Cyberkriminelle haben auf Daten der Stadtverwaltung Hohen Neuendorf zugegriffen. LookerStudio – shutterstock.com Wie die Stadtverwaltung Hohen Neuendorf auf ihrer Website mitteilt, gab es kürzlich einen […]
‘Zero Disco’ campaign hits legacy Cisco switches with fileless rootkit payloads
In newly disclosed real-world attacks, threat actors are found exploiting a Cisco Simple Network Management Protocol (SNMP) vulnerability to gain remote code execution (RCE) and […]
Cyberkriminelle erbeuten Kundendaten von Modekonzern Mango
Hacker haben Kundendaten des Modekonzerns Mango gestohlen. Auch deutsche Kunden sind betroffen. Vytautas Kielaitis – shutterstock.com Kriminelle Hacker haben massenhaft persönliche Daten von Kunden des […]
New Tech Support Scam Exploits Microsoft Logo to Steal User Credentials
Microsoft’s name and branding have long been associated with trust in computing, security, and innovation. Yet a newly uncovered campaign by the Cofense Phishing Defense […]
ConnectWise Flaws Let Attackers Deliver Malicious Software Updates
ConnectWise has issued a critical security update for its Automateâ„¢ platform after uncovering vulnerabilities that could allow attackers to intercept and tamper with software updates. […]
Microsoft Report Warns of AI-Powered Automation in Cyberattacks and Malware Creation
Cybercriminals are weaponizing artificial intelligence to accelerate malware development, discover vulnerabilities faster, and create more sophisticated phishing campaigns, according to Microsoft’s latest Digital Defense Report […]
Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices
Cybersecurity researchers have disclosed details of a recently patched critical security flaw in WatchGuard Fireware that could allow unauthenticated attackers to execute arbitrary code. The […]
Windows GDI Vulnerability in Rust Kernel Module Enables Remote Attacks
A newly discovered flaw in Microsoft’s Rust-based Graphics Device Interface (GDI) kernel component allows unprivileged attackers to crash or take control of Windows systems. Check […]
CISOs face quantum leap in prioritizing quantum resilience
Despite recognizing the severity of the threat, enterprises continue to respond slowly to warnings that existing systems must be updated to address the risks of […]
APT28 Deploys BeardShell and Covenant Modules via Weaponized Office Documents
Security researchers at Sekoia.io have uncovered a sophisticated cyberattack campaign orchestrated by APT28, the notorious Russian state-sponsored threat actor, targeting Ukrainian military personnel with weaponized […]