Security-Forscher haben eine neue Schwachstelle entdeckt, die den ChatGPT Atlas-Browser von OpenAI betrifft. jackpress – shutterstock.com Nur wenige Tage, nachdem Cybersicherheitsanalysten davor gewarnt hatten, den […]
Jenkins Flaws Expose SAML Authentication Bypass and MCP Server Plugin Weaknesses
Jenkins automation server users face critical security threats following the disclosure of 14 distinct vulnerabilities spanning multiple plugins. The security advisory reveals a widespread pattern […]
Aembit Introduces Identity and Access Management for Agentic AI
Silver Spring, USA/ Maryland, October 30th, 2025, CyberNewsWire Aembit today announced the launch of Aembit Identity and Access Management (IAM) for Agentic AI, a set […]
PhantomRaven Malware Found in 126 npm Packages Stealing GitHub Tokens From Devs
Cybersecurity researchers have uncovered yet another active software supply chain attack campaign targeting the npm registry with over 100 malicious packages that can steal authentication […]
ThreatsDay Bulletin: DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising
The comfort zone in cybersecurity is gone. Attackers are scaling down, focusing tighter, and squeezing more value from fewer, high-impact targets. At the same time, […]
NFC Relay Attack: 700+ Android Apps Harvest Banking Login Details
A sophisticated cybercrime campaign leveraging Near Field Communication technology has exploded across multiple continents, with researchers at zLabs identifying over 760 malicious Android applications designed […]
Typo hackers sneak cross-platform credential stealer into 10 npm packages
In a newly disclosed multi-stage supply-chain campaign, a threat actor published ten typosquatted npm packages that mimicked popular libraries to deploy a cross-platform credential stealer. […]
Critical RediShell RCE Vulnerability Threatens 8,500+ Redis Deployments Worldwide
A critical security vulnerability in Redis’s Lua scripting engine has left thousands of database instances vulnerable to remote code execution attacks. The RediShell RCE vulnerability, […]
Cybersecurity management for boards: Metrics that matter
Ransomware doesn’t schedule a meeting with your CISO. It hits your core systems, deletes your backups and leaks your data. And while the security team […]
New Attack Chains Ghost SPNs and Kerberos Reflection to Elevate SMB Privileges
Microsoft has addressed a critical privilege escalation vulnerability affecting Windows environments worldwide. Attackers can exploit misconfigured Service Principal Names (SPNs) combined with Kerberos reflection attacks […]