Researchers have discovered a critical zero-click vulnerability in ChatGPT’s Deep Research agent that allows attackers to silently steal sensitive Gmail data without any user interaction. This sophisticated […]
New Loader “CountLoader” Uses PDFs to Launch Ransomware Attacks
Security researchers have uncovered a sophisticated new malware loader called “CountLoader” that leverages weaponized PDF files to deliver ransomware payloads to victims across multiple regions, […]
Bedrohungs-Monitoring: Die 10 besten Tools zur Darknet-Überwachung
Lesen Sie, worauf es beim Darknet-Monitoring ankommt und welche Tools dafür am besten geeignet sind. Foto: sashk0 – shutterstock.com Das Dark Web ist ein Ort, […]
CISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday released details of two sets of malware that were discovered in an unnamed organization’s network […]
New Rowhammer technique against DDR5 achieves privilege escalation
Researchers have devised a new technique to trigger Rowhammer bit flips inside the memory cells of DDR5 RAM modules, which were believed to be protected […]
TikTok Deal Won’t End Enterprise Risks
The proposed restructuring plan would address many concerns related to the social media platform, but risks remain for security teams. The original article found on […]
SonicWall Breached, Firewall Backup Data Exposed
Threat actors breached the MySonicWall service and accessed backup firewall configuration files belonging to “fewer than 5%” of its install base, according to the company. […]
WatchGuard patches ‘critical’ VPN flaw in firewalls that could lead to compromise
WatchGuard has patched a dangerous branch office and mobile VPN configuration vulnerability affecting nearly three dozen models of its current and legacy Firebox firewall systems. […]
Meet ShadowLeak: ‘Impossible to detect’ data theft using AI
For years threat actors have used social engineering to trick employees into helping them steal corporate data. Now a cybersecurity firm has found a way […]
Top 10 Best NGFW (Next‑Generation Firewall) Providers in 2025
Protecting digital infrastructure is critical in 2025, as cyber threats escalate in complexity and diversity. Next‑Generation Firewalls (NGFWs) have become the cornerstone for enterprise security, […]