Security researchers at GreyNoise have uncovered a massive spike in cyberattacks targeting Palo Alto Networks GlobalProtect VPN systems. The assault began on November 14, 2025, […]
Author: cyberbytes
The Rise of Hybrid Threat Actors: Digital Meets Physical
The distinction between cyber warfare and traditional military operations is disappearing. Recent investigations by Amazon threat intelligence teams have identified a troubling trend: cyber-enabled kinetic […]
Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
Threat actors with ties to Iran engaged in cyber warfare as part of efforts to facilitate and enhance physical, real-world attacks, a trend that Amazon […]
The Rise of AI-Enhanced Cyber Scams: How GenAI Empowers Criminals
Generative artificial intelligence has fundamentally transformed the landscape of cybercriminal operations by eliminating what was once a critical barrier to entry: the quality of the […]
Critical Twonky Server Flaws Let Hackers Bypass Login Protection
Twonky Server version 8.5.2 contains two critical authentication bypass vulnerabilities that allow unauthenticated attackers to steal administrator credentials and take complete control of the media […]
Selling to the CISO: An open letter to the cybersecurity industry
The cybersecurity market has lost its mind. It seems like every week a new vendor appears, investors throw money at half-baked ideas, and CISOs get […]
TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign
Threat actors are leveraging bogus installers masquerading as popular software to trick users into installing malware as part of a global malvertising campaign dubbed TamperedChef. […]
Der große KI-Risiko-Guide
KI-Risiken zu bewerten und zu quantifizieren, ist in der GenAI-Ära unerlässlich. Lerbank-bbk22 | shutterstock.com Wie jede Technologie birgt auch künstliche Intelligenz (KI) nicht nur Vorteile. […]
Attack Surface Management – ein Kaufratgeber
Mit diesen Attack Surface Management Tools sorgen Sie im Idealfall dafür, dass sich Angreifer gar nicht erst verbeißen. Sergey Zaykov | shutterstock.com Regelmäßige Netzwerk-Scans reichen […]
Iranian APT hacks helped direct missile strikes in Israel and the Red Sea
Cyber-related activities of two Iran-linked threat actors played key roles in subsequent high-profile missile strikes, according to Amazon’s Threat Intel team, which sees the incidents […]