theinfosecnews
CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634
P
policy

Data Privacy Labels for Mobile Apps: Current Limitations and Compliance Challenges

Data privacy labels on mobile apps aim to improve transparency but often contain inaccuracies and under-report data collection. Security teams should not rely solely on these labels and need to implement additional monitoring and validation tools to ensure compliance and protect user data.

Dark Reading·5h ago·2 min read
Read full story
Allvulnerability73policy17malware15breach6apt5ransomware2
Aapt

TA416 Resurges with Targeted Attacks on European Government and Diplomatic Entities Since Mid-2025

Since mid-2025, the China-aligned threat actor TA416 has resumed targeting European government and diplomatic organizations after a two-year lull. The group employs spear-phishing, exploits Microsoft Office vulnerabilities, and uses multi-stage malware to conduct espionage. Detection and defense require patch management, email filtering, and endpoint monitoring.

The Hacker News·8h ago·2 min read
Bbreach

Supply Chain Attacks Linked to TeamPCP Amplified by ShinyHunters and Lapsus$ Involvement

Organizations have disclosed breaches stemming from TeamPCP's supply chain compromise, with threat actors ShinyHunters and Lapsus$ claiming involvement. These attacks exposed sensitive data through injected malicious code in software updates, affecting numerous enterprises. Affected users should audit software integrity, reset credentials, and enable multi-factor authentication.

Dark Reading·11h ago·2 min read
Ppolicy

Microsoft and CrowdStrike Forge Partnership After Years of Rivalry Fueled by Formula 1 Collaboration

Microsoft and CrowdStrike have shifted from competitors to partners through a collaboration rooted in their shared involvement in Formula 1. This alliance integrates their cybersecurity tools and threat intelligence, enhancing protection for enterprise customers. Organizations using both platforms should prepare to leverage combined capabilities and update configurations accordingly.

Dark Reading·14h ago·2 min read
Aapt

UNC1069 North Korean APT Executes Targeted Social Engineering to Compromise Axios NPM Package

North Korean APT group UNC1069 targeted the Axios npm package via a tailored social engineering attack against its maintainer. The campaign aimed to insert malicious code into this critical open-source library, posing risks to global software supply chains. Detection methods include MFA, cryptographic signing, and vigilant monitoring of package updates.

The Hacker News·15h ago·2 min read
Ppolicy

Microsoft Mandates Windows 11 25H2 Upgrade for Unmanaged Home and Pro Devices

Microsoft has begun force-upgrading unmanaged Windows 11 24H2 Home and Pro devices to version 25H2 to address critical vulnerabilities including CVE-2023-28252. Unmanaged devices not enrolled in enterprise management tools will be automatically updated starting June 2024. Organizations should audit unmanaged endpoints and enforce patch management to maintain security compliance.

BleepingComputer·18h ago·2 min read
Ppolicy

RSAC 2026: AI-Driven Threats, Global Cyber Leadership Shifts, and the Policies Reshaping Defense Priorities

RSAC 2026 surfaced AI-assisted attack tooling, enforcement of EU NIS2 and the incoming EU AI Act, and structural shifts in U.S. and allied cyber leadership as the defining issues for security practitioners. SOC teams and CISOs face active NIS2 enforcement since October 2024, EU AI Act high-risk system deadlines in August 2026, and ongoing CISA KEV remediation obligations. Organizations must audit AI product compliance, validate vulnerability remediation workflows, and document NIS2 risk management measures now.

Dark Reading·1d ago·4 min read