Google has filed a civil lawsuit in the U.S. District Court for the Southern District of New York (SDNY) against China-based hackers who are behind […]
Wie ChatGPT sich selbst eine Prompt Injection zufügt
Forscher haben neue Methoden für Angriffe über ChatGPT aufgedeckt. PhotoGranary02 – shutterstock.com Forscher des Sicherheitsunternehmens Tenable haben sieben neue Möglichkeiten entdeckt, wie Angreifer ChatGPT dazu […]
Phishing Tool Uses Smart Redirects to Bypass Detection
A campaign against Microsoft 365 users leverages Quantum Route Redirection, which simplifies previously technical attack steps and has affected victims across 90 countries. The original […]
Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws
Amazon’s threat intelligence team on Wednesday disclosed that it observed an advanced threat actor exploiting two then-zero-day security flaws in Cisco Identity Service Engine (ISE) […]
AppleScript Used to Deliver macOS Malware Disguised as Zoom & Teams Updates
Since Apple removed the popular “right-click and open” Gatekeeper override in August 2024, threat actors have shifted their tactics to deliver malware on macOS. Among […]
Miniatur Wunderland Hamburg warnt vor Datendiebstahl
Der Ticketshop des Miniatur Wunderland Hamburg wurde offenbar gehackt. JHVEPhoto – shutterstock.com Das Miniatur Wunderland Hamburg zählt zu den beliebtesten Sehenswürdigkeiten der Hansestadt und ist […]
[Webinar] Learn How Leading Security Teams Reduce Attack Surface Exposure with DASR
Every day, security teams face the same problem—too many risks, too many alerts, and not enough time. You fix one issue, and three more show […]
Malicious npm package sneaks into GitHub Actions builds
A malicious npm package named “@acitons/artifact” was found impersonating the legitimate “@actions/artifact” module, directly targeting the CI/CD pipelines within GitHub Actions workflows. According to Veracode […]
MastaStealer Exploits Windows LNK to Launch PowerShell and Bypass Defender
Windows LNK files remain a preferred vector for attackers seeking to establish initial access on target systems. Recently, security researchers identified a sophisticated MastaStealer campaign […]
UK cybersecurity bill brings tougher rules for critical infrastructure
The UK government has introduced a new legislation to harden national cyber defenses across critical infrastructure, imposing turnover-based penalties and granting ministers emergency powers to […]