HackMyIP

网络安全资讯

来自顶级安全媒体的最新动态

2026-05-21Dark Reading
Enterprises Boost AI Agent Identity Security Budgets as Omdia Reveals Shifting Priorities

Organizations are dramatically increasing investments in AI agent identity management as enterprise deployments accelerate, according to new research from Omdia. The study reveals ...

AI SecurityAuthenticationCloud Security
Read More → Use Tool →
2026-05-08SecurityWeek
Braintrust Data Breach: AWS API Keys Leaked, Prompting Rotation

Braintrust, an AI infrastructure provider, disclosed on March 5 2026 that an unauthorized party had gained access to one of its Amazon Web Services (AWS) accounts. The intrusion, d...

Data BreachCloud SecurityAI Security
Read More → Use Tool →
2026-05-08SecurityWeek
PCPJack Worm Cleans TeamPCP, Steals AWS Cloud Credentials

Security researchers have identified a new self‑propagating threat, named PCPJack, that behaves like a worm while simultaneously purging systems infected by the earlier TeamPCP mal...

MalwareCloud SecurityAuthentication
Read More → Use Tool →
2026-05-08BleepingComputer
NVIDIA Confirms GeForce NOW Data Breach Affects Armenian Users

NVIDIA has officially confirmed a data breach impacting its GeForce NOW service, exposing personal information for a subset of users in Armenia. The disclosure, made in a statement...

Data BreachPrivacyCloud Security
Read More → Use Tool →
2026-05-07The Hacker News
PCPJack Credential Stealer Uses 5 CVEs to Spread Worm-Like in Cloud

Cybersecurity researchers have uncovered a new credential‑stealing framework called PCPJack that aggressively targets exposed cloud infrastructure and propagates in a worm‑like fas...

MalwareCloud SecurityVulnerability
Read More → Use Tool →
2026-05-07BleepingComputer
PCPJack Worm Targets Cloud Infrastructure, Removes TeamPCP Infections

Security researchers have identified a new malware framework designated PCPJack that is actively targeting exposed cloud infrastructure environments. The threat operates as a crede...

MalwareCloud Security
Read More → Use Tool →
2026-05-07Dark Reading
PCPJack Malware Exploits Parquet Files to Steal Cloud Secrets

Security researchers at Unit 42 have uncovered a new cloud‑targeting malware family they are calling PCPJack, which has quietly replaced the earlier TeamPCP implant. PCPJack distin...

MalwareCloud SecurityThreat Intel
Read More → Use Tool →
2026-05-05The Hacker News
OAuth Token Exposure in AI Tools: Unclosed Backdoors Threaten Cloud Security

In the past twelve months, enterprises have rushed to embed AI‑powered writing assistants, workflow automations and productivity plugins into their Google Workspace and Microsoft 3...

VulnerabilityCloud SecurityAI Security
Read More → Use Tool →
2026-05-04BleepingComputer
Kaspersky: Amazon SES Phishing Evades Email Security

Kaspersky researchers identified a surge in phishing campaigns leveraging Amazon Simple Email Service (SES). Attackers abuse the trusted infrastructure by sending emails via verifi...

PhishingCloud SecurityThreat Intel
Read More → Use Tool →
2026-05-04BleepingComputer
Malicious PyTorch Lightning Package Steals AWS and Browser Credentials

On March 15, 2024, the Python Package Index (PyPI) removed a trojanized version of the popular deep‑learning wrapper "pytorch‑lightning" after security analysts at Cisco Talos iden...

MalwareSupply ChainCloud Security
Read More → Use Tool →
2026-05-04BleepingComputer
Amazon SES Phishing Surge: Evading Standard Security Filters

Amazon Simple Email Service (SES), the cloud‑based email sending platform offered by Amazon Web Services, is increasingly being weaponized by threat actors to distribute phishing e...

PhishingCloud SecurityThreat Intel
Read More → Use Tool →
2026-05-04BleepingComputer
MSPs: Strengthen Security & Backup with SaaS BCDR

Kaseya announced a live webinar titled “Why MSPs must rethink security and backup strategies” scheduled for June 15, 2026 at 2:00 PM ET. The session, hosted by Kaseya’s Product Mar...

Cloud SecurityIncident ResponseRansomware
Read More → Use Tool →
2026-05-03The Hacker News
CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-31431, a critical Linux kernel privilege escalation vulnerability, to its Known Exploited Vulner...

VulnerabilityZero-DayCloud Security
Read More → Use Tool →
2026-05-02BleepingComputer
ConsentFix v3: Automated OAuth Abuse Targets Azure

Security researchers have flagged a new iteration of the consent‑phishing tool known as ConsentFix, now labeled v3, which dramatically expands the scale and automation of attacks a...

Cloud SecurityAuthenticationThreat Intel
Read More → Use Tool →
2026-05-01The Hacker News
Vishing & SSO Abuse Power Rapid SaaS Extortion Attacks

Cybersecurity researchers have identified two distinct cybercrime groups orchestrating rapid, high‑impact extortion campaigns that operate almost entirely within Software‑as‑a‑Serv...

PhishingCloud SecurityThreat Intel
Read More → Use Tool →
2026-05-01The Hacker News
Top 5 Sales Challenges Costing MSPs Cybersecurity Revenue

Managed security services are on a steep ascent, with the market expected to swell from $38.31 billion in 2025 to $69.16 billion by 2030, making cybersecurity the fastest‑growing s...

Cloud SecurityThreat Intel
Read More → Use Tool →
2026-04-30The Hacker News
DEEP#DOOR Python Backdoor Steals Browser and Cloud Credentials

Security researchers at SentinelOne and WithSecure have uncovered a sophisticated Python-based backdoor named DEEP#DOOR that leverages legitimate tunneling services to establish co...

MalwareCloud SecurityThreat Intel
Read More → Use Tool →
2026-04-30Dark Reading
Oracle Red Bull Racing Powers Security with Automation

Oracle Red Bull Racing has launched a sweeping automation initiative aimed at embedding security directly into the team’s high‑velocity development pipelines. With the pit wall and...

Cloud SecurityIncident ResponseVulnerability
Read More → Use Tool →
2026-04-29The Hacker News
Exposure Management Platforms: Key Features and Common Pitfalls

Security teams across industries are increasingly discovering that traditional vulnerability management approaches fail to accurately represent organizational risk. Despite closing...

VulnerabilityThreat IntelCloud Security
Read More → Use Tool →
2026-04-28The Hacker News
Secure Data Movement: The Zero Trust Bottleneck You're Ignoring

In the rush to hybrid cloud adoption, many organizations treat data movement as a simple connectivity chore. Open a ticket, spin up an SFTP gateway, push the data across, and consi...

Data BreachCloud SecurityVulnerability
Read More → Use Tool →
2026-04-28The Hacker News
Microsoft Patches Entra ID Role Flaw Enabling Service Principal Takeover

Silverfort’s identity threat research team disclosed a critical misconfiguration in a Microsoft Entra ID administrative role designed for AI agents. The role, named “AI Service Adm...

VulnerabilityCloud Security
Read More → Use Tool →
2026-04-27Dark Reading
UNC6692 APT Deploys Snow Malware via Microsoft Teams, AWS S3

Cybersecurity researchers have identified a sophisticated campaign conducted by the threat actor UNC6692, who is combining social engineering, custom malware, and cloud infrastruct...

APTMalwareCloud Security
Read More → Use Tool →
2026-04-24Dark Reading
Glasswing Secures Code, But Your Stack Still Exposed

Glasswing’s recent announcement that it has secured the core code of its platform is a welcome step toward reducing software vulnerabilities, but security experts warn that the bro...

Supply ChainAI SecurityCloud Security
Read More → Use Tool →
2026-04-24Dark Reading
Chinese APT Exploits Outlook, Slack, Discord & file.io to Spy on Mongolia

Security researchers at Secureworks’ Counter Threat Unit (CTU) have uncovered a sophisticated espionage operation conducted by a Chinese state‑sponsored APT that targeted Mongolian...

APTCloud SecurityMalware
Read More → Use Tool →
2026-04-23Dark Reading
Zealot AI Attack Exposes Cloud Security Risks

In a live demonstration at the Dark Reading CyberStorm conference, researchers from Sentinel Labs unveiled 'Zealot', a proof‑of‑concept AI framework designed to autonomously compro...

AI ThreatsCloud Security
Read More → Use Tool →
2026-03-23KrebsOnSecurity
CanisterWorm Worm Targets Iran via Cloud Services, Wipes Data

Security researchers at SecureSphere Labs have uncovered a new file‑wiping worm they have named CanisterWorm, attributed to a financially motivated threat actor tracked under the a...

MalwareCloud SecurityThreat Intel
Read More → Use Tool →
2025-09-02Ars Technica
Google Defends Gmail Security Amid Breach Claims

Google on Monday rebuffed recent reports—published by Ars Technica—that claimed a massive breach exposing all 2.5 billion Gmail accounts, asserting that its security controls are r...

Cloud SecurityPrivacyData Breach
Read More → Use Tool →