Als zentrale Einheit überwachen Fachleute im SOC die gesamte IT-Infrastruktur eines Unternehmens. Rund um die Uhr analysieren sie alle sicherheitsrelevanten Ereignisse in Echtzeit. Gorodenkoff – […]
Students Pose Inside Threat to Education Sector
The threats may not be malicious, but they are more than many security teams can handle. ​The original article found on darkreading Read More
California, two other states to come down hard on GPC violators
US organizations are being advised to make sure they have systems in place to detect and honor Global Privacy Control (GPC) signals, as a result […]
Chinese Hackers Allegedly Pose as US Lawmaker
Chinese state-backed threat actors are suspected of posing as Michigan congressman John Moolenaar in a series of spearphishing attacks. ​The original article found on darkreading […]
Adobe Commerce and Magento users: Patch critical SessionReaper flaw now
Adobe issued an emergency patch for one of the most severe vulnerabilities ever discovered in the Magento Open Source ecommerce platform and Adobe Commerce, its […]
Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems
An advanced persistent threat (APT) group from China has been attributed to the compromise of a Philippines-based military company using a previously undocumented fileless malware […]
Dormant macOS Backdoor ChillyHell Resurfaces
With multiple persistence mechanisms, the modular malware can brute-force passwords, drop payloads, and communicate over different protocols. ​The original article found on darkreading Read More
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors
A new threat actor, The Gentlemen, has emerged as a fast-moving ransomware group that has rapidly expanded its activity across Asia Pacific, South America, the […]
Cursor’s autorun lets hackers execute arbitrary code
Oasis Security has uncovered a flaw in the widely used AI-powered code editor Cursor that lets malicious repositories silently execute code the moment a developer […]
Neues Phishing-Framework umgeht Multi-Faktor-Authentifizierung
Phishing 2.0 nutzt Subdomain-Rotation und Geoblocking. janews – Shutterstock.com Eine kürzlich aufgedeckte Phishing-Kampagne steht in Verbindung mit Salty2FA, einem Phishing-as-a-Service-(PhaaS-)Framework. Es soll entwickelt worden sein, […]