VULNERABILITY

What Orgs Can Learn From Olympics, World Cup IR Plans

What Orgs Can Learn From Olympics, World Cup IR Plans

In the most recent episode of our monthly Reporters' Notebook video series, Tara Seals from ZeroOwl, Sharon Shea from TechTarget Search Security, and.

Real-Time Banking Trojan Strikes Brazil's Pix Users

Real-Time Banking Trojan Strikes Brazil's Pix Users

A new Android-based banking Trojan is trying to steal mobile payments in Brazil as they are being sent This article explores banking trojan specifically.

Xygeni GitHub Action Compromised Via Tag Poison

Xygeni GitHub Action Compromised Via Tag Poison

This month, an unknown threat actor got into one of application security vendor Xygeni's GitHub Actions by poisoning a tag This article explores github.

Microsoft Patches 83 CVEs in March Update

Microsoft Patches 83 CVEs in March Update

Microsoft this week released patches for 83 CVEs across its product range, six of which it expects attackers are more like to exploit for a variety of.

'Overly Permissive' Salesforce Cloud Configs in the Crosshairs

'Overly Permissive' Salesforce Cloud Configs in the Crosshairs

Discover how Salesforce Security said in a blog post on March 7 that "customers' overly permissive" Salesforce Experience Cloud guest user settings are.

'InstallFix' Attacks Spread Fake Claude Code Sites

'InstallFix' Attacks Spread Fake Claude Code Sites

The success of Anthropic's Claude Code and other AI coding tools is being leveraged by a new version of the ClickFix method This article explores code.

Are We Prepared for Agentic AI-Powered Auto Remediation?

Are We Prepared for Agentic AI-Powered Auto Remediation?

Optimizing remediation is essential to the success of security programs. This has become increasingly difficult as organizations strive to modernize their.

Three Years of Cisco SD-WAN Zero-Day Exploitation

Three Years of Cisco SD-WAN Zero-Day Exploitation

A critical zero-day vulnerability in Cisco's Catalyst SD-WAN Controller has been exploited in the wild for "at least three years," the company disclosed.

Chinese Police Use ChatGPT to Smear Japan PM Takaichi

Chinese Police Use ChatGPT to Smear Japan PM Takaichi

Discover how ChatGPT was used by someone connected to Chinese Communist Party (CCP) law enforcement to assist in managing smear campaigns against CCP.

Claude Code Errors Endanger Developers Computers

Claude Code Errors Endanger Developers Computers

Anthropic's AI-powered coding tool, Claude Code, had three serious security flaws that made it possible for developers to take over a machine and steal.

Why 'Call This Number' TOAD Emails Beat Gateways

Why 'Call This Number' TOAD Emails Beat Gateways

While avoiding clicking on dubious links or downloading malicious attachments is a major topic of discussion when it comes to phishing, there is an.

An AI-Armed Amateur Hacked More Than 600 FortiGate Devices

An AI-Armed Amateur Hacked More Than 600 FortiGate Devices

Hundreds of FortiGate instances were breached at scale by a financially motivated threat actor with limited technical expertise using generative.

Securing the Modern Workplace: Why Application and Third-Party Security Can’t Be Ignored

Securing the Modern Workplace: Why Application and Third-Party Security Can’t Be Ignored

The number of apps installed across endpoints has increased dramatically as businesses around the world speed up their digital transformation This article.

Attackers Check for React2Shell Exposure Using a New Tool

Attackers Check for React2Shell Exposure Using a New Tool

According to new information, a cyber espionage organization is preparing for attacks on significant industries. According to Anna Pham, senior hunt and.

Lessons From AI Hacking: Every Model, Every Layer Is Risky

Lessons From AI Hacking: Every Model, Every Layer Is Risky

Two years ago, Hillai Ben Sasson and Dan Segev set out to hack AI infrastructure in the hopes of discovering vulnerabilities. However, they were surprised.

AI Agents Disregard Security Policies in God-Like Attack Machines

AI Agents Disregard Security Policies in God-Like Attack Machines

Although AI agents are designed to be diligent and intent on finishing tasks given to them by the user, this singular focus has frequently backfired This.

Dell's Hard-Coded Flaw: A Nation-State Goldmine

Dell's Hard-Coded Flaw: A Nation-State Goldmine

For two years, a Chinese nation-state threat actor exploited a Dell hard-coded credential vulnerability, highlighting the risk of a pre-compromised.

RMM Abuse Explodes as Hackers Ditch Malware

RMM Abuse Explodes as Hackers Ditch Malware

When enterprise software can be used to prevent intrusions, why use malware This article explores malware threat actors. ? Threat actors essentially.

More than 260K Chrome Users Were Tricked by False AI Browser Extensions

More than 260K Chrome Users Were Tricked by False AI Browser Extensions

Discover how Numerous malicious browser extensions that pretend to be AI assistants but are actually stealing victims' personal information have taken.

When AI Factories Scale, Security Has to Be Engineered In

When AI Factories Scale, Security Has to Be Engineered In

A new era of enterprise AI is beginning This article explores ai factories infrastructures. . What started out as experimentation—single models, few.

Security Complexity Follows Suit for AI Agents to Swarm

Security Complexity Follows Suit for AI Agents to Swarm

It is more likely that several models and agents will need to collaborate as the AI landscape develops This article explores ai agents prevalent.

North Koreas UNC1069 Uses AI to Attack Crypto Companies

North Koreas UNC1069 Uses AI to Attack Crypto Companies

A financially driven North Korean threat actor is using innovative social engineering techniques powered by deepfakes to target cryptocurrency companies.

The automaker uses a developer-friendly platform to secure the supply chain.

The automaker uses a developer-friendly platform to secure the supply chain.

Discover how Software supply chain security has serious ramifications for teams in charge of installing software in connected cars. Real-world risks to.

Top Cyber Industry Defenses Spike CO2 Emissions

Top Cyber Industry Defenses Spike CO2 Emissions

Two specific areas of cybersecurity — backups and identity and access management (IAM) — are responsible for nearly half (45%) of the cybersecurity.

SolarWinds WHD Attacks Draw Attention to the Dangers of Vulnerable Apps

SolarWinds WHD Attacks Draw Attention to the Dangers of Vulnerable Apps

New vulnerabilities in SolarWinds Web Help Desk (WHD) are being exploited by threat actors, highlighting the dangers of applications that are accessible.

Microsoft Patches 6 Actively Exploited Zero-Days

Microsoft Patches 6 Actively Exploited Zero-Days

Six of the 59 vulnerabilities Microsoft revealed in its most recent security update are already being actively exploited by attackers, so security teams.

BYOVD Bundles With Ransomware Payload by Reynolds

BYOVD Bundles With Ransomware Payload by Reynolds

The bring-your-own-vulnerable-driver (BYOVD) technique has been reimagined by an emergent ransomware group. The Symantec and Carbon Black Threat Hunter.

Warlock Gang Breaches SmarterTools Via SmarterMail Bugs

Warlock Gang Breaches SmarterTools Via SmarterMail Bugs

A breach that happened as a result of vulnerabilities that SmarterTools fixed last month was recently revealed This article explores smartermail instance.

Top 5 this week

Page 2 of 4