The cybersecurity market has lost its mind. It seems like every week a new vendor appears, investors throw money at half-baked ideas, and CISOs get […]
Author: cyberbytes
TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign
Threat actors are leveraging bogus installers masquerading as popular software to trick users into installing malware as part of a global malvertising campaign dubbed TamperedChef. […]
Der große KI-Risiko-Guide
KI-Risiken zu bewerten und zu quantifizieren, ist in der GenAI-Ära unerlässlich. Lerbank-bbk22 | shutterstock.com Wie jede Technologie birgt auch künstliche Intelligenz (KI) nicht nur Vorteile. […]
Attack Surface Management – ein Kaufratgeber
Mit diesen Attack Surface Management Tools sorgen Sie im Idealfall dafür, dass sich Angreifer gar nicht erst verbeißen. Sergey Zaykov | shutterstock.com Regelmäßige Netzwerk-Scans reichen […]
Iranian APT hacks helped direct missile strikes in Israel and the Red Sea
Cyber-related activities of two Iran-linked threat actors played key roles in subsequent high-profile missile strikes, according to Amazon’s Threat Intel team, which sees the incidents […]
The AI Attack Surface: How Agents Raise the Cyber Stakes
Researcher shows how agentic AI is vulnerable to hijacking to subvert an agent’s goals and how agent interaction can be altered to compromise whole networks. […]
WhatsApp flaw allowed discovery of the 3.5 billion mobile numbers registered to the platform
Researchers have uncovered a WhatsApp privacy flaw that allowed them to discover the 3.5 billion mobile numbers using the app globally, and possibly infer the […]
Do National Data Laws Carry Cyber-Risks for Large Orgs?
When international corporations have to balance competing cyber laws from different countries, the result is fragmented, potentially vulnerable systems. ​The original article found on darkreading […]
Fortinet Woes Continue With Another WAF Zero-Day Flaw
A second zero-day vulnerability in its web application firewall (WAF) line has come under attack, raising more questions about the vendor’s disclosure practices. ​The original […]
Obscure MCP API in Comet Browser Breaches User Trust, Enabling Full Device Control via AI Browsers
Palo Alto, California, November 19th, 2025, CyberNewsWire SquareX released critical research exposing a hidden API in Comet that allows extensions in the AI Browser to […]