Trend Micro researchers have uncovered a novel ransomware family dubbed Charon, deployed in a sophisticated campaign targeting the public sector and aviation industry in the […]
Author: cyberbytes
Microsoft August 2025 Patch Tuesday Fixes Kerberos Zero-Day Among 111 Total New Flaws
Microsoft on Tuesday rolled out fixes for a massive set of 111 security flaws across its software portfolio, including one flaw that has been disclosed […]
Hacker verkaufen Ausweispapiere Zehntausender Italien-Urlauber
Gescannte Reisepässe, Personalausweise und anderen Ausweisdokumente haben Hacker über die Buchungssysteme verschiedener Hotels gestohlen. DC Studio – shutterstock.com Aus italienischen Hotels sind die Daten mehrerer […]
Malicious npm Package Lures Job Seekers and Exfiltrates Sensitive Data
A self-proclaimed Ukrainian Web3 team targeted a community member during an interview’s first round by instructing them to clone and run a GitHub repository named […]
GPT-5 ist geknackt
Die Grenzen von KI-Modellen lassen sich mit relativ einfachen Mitteln überwinden, wie der Jailbreak von GPT-5 demonstriert. Nelson Antoine | shutterstock.com Research-Experten des Sicherheitsanbieters NeuralTrust […]
Charon Ransomware Hits Middle East Sectors Using APT-Level Evasion Tactics
Cybersecurity researchers have discovered a new campaign that employs a previously undocumented ransomware family called Charon to target the Middle East’s public sector and aviation […]
10 most powerful cybersecurity companies today
Geopolitical unrest. Uncertainty about tariffs. A tough regulatory climate. Heightened concerns about AI-generated attacks. Add it up and you get a high-anxiety, high-stress climate in […]
New Zero-Click NTLM Credential Leak Exploit Bypasses Microsoft Patch for CVE-2025-24054
Security researchers at Cymulate Research Labs have discovered a critical zero-click NTLM credential leakage vulnerability that successfully bypasses Microsoft’s security patch for CVE-2025-24054, demonstrating that […]
Critical FortiSIEM Vulnerability Allows Attackers to Execute Malicious Commands, PoC Found in the Wild
Security researchers have discovered a critical vulnerability in Fortinet’s FortiSIEM platform that enables remote attackers to execute unauthorized commands without authentication. The flaw, tracked as […]
FortiWeb Authentication Bypass Vulnerability Allows Logins as Any Existing User
A critical security vulnerability in Fortinet’s FortiWeb web application firewall has been discovered that allows unauthenticated attackers to bypass authentication and impersonate any existing user […]