Threat actors are increasingly leveraging the trusted names of popular software and services like ChatGPT, Cisco AnyConnect, Google Meet, and Microsoft Teams to orchestrate sophisticated […]
AMI MegaRAC authentication bypass flaw is being exploitated, CISA warns
A critical authentication bypass by spoofing vulnerability in AMI MegaRAC SPx server management firmware is now being actively exploited by attackers, creating urgent pressure for […]
New FileFix Method Emerges as a Threat Following 517% Rise in ClickFix Attacks
The ClickFix social engineering tactic as an initial access vector using fake CAPTCHA verifications increased by 517% between the second half of 2024 and the […]
Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access
Cisco has released updates to address two maximum-severity security flaws in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that could permit an […]
Cisco ISE Vulnerability Allows Remote Attackers to Execute Malicious Commands
Cisco has issued urgent security patches addressing two critical vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) platforms. These flaws, […]
WhatsApp to Introduce AI-Powered Message Summaries for Faster Catch-Up
WhatsApp has announced the upcoming launch of “Message Summaries”—an AI-powered feature designed to help users quickly catch up on unread messages. Powered by Meta AI, […]
Taming Agentic AI Risks Requires Securing Non-Human Identities
As the definition of machine identities broadens, AI agents working on behalf of the user and gaining access to various services blurs the lines of […]
Microsoft Teams Adds Feature for Admins to Control 365 Certified Apps with Custom Rules
Microsoft is rolling out a major update to Microsoft Teams, empowering administrators with enhanced control over third-party app availability through new rule-based settings in the […]
SAP-Schwachstellen gefährden Windows-Nutzerdaten
Schwachstellen in SAP GUI geben sensible Daten durch schwache oder fehlende Verschlüsselung preis. LALAKA – shutterstock.com Die Forscher Jonathan Stross von Pathlock, und Julian Petersohn […]
Cloud Repatriation Driven by AI, Cost, and Security
Organizations are moving away from the public cloud and embracing a more hybrid approach due to big changes over the last five years. The original […]