🔒

Cybersecurity News

The latest cybersecurity news — data breaches, zero-days, ransomware, CVEs and threat intelligence. Aggregated from Krebs on Security, Bleeping Computer, The Hacker News and more.

83 articles · Updated 3 hr ago · Browse all categories

Dev.to 3 hr ago

Dev.to Article Draft #13

标题 API Security in 2026: The Attacks That Are Destroying Production Systems 标签 security, api, webdev, programming, backend, devsecops 内容 API Security i...

Dev.to 3 hr ago

Beyond the Context Window: How to Build a Self-Improving AI Agent with Persistent Memory

Imagine you are a master carpenter. You spend weeks designing and building a magnificent, hand-carved oak cabinet. You run into complex joinery issues, disco...

Dev.to 3 hr ago

Supply Chain Attacks + Stale Credentials: Why This Combination Is So Dangerous in 2026

Recent incidents at GitHub and Grafana Labs highlight a painful truth in modern infrastructure: even strong perimeter defenses can fail completely when crede...

Dev.to 4 hr ago

Tier 4 — Entity and Authority: Wikidata, KG, sameAs threading

Originally published at thatdevpro.com. This article is part of the 14-tier Engine Optimization stack from ThatDevPro, an SDVOSB-certified veteran-owned web ...

ESPN Cricinfo 5 hr ago

Shreyas Iyer's maiden IPL ton keeps Punjab Kings in the hunt for playoffs spot

The PBKS skipper helped break their six-match losing streak, as they sealed a chase of 200 against a depleted Lucknow Super Giants to breach the top four on ...

The Hacker News (Security) 7 hr ago

npm Adds 2FA-Gated Publishing and Package Install Controls Against Supply Chain Attacks

GitHub has rolled out new controls for npm to improve the security of the software supply chain, giving maintainers the ability to explicitly approve a relea...

The Hacker News (Security) 7 hr ago

Packagist Supply Chain Attack Infects 8 Packages Using GitHub-Hosted Linux Malware

A new "coordinated" supply chain attack campaign has impacted eight packages on Packagist including malicious code designed to run a Linux binary retrieved f...

TechCrunch 7 hr ago

These special phone and app features can help protect you from spyware

Apple, Meta, and Google offer special security modes that provide your devices more secure against targeted spyware attacks. Here are how those modes work, w...

Ad
The Guardian 8 hr ago

GLA considering investigation into Zack Polanski over houseboat council tax

Official assessing formal complaint into Green party leader’s potential ‘breach of conduct’ as assembly memberLondon assembly officials are weighing up wheth...

NextWeb 9 hr ago

Anthropic’s Claude Mythos found 10,000 critical vulnerabilities in one month. The patches can’t keep up.

Anthropic disclosed on Friday that Project Glasswing, its restricted cybersecurity initiative, has uncovered more than 10,000 high- or critical-severity vuln...

The Hacker News (Security) 11 hr ago

Claude Mythos AI Finds 10,000 High-Severity Flaws in Widely Used Software

Anthropic on Friday disclosed that Project Glasswing has helped uncover more than 10,000 high- or critical-severity vulnerabilities across some of the most "...

Tom's Hardware 12 hr ago

Wi-Fi controlled hacking USB cable stealthily packs in a microcontroller, microSD storage, and more — cable executes remote payload execution, keystroke injection, and more, but is 'built for makers, developers, enthusiasts, and cybersecurity learners'

A device that 'looks like a normal USB cable' but packs in an ESP32-S3 microcontroller, micro SD card storage, and Wi-Fi capabilities has enjoyed great succe...

Wired 13 hr ago

The FBI Wants ‘Near Real-Time’ Access to US License Plate Readers

Plus: Google publishes a live exploit for an unpatched flaw, the feds arrest two men accused of creating thousands of nonconsensual deepfake nudes, and more.

The Hacker News (Security) 14 hr ago

Laravel-Lang PHP Packages Compromised to Deliver Cross-Platform Credential Stealer

Cybersecurity researchers have flagged a fresh software supply chain attack campaign that has targeted multiple PHP packages belonging to Laravel-Lang to del...

The Hacker News (Security) 16 hr ago

LiteSpeed cPanel Plugin CVE-2026-48172 Exploited to Run Scripts as Root

A maximum-severity security vulnerability impacting LiteSpeed User-End cPanel Plugin has come under active exploitation in the wild. The flaw, tracked as CVE...

The Guardian 17 hr ago

Albanese joins coalition of nations calling for an end to Israeli settlement expansion in the West Bank

Australia joins the UK, Italy, France, Germany, Canada, Norway, the Netherlands and New Zealand in condemning illegal settlementsGet our breaking news email,...

Ad
9to5Mac 19 hr ago

9to5Mac Daily: May 22, 2026 – Apple Music AI, hardware changes

Listen to a recap of the top stories of the day from 9to5Mac. 9to5Mac Daily is available on iTunes and Apple’s Podcasts app, Stitcher, TuneIn, Google Play, o...

TechRadar 22 hr ago

Another major Linux security flaw revealed — nine-year old issue could spell disaster for users

There was a way to elevate normal Linux users' privileges to root, granting threat actors admin access.

VentureBeat 1d ago

Valid certificates, stolen accounts: how attackers broke npm's last trust signal

On May 19, 633 malicious npm package versions passed Sigstore provenance verification. They were cleared by the system because the attacker had generated val...

TechSpot 1d ago

Hackers breach GitHub and access 3,800 internal repositories now listed for sale

GitHub has said it found about 3,800 internal repositories accessed in the breach and stressed that these contained its own code rather than customer project...

Ars Technica 1d ago

Texas AG sues Meta over claims that WhatsApp doesn't provide end-to-end encryption

Critics note a lack of factual support in lawsuit filed by US Senate candidate.

Krebs on Security 1d ago

Lawmakers Demand Answers as CISA Tries to Contain Data Leak

Lawmakers in both houses of Congress are demanding answers from the U.S. Cybersecurity & Infrastructure Security Agency (CISA) after KrebsOnSecurity reported...

TechCrunch 1d ago

Kash Patel’s clothing brand website shut down after reports it was hacked

According to users on X, the website was hijacked by hackers in an attempt to trick visitors into installing malware.

TechRepublic 1d ago

Microsoft Warns: Windows Zero-Day ‘YellowKey’ Can Bypass BitLocker

Microsoft has released a temporary mitigation for YellowKey, a Windows zero-day that can reportedly bypass BitLocker protections. The post Microsoft Warns: W...

Ad
Bleeping Computer 1d ago

Trend Micro warns of Apex One zero-day exploited in the wild

Japanese cybersecurity software company Trend Micro has addressed an Apex One zero-day vulnerability exploited in attacks targeting Windows systems. [...]

Dark Reading 1d ago

Verizon DBIR: Healthcare Fends Off Increased Social Engineering Attacks

Ransomware and vendor breaches persist. The "2026 Data Breach Investigations Report" (DBIR) highlights how evolving social engineering tactics make the secto...

Bleeping Computer 1d ago

Drupal: Critical SQL injection flaw now targeted in attacks

Drupal is warning that hackers are attempting to exploit a "highly critical" SQL injection vulnerability announced earlier this week. [...]

Tom's Hardware 1d ago

Europol's Operation Saffron takes down First VPN service over ransomware attacks — 33 'bulletproof' servers spread across 27 countries seized

Europol's Operation Saffron takes down privacy-focused First VPN service

CoinDesk 1d ago

ZachXBT flags $520K Polymarket exploit on Polygon, team says funds are safe

Blockchain investigator ZachXBT has highlighted a suspected security breach involving Polymarket, the world’s largest decentralized prediction market platform.

Bleeping Computer 1d ago

US and Canada arrest and charge suspected Kimwolf botnet admin

U.S. and Canadian authorities arrested and charged a Canadian man with operating the KimWolf distributed denial-of-service (DDoS) botnet, which infected near...

Load more Cybersecurity News

Explore other categories