The healthcare sector has emerged as a prime target for cyber attackers, driven by the increasing reliance on cloud applications and the rapid integration of […]
Ransomware-Bande erpresst Brauerei Oettinger
Cyberkriminelle haben die IT-Systeme der Brauerei Oettinger verschlüsselt. Die Produktion ist nicht betroffen. defotoberg – shutterstock.com In Darknet ist kürzlich ein Post der Cyberbande Ransomhouse […]
PoC Tool Released to Detect Servers Affected by Critical Apache Parquet Vulnerability
F5 Labs has released a new proof-of-concept (PoC) tool designed to help organizations detect servers vulnerable to the recently disclosed Apache Parquet vulnerability, CVE-2025-30065. This […]
Hackers booby trap NPM with cross-language imposter packages
Hackers are abusing the Node Package Manager (NPM) registry — a database of JavaScript packages — to target multi-language developers with typo-squatted packages containing stealers […]
Reevaluating SSEs: A Technical Gap Analysis of Last-Mile Protection
Security Service Edge (SSE) platforms have become the go-to architecture for securing hybrid work and SaaS access. They promise centralized enforcement, simplified connectivity, and consistent […]
Russian Company Gains Full Control Over Critical Open Source Easyjson Library
A startling discovery by Hunted Labs has brought to light a potential security risk lurking within the heart of the cloud-native ecosystem. The open source […]
CISA Warns of Cyber Threats to Oil and Gas SCADA and ICS Networks
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a new alert warning critical infrastructure operators-particularly those in the oil and natural gas sector-of emerging […]
SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version
Cybersecurity researchers have disclosed multiple security flaw in the on-premise version of SysAid IT support software that could be exploited to achieve pre-authenticated remote code […]
SysAid ITSM Vulnerabilities Enables Pre-Auth Remote Command Execution
Security researchers have disclosed a chain of critical vulnerabilities affecting SysAid ITSM’s On-Premise solution, enabling unauthenticated attackers to execute remote commands by exploiting several pre-auth […]
DragonForce: Emerging Hybrid Cyber Threat in the 2025 Ransomware Landscape
DragonForce has swiftly risen as a formidable player in 2025, embodying a hybrid threat that blends ideological ambiguity with ruthless opportunism. First identified in December […]