Von Moschusochsen können sich CISOs eine Scheibe abschneiden – wenn es nach unserem Autor geht. Wirestock Creators – shutterstock.com Drittanbieter-Risikomanagement ist für CISOs und Sicherheitsentscheider eine […]
Cisco warns of critical API vulnerabilities in ISE and ISE-PIC
CSOs are being urged to quickly patch multiple vulnerabilities in Cisco Systems Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) that could […]
‘IntelBroker’ Suspect Arrested, Charged in High-Profile Breaches
A British national arrested earlier this year in France was charged by the US Department of Justice in connection with a string of major cyberattacks. […]
US indicts one for role in BreachForums, France arrests four others
A US court indicted a man accused of being IntelBroker, a key administrator of stolen data marketplace BreachForums, on Wednesday, just days after four others […]
Iranian APT35 Hackers Targeting High-Profile Cybersecurity Experts and Professors in Israel
The Iranian threat group Educated Manticore, also tracked as APT35, APT42, Charming Kitten, or Mint Sandstorm, has intensified its cyber-espionage operations targeting Israeli cybersecurity experts, […]
Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks
Cybersecurity researchers have disclosed a critical vulnerability in the Open VSX Registry (“open-vsx[.]org”) that, if successfully exploited, could have enabled attackers to take control of […]
nOAuth Exploit Enables Full Account Takeover of Entra Cross-Tenant SaaS Applications
A severe security flaw, dubbed nOAuth, has been identified in certain software-as-a-service (SaaS) applications integrated with Microsoft Entra ID, potentially allowing attackers to achieve full […]
IBM WebSphere Application Server Flaw Enables Arbitrary Code Execution
A severe security flaw has been identified in IBM WebSphere Application Server, potentially allowing remote attackers to execute arbitrary code on affected systems. Tracked under […]
Researchers Weaponize and Obfuscate .NET Assemblies Using MacroPack
Researchers at BallisKit have introduced a sophisticated scenario within their MacroPack Pro tool to obfuscate and weaponize .NET assemblies, significantly enhancing their stealth against modern […]
How Geopolitical Tensions Are Shaping Cyber Warfare
In today’s cyber battlefield, resilience starts with readiness, and the cost of falling short increases by the day. ​The original article found on darkreading Read […]