Two kinds of attacks are in high gear: ransomware attacks against OEMs and compromised electric vehicle chargers, according to data from Q1 2025. ​The original […]
Author: cyberbytes
Chrome UAF Process Vulnerabilities Actively Exploited
Security researchers have revealed that two critical use-after-free (UAF) vulnerabilities in Google Chrome’s Browser process were actively exploited in the wild, exposing users to potential […]
Darcula phishing toolkit gets AI boost, democratizing cybercrime
Enterprise security teams face an immediate escalation in phishing threats as the notorious Darcula toolkit has now started weaponizing generative AI to create highly convincing […]
Vor diesen Ransomware-Banden sollten Sie sich hüten
loading=”lazy” width=”400px”>Ransomware-Attacken werden immer mehr. Höchste Zeit, die Schutzmaßnahmen hochzufahren. Zephyr_p – shutterstock.com In den ersten drei Monaten des laufenden Jahres gab es einen neuen […]
Microsoft Defender XDR False Positive Leaked Massive 1,700+ Sensitive Documents to Publish
An alarming data leak involving Microsoft Defender XDR has exposed more than 1,700 sensitive documents from hundreds of organizations, following a chain reaction triggered by […]
Why NHIs Are Security’s Most Dangerous Blind Spot
When we talk about identity in cybersecurity, most people think of usernames, passwords, and the occasional MFA prompt. But lurking beneath the surface is a […]
SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers
Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload JSP web shells with the goal of facilitating unauthorized file uploads and […]
DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks
Cybersecurity researchers are warning about a new malware called DslogdRAT that’s installed following the exploitation of a now-patched security flaw in Ivanti Connect Secure (ICS). […]
Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers
Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server interface that, if successfully exploited, could enable attackers to gain unauthorized access […]
6 types of risk every organization must manage — and 4 strategies for doing it
Risk management is the process of identifying, analyzing, and mitigating uncertainties and threats that can harm your organization. That’s a straightforward description of a generic […]