theinfosecnews
CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634
P
policy

Microsoft Mandates Windows 11 25H2 Upgrade for Unmanaged Home and Pro Devices

Microsoft has begun force-upgrading unmanaged Windows 11 24H2 Home and Pro devices to version 25H2 to address critical vulnerabilities including CVE-2023-28252. Unmanaged devices not enrolled in enterprise management tools will be automatically updated starting June 2024. Organizations should audit unmanaged endpoints and enforce patch management to maintain security compliance.

BleepingComputer·3h ago·2 min read
Read full story
Allvulnerability70malware15policy14breach5apt3ransomware1
Ppolicy

RSAC 2026: AI-Driven Threats, Global Cyber Leadership Shifts, and the Policies Reshaping Defense Priorities

RSAC 2026 surfaced AI-assisted attack tooling, enforcement of EU NIS2 and the incoming EU AI Act, and structural shifts in U.S. and allied cyber leadership as the defining issues for security practitioners. SOC teams and CISOs face active NIS2 enforcement since October 2024, EU AI Act high-risk system deadlines in August 2026, and ongoing CISA KEV remediation obligations. Organizations must audit AI product compliance, validate vulnerability remediation workflows, and document NIS2 risk management measures now.

Dark Reading·14h ago·4 min read
Bbreach

Cisco Talos Links Large-Scale Credential Harvesting Campaign to React2Shell Exploitation

Cisco Talos has attributed a large-scale credential harvesting operation to a tracked threat cluster exploiting the React2Shell vulnerability to steal AWS secrets, SSH keys, GitHub tokens, Stripe API keys, database credentials, and shell history at scale. The campaign used automated post-exploitation tooling to sweep compromised systems for secrets across multiple credential categories simultaneously. Affected organizations should immediately patch React2Shell, rotate all exposed secrets, and review cloud and source control access logs using IOCs published by Talos.

The Hacker News·15h ago·3 min read
Ppolicy

SEC Cybersecurity Disclosure Rule: What CISOs and Security Engineers Must Do Before the Deadlines Hit

The SEC's cybersecurity disclosure rule requires public companies to report material incidents on Form 8-K within four business days of a materiality determination, and to disclose risk management programs and board oversight annually in 10-K filings. Large accelerated filers have been subject to incident reporting requirements since December 18, 2023, with enforcement precedent already set through the SEC's fraud charges against SolarWinds and CISO Timothy Brown. Security teams must build materiality determination workflows, align IR playbooks to disclosure triggers, and ensure 10-K disclosures accurately reflect internal security posture.

Dark Reading·16h ago·4 min read
Bbreach

Drift Protocol Loses $280 Million After Attacker Seizes Security Council Admin Controls

Drift Protocol, a Solana-based decentralized perpetuals exchange, lost at least $280 million after an attacker compromised the signing keys of its Security Council multisig and used administrative privileges to drain protocol-controlled vaults. The attack targeted the governance layer rather than a smart contract vulnerability, exploiting insufficient key management practices among Security Council signers. Affected users should withdraw remaining funds, revoke token approvals, and avoid unofficial recovery contracts.

BleepingComputer·16h ago·3 min read
Vvulnerability

CVE Pending: Critical Vulnerability in Anthropic's Claude Code Discovered Days After Source Code Leak

Adversa AI discovered a critical vulnerability in Anthropic's Claude Code agentic coding assistant within days of Anthropic accidentally leaking the product's source code. Claude Code operates with elevated system privileges in developer environments, making exploitation potentially severe — including credential theft, CI/CD pipeline manipulation, and lateral movement. Organizations should audit deployments, rotate credentials, and apply patches immediately once Anthropic releases a fix.

SecurityWeek·17h ago·3 min read
Ppolicy

FCC Mandates Pre-Approval for All Foreign-Manufactured Routers Imported or Sold in the US

The FCC now requires pre-approval for all foreign-manufactured routers before they can be imported, marketed, or sold in the United States, with applicants required to disclose foreign investor relationships and submit a U.S. manufacturing relocation plan. The rule targets supply chain risks tied to documented exploitation campaigns by groups including Volt Typhoon and Salt Typhoon, which compromised SOHO and enterprise routers to gain persistent access to U.S. critical infrastructure. CISOs, procurement teams, and network engineers must audit hardware pipelines, monitor DoD and DHS exemption lists, and pressure vendors for compliance timelines now.

Schneier on Security·17h ago·4 min read
Vvulnerability

Apple Expands DarkSword Exploit Kit Mitigations Across Device Fleet After State-Sponsored and Spyware Vendor Abuse

Apple has expanded mitigations against the DarkSword exploit kit to additional devices after the toolkit was used in operations by state-sponsored threat groups and commercial spyware vendors. The expansion follows Apple's standard model of phased protection rollouts across its device ecosystem. All Apple device owners should apply the latest OS updates immediately, and high-risk individuals should enable Lockdown Mode.

SecurityWeek·19h ago·3 min read
Vvulnerability

CVE-2024-6387: OpenSSH regreSSHion RCE Flaw Exposes Millions of Linux Servers to Unauthenticated Root Access

CVE-2024-6387 (regreSSHion) is a signal handler race condition in OpenSSH sshd versions 8.5p1 through 9.7p1 that allows unauthenticated remote code execution as root. Discovered by Qualys, the flaw affects an estimated 700,000 publicly exposed servers. Administrators should upgrade to OpenSSH 9.8p1 immediately or set LoginGraceTime 0 as a temporary workaround.

BleepingComputer·20h ago·3 min read
Vvulnerability

CVE-2026-20093: Critical Cisco IMC Authentication Bypass Carries CVSS 9.8

Cisco has patched CVE-2026-20093, a critical authentication bypass vulnerability in the Cisco Integrated Management Controller (IMC) with a CVSS score of 9.8. An unauthenticated remote attacker can exploit the flaw to bypass authentication and gain elevated privileges over affected hardware management interfaces. Administrators should apply Cisco's patch immediately and restrict IMC network access to isolated management VLANs.

The Hacker News·20h ago·3 min read
Vvulnerability

CVE-2025-30208: Vite Development Server Path Traversal Allows Arbitrary File Read

CVE-2025-30208 is a path traversal vulnerability in Vite's development server that allows unauthenticated remote attackers to read arbitrary files from the host filesystem by crafting a malicious URL query string. Affected versions span Vite 4.x through 6.2.x, with patched releases available across all supported branches. Teams running Vite dev servers with network exposure should patch immediately and rotate any secrets that may have been accessible.

SANS ISC·20h ago·3 min read
Bbreach

Vacant Property Mail Interception: How Threat Actors Convert Drop Addresses Into Fraud Infrastructure

Flare research documents how threat actors register vacant properties as mail drop addresses by abusing USPS Change of Address mechanisms and synthetic identities to intercept physical mail containing PII, financial credentials, and authentication material. The methodology chains public foreclosure data, dark web identity documents, and reshipping mules into a functional fraud pipeline targeting bank card deliveries, government correspondence, and OTP letters. Individuals should enroll in USPS Informed Delivery and freeze their addresses online; security teams should re-evaluate physical mail as a weak authentication channel.

BleepingComputer·21h ago·3 min read