WebNews
Please enter a web search for web results.
NewsWeb
Researchers Uncover Pre-Stuxnet "fast16" Malware Targeting Engineering Software
2+ hour, 36+ min ago (866+ words) Cybersecurity researchers have discovered a new Lua-based malware created years before the notorious Stuxnet worm that aimed to sabotage Iran's nuclear program by destroying uranium enrichment centrifuges. According to a new report published by Sentinel One, the previously undocumented cyber…...
NASA Employees Duped in Chinese Phishing Scheme Targeting U. S. Defense Software
21+ hour, 49+ min ago (430+ words) The Office of Inspector General (OIG) of the U. S. National Aeronautics and Space Administration (NASA) has revealed how a Chinese national posed as a U. S. researcher as part of a spear-phishing campaign to obtain sensitive information from the space agency, as well…...
Bridging the AI Agent Authority Gap: Continuous Observability as the Decision Engine
1+ day, 13+ min ago (214+ words) As discussed in our previous article, AI agents are exposing a structural gap in enterprise security, but the problem is often framed too narrowly. The issue is not simply that agents are new actors. It is that agents are delegated…...
LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure
1+ day, 4+ hour ago (617+ words) A high-severity security flaw in LMDeploy, an open-source toolkit for compressing, deploying, and serving LLMs, has come under active exploitation in the wild less than 13 hours after its public disclosure. The vulnerability, tracked as CVE-2026-33626 (CVSS score: 7. 5), relates to a…...
Threats Day Bulletin: $290 M De Fi Hack, mac OS Lot L Abuse, Proxy Smart SIM Farms +25 New Stories
1+ day, 22+ hour ago (283+ words) You scroll past one incident and see another that feels familiar, like it should have been fixed years ago, but it still works with small changes. Same bugs. Same mistakes. The supply chain is messy. Packages you did not check…...
[Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speed
1+ day, 23+ hour ago (244+ words) Imagine a world where hackers don't sleep, don't take breaks, and find weak spots in your systems instantly. Well, that world is already here. Thanks to AI, attackers are now launching automated, large-scale exploits faster than ever before. The time…...
Project Glasswing Proved AI Can Find the Bugs. Who's Going to Fix Them?
2+ day, 32+ min ago (1130+ words) Last week, Anthropic announced Project Glasswing, an AI model so effective at discovering software vulnerabilities that they took the extraordinary step of postponing its public release. Instead, the company has given access to Apple, Microsoft, Google, Amazon, and a coalition…...
Vercel Finds More Compromised Accounts in Context. ai-Linked Breach
2+ day, 3+ hour ago (482+ words) Vercel on Wednesday revealed that it has identified an additional set of customer accounts that were compromised as part of a security incident that enabled unauthorized access to its internal systems. The company said it made the discovery after expanding…...
China-Linked Gopher Whisper Infects 12 Mongolian Government Systems with Go Backdoors
2+ day, 2+ hour ago (331+ words) "The group wields a wide array of tools mostly written in Go, using injectors and loaders to deploy and execute various backdoors in its arsenal," Slovakian cybersecurity company ESET said in a report shared with The Hacker News. "Gopher Whisper…...
Toxic Combinations: When Cross-App Permissions Stack into Risk
3+ day, 1+ hour ago (908+ words) On January 31, 2026, researchers disclosed that Moltbook, a social network built for AI agents, had left its database wide open, exposing 35, 000 email addresses and 1. 5 million agent API tokens across 770, 000 active agents. The more worrying part sat inside the private messages. Some…...