniques such as ClickFix since

The Hacker News – ​Read More

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) to its Known Exploited Vulnerabilities (KEV) catalog, flagging it as actively exploited in attacks.
The vulnerability, tracked as CVE-2025-40551 (CVSS score: 9.8), is a untrusted data deserialization vulnerability that could pave the way for remote

The Hacker News – ​Read More

Chrome Add-On Caught Stealing Amazon Commissions

A Chrome extension posing as an Amazon ad blocker was caught hijacking affiliate links in the background, redirecting commissions without user consent.

The post Chrome Add-On Caught Stealing Amazon Commissions appeared first on TechRepublic.

Security Archives – TechRepublic – ​Read More