Ransomware liegt weiter im Trend bei Cyberkriminellen. Studio-M – shutterstock.com Die Bedrohungslage für Europas digitale Infrastruktur hat sich weiter verschärft. Das geht aus dem neuen […]
Author: cyberbytes
Hackers Abuse EV Certificates to Sign Completely Undetectable DMG Malware
Security researchers have uncovered a new macOS malware campaign in which threat actors are abusing Extended Validation (EV) code-signing certificates to distribute completely undetectable (FUD) […]
New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones
A previously undocumented Android banking trojan called Klopatra has compromised over 3,000 devices, with a majority of the infections reported in Spain and Italy. Italian […]
Ukraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPs
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of new targeted cyber attacks in the country using a backdoor called CABINETRAT. The activity, […]
Red Hat OpenShift AI Vulnerability Lets Attackers Seize Infrastructure Control
A serious vulnerability in the Red Hat OpenShift AI service (RHOAI) enables attackers with minimal access to escalate privileges and take control of entire clusters. […]
CISOs advised to rethink vulnerability management as exploits sharply rise
Enterprise attack surfaces continue to expand rapidly, with more than 20,000 new vulnerabilities disclosed in the first half of 2025, straining already hard-pressed security teams. […]
Battering RAM Exploit Bypasses Modern Protections in Intel, AMD Cloud Processors
Cloud providers rely on hardware-based memory encryption to keep user data safe. This encryption shields sensitive information like passwords, financial records, and personal files from […]
Google Publishes Security Hardening Guide to Counter UNC6040 Threats
Google’s Threat Intelligence Group (GTIG) has published a comprehensive guide to help organizations strengthen their SaaS security posture—particularly Salesforce—against UC6040’s sophisticated voice-phishing and malicious connected-app […]
Google Gemini Vulnerabilities Let Hackers Steal Saved Data and Live Location
Research has uncovered three significant vulnerabilities in Google’s Gemini AI assistant suite, dubbed the “Gemini Trifecta,” that could have allowed cybercriminals to steal users’ saved […]
MatrixPDF Campaign Evades Gmail Filters to Deliver Malicious Payloads
Cybercriminals are turning a trusted file format against users in a sophisticated new attack campaign. MatrixPDF represents a concerning evolution in social engineering attacks that […]