Toys “R” Us Canada has sent notices of a data breach to customers informing them of a security incident where threat actors leaked customer records they had previously stolen from its systems. […] Go to Source Author: Bill Toulas
Category Archives: Security
The Cybersecurity & Infrastructure Security Agency (CISA) is warning that hackers are exploiting a critical vulnerability in the Motex Landscope Endpoint Manager. […] Go to Source Author: Bill Toulas
Microsoft says that the File Explorer (formerly Windows Explorer) now automatically blocks previews for files downloaded from the Internet to block credential theft attacks via malicious documents. […] Go to Source Author: Sergiu Gatlan
AI agents now act, decide, and access systems on their own — creating new blind spots Zero Trust can’t see. Token Security helps organizations govern AI identities so every agent’s access, intent, and action are verified and accountable. […] Go to Source Author: Sponsored by Token Security
OpenAI’s Atlas and Perplexity’s Comet browsers are vulnerable to AI sidebar spoofing attacks that mislead users into following fake AI-generated instructions. […] Go to Source Author: Bill Toulas
North Korean Lazarus hackers compromised three European companies in the defense sector through a coordinated Operation DreamJob campaign leveraging fake recruitment lures. […] Go to Source Author: Bill Toulas
State-sponsored Iranian hacker group MuddyWater has targeted more than 100 government entities in attacks that deployed version 4 of the Phoenix backdoor. […] Go to Source Author: Bill Toulas
Security researchers collected $792,750 in cash after exploiting 56 unique zero-day vulnerabilities during the second day of the Pwn2Own Ireland 2025 hacking competition. […] Go to Source Author: Sergiu Gatlan
Hackers are actively exploiting the critical SessionReaper vulnerability (CVE-2025-54236) in Adobe Commerce (formerly Magento) platforms, with hundreds of attempts recorded. […] Go to Source Author: Bill Toulas
A high-severity vulnerability in the now-abandoned async-tar Rust library and its forks can be exploited to gain remote code execution on systems running unpatched software. […] Go to Source Author: Sergiu Gatlan
