Security researchers have identified a sophisticated new malware family, Airstalk, that exploits VMware’s AirWatch API—now known as Workspace ONE Unified Endpoint Management—to establish covert command-and-control […]
Cisco UCCX Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code
Cisco has issued a critical security advisory addressing two severe vulnerabilities in its Unified Contact Center Express (CCX) platform that could enable remote attackers to […]
Checkpoint Analysis: Dissecting the $128M Balancer Pool Drain in Under 30 Minutes
In the early hours of November 3, 2025, Check Point Research’s blockchain threat monitoring systems flagged a suspicious pattern on the Ethereum mainnet. The alert […]
Threat Actors Exploit VS Code Extensions for Ransomware via GitHub C2
Security researchers have uncovered a sophisticated attack campaign attributed to Kimsuky, the North Korean-backed threat group known for conducting espionage operations against government entities and […]
Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response
Bitdefender has once again been recognized as a Representative Vendor in the Gartner® Market Guide for Managed Detection and Response (MDR) — marking the fourth […]
KI-Malware ist keine Theorie mehr
KI boomt auch unter Cyberkriminellen. Die ersten operativen Ergebnisse dieses Trends beleuchten Google-Sicherheitsforscher in einem aktuellen Report. Tayler Derden | shutterstock.com Was lange befürchtet und […]
Verdacht des systematischen Missbrauchs von Zahlungsdienstleistern
width=”2496″ height=”1404″ sizes=”auto, (max-width: 2496px) 100vw, 2496px”>Die Beschuldigten sollen zur Abwicklung von Zahlungen vier große deutsche Zahlungsdienstleister kompromittiert haben. Andrea Danti – shutterstock.com Bei der […]
Keeper Security launches Forcefield to defend against memory-based attacks on Windows devices
Keeper Security has unveiled Keeper Forcefield, a new kernel-level endpoint security product designed to stop one of the fastest-growing cyber threats: memory-based attacks. The company, […]
Digital health can’t scale if cybersecurity falls behind
When the world faced COVID-19, I watched something remarkable happen. Artificial intelligence (AI) systems, which I had once viewed as tools of research and efficiency, […]
Multiple Django Flaws Could Allow SQL Injection and Denial-of-Service Attacks
The Django development team has released critical security patches addressing two significant vulnerabilities that could expose applications to denial-of-service attacks and SQL injection exploits. The […]