Download the October 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World. aria-label=”Embed of Spotlight report: Securing […]
New DNS Malware ‘Detour Dog’ Uses TXT Records to Deliver Strela Stealer
Detour Dog, a stealthy website malware campaign tracked since August 2023, has evolved from redirecting victims to tech-support scams into a sophisticated DNS-based command-and-control (C2) […]
Cyber-Bedrohungslage in der EU verschärft sich
Ransomware liegt weiter im Trend bei Cyberkriminellen. Studio-M – shutterstock.com Die Bedrohungslage für Europas digitale Infrastruktur hat sich weiter verschärft. Das geht aus dem neuen […]
Hackers Abuse EV Certificates to Sign Completely Undetectable DMG Malware
Security researchers have uncovered a new macOS malware campaign in which threat actors are abusing Extended Validation (EV) code-signing certificates to distribute completely undetectable (FUD) […]
New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones
A previously undocumented Android banking trojan called Klopatra has compromised over 3,000 devices, with a majority of the infections reported in Spain and Italy. Italian […]
Ukraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPs
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of new targeted cyber attacks in the country using a backdoor called CABINETRAT. The activity, […]
Red Hat OpenShift AI Vulnerability Lets Attackers Seize Infrastructure Control
A serious vulnerability in the Red Hat OpenShift AI service (RHOAI) enables attackers with minimal access to escalate privileges and take control of entire clusters. […]
CISOs advised to rethink vulnerability management as exploits sharply rise
Enterprise attack surfaces continue to expand rapidly, with more than 20,000 new vulnerabilities disclosed in the first half of 2025, straining already hard-pressed security teams. […]
Battering RAM Exploit Bypasses Modern Protections in Intel, AMD Cloud Processors
Cloud providers rely on hardware-based memory encryption to keep user data safe. This encryption shields sensitive information like passwords, financial records, and personal files from […]
Google Publishes Security Hardening Guide to Counter UNC6040 Threats
Google’s Threat Intelligence Group (GTIG) has published a comprehensive guide to help organizations strengthen their SaaS security posture—particularly Salesforce—against UC6040’s sophisticated voice-phishing and malicious connected-app […]