Microsoft has acknowledged that the August 2025 security update—KB5063878—can cause significant performance degradation on both Windows 11, version 24H2, and supported Windows 10 releases. The […]
Category: Cyber Security News
Chinese Hacker Sentenced for Kill Switch Attack on Ohio Firm’s Global Network
A federal court has handed down a four-year prison term to a former software developer who sabotaged his employer’s global network with a custom “kill […]
Unmasking KorPlug Malware: TTPs, Control Flow, and Exposed IOCs
As part of the ongoing analysis of the KorPlug malware family, this second installment focuses on the complex second-stage payload, expanding on earlier discoveries of […]
Hackers Abuse Python eval/exec Calls to Run Malicious Code
Threat actors are increasingly abusing native evaluation and execution functions to conceal and execute malicious payloads within innocent-looking packages on PyPI. Security researchers warn that […]
BSI-E-Mail-Checker soll vor Hackern schützen
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2344891127.jpg?quality=50&strip=all 4539w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2344891127.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2344891127.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2344891127.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2344891127.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2344891127.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2344891127.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2344891127.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2344891127.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2344891127.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2344891127.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”576″ sizes=”auto, […]
Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing
The advanced persistent threat (APT) actor known as Transparent Tribe has been observed targeting both Windows and BOSS (Bharat Operating System Solutions) Linux systems with […]
Rowhammer attack can backdoor AI models with one devastating bit flip
A team of researchers from George Mason University has developed a new method of using the well-known Rowhammer attack against physical computer memory to insert […]
New macOS Installer Boasts Lightning-Fast Data Theft, Marketed on Dark Web
A novel macOS infostealer malware, designated as Mac.c, has emerged as a formidable contender in the underground malware-as-a-service (MaaS) ecosystem. Developed openly by a threat […]
Hackers Exploit SendGrid to Steal User Login Credentials in Latest Attack
Cybersecurity researchers at the Cofense Phishing Defense Center (PDC) have uncovered a fresh surge in credential harvesting attacks that leverage the reputable cloud-based email service […]
BSI-Doppelstrategie für digitale Souveränität
width=”4743″ height=”2667″ sizes=”auto, (max-width: 4743px) 100vw, 4743px”>BSI-Präsidentin Claudia Plattner: “Je mehr vertrauenswürdige Produkte verfügbar sind, desto souveräner können wir entscheiden – und desto sicherer wird […]