theinfosecnews
CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634
V
vulnerability

BrowserGate: Microsoft LinkedIn's Hidden JavaScript Scripts Expose Browser Extensions and Device Data

The BrowserGate report reveals that Microsoft's LinkedIn uses hidden JavaScript to scan visitors' browser extensions and collect device data, raising privacy concerns. Although not a traditional vulnerability, this data collection can aid profiling and tracking, urging organizations to consider mitigation strategies.

BleepingComputer·2h ago·2 min read
Read full story
Allvulnerability73malware15policy14breach6apt5ransomware2
Aapt

TA416 Resurges with Targeted Attacks on European Government and Diplomatic Entities Since Mid-2025

Since mid-2025, the China-aligned threat actor TA416 has resumed targeting European government and diplomatic organizations after a two-year lull. The group employs spear-phishing, exploits Microsoft Office vulnerabilities, and uses multi-stage malware to conduct espionage. Detection and defense require patch management, email filtering, and endpoint monitoring.

The Hacker News·5h ago·2 min read
Bbreach

Supply Chain Attacks Linked to TeamPCP Amplified by ShinyHunters and Lapsus$ Involvement

Organizations have disclosed breaches stemming from TeamPCP's supply chain compromise, with threat actors ShinyHunters and Lapsus$ claiming involvement. These attacks exposed sensitive data through injected malicious code in software updates, affecting numerous enterprises. Affected users should audit software integrity, reset credentials, and enable multi-factor authentication.

Dark Reading·7h ago·2 min read
Aapt

UNC1069 North Korean APT Executes Targeted Social Engineering to Compromise Axios NPM Package

North Korean APT group UNC1069 targeted the Axios npm package via a tailored social engineering attack against its maintainer. The campaign aimed to insert malicious code into this critical open-source library, posing risks to global software supply chains. Detection methods include MFA, cryptographic signing, and vigilant monitoring of package updates.

The Hacker News·12h ago·2 min read
Ppolicy

Microsoft Mandates Windows 11 25H2 Upgrade for Unmanaged Home and Pro Devices

Microsoft has begun force-upgrading unmanaged Windows 11 24H2 Home and Pro devices to version 25H2 to address critical vulnerabilities including CVE-2023-28252. Unmanaged devices not enrolled in enterprise management tools will be automatically updated starting June 2024. Organizations should audit unmanaged endpoints and enforce patch management to maintain security compliance.

BleepingComputer·15h ago·2 min read
Ppolicy

RSAC 2026: AI-Driven Threats, Global Cyber Leadership Shifts, and the Policies Reshaping Defense Priorities

RSAC 2026 surfaced AI-assisted attack tooling, enforcement of EU NIS2 and the incoming EU AI Act, and structural shifts in U.S. and allied cyber leadership as the defining issues for security practitioners. SOC teams and CISOs face active NIS2 enforcement since October 2024, EU AI Act high-risk system deadlines in August 2026, and ongoing CISA KEV remediation obligations. Organizations must audit AI product compliance, validate vulnerability remediation workflows, and document NIS2 risk management measures now.

Dark Reading·1d ago·4 min read
Bbreach

Cisco Talos Links Large-Scale Credential Harvesting Campaign to React2Shell Exploitation

Cisco Talos has attributed a large-scale credential harvesting operation to a tracked threat cluster exploiting the React2Shell vulnerability to steal AWS secrets, SSH keys, GitHub tokens, Stripe API keys, database credentials, and shell history at scale. The campaign used automated post-exploitation tooling to sweep compromised systems for secrets across multiple credential categories simultaneously. Affected organizations should immediately patch React2Shell, rotate all exposed secrets, and review cloud and source control access logs using IOCs published by Talos.

The Hacker News·1d ago·3 min read
Ppolicy

SEC Cybersecurity Disclosure Rule: What CISOs and Security Engineers Must Do Before the Deadlines Hit

The SEC's cybersecurity disclosure rule requires public companies to report material incidents on Form 8-K within four business days of a materiality determination, and to disclose risk management programs and board oversight annually in 10-K filings. Large accelerated filers have been subject to incident reporting requirements since December 18, 2023, with enforcement precedent already set through the SEC's fraud charges against SolarWinds and CISO Timothy Brown. Security teams must build materiality determination workflows, align IR playbooks to disclosure triggers, and ensure 10-K disclosures accurately reflect internal security posture.

Dark Reading·1d ago·4 min read
Bbreach

Drift Protocol Loses $280 Million After Attacker Seizes Security Council Admin Controls

Drift Protocol, a Solana-based decentralized perpetuals exchange, lost at least $280 million after an attacker compromised the signing keys of its Security Council multisig and used administrative privileges to drain protocol-controlled vaults. The attack targeted the governance layer rather than a smart contract vulnerability, exploiting insufficient key management practices among Security Council signers. Affected users should withdraw remaining funds, revoke token approvals, and avoid unofficial recovery contracts.

BleepingComputer·1d ago·3 min read