A groundbreaking collaborative investigation by Mauro Eldritch of BCA LTD, ANYRUN, and NorthScan has lifted the curtain on North Korean threat actors from the Lazarus […]
Multiple Django Vulnerability Expose Applications to SQL Injection and DoS Attacks
The Django development team has released critical security patches for three major versions of the popular Python web framework, addressing two significant vulnerabilities that could […]
CISA Alerts on Iskra iHUB Authentication Flaw Allowing Remote Device Reconfiguration
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert regarding a severe authentication vulnerability affecting Iskra iHUB and iHUB Lite intelligent metering […]
How CISOs can prepare for the new era of short-lived TLS certificates
For years, organizations used SSL/TLS certificates with long lifespans, reviewing and renewing them only occasionally. That is about to change. On 15 March 2026, the […]
Water Saci Hackers Exploit AI Tools to Target WhatsApp Web Users
The Water Saci campaign targeting Brazilian users has escalated significantly, with threat actors demonstrating remarkable technical sophistication by employing artificial intelligence to enhance their malware […]
Cybersicherheit für viele Nebensache
Laut einer Umfrage informieren sich lediglich 54 Prozent der Deutschen regelmäßig über das Thema Cybersicherheit. Summit Art Creations – shutterstock.com Fake-Shops, Datendiebstahl, gefälschte Angebote auf […]
New Raptor Framework Uses Agentic Workflows to Create Patches
Researchers utilized prompts and large language models to develop an open-source AI framework capable of generating both vulnerability exploits and patches. ​The original article found […]
While ECH Adoption Is Low, Risks Remain for Enterprises, End Users
Is the new privacy protocol helping malicious actors more than Internet users? ​The original article found on darkreading Read More
Chrome 143 Update Patches 13 Security Vulnerabilities Allowing Arbitrary Code Execution
Google has released Chrome 143 to the stable channel, addressing 13 security vulnerabilities that could allow attackers to execute arbitrary code on affected systems. The […]
BPFDoor and Symbiote: Advanced eBPF-Based Rootkits Target Linux Systems
Extended Berkeley Packet Filter (eBPF) represents one of Linux’s most powerful kernel technologies, enabling users to load sandboxed programs directly into the kernel for network […]