Vulnerability News
4.59K subscribers
2 photos
41.3K links
Every day new posts about vulnerabilities and cybersecurity news. Get the latest news about the cyberspace!

Group: @VulnerabilityNewsGroup
Download Telegram
Nevada Unveils New Statewide Data Classification Policy Months After Cyberattack

Officials said data will now be classified as one of four categories: “public,” “sensitive,” “confidential” or “restricted.”
The post Nevada Unveils New Statewide Data Classification Policy Months After Cyberattack appeared first on SecurityWeek.
https://www.securityweek.com/nevada-unveils-new-statewide-data-classification-policy-months-after-cyberattack/
Webinar Today: Identity Under Attack – Strengthen Your Identity Defenses

Gain practical insights on balancing security, user experience, and operational efficiency while staying ahead of increasingly sophisticated threats.
The post Webinar Today: Identity Under Attack – Strengthen Your Identity Defenses appeared first on SecurityWeek.
https://www.securityweek.com/webinar-today-identity-under-attack-strengthen-your-identity-defenses/
GitGuardian Raises $50 Million for Secrets and Non-Human Identity Security

The secrets security company has raised more than $100 million since its creation in 2017.
The post GitGuardian Raises $50 Million for Secrets and Non-Human Identity Security appeared first on SecurityWeek.
https://www.securityweek.com/gitguardian-raises-50-million-for-secrets-and-non-human-identity-security/
Conduent Breach Hits Volvo Group: Nearly 17,000 Employees’ Data Exposed

The Conduent data breach affects at least 25 million individuals, up from 10 million estimated a few months ago. 
The post Conduent Breach Hits Volvo Group: Nearly 17,000 Employees’ Data Exposed appeared first on SecurityWeek.
https://www.securityweek.com/conduent-breach-hits-volvo-group-nearly-17000-employees-data-exposed/
Zast.AI Raises $6 Million for AI-Powered Code Security

The startup relies on AI agents to identify software vulnerabilities and validate them before reporting.
The post Zast.AI Raises $6 Million for AI-Powered Code Security appeared first on SecurityWeek.
https://www.securityweek.com/zast-ai-raises-6-million-for-ai-powered-code-security/
Security in the Dark: Recognizing the Signs of Hidden Information

Security failures don’t always start with attackers, sometimes they start with missing truth.
The post Security in the Dark: Recognizing the Signs of Hidden Information appeared first on SecurityWeek.
https://www.securityweek.com/security-in-the-dark-recognizing-the-signs-of-hidden-information/
Microsoft to Refresh Windows Secure Boot Certificates in June 2026

After a decade and a half of service, the current certificates will expire, and new ones will be rolled out.
The post Microsoft to Refresh Windows Secure Boot Certificates in June 2026 appeared first on SecurityWeek.
https://www.securityweek.com/microsoft-to-refresh-windows-secure-boot-certificates-in-june-2026/
Hacker Conversations: Professional Hacker Douglas Day

Day became a professional hacker by choice. But that doesn’t mean he isn’t a natural hacker.
The post Hacker Conversations: Professional Hacker Douglas Day appeared first on SecurityWeek.
https://www.securityweek.com/hacker-conversations-professional-hacker-douglas-day/
Ivanti Patches Endpoint Manager Vulnerabilities Disclosed in October 2025

It also fixed a high-severity authentication bypass that could be exploited remotely without authentication to obtain credentials.
The post Ivanti Patches Endpoint Manager Vulnerabilities Disclosed in October 2025 appeared first on SecurityWeek.
https://www.securityweek.com/ivanti-patches-endpoint-manager-vulnerabilities-disclosed-in-october-2025/
Chipmaker Patch Tuesday: Over 80 Vulnerabilities Addressed by Intel and AMD

More than two dozen advisories have been published by the chip giants for vulnerabilities found recently in their products.
The post Chipmaker Patch Tuesday: Over 80 Vulnerabilities Addressed by Intel and AMD appeared first on SecurityWeek.
https://www.securityweek.com/chipmaker-patch-tuesday-over-80-vulnerabilities-addressed-by-intel-and-amd/
The strategic SIEM buyer’s guide: Choosing an AI-ready platform for the agentic era

New guide details how a unified, AI ready SIEM platform empowers security leaders to operate at the speed of AI, strengthen resilience, accelerate detection and response, and more.
The post The strategic SIEM buyer’s guide: Choosing an AI-ready platform for the agentic era appeared first on Microsoft Security Blog.
https://www.microsoft.com/en-us/security/blog/2026/02/11/the-strategic-siem-buyers-guide-choosing-an-ai-ready-platform-for-the-agentic-era/
First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

Cybersecurity researchers have discovered what they said is the first known malicious Microsoft Outlook add-in detected in the wild.
In this unusual supply chain attack detailed by Koi Security, an unknown attacker claimed the domain associated with a now-abandoned legitimate add-in to serve a fake Microsoft login page, stealing over 4,000 credentials in the process. The activity has been
https://thehackernews.com/2026/02/first-malicious-outlook-add-in-found.html
Critical BeyondTrust RCE flaw now exploited in attacks, patch now

A critical pre-authentication remote code execution vulnerability in BeyondTrust Remote Support and Privileged Remote Access appliances is now being exploited in attacks after a PoC was published online. [...]
https://www.bleepingcomputer.com/news/security/critical-beyondtrust-rce-flaw-now-exploited-in-attacks-patch-now/
WordPress plugin with 900k installs vulnerable to critical RCE flaw

A critical vulnerability in the WPvivid Backup & Migration plugin for WordPress, installed on more than 900,000 websites, can be exploited to achieve remote code execution by uploading arbitrary files without authentication. [...]
https://www.bleepingcomputer.com/news/security/wordpress-plugin-with-900k-installs-vulnerable-to-critical-rce-flaw/
AMOS infostealer targets macOS through a popular AI app

AMOS infostealer is targeting macOS users by abusing popular AI apps and extension marketplaces to harvest credentials. Flare examines how AMOS operates, spreads through AI-driven lures, and feeds the broader stealer-log cybercrime economy. [...]
https://www.bleepingcomputer.com/news/security/amos-infostealer-targets-macos-through-a-popular-ai-app/