Vulnerability News
4.66K subscribers
2 photos
41.5K links
Every day new posts about vulnerabilities and cybersecurity news. Get the latest news about the cyberspace!

Group: @VulnerabilityNewsGroup
Download Telegram
Webinar: From noise to signal - What threat actors are targeting next

Threat actors often signal their intentions before launching attacks, from dark web chatter to access-broker listings and credential requests. Join our upcoming webinar with Flare Systems to learn how to turn those early warning signs into proactive defensive action before an intrusion begins. [...]
https://www.bleepingcomputer.com/news/security/webinar-from-noise-to-signal-what-threat-actors-are-targeting-next/
Eurail says December data breach impacts 300,000 individuals

Eurail B.V., a European travel operator that provides digital passes covering 33 national railways, says attackers stole the personal information of over 300,000 individuals in a December 2025 data breach. [...]
https://www.bleepingcomputer.com/news/security/eurail-says-december-data-breach-impacts-300-000-individuals/
Microsoft suspends dev accounts for high-profile open source projects

Microsoft has suspended developer accounts used to maintain multiple high-profile open-source projects without proper notification and no way to quickly reinstate them, effectively blocking them from publishing new software builds and security patches for Windows users. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-suspends-dev-accounts-for-high-profile-open-source-projects/
Apple Intelligence AI Guardrails Bypassed in New Attack

RSAC researchers hacked Apple Intelligence using the Neural Exect method and Unicode manipulation.
The post Apple Intelligence AI Guardrails Bypassed in New Attack appeared first on SecurityWeek.
https://www.securityweek.com/apple-intelligence-ai-guardrails-bypassed-in-new-attack/
Can we Trust AI? No – But Eventually We Must

From hallucinations and bias to model collapse and adversarial abuse, today’s AI is built on probability rather than truth, yet enterprises are deploying it at speed without fully understanding the risks.
The post Can we Trust AI? No – But Eventually We Must appeared first on SecurityWeek.
https://www.securityweek.com/can-we-trust-ai-no-but-eventually-we-must/
Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access

Dozens of such keys can be extracted from apps’ decompiled code to gain access to all Gemini endpoints.
The post Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access appeared first on SecurityWeek.
https://www.securityweek.com/google-api-keys-in-android-apps-expose-gemini-endpoints-to-unauthorized-access/
Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities

The bugs could allow attackers to modify protected resources and escalate their privileges to administrator.
The post Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities appeared first on SecurityWeek.
https://www.securityweek.com/palo-alto-networks-sonicwall-patch-high-severity-vulnerabilities/
The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security

Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions.
The post The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security appeared first on SecurityWeek.
https://www.securityweek.com/the-hidden-roi-of-visibility-better-decisions-better-behavior-better-security/
Google Warns of New Campaign Targeting BPOs to Steal Corporate Data

Tracked as UNC6783, the threat actor is likely linked to Mr. Raccoon, the hacker behind the alleged theft of Adobe data from a BPO.
The post Google Warns of New Campaign Targeting BPOs to Steal Corporate Data appeared first on SecurityWeek.
https://www.securityweek.com/google-warns-of-new-campaign-targeting-bpos-to-steal-corporate-data/
Adobe Reader Zero-Day Exploited for Months: Researcher

Reputable researcher Haifei Li has come across what appears to be a PDF designed to exploit an unpatched vulnerability.
The post Adobe Reader Zero-Day Exploited for Months: Researcher appeared first on SecurityWeek.
https://www.securityweek.com/adobe-reader-zero-day-exploited-for-months-researcher/
300,000 People Impacted by Eurail Data Breach

In December 2025, hackers stole names and passport numbers from the European travel company’s network.
The post 300,000 People Impacted by Eurail Data Breach appeared first on SecurityWeek.
https://www.securityweek.com/300000-people-impacted-by-eurail-data-breach/
$3.6 Million Stolen in Bitcoin Depot Hack

A hacker transferred more than 50 bitcoin from the Bitcoin ATM operator’s wallets after stealing credentials. 
The post $3.6 Million Stolen in Bitcoin Depot Hack appeared first on SecurityWeek.
https://www.securityweek.com/3-6-million-stolen-in-bitcoin-depot-hack/
Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long

Hackers vowed to revive its efforts against America when the time was right — demonstrating how digital warfare has become ingrained in military conflict.
The post Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long appeared first on SecurityWeek.
https://www.securityweek.com/shaky-ceasefire-unlikely-to-stop-cyberattacks-from-iran-linked-hackers-for-long/
The agentic SOC—Rethinking SecOps for the next decade

In the SOC of the future, autonomous defense moves at machine speed, agents add context and coordination, and humans focus on judgment, risk, and outcomes.
The post The agentic SOC—Rethinking SecOps for the next decade appeared first on Microsoft Security Blog.
https://www.microsoft.com/en-us/security/blog/2026/04/09/the-agentic-soc-rethinking-secops-for-the-next-decade/
Investigating Storm-2755: “Payroll pirate” attacks targeting Canadian employees

Microsoft Incident Response – Detection and Response Team (DART) researchers observed an emerging, financially motivated threat actor, tracked as Storm-2755, compromising Canadian employee accounts to gain unauthorized access to employee profiles and divert salary payments to attacker-controlled accounts.
The post Investigating Storm-2755: “Payroll pirate” attacks targeting Canadian employees appeared first on Microsoft Security Blog.
https://www.microsoft.com/en-us/security/blog/2026/04/09/investigating-storm-2755-payroll-pirate-attacks-targeting-canadian-employees/
Intent redirection vulnerability in third-party SDK exposed millions of Android wallets to potential risk

A severe Android intent‑redirection vulnerability in a widely deployed SDK exposed sensitive user data across millions of apps. Microsoft researchers detail how the flaw works, why it matters, and how developers can mitigate similar risks by updating affected SDKs.
The post Intent redirection vulnerability in third-party SDK exposed millions of Android wallets to potential risk appeared first on Microsoft Security Blog.
https://www.microsoft.com/en-us/security/blog/2026/04/09/intent-redirection-vulnerability-third-party-sdk-android/