A growing wave of sophisticated attacks is turning macOS’s built-in security defenses into avenues for malware distribution, according to recent security research. As macOS continues […]
Category: Cyber Security News
IBM Watsonx Vulnerability Enables SQL Injection Attacks
A critical vulnerability in the IBM Watsonx Orchestrate Cartridge for IBM Cloud Pak for Data has been disclosed, enabling blind SQL injection attacks that could compromise sensitive data. Tracked […]
ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics
Cybersecurity researchers have discovered a new phishing campaign undertaken by the North Korea-linked hacking group called ScarCruft (aka APT37) to deliver a malware known as […]
Critical ImageMagick Vulnerability Allows Remote Code Execution
A critical security vulnerability has been discovered in ImageMagick, the widely used open-source image processing software, that could allow attackers to execute arbitrary code remotely. The vulnerability, […]
Malicious npm Package Impersonates Popular Nodemailer, Puts 3.9M Weekly Downloads at Risk of Crypto Theft
A sophisticated cryptocurrency theft scheme involving a malicious npm package that masquerades as the widely-used Nodemailer email library while secretly hijacking desktop cryptocurrency wallets on […]
Windows 11 25H2 Preview Build Released: Here’s What’s New
Microsoft has begun rolling out the Windows 11, version 25H2 (Build 26200.5074) preview to the Release Preview Channel, offering enthusiasts and enterprise customers an early […]
BSI: Bei Digital-Produkten auch auf Ausfallrisiken achten
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/02/Bildschirmfoto-2025-02-24-um-14.59.14.png?quality=50&strip=all 2496w, https://b2b-contenthub.com/wp-content/uploads/2025/02/Bildschirmfoto-2025-02-24-um-14.59.14.png?resize=300%2C172&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/02/Bildschirmfoto-2025-02-24-um-14.59.14.png?resize=768%2C441&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/02/Bildschirmfoto-2025-02-24-um-14.59.14.png?resize=1024%2C587&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/02/Bildschirmfoto-2025-02-24-um-14.59.14.png?resize=1536%2C881&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/02/Bildschirmfoto-2025-02-24-um-14.59.14.png?resize=2048%2C1175&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/02/Bildschirmfoto-2025-02-24-um-14.59.14.png?resize=1215%2C697&quality=50&strip=all 1215w, https://b2b-contenthub.com/wp-content/uploads/2025/02/Bildschirmfoto-2025-02-24-um-14.59.14.png?resize=293%2C168&quality=50&strip=all 293w, https://b2b-contenthub.com/wp-content/uploads/2025/02/Bildschirmfoto-2025-02-24-um-14.59.14.png?resize=146%2C84&quality=50&strip=all 146w, https://b2b-contenthub.com/wp-content/uploads/2025/02/Bildschirmfoto-2025-02-24-um-14.59.14.png?resize=837%2C480&quality=50&strip=all 837w, https://b2b-contenthub.com/wp-content/uploads/2025/02/Bildschirmfoto-2025-02-24-um-14.59.14.png?resize=627%2C360&quality=50&strip=all 627w, https://b2b-contenthub.com/wp-content/uploads/2025/02/Bildschirmfoto-2025-02-24-um-14.59.14.png?resize=436%2C250&quality=50&strip=all 436w” width=”1024″ […]
12 Days Left to Nominate Yourself for the Prestigious CSO30 Awards 2025 – Celebrating Security Leadership & Innovation
With only 12 days left to the nomination closing date of 12 September 2025, seize this opportunity to nominate yourself and your team for the […]
Women cyber leaders are on the rise — and paying it forward
Female cybersecurity leaders are feeling fairly positive about their standing in a traditionally male-dominated field, although many believe there is still room for improvement. 2025’s […]
APT Groups Weaponize Infostealer Malware in Precision Attacks
The cybersecurity landscape has witnessed a dangerous evolution as Advanced Persistent Threat (APT) groups increasingly weaponize opportunistic infostealer malware for sophisticated espionage campaigns. What once […]