Die zertifikatsbasierte Authentifizierung mit PKI erfolgt via physischen Token statt Passwort. Momentum studio – shutterstock.com Die Bedrohungslage im Cyberraum verschärft sich stetig. Immer mehr Unternehmen […]
Category: Cyber Security News
Unplug Gemini from email and calendars, says cybersecurity firm
CSOs should consider turning off Google Gemini access to employees’ Gmail and Google Calendars, because the chatbot is vulnerable to a form of prompt injection, […]
GitHub Copilot prompt injection flaw leaked sensitive data from private repos
In a new case that showcases how prompt injection can impact AI-assisted tools, researchers have found a way to trick the GitHub Copilot chatbot into […]
Vampire Bot Malware Sinks Fangs Into Job Hunters
The campaign is the latest by BatShadow, one of a growing number of cybercrime groups operating out of Vietnam. ​The original article found on darkreading […]
Red Hat Hackers Team Up With Scattered Lapsus$ Hunters
Crimson Collective, which recently breached the GitLab instance of Red Hat Consulting, has teamed up with the notorious cybercriminal collective. ​The original article found on […]
LockBit, Qilin & DragonForce Join Forces in Ransomware ‘Cartel’
The three extortion gangs also invited other e-crime attackers to join their collaboration to share attack information and resources, in the wake of LockBit 5.0 […]
Top 10 Best Supply Chain Intelligence Security Companies in 2025
In 2025, securing global supply chains is one of the top priorities for enterprises seeking business continuity, data integrity, and resilience against threats. As cyber […]
Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks
Cybersecurity researchers are calling attention to a nefarious campaign targeting WordPress sites to make malicious JavaScript injections that are designed to redirect users to sketchy […]
Figma MCP Server Opens Orgs to Agentic AI Compromise
Patch now: A bug (CVE-2025-53967) in the popular Web design tool’s option for talking to agentic AI can lead to remote code execution (RCE). ​The […]
Computer mice can eavesdrop on private conversations, researchers discover
High-end computer mice can be used to eavesdrop on the voice conversations of nearby PC users, researchers from the University of California, Irvine, have shown […]