Visualização normal
-
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News
-
Why Outdated Maintenance Software Is a Growing Ransomware Risk
Outdated maintenance software increases ransomware risk by exposing weak access controls, unpatched systems, and critical operational data to attackers.
-
Security | TechRepublic
-
Microsoft Defender Bug Triggers False Malware Alerts for DigiCert Certificates
Microsoft fixed a Defender false positive that flagged legitimate DigiCert certificates as malware, disrupting Windows trust stores for some IT teams. The post Microsoft Defender Bug Triggers False Malware Alerts for DigiCert Certificates appeared first on TechRepublic.
Microsoft Defender Bug Triggers False Malware Alerts for DigiCert Certificates
Microsoft fixed a Defender false positive that flagged legitimate DigiCert certificates as malware, disrupting Windows trust stores for some IT teams.
The post Microsoft Defender Bug Triggers False Malware Alerts for DigiCert Certificates appeared first on TechRepublic.
-
Cybersecurity News
-
MOVEit Automation Alert: Critical Authentication Bypass Hits CVSS 9.8
The post MOVEit Automation Alert: Critical Authentication Bypass Hits CVSS 9.8 appeared first on Daily CyberSecurity. Related posts: Total Platform Compromise: Critical 9.6 CVSS Flaws in Budibase Expose Production Secrets Winter CMS Urgently Patches Critical 10.0 CVSS Privilege Escalation Flaw Two High-Severity Spring Boot Flaws Expose Actuator Endpoints
MOVEit Automation Alert: Critical Authentication Bypass Hits CVSS 9.8
The post MOVEit Automation Alert: Critical Authentication Bypass Hits CVSS 9.8 appeared first on Daily CyberSecurity.
-
Security | TechRepublic
-
Microsoft Flagged 8.3B Phishing Emails in Q1 as QR Codes, CAPTCHAs Rise
Microsoft flagged 8.3 billion phishing emails as attackers turned to QR codes, fake CAPTCHAs, PhaaS kits, and file-based payloads. The post Microsoft Flagged 8.3B Phishing Emails in Q1 as QR Codes, CAPTCHAs Rise appeared first on TechRepublic.
Microsoft Flagged 8.3B Phishing Emails in Q1 as QR Codes, CAPTCHAs Rise
Microsoft flagged 8.3 billion phishing emails as attackers turned to QR codes, fake CAPTCHAs, PhaaS kits, and file-based payloads.
The post Microsoft Flagged 8.3B Phishing Emails in Q1 as QR Codes, CAPTCHAs Rise appeared first on TechRepublic.
-
Security | TechRepublic
-
6 Best Enterprise Antivirus Software Choices in 2026
We reviewed the leading enterprise antivirus and EDR tools for 2026 and found SentinelOne Singularity to be the best overall, followed closely by Microsoft Defender and CrowdStrike Falcon. The post 6 Best Enterprise Antivirus Software Choices in 2026 appeared first on TechRepublic.
6 Best Enterprise Antivirus Software Choices in 2026
We reviewed the leading enterprise antivirus and EDR tools for 2026 and found SentinelOne Singularity to be the best overall, followed closely by Microsoft Defender and CrowdStrike Falcon.
The post 6 Best Enterprise Antivirus Software Choices in 2026 appeared first on TechRepublic.
-
BleepingComputer
-
Microsoft tests modern Windows Run, says it's faster than legacy dialog
Microsoft has confirmed that Windows 11 is getting a new modern Run dialog with dark mode support and faster performance in a new preview build. [...]
Microsoft tests modern Windows Run, says it's faster than legacy dialog
-
Firewall Daily – The Cyber Express

-
Dutch Health Tech Firm ChipSoft Confirms Destruction of Stolen Patient Data
The Cyber Express previously reported the ChipSoft cyberattack, in which ransomware actors stole patient data. Now, reports have surfaced from the Dutch medical software provider, noting that the compromised data has been destroyed, though key details about the incident remain undisclosed. In an update issued on April 28, 2026, ChipSoft stated that all data collected during the cyberattack had been deleted. According to the company, cybersecurity specialists verified that the destruction was
Dutch Health Tech Firm ChipSoft Confirms Destruction of Stolen Patient Data
![]()
Timeline of the ChipSoft Cyberattack
The ChipSoft cyberattack first came to light in early April 2026. On April 12, ChipSoft disclosed that it had fallen victim to a cyberattack on its systems earlier that week. As an immediate precaution, the company disabled connections to several key services, including its Care Portal, Care Platform, and HiX Mobile applications, starting April 8. At the time, ChipSoft confirmed it had engaged Z-CERT, the Dutch healthcare cybersecurity expertise center, and external cybersecurity professionals to conduct a forensic investigation. The company acknowledged the disruption caused to healthcare providers and patients, noting that patient portals were temporarily unavailable and data exchange via the platform had been halted.Data Theft Confirmed in the Netherlands
By April 16, the investigation revealed that cybercriminals behind the ransomware attack had successfully stolen personal and medical data from several Dutch healthcare institutions. ChipSoft confirmed that affected organizations were being notified directly. Hans Mulder, CEO of ChipSoft, addressed the breach, stating: “After forty years of dedication to reliable healthcare IT, it pains us that this situation has arisen. We cannot undo this data theft. However, we are doing everything we can to support the affected customers as best as possible in this situation.” In contrast, a separate update on the same day confirmed that Belgian patient data had not been compromised in the cyberattack on ChipSoft systems.Systems Shutdown and Gradual Recovery
The cyberattack forced ChipSoft to shut down multiple services as a preventive measure. Systems such as Zorgplatform, Zorgportaal, and HiX Mobile were temporarily taken offline, affecting daily operations in healthcare institutions. By April 17, after extensive analysis conducted in collaboration with cybersecurity experts and Z-CERT, ChipSoft announced that the affected systems were safe to use again. A phased rollout began shortly afterward, with healthcare institutions being informed directly about the restoration process. Further progress was reported on April 24, when ChipSoft confirmed that most healthcare institutions had regained access to Zorgplatform. Connections to Zorgportaal were also being restored, allowing many patient portals to become operational again. The HiX Mobile app became available once institutions reactivated their systems. Despite these advancements, ChipSoft cautioned that the recovery process required time and careful handling. The company acknowledged the strain placed on healthcare providers, stating that the precautionary measures had significantly impacted daily workflows and patient care.-
Security | TechRepublic
-
Microsoft Confirms Windows Flaw Is Being Exploited After Incomplete Patch
Microsoft confirmed a Windows zero-click flaw tied to an incomplete patch is being exploited, putting credentials at risk for unpatched users. The post Microsoft Confirms Windows Flaw Is Being Exploited After Incomplete Patch appeared first on TechRepublic.
Microsoft Confirms Windows Flaw Is Being Exploited After Incomplete Patch
Microsoft confirmed a Windows zero-click flaw tied to an incomplete patch is being exploited, putting credentials at risk for unpatched users.
The post Microsoft Confirms Windows Flaw Is Being Exploited After Incomplete Patch appeared first on TechRepublic.
-
The Security Ledger
-
How Claude Planted Malicious Code In A Crypto-Trading App
A malicious campaign by North Korean state actors saw a malicious npm package dependency slipped into a crypto trading agent by an AI coding agent, according to a new report by ReversingLabs. The incident highlights a troubling new frontier in software supply chain attacks: hackers targeting developers...and the AI tools writing their code. The post How Claude Planted Malicious Code In A Crypto-Trading App appeared first on The Security Ledger with Paul F. Roberts.
How Claude Planted Malicious Code In A Crypto-Trading App
A malicious campaign by North Korean state actors saw a malicious npm package dependency slipped into a crypto trading agent by an AI coding agent, according to a new report by ReversingLabs. The incident highlights a troubling new frontier in software supply chain attacks: hackers targeting developers...and the AI tools writing their code.
The post How Claude Planted Malicious Code In A Crypto-Trading App appeared first on The Security Ledger with Paul F. Roberts.
-
Security | TechRepublic
-
ClickUp Data Leak Exposes Enterprise Emails for Over a Year
A hardcoded ClickUp API key exposed hundreds of corporate and government emails for over a year, raising new SaaS security concerns. The post ClickUp Data Leak Exposes Enterprise Emails for Over a Year appeared first on TechRepublic.
ClickUp Data Leak Exposes Enterprise Emails for Over a Year
A hardcoded ClickUp API key exposed hundreds of corporate and government emails for over a year, raising new SaaS security concerns.
The post ClickUp Data Leak Exposes Enterprise Emails for Over a Year appeared first on TechRepublic.
-
Security | TechRepublic
-
ADT Confirms Major Data Breach Exposing Millions of Names, Partial SSNs
ADT confirmed a data breach exposing customer names, addresses, phone numbers, and partial SSNs, with millions of records reportedly affected. The post ADT Confirms Major Data Breach Exposing Millions of Names, Partial SSNs appeared first on TechRepublic.
ADT Confirms Major Data Breach Exposing Millions of Names, Partial SSNs
ADT confirmed a data breach exposing customer names, addresses, phone numbers, and partial SSNs, with millions of records reportedly affected.
The post ADT Confirms Major Data Breach Exposing Millions of Names, Partial SSNs appeared first on TechRepublic.
-
Cybersecurity News
-
Attackers Are Weaponizing Foxit PDF Reader’s Reputation
The post Attackers Are Weaponizing Foxit PDF Reader’s Reputation appeared first on Daily CyberSecurity. Related posts: CyberEye RAT: Plug-and-Play Espionage via Telegram-Powered Malware DCRat: Sophisticated RAT Delivered via Phishing Campaign Impersonating Government Entity NetSupport RAT Returns: Weaponized via WordPress & “ClickFix” for Remote Access
Attackers Are Weaponizing Foxit PDF Reader’s Reputation
The post Attackers Are Weaponizing Foxit PDF Reader’s Reputation appeared first on Daily CyberSecurity.
-
Cybersecurity News
-
Carlson VASCO-B GNSS Receivers Left Open to Remote Hijack
The post Carlson VASCO-B GNSS Receivers Left Open to Remote Hijack appeared first on Daily CyberSecurity. Related posts: Critical 9.8 CVSS Flaw Exposes Intrado 911 Emergency Gateways CVE-2026-1603: Remote Unauthenticated Attacker Can Steal Ivanti EPM Secrets The Three-Year Shadow: Critical CVSS 10 Cisco SD-WAN Zero-Day Exploited by UAT-8616
Carlson VASCO-B GNSS Receivers Left Open to Remote Hijack
The post Carlson VASCO-B GNSS Receivers Left Open to Remote Hijack appeared first on Daily CyberSecurity.
-
Security | CIO

-
구글, AI 해커 대응 위해 ‘에이전틱 보안 전략’ 전면 강화
구글은 ‘구글 클라우드 넥스트 2026’에서 에이전틱 AI 기반 방어 전략을 전면에 내세웠다. 이는 CVE(공통 취약점 및 노출) 급증에 대응하느라 어려움을 겪는 보안 운영센터(SOC) 분석가들을 지원하기 위한 조치다. 앤트로픽의 미토스(Mythos)가 더 많은 소프트웨어 취약점을 발견할 것으로 예상되는 가운데, 구글은 향후 쏟아질 위협에 대응하려면 인간 분석가가 아닌 AI 에이전트가 핵심 역할을 맡아야 한다고 보고 있다. 구글은 탐지 자동화, 대응 속도 향상, 그리고 AI·클라우드·서드파티 생태계가 복잡하게 얽힌 환경을 보호하는 데 초점을 맞춘 새로운 기능도 공개했다. 이번 발표에는 구글 시큐리티 오퍼레이션(Google Security Operations)에 새롭게 추가된 3종의 AI 에이전트, 위즈 통합 확대를 통한 멀티클라우드 및 AI 스튜디오 보안 강화, 그리고 섀도우 AI에 대응하는 방어 계층을 제공하는 제미나이 엔터
구글, AI 해커 대응 위해 ‘에이전틱 보안 전략’ 전면 강화
구글은 ‘구글 클라우드 넥스트 2026’에서 에이전틱 AI 기반 방어 전략을 전면에 내세웠다. 이는 CVE(공통 취약점 및 노출) 급증에 대응하느라 어려움을 겪는 보안 운영센터(SOC) 분석가들을 지원하기 위한 조치다.
앤트로픽의 미토스(Mythos)가 더 많은 소프트웨어 취약점을 발견할 것으로 예상되는 가운데, 구글은 향후 쏟아질 위협에 대응하려면 인간 분석가가 아닌 AI 에이전트가 핵심 역할을 맡아야 한다고 보고 있다.
구글은 탐지 자동화, 대응 속도 향상, 그리고 AI·클라우드·서드파티 생태계가 복잡하게 얽힌 환경을 보호하는 데 초점을 맞춘 새로운 기능도 공개했다.
이번 발표에는 구글 시큐리티 오퍼레이션(Google Security Operations)에 새롭게 추가된 3종의 AI 에이전트, 위즈 통합 확대를 통한 멀티클라우드 및 AI 스튜디오 보안 강화, 그리고 섀도우 AI에 대응하는 방어 계층을 제공하는 제미나이 엔터프라이즈 에이전트 플랫폼(Gemini Enterprise Agent Platform)이 포함됐다.
이와 함께 구글은 최신 IAM(접근 권한 관리)을 기반으로 권한 설정을 간소화하는 작업을 진행 중이며, 구글 클라우드 보안 전반에 걸친 다양한 개선도 추진하고 있다고 밝혔다.
에이전트형 보안 전략 강화
구글은 보안 운영센터(SOC) 팀을 지원하기 위한 가장 직접적인 방안으로 구글 시큐리티 오퍼레이션스(Google Security Operations)에 3종의 신규 AI 에이전트를 도입했다. 여기에는 위협 헌팅 에이전트, 탐지 엔지니어링 에이전트, 서드파티 컨텍스트 에이전트가 포함된다.
현재 프리뷰 단계인 위협 헌팅 에이전트와 탐지 엔지니어링 에이전트는 각각 새로운 공격 패턴을 식별하고 탐지 공백을 해소하는 데 초점을 맞췄다. 향후 프리뷰에 들어갈 예정인 서드파티 컨텍스트 에이전트는 외부 인텔리전스를 결합해 보안 조사 품질을 높이도록 설계됐다.
구글이 기존에 사용해온 ‘초기 분류 및 조사용 AI 에이전트가 이미 500만 건 이상의 보안 경고를 처리했으며, 제미나이를 활용해 분석 시간을 기존 30분에서 약 1분 수준으로 줄였다고 밝혔다.
또한 구글은 ‘에이전트 자동화(Agentic Automation)’ 개념도 강조했다. 이는 대응 조치를 자동으로 실행하는 방식으로, 구글 위협 인텔리전스(Google Threat Intelligence)에 통합된 다크웹 인텔리전스 기능과 결합해 실제 위협을 높은 정확도로 선별하는 데 초점을 둔다.
위즈·AI-BOM으로 AI 개발 확산 대응
구글은 AI 개발 환경 확산과 멀티클라우드 리스크에 대응하기 위해 위즈 포트폴리오를 확대했다.
위즈는 AWS와 마이크로소프트 애저(Microsoft Azure), SaaS 플랫폼, AI 에이전트 스튜디오 등 다양한 환경을 연결하는 핵심 계층으로 자리 잡고 있다.
구글 클라우드 COO 겸 보안 제품 부문 사장 프랜시스 드수자는 “위즈는 데이터브릭스는 물론 AWS 에이전트코어(Agentcore), 제미나이 엔터프라이즈 에이전트 플랫폼(Gemini Enterprise Agent Platform), 마이크로소프트 애저 코파일럿 스튜디오(Microsoft Azure Copilot Studio), 세일즈포스 에이전트포스 등 새로운 에이전트 스튜디오까지 지원해, 고객이 어떤 방식으로 개발하더라도 가시성을 확보할 수 있도록 한다”고 설명했다.
이번 통합을 통해 AI 생성 코드에 대한 인라인 스캔, 개발자 워크플로우와의 직접 연동, 그리고 조직 내 모든 AI 구성 요소를 목록화하는 AI-BOM(AI Bill of Materials) 기능이 새롭게 추가됐다.
AI-BOM은 모델, 프레임워크, IDE 플러그인까지 포함해 조직 내 AI 자산을 체계적으로 파악할 수 있도록 지원하며, 승인된 도구와 실제 사용 도구 간 차이를 확인할 수 있게 해 섀도우 AI 대응 수단으로 활용된다.
‘에이전트 웹’ 보안 강화
구글은 AI 에이전트가 시스템 전반에서 자율적으로 상호작용하는 영역을 에이전틱 웹(Agentic Web)으로 정의하고, 해당 환경에 대한 가시성 확보에 나섰다.
이를 위해 구글은 거버넌스와 정책 집행을 지원하는 에이전트 아이덴티티(Agent Identity)와 에이전트 게이트웨이(Agent Gateway)를 도입했다. 동시에 프롬프트 인젝션과 데이터 유출 같은 위험을 완화하기 위해 모델 아머(Model Armor)와의 통합도 한층 강화했다.
또한 구글 클라우드 사기 방지(Google Cloud Fraud Defense)를 통해 봇 및 사기 탐지 방식도 재정비했다. 이 시스템은 전체 워크플로우에서 인간 사용자, 봇, AI 에이전트를 구분해 보다 정밀한 보안 대응을 가능하게 한다.
dl-ciokorea@foundryco.com

-
BleepingComputer
-
Microsoft rolls out revamped Windows Insider Program
Microsoft says it's rolling out a revamped Windows Insider Program experience as part of the broader plans to address performance and reliability concerns affecting Windows 11. [...]
Microsoft rolls out revamped Windows Insider Program
-
Security | TechRepublic
-
Google’s Pixel Update Sparks ‘Severe’ Battery Drain Across Multiple Models
Google Pixel users are reporting severe battery drain after recent Android updates, with complaints spanning multiple models and no confirmed fix yet. The post Google’s Pixel Update Sparks ‘Severe’ Battery Drain Across Multiple Models appeared first on TechRepublic.
Google’s Pixel Update Sparks ‘Severe’ Battery Drain Across Multiple Models
Google Pixel users are reporting severe battery drain after recent Android updates, with complaints spanning multiple models and no confirmed fix yet.
The post Google’s Pixel Update Sparks ‘Severe’ Battery Drain Across Multiple Models appeared first on TechRepublic.
-
Security | TechRepublic
-
Microsoft: Most Windows 11 Users Don’t Need Third-Party Antivirus
Microsoft says Windows 11’s built-in security is strong enough for most users, though power users and enterprises may still want third-party protection. The post Microsoft: Most Windows 11 Users Don’t Need Third-Party Antivirus appeared first on TechRepublic.
Microsoft: Most Windows 11 Users Don’t Need Third-Party Antivirus
Microsoft says Windows 11’s built-in security is strong enough for most users, though power users and enterprises may still want third-party protection.
The post Microsoft: Most Windows 11 Users Don’t Need Third-Party Antivirus appeared first on TechRepublic.
-
Cybersecurity News
-
MOVEit WAF Critical Alert: Multi-Level RCE and WAF Bypass Vulnerabilities Disclosed
The post MOVEit WAF Critical Alert: Multi-Level RCE and WAF Bypass Vulnerabilities Disclosed appeared first on Daily CyberSecurity. Related posts: Progress Kemp LoadMaster Alert: Multiple RCE and WAF Bypass Flaws Patched The Instant Weaponization of Oracle’s 10.0 CVSS “Zero-Day-Like” Flaw High-Severity RCE and XSS Vulnerabilities Patched in Apache Storm 2.8.6
MOVEit WAF Critical Alert: Multi-Level RCE and WAF Bypass Vulnerabilities Disclosed
The post MOVEit WAF Critical Alert: Multi-Level RCE and WAF Bypass Vulnerabilities Disclosed appeared first on Daily CyberSecurity.
-
Cybersecurity News
-
The Price of Privacy: Atlassian to Train AI on Jira and Confluence Data Starting August 2026
The post The Price of Privacy: Atlassian to Train AI on Jira and Confluence Data Starting August 2026 appeared first on Daily CyberSecurity. Related posts: LinkedIn to Use Your Data for AI Training. Here’s How to Opt Out Ubisoft Hit by New Data Breach Popular Chrome Extensions Caught Leaking Sensitive User Data via Unencrypted HTTP
The Price of Privacy: Atlassian to Train AI on Jira and Confluence Data Starting August 2026
The post The Price of Privacy: Atlassian to Train AI on Jira and Confluence Data Starting August 2026 appeared first on Daily CyberSecurity.
-
Cybersecurity News
-
Progress Kemp LoadMaster Alert: Multiple RCE and WAF Bypass Flaws Patched
The post Progress Kemp LoadMaster Alert: Multiple RCE and WAF Bypass Flaws Patched appeared first on Daily CyberSecurity. Related posts: Critical 9.1 Flaws Hit Fortinet FortiSandbox ASUS Kills “File Shredder” Feature to Fix Critical Flaw Sandbox Escape: Critical 9.2 Severity RCE Flaw Unmasked in ServiceNow AI Platform
Progress Kemp LoadMaster Alert: Multiple RCE and WAF Bypass Flaws Patched
The post Progress Kemp LoadMaster Alert: Multiple RCE and WAF Bypass Flaws Patched appeared first on Daily CyberSecurity.