A new campaign leveraging Formbook malware has emerged, showcasing sophisticated multi-stage infection tactics that underscore the importance of analyzing more than just executable files during […]
Author: cyberbytes
Copy-paste vulnerability hits AI inference frameworks at Meta, Nvidia, and Microsoft
Cybersecurity researchers have uncovered a chain of critical remote code execution (RCE) vulnerabilities in major AI inference server frameworks, including those from Meta, Nvidia, Microsoft, […]
Advanced macOS DigitStealer Uses Multi-Stage Attack Chain to Evade Detection
Jamf Threat Labs has identified a new family of malicious stealers tracked as DigitStealer, representing a significant evolution in macOS-targeted malware. Unlike traditional infostealers that […]
Cybercriminals Use Fake Invoices to Deploy XWorm and Steal Login Credentials
Cybercriminals are deploying sophisticated phishing campaigns that weaponize seemingly legitimate invoice emails to distribute Backdoor.XWorm is a dangerous remote-access trojan (RAT) capable of stealing sensitive credentials, […]
Bundestag beschließt NIS2-Umsetzung
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?quality=50&strip=all 7000w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?resize=300%2C193&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?resize=768%2C494&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?resize=1024%2C658&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?resize=1536%2C987&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?resize=2048%2C1317&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?resize=1084%2C697&quality=50&strip=all 1084w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?resize=261%2C168&quality=50&strip=all 261w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?resize=131%2C84&quality=50&strip=all 131w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?resize=747%2C480&quality=50&strip=all 747w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?resize=560%2C360&quality=50&strip=all 560w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2692248471.jpg?resize=389%2C250&quality=50&strip=all 389w” width=”1024″ […]
NVIDIA NeMo Flaw Enables Code Injection and Privilege Escalation Attacks
NVIDIA has released critical security patches addressing two high-severity vulnerabilities in its NeMo Framework that could allow attackers to execute arbitrary code and escalate privileges […]
Anthropic’s AI used in automated attacks
Anthropic reported that a group of what it believes to be Chinese hackers carried out a series of attacks against foreign governments and large corporations […]
Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns
Key Takeaways: 85 active ransomware and extortion groups observed in Q3 2025, reflecting the most decentralized ransomware ecosystem to date. 1,590 victims disclosed across 85 […]
Analysis of Multi-Stage Phishing Kits Leveraging Telegram for Credential Theft and Evasion Techniques
Researchers at Group-IB have uncovered a sophisticated phishing framework that demonstrates how cybercriminals are industrializing credential theft through automation, evasion techniques, and Telegram-based data exfiltration. […]
Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign
State-sponsored threat actors from China used artificial intelligence (AI) technology developed by Anthropic to orchestrate automated cyber attacks as part of a “highly sophisticated espionage […]