Threat actors are actively exploiting a critical security flaw impacting the Service Finder WordPress theme that makes it possible to gain unauthorized access to any […]
Category: Cyber Security News
Discord Data Breach Exposes 1.5 TB of Data and 2 Million Government ID Photos
The popular communication platform Discord is confronting a major extortion attempt after cybercriminals breached one of its third-party customer service providers, compromising sensitive user data […]
Data-Leak Sites Surge to Record Levels Amid Scattered Spider RaaS and LockBit 5.0 Rise
Ransomware threats reached a tipping point in Q3 2025 as data-leak sites surged to a record 81 active platforms, driven by major developments across the […]
APT Hackers Abuse ChatGPT to Develop Advanced Malware and Phishing Campaigns
Security researchers at Volexity have uncovered compelling evidence that China-aligned threat actors are leveraging artificial intelligence platforms like ChatGPT to enhance their sophisticated cyberattack capabilities. […]
The Evolution of Chaos: Ransomware’s New Era of Speed and Intelligence
In 2025, the notorious Chaos ransomware has undergone a dramatic transformation, emerging with a sophisticated C++ variant that represents the most dangerous iteration to date. […]
CISOs wollen mehr Datensichtbarkeit
width=”2500″ height=”1406″ sizes=”auto, (max-width: 2500px) 100vw, 2500px”>Die meisten CISOs wollen Einsicht in alle Datenströme in ihren Unternehmen, fast immer müssen sie dabei jedoch Kompromisse eingehen. […]
The ultimate business resiliency test: Inside Kantsu’s ransomware response
A year ago, midsize Japanese logistics company Kantsu suffered significant damage from a cyberattack in which ransomware locked its servers and cut off communications, bringing […]
Chinese Hackers Weaponize Nezha Tool to Run Commands on Web Servers
Security researchers have uncovered a sophisticated cyberattack campaign where Chinese threat actors are exploiting web applications using an innovative log poisoning technique to deploy web […]
CrowdStrike Falcon Windows Sensor Flaw Could Let Attackers Execute Code and Delete Files
CrowdStrike has disclosed two critical vulnerabilities affecting its Falcon sensor for Windows that could enable attackers to delete arbitrary files and potentially compromise system stability. […]
Passwortfreie Authentifizierung: So gelingt der Umstieg auf PKI
Die zertifikatsbasierte Authentifizierung mit PKI erfolgt via physischen Token statt Passwort. Momentum studio – shutterstock.com Die Bedrohungslage im Cyberraum verschärft sich stetig. Immer mehr Unternehmen […]