HUMAN Security’s Satori Threat Intelligence team has uncovered a sophisticated malware operation dubbed “BADBOX 2.0” that compromised over 50,000 Android devices using 24 deceptive applications. […]
Category: Cyber Security News
Aryon Security Launches to Tackle Cloud Misconfigurations
The new cloud security startup uses AI to scan cloud applications and systems for issues before they are deployed. The original article found on darkreading […]
Espionage Actor ‘Lotus Blossom’ Targets South East Asia
The threat actor, of unknown origin, is deploying a proprietary backdoor malware known as “Sagerunex” against critical infrastructure in Hong Kong, Philippines, Taiwan, and Vietnam. […]
China’s Silk Typhoon APT Shifts to IT Supply Chain Attacks
The nation-state threat group has been breaching providers of remote management tools, identity management providers, and other IT companies to access networks of targeted entities, […]
Qualcomm, MediaTek Release Security Fix Bonanza
The chipmakers patched bugs, mostly critical and high severity, that affect everything from smartphones to TVs to artificial intelligence platforms. The original article found on […]
‘Crafty Camel’ APT Targets Aviation, OT With Polygot Files
The Iran-linked nation-state group made its debut with a stealthy, sophisticated, and laser-focused cyber-espionage attack on targets in UAE. The original article found on darkreading […]
WordPress Plugin Vulnerability Exposes 10,000 Sites to Code Execution Attacks
A critical security flaw in the GiveWP Donation Plugin tracked as CVE-2025-0912, has exposed over 100,000 WordPress websites to unauthenticated remote code execution (RCE) attacks. […]
Defending against USB drive attacks with Wazuh
USB drive attacks constitute a significant cybersecurity risk, taking advantage of the everyday use of USB devices to deliver malware and circumvent traditional network security […]
So werden PV-Anlagen digital angegriffen und geschützt
Unternehmen setzen vermehrt auf Solaranlagen mit Batteriespeichern, um hohe Energiekosten und Netzstabilitätsrisiken zu minimieren. Diese Systeme sind allerdings oft nicht gehärtet und damit ein immer […]
Why Security Leaders Are Opting for Consulting Gigs
Many CISOs are weighing the benefits of going virtual as a consultant. Can the pendulum swing in the other direction? darkreading Read More