Swedish authorities have launched formal investigations into a significant data breach affecting Miljödata, a prominent IT company whose security lapse exposed the personal information of […]
Author: cyberbytes
Hackers Exploit AI Tools to Intensify Ransomware Attacks on European Organizations
European organizations are facing an unprecedented surge in ransomware attacks as cybercriminals increasingly adopt artificial intelligence and sophisticated social engineering tactics to breach defenses and […]
Elusive Iranian APT Phishes Influential US Policy Wonks
Iran is spying on American foreign policy influencers. But exactly which of its government’s APTs is responsible remains a mystery. ​The original article found on […]
Jupyter Misconfiguration Exposes Systems to Root Privilege Escalation
Security researchers have uncovered a vulnerability in commonly misconfigured Jupyter notebook servers that allows attackers to gain root-level access on Linux systems. The flaw doesn’t […]
Louvre-Raubzug offenbart jahrzehntelanges Security-Versagen
Windows-Sicherheitsprobleme haben beim Louvre-Museum scheinbar Tradition. Shutterstock / Phil Pasquini Das Louvre-Museum in Paris wurde im Oktober 2025 bekanntlich von Einbrechern heimgesucht und auf ziemlich […]
Security Professionals Charged for Using BlackCat Ransomware Against American Businesses
Two individuals with security backgrounds have been federally charged for orchestrating a coordinated ransomware attack campaign against American businesses using the dangerous BlackCat strain. Ryan […]
Curly COMrades Hacker Group Deploys New Tools for Stealthy Remote Access on Compromised Windows 10 Systems
A sophisticated threat actor known as Curly COMrades has demonstrated advanced evasion capabilities by leveraging legitimate Windows virtualization features to establish covert, long-term access to […]
Silent Lynx APT New Attack Targeting Governmental Employees Posing as Officials
Seqrite Labs’ APT Team has documented fresh campaigns from Silent Lynx, a sophisticated threat actor group known for orchestrating spear-phishing operations that impersonate government officials […]
Hackers Abuse OneDrive.exe via DLL Sideloading to Run Malicious Code
Security researchers have discovered a sophisticated attack technique that exploits Microsoft’s OneDrive application to execute malicious code without detection. The method, known as DLL sideloading, […]
CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Gladinet and Control Web Panel (CWP) to its Known Exploited […]