On September 8th, 2025, at approximately 9AM EST, the npm ecosystem faced an acute supply chain attack. A threat actor leveraged social engineering techniques to […]
Category: Cyber Security News
Managed SOC für mehr Sicherheit
Als zentrale Einheit überwachen Fachleute im SOC die gesamte IT-Infrastruktur eines Unternehmens. Rund um die Uhr analysieren sie alle sicherheitsrelevanten Ereignisse in Echtzeit. Gorodenkoff – […]
Menschenzentrierte Cybersicherheit gewinnt an Bedeutung
Lesen Sie, worauf es beim Human Risk Management ankommt. UnImages – shutterstock.com Die Rolle des CISO in Unternehmen hat sich stark gewandelt, vom Cybersicherheitsexperten mit […]
California, two other states to come down hard on GPC violators
US organizations are being advised to make sure they have systems in place to detect and honor Global Privacy Control (GPC) signals, as a result […]
Students Pose Inside Threat to Education Sector
The threats may not be malicious, but they are more than many security teams can handle. ​The original article found on darkreading Read More
Adobe Commerce and Magento users: Patch critical SessionReaper flaw now
Adobe issued an emergency patch for one of the most severe vulnerabilities ever discovered in the Magento Open Source ecommerce platform and Adobe Commerce, its […]
Chinese Hackers Allegedly Pose as US Lawmaker
Chinese state-backed threat actors are suspected of posing as Michigan congressman John Moolenaar in a series of spearphishing attacks. ​The original article found on darkreading […]
Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems
An advanced persistent threat (APT) group from China has been attributed to the compromise of a Philippines-based military company using a previously undocumented fileless malware […]
Neues Phishing-Framework umgeht Multi-Faktor-Authentifizierung
Phishing 2.0 nutzt Subdomain-Rotation und Geoblocking. janews – Shutterstock.com Eine kürzlich aufgedeckte Phishing-Kampagne steht in Verbindung mit Salty2FA, einem Phishing-as-a-Service-(PhaaS-)Framework. Es soll entwickelt worden sein, […]
Cursor’s autorun lets hackers execute arbitrary code
Oasis Security has uncovered a flaw in the widely used AI-powered code editor Cursor that lets malicious repositories silently execute code the moment a developer […]