North Korea-linked threat actors have found a novel way to weaponize Google’s own security ecosystem, using it to wipe espionage data from victim phones remotely. […]
New “KomeX” Android RAT Hits Hacker Forums with Tiered Subscriptions
A sophisticated Android remote-access trojan named KomeX RAT has emerged on underground hacking forums, with the threat actor Gendirector actively marketing the malware through tiered […]
SAP Releases Security Update to Fix Critical Code Execution and Injection Flaws
SAP has released a significant security update addressing 18 new vulnerabilities across its enterprise software portfolio, including several critical flaws related to code execution and […]
Phishing Scam Uses Big-Name Brands to Steal Logins
A recent investigation by Cyble Research and Intelligence Labs (CRIL) has uncovered a sophisticated phishing campaign exploiting globally recognized and regional brands to steal user […]
Ferocious Kitten APT Uses MarkiRAT for Keystroke and Clipboard Surveillance
Ferocious Kitten, a covert cyber-espionage group active since at least 2015, has emerged as a persistent threat to Persian-speaking dissidents and activists within Iran. The […]
Senate moves to restore lapsed cybersecurity laws after shutdown
Two cybersecurity laws that lapsed during the government shutdown moved closer to restoration on Monday after the Senate voted 60-40 to advance legislation extending them […]
New Phishing Campaign Targets Meta Business Suite Users
With more than 5.4 billion social media users worldwide, Facebook remains a critical marketing channel for businesses of all sizes. This massive reach and trusted […]
Attackers Use Quantum Route Redirect to Launch Instant Phishing on M365
KnowBe4 Threat Labs has uncovered a sophisticated phishing campaign that marks a turning point in cybercriminal capabilities. The threat landscape is shifting dramatically with the […]
Beyond silos: How DDI-AI integration is redefining cyber resilience
As organizations migrate toward hybrid and multi-cloud architectures, the boundaries between network and security operations have eroded, revealing critical visibility gaps. This issue is forcing […]
Öffentliche Verwaltung im Visier von Cyberspionen
Laut BSI haben es Cyberspione aktuell besonders auf die öffentliche Verwaltung abgesehen. Skorzewiak – shutterstock.com Cyberspione haben es in Deutschland derzeit besonders auf die öffentliche […]