Google brings Auto Browse and Skills to Chrome Enterprise – and a new ‘Gemini Summary’

Chrome Enterprise is turning into more of an AI workspace, with task automation, one-click workflows, and new IT security controls.

Latest news – ​Read More

Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens

Cybersecurity researchers have flagged a fresh set of packages that have been compromised by bad actors to deliver a self-propagating worm that spreads through stolen developer npm tokens.
The supply chain worm has been detected by both Socket and StepSecurity, with the companies tracking the activity under the name CanisterSprawl owing to the use of an ICP canister to exfiltrate the stolen data

The Hacker News – ​Read More

Cosmetics giant Rituals confirms data breach of customer membership records

The cosmetics retailer, which counts 41 million customers in its membership data, declined to provide an accurate total number of customers affected.

Security News | TechCrunch – ​Read More

French police arrest suspected hacker behind dozens of data breaches

French authorities have arrested a suspected hacker believed to be behind dozens of data breaches targeting public institutions, sports federations and private organizations across the country.

The Record from Recorded Future News – ​Read More

AI Tools Are Helping Mediocre North Korean Hackers Steal Millions

One group of hackers used AI for everything from vibe coding their malware to creating fake company websites—and stole as much as $12 million in three months.

Security Latest – ​Read More

An AI app prepares me for my day now – and I’ve never been more organized

The free Huxe app combines your important events and emails with the news to create a personalized morning briefing. I’m finding it seriously useful and addictive.

Latest news – ​Read More

UK government says 100 countries have spyware that can hack people’s phones

The U.K.’s cybersecurity chief warned that U.K. businesses and critical infrastructure are underestimating the threat from spyware attacks and other cyberthreats, with more governments having access to the powerful surveillance technology than ever.

Security News | TechCrunch – ​Read More

Mustang Panda Hits India and S. Korea with Updated LOTUSLITE Backdoor

Acronis reveals Mustang Panda is using a new LOTUSLITE backdoor to target Indian banks and Korean diplomats. Learn how this DLL sideloading attack works.

Hackread – Cybersecurity News, Data Breaches, AI and More – ​Read More

Mirai Botnet Targets Flaw in Discontinued D-Link Routers

The exploitation of the command injection vulnerability started one year after public disclosure and PoC exploit code publication.

The post Mirai Botnet Targets Flaw in Discontinued D-Link Routers appeared first on SecurityWeek.

SecurityWeek – ​Read More

Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM Data

Researcher says the missing piece is a governance-driven intelligence layer that turns SBOM and VEX data into explainable security decisions.

The post Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM Data appeared first on SecurityWeek.

SecurityWeek – ​Read More