A critical security vulnerability has been identified in the Cisco Catalyst Center Virtual Appliance that could enable authenticated, remote attackers to escalate their privileges to […]
Author: cyberbytes
Hackers Exploit Rogue MCP Server to Inject Malicious Code into Cursor’s Built-In Browser
Security researchers have uncovered a critical vulnerability in Cursor, the AI-powered code editor, that allows attackers to inject malicious code through rogue Model Context Protocol […]
RONINGLOADER Uses Signed Drivers to Disable Microsoft Defender and Bypass EDR
Elastic Security Labs has uncovered a sophisticated campaign deploying a newly identified loader, dubbed RONINGLOADER, that weaponizes legitimately signed kernel drivers to systematically disable Microsoft […]
Multiple Cisco Unified CCX Vulnerabilities Enable Arbitrary Command Execution by Attackers
Cisco has disclosed critical security vulnerabilities affecting Cisco Unified Contact Center Express (Unified CCX) that could enable unauthenticated, remote attackers to execute arbitrary commands, escalate […]
Fighting AI with AI: Adversarial bots vs. autonomous threat hunters
I recently gave a presentation at SecTor on proactive threat hunting, which sparked some meaty conversations afterward on the show floor. On the expo floor, […]
Formbook Malware Campaign Uses Malicious ZIP Files and Layered Scripting Techniques
A new campaign leveraging Formbook malware has emerged, showcasing sophisticated multi-stage infection tactics that underscore the importance of analyzing more than just executable files during […]
Copy-paste vulnerability hits AI inference frameworks at Meta, Nvidia, and Microsoft
Cybersecurity researchers have uncovered a chain of critical remote code execution (RCE) vulnerabilities in major AI inference server frameworks, including those from Meta, Nvidia, Microsoft, […]
Advanced macOS DigitStealer Uses Multi-Stage Attack Chain to Evade Detection
Jamf Threat Labs has identified a new family of malicious stealers tracked as DigitStealer, representing a significant evolution in macOS-targeted malware. Unlike traditional infostealers that […]
Cybercriminals Use Fake Invoices to Deploy XWorm and Steal Login Credentials
Cybercriminals are deploying sophisticated phishing campaigns that weaponize seemingly legitimate invoice emails to distribute Backdoor.XWorm is a dangerous remote-access trojan (RAT) capable of stealing sensitive credentials, […]
Bundestag beschließt NIS2-Umsetzung
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?quality=50&strip=all 7000w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?resize=300%2C193&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?resize=768%2C494&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?resize=1024%2C658&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?resize=1536%2C987&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?resize=2048%2C1317&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?resize=1084%2C697&quality=50&strip=all 1084w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?resize=261%2C168&quality=50&strip=all 261w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?resize=131%2C84&quality=50&strip=all 131w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?resize=747%2C480&quality=50&strip=all 747w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?resize=560%2C360&quality=50&strip=all 560w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?resize=389%2C250&quality=50&strip=all 389w” width=”1024″ […]