51Articles
8Categories
2025-11-27Date
🐛
Apache SkyWalking Flaw Allows Attackers to Launch XSS Attacks
⚠️
AI browsers can be tricked with malicious prompts hidden in URL fragments
⚠️
SonicWall ransomware attacks offer an M&A lesson for CSOs
⚠️
Smashing Security podcast #445: The hack that brought back the zombie apocalypse
⚠️
Gainsight Expands Impacted Customer List Following Salesforce Security Alert
⚠️
Microsoft Teams’ guest chat feature exposes cross-tenant blind spot
⚠️
ServiceNow is in talks to buy identity security firm Veza for over $1 billion: report
⚠️
Neues ToddyCat-Toolkit greift Outlook und Microsoft-Token an
⚠️
OpenAI Reveals Mixpanel Data Breach Exposing User Details
⚠️
Legacy Python Package Vulnerabilities Enable PyPI Attacks Through Domain Takeover
⚠️
Microsoft Teams Guest Chat Flaw Could Let Hackers Deliver Malware
⚠️
Shai Hulud v2 Exploits GitHub Actions to Steal Secrets
⚠️
OpenAI admits data breach after analytics partner hit by phishing attack
📋
Cybersecurity Update: Incorrect Company Naming, Major Breaches, and New Malware Campaigns
📋
NVIDIA DGX Spark Flaws Allow Attackers to Run Malicious Code and Launch DoS Attacks
📢
State-backed spyware attacks are targeting Signal and WhatsApp users, CISA warns
📢
Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0
📢
[Control systems] ABB security advisory (AV25-788)
📢
News alert: Quttera’s new API replaces manual audit prep, now aligned with PCI DSS v4.0 requirements
🔥
China Software Developer Network - 6,414,990 breached accounts
🔥
OpenAI discloses API customer data breach via Mixpanel vendor hack
🔥
OpenAI User Data Exposed in Mixpanel Hack
🔥
Comcast to pay $1.5M fine for vendor breach affecting 270K customers
🔥
OpenAI-Dienstleister gehackt
🔥
Asahi Data Breach Impacts 2 Million Individuals
🔥
How your dashcam can be hacked, and how to protect yourself from the attack | Kaspersky official blog
🔥
Ransomware Defense: Embracing Zero Trust Networking
🔥
Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
🔥
Malicious LLMs empower inexperienced hackers with advanced tools
🕵️
Von LLM generierte Malware wird immer besser
🕵️
What is Cyber Resilience Act, and what cybersecurity requirements does it impose?
🕵️
What is Cyber Resilience Act, and what cybersecurity requirements does it impose?
🕵️
Firmware Authentication Bypass: The Holy Grail
🕵️
Blurred Chats, Bigger Risks
🕵️
How Malware Authors Incorporate LLMs to Evade Detection
🕵️
New ShadowV2 botnet malware used AWS outage as a test opportunity
🕵️
Handala Hacker Group Targets Israeli High-Tech and Aerospace Professionals
🕵️
“Dead Man’s Switch” Triggers Massive npm Supply Chain Malware Attack
🕵️
Lapsus$ Hunters Register 40+ Domains Impersonating Zendesk Environments
🕵️
Abandoned iCal Domains Threaten 4M Devices
🕵️
OpenAI User Data Exposed in Mixpanel Hack
🕵️
One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM
🕵️
Cybersecurity Services, Solutions & Products. Global Provider | Group-IB
🕵️
Malware: Software with Bad Intent
🕵️
Vibe Coding For Success and Failure - PSW #902
🌐
ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
🌐
Shai-hulud 2.0 Campaign Targets Cloud and Developer Ecosystems
🌐
Joint statement on malicious cyber activity targeting Canadian critical infrastructure
🌐
GreyNoise launches free scanner to check if you're part of a botnet
📡
Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update
📡
What parents should know to protect their children from doxxing