VulnCheck’s latest report for Q1 2025 has identified 159 Common Vulnerabilities and Exposures (CVEs) publicly disclosed as exploited in the wild for the first time. […]
Author: cyberbytes
New Report Reveals How AI is Rapidly Enhancing Phishing Attack Precision
The Zscaler ThreatLabz 2025 Phishing Report unveils the alarming sophistication of modern phishing attacks, driven by generative AI (GenAI). By examining over 2 billion blocked […]
Spring Security Vulnerability Exposes Valid Usernames to Attackers
A newly identified security vulnerability, CVE-2025-22234, has exposed a critical weakness in the widely-used Spring Security framework. According to the HeroDevs report, affecting several versions […]
Ransomware-Angriff auf guenstiger.de
Das Portal von guenstiger.de ist online – was die Hacker jedoch im Backend angerichtet haben, darüber liegen noch keine Informationen vor. guenstiger.de Das deutsche Preisvergleichsportal […]
Microsoft’s Patch for Symlink Vulnerability Introduces New Windows Denial-of-Service Flaw
Microsoft’s recent attempt to resolve a critical privilege escalation vulnerability has inadvertently introduced a new denial-of-service (DoS) flaw in Windows systems, leaving organizations vulnerable to […]
Russian VPS Servers With RDP and Proxy Servers Enable North Korean Cybercrime Operations
Trend Research has uncovered a sophisticated network of cybercrime operations linked to North Korea, heavily utilizing Russian internet infrastructure. Specifically, IP address ranges in the […]
U.S. Secret Service Reveals Ways to Identify Credit Card Skimmers
With credit card skimming crimes escalating nationwide, the U.S. Secret Service’s Washington Field Office is sharing essential tips for the public to protect themselves from […]
SAP NetWeaver 0-Day Vulnerability Enables Webshell Deployment
Cybersecurity analysts have issued a high-priority warning after several incidents revealed active exploitation of SAP NetWeaver, the widely deployed enterprise integration platform. Attackers have leveraged […]
Lesson from huge Blue Shield California data breach: Read the manual
CISOs can learn two lessons from a US health insurance provider’s admission this month that misconfiguring Google Analytics led to the disclosure of personal health […]
As clock ticks, vendors slowly patch critical flaw in AMI MegaRAC BMC firmware
Weeks after BIOS developer AMI released an update fixing a critical vulnerability in its MegaRAC baseband management controller (BMC) firmware used in many enterprise servers […]