A team of academics has devised a novel attack that can be used to downgrade a 5G connection to a lower generation without relying on […]
Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775
Citrix has released fixes to address three security flaws in NetScaler ADC and NetScaler Gateway, including one that it said has been actively exploited in […]
Hook Android Trojan Now Delivers Ransomware-Style Attacks
New features to take over smartphones and monitor user activity demonstrate the continued evolution of the malware, which is now being spread on GitHub. The […]
Securden Unified PAM Flaw Allows Attackers to Bypass Authentication
Securden Unified PAM is a comprehensive privileged access management platform that is used to store, manage, and monitor credentials across human, machine, and AI identities […]
New Hook Android Banking Malware Emerges with Advanced Features and 107 Remote Commands
Zimperium’s zLabs research team has identified a sophisticated new variant of the Hook Android banking trojan, marking a significant escalation in mobile threat sophistication. This […]
Google Introduces Enhanced Developer Verification for Play Store App Distribution
Google has announced that all Android apps installed on approved devices will soon need to be able to be traced back to a verified developer […]
OneFlip Attack Backdoors AI Systems by Flipping a Single Bit in Neural Networks
CYFIRMA researchers have uncovered a campaign they have codenamed “OneFlip”, an operation that demonstrates how a single-bit modification inside a seemingly benign file can be […]
NIS2 und der Mittelstand: Zwischen Pflicht und Praxis
Cyberkriminalität ist und bleibt ein einträgliches Geschäft – eines, das zu einem wachsenden Problem wird. Knapp 179 Milliarden Euro Schaden sind in Deutschland im Jahr […]
Rache am Arbeitgeber bringt Entwickler vier Jahre in den Knast
Welche Konsequenzen es haben kann, wenn technisch versierte IT-Fachkräfte zum Innentäter werden, hat die Eaton Corporation am eigenen Leib erfahren. JHVEPhoto | shutterstock.com Wenn unzufriedene […]
DSLRoot, Proxies, and the Threat of ‘Legal Botnets’
The cybersecurity community on Reddit responded in disbelief this month when a self-described Air National Guard member with top secret security clearance began questioning the […]