Microsoft’s Detection and Response Team has exposed a sophisticated backdoor malware that exploits the OpenAI Assistants API as an unconventional command-and-control communication channel. Named SesameOp, […]
Apple Releases Security Update Addressing Critical Flaws in iOS 26.1 and iPadOS 26.1
Apple has rolled out new security updates for iOS 26.1 and iPadOS 26.1, released on November 3, 2025, introducing important fixes for a wide range […]
Cybercriminals Exploit RMM Tools to Target Trucking Firms and Hijack Freight
Cybercriminals are orchestrating sophisticated attacks against trucking and freight companies in elaborate schemes designed to steal cargo shipments worth millions. These threat actors are exploiting […]
Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data
A new security issue discovered by researchers reveals that Anthropic’s Claude AI system can be exploited through indirect prompts, allowing attackers to exfiltrate user data […]
Android Malware Mutes Alerts, Drains Crypto Wallets
Android/BankBot-YNRK is currently targeting users in Indonesia by masquerading as legitimate applications. ​The original article found on darkreading Read More
Hackers Weaponize Remote Tools to Hijack Cargo Freight
Researchers uncovered a new threat campaign in which attackers use RMM tools to steal physical cargo out of the supply chain. ​The original article found […]
Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive
Cybersecurity researchers have flagged a new malicious extension in the Open VSX registry that harbors a remote access trojan called SleepyDuck. According to Secure Annex’s […]
OpenAIs Aardvark soll Fehler im Code erkennen und beheben
KI soll das Thema Sicherheit frühzeitig in den Development-Prozess miteinbeziehen. Summit Art Creations/ Shutterstock OpenAI hat Aardvark vorgestellt, einen autonomen Agenten auf Basis von GPT-5. […]
Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks
Bad actors are increasingly training their sights on trucking and logistics companies with an aim to infect them with remote monitoring and management (RMM) software […]
Let’s Get Physical: A New Convergence for Electrical Grid Security
The power grid is being attacked online and IRL. Increasingly, regulators and industry experts agree: Security teams need to focus on both cyber and physical […]