An employee in the finance department at a retail company recently got a call from his CFO directing him to wire $700,000 to a business […]
Apple Releases Security Patches to Fix Critical Data Exposure Flaws
Apple released critical security updates for macOS Sequoia 15.5 on May 12, 2025, addressing over 40 vulnerabilities across system components ranging from kernel-level memory corruption […]
So schützen Zugriffskontrollen vor Ransomware
loading=”lazy” width=”400px”>Um sich vor Ransomware-Angriffen zu schützen, sollten Unternehmen ihre Logins absichern. Fit Ztudio – shutterstock.com Ransomware bleibt eine der größten Gefahren für Unternehmen – […]
Top-Tipps für die erfolgreiche Nutzung von Bedrohungsdaten
Mit STIX und TAXII werden Bedrohungsdaten nicht nur übertragen, sondern strategisch nutzbar gemacht. Gorodenkoff – shutterstock.com Unternehmen, die der Flut von Sicherheitsverletzungen und Angriffen Einhalt […]
NSO Group’s Legal Loss May Do Little to Curtail Spyware
The $168 million judgment against NSO Group underscores how citizens put little store in the spyware industry’s justifications for circumventing security — but will it […]
Attackers Lace Fake Generative AI Tools With ‘Noodlophile’ Malware
Threat actors are scamming users by advertising legitimate-looking generative AI websites that, when visited, install credential-stealing malware onto the victim’s computer. ​The original article found […]
New Noodlophile Malware Spreads Through Fake AI Video Generation Platforms
Cybercriminals have unleashed a new malware campaign using fake AI video generation platforms as a lure. Dubbed Noodlophile Stealer, this previously undocumented infostealer targets unsuspecting […]
Lumma Stealer Upgraded with PowerShell Tools and Advanced Evasion Techniques
Sophos Managed Detection and Response (MDR) in September 2024, the notorious Lumma Stealer malware has evolved with sophisticated PowerShell tools and advanced evasion tactics, leveraging […]
4 Hackers Arrested After Millions Made in Global Botnet Business
The cybercriminals infected older wireless Internet routers with Anyproxy and 5socks malware in order to reconfigure them — all without the users’ knowledge. ​The original […]
APT37 Hackers Use Weaponized LNK Files and Dropbox for Command-and-Control Operations
The North Korean state-sponsored hacking group APT37, also known as ScarCruft, launched a spear phishing campaign targeting activists focused on North Korean issues. Named “Operation: […]