Source: www.csoonline.com – Author: Forscher haben ein KI-Tool entwickelt, das Sicherheitslücken in großen Repositories wie GitHub findet und automatisch einen Patch erstellt. Ein neu entwickeltes GenAI-Tool...
Month: June 2025
China-linked hackers target cybersecurity firms, governments in global espionage campaign – Source: www.csoonline.com
Source: www.csoonline.com – Author: News Jun 11, 20254 mins Advanced Persistent ThreatsCyberattacksSecurity PurpleHaze and ShadowPad campaigns targeted over 70 organizations globally, including government and critical infrastructure...
Operation Secure: INTERPOL dismantles 20,000+ malicious IPs in major cybercrime crackdown – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini INTERPOL announced that a joint operation code-named Operation Secure took down 20,000+ malicious IPs/domains tied to 69 info-stealers. Between January...
Over 80,000 servers hit as Roundcube RCE bug gets rapidly exploited – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini A critical remote code execution (RCE) vulnerability in Roundcube was exploited days after patch, impacting over 80,000 servers. Threat actors...
A flaw could allow recovery of the phone number associated with any Google account – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini A vulnerability could allow recovery of the phone number associated with a Google account by carrying out a brute force...
Your Social Security Number Could be for Sale: Old AT&T Data Leak Exposes 44M SSN Numbers – Source:www.mcafee.com
Source: www.mcafee.com – Author: Jasdev Dhaliwal. If you’re an AT&T customer, now’s the time to take action. A previously reported data breach has exposed personal information...
Maze Banks $25M to Tackle Cloud Security With AI Agents – Source: www.securityweek.com
Source: www.securityweek.com – Author: SecurityWeek News British cloud security start‑up Maze has banked $25 million in early stage capital to build software that deploys swarms of...
Webinar Today: Rethinking Endpoint Hardening for Today’s Attack Landscape – Source: www.securityweek.com
Source: www.securityweek.com – Author: SecurityWeek News Live Webinar: Wednesday, June 11, 2025 at 1PM ET Living off the Land (LOtL) attacks—where adversaries weaponize legitimate tools like...
40,000 Security Cameras Exposed to Remote Hacking – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire More than 40,000 security cameras worldwide are exposed to the internet, cybersecurity firm Bitsight warns. Operating over HTTP or RTSP...
Skybox non c’è più. Il rischio di aspettare non c’è. – Source: securityboulevard.com
Source: securityboulevard.com – Author: FireMon Skybox non c’è più, ma le scadenze di conformità, gli obblighi di revisione e i rischi per la sicurezza sono ben...
I pericoli della gestione fai-da-te dei criteri di sicurezza di rete – Source: securityboulevard.com
Source: securityboulevard.com – Author: FireMon La sicurezza della rete è diventata una priorità assoluta per le aziende, per salvaguardare i propri dati sensibili, proteggere dalle minacce...
How Adaptable NHIs Enhance Cyber Resilience – Source: securityboulevard.com
Source: securityboulevard.com – Author: Alison Mack Is Your Organization Cyber Resilient with Adaptable NHIs? Are you fully utilizing the powers of Non-Human Identities (NHIs) to ensure...
Skybox ist verschwunden. Das Risiko des Wartens nicht. – Source: securityboulevard.com
Source: securityboulevard.com – Author: FireMon Skybox gibt es nicht mehr, aber Ihre Compliance-Fristen, Audit-Verpflichtungen und Sicherheitsrisiken sind noch sehr lebendig. Hier erfahren Sie, warum EMEA-Organisationen jetzt...
Die Gefahren von DIY Network Security Policy Management – Source: securityboulevard.com
Source: securityboulevard.com – Author: FireMon Die Netzwerksicherheit hat für Unternehmen oberste Priorität, um ihre sensiblen Daten zu schützen, vor Cyber-Bedrohungen zu bewahren und die Einhaltung von...
Arrêt de Skybox. Le risque d’attendre existe – Source: securityboulevard.com
Source: securityboulevard.com – Author: FireMon Arrêt de Skybox mais les délais de conformité, les obligations d’audit et les risques de sécurité sont toujours réels. Voici pourquoi...
Looking for a Python Developer or a Team of Python Developers – Source: securityboulevard.com
Source: securityboulevard.com – Author: Dancho Danchev Dear blog readers, This is Dancho. I’ve spent the past week working on a very important personal project where I’m...
Les dangers d’une gestion bricolée en matière de politique de sécurité du réseau – Source: securityboulevard.com
Source: securityboulevard.com – Author: FireMon La sécurité des réseaux est devenue une priorité absolue pour les entreprises afin de sauvegarder leurs données sensibles, de se protéger...
Demo: fine-tuning LLMs with Tonic Textual – Source: securityboulevard.com
Source: securityboulevard.com – Author: Expert Insights on Synthetic Data from the Tonic.ai Blog In this blog post, Tonic.ai’s Head of AI, Ander Steele, walks through a...
Los Peligros de la Gestión de Políticas de Seguridad de Red Desarrolladas Internamente – Source: securityboulevard.com
Source: securityboulevard.com – Author: FireMon La seguridad de red se ha convertido en una prioridad clave para las empresas que buscan proteger sus datos sensibles, defenderse...
CVE-2025-33053 Exploitation: A Critical WebDAV Zero-Day RCE Vulnerability Actively Weaponized by Stealth Falcon APT Group – Source: socprime.com
Source: socprime.com – Author: Veronika Telychko WRITTEN BY Veronika Telychko Technical Writer [post-views] June 11, 2025 · 5 min read A new critical zero-day RCE vulnerability...
CVE-2025-33073: Windows SMB Client Zero-Day Lets Attackers Gain SYSTEM Privileges – Source: socprime.com
Source: socprime.com – Author: Daryna Olyniychuk As the digital landscape continues to evolve in complexity, the number of discovered vulnerabilities is growing at an unprecedented pace,...
Congress Introduces Bill to Strengthen Healthcare Cybersecurity – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: US legislators have introduced a new Healthcare Cybersecurity Bill to Congress, which is designed to expand the federal government’s role in preventing...
DeepSeek installer or just malware in disguise? Click around and find out – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons Suspected cybercriminals have created a fake installer for Chinese AI model DeepSeek-R1 and loaded it with previously unknown malware called...
Hire me! To drop malware on your computer – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons In a scam that flips the script on fake IT worker schemes, cybercriminals posing as job seekers on LinkedIn and...
Salesforce tags 5 CVEs after SaaS security probe uncovers misconfig risks – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Salesforce has assigned five CVE identifiers following a security report that uncovered more than 20 configuration weaknesses, some of which...
Asia dismantles 20,000 malicious domains in infostealer crackdown – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Thirty-two people across Asia have been arrested over their suspected involvement with infostealer malware in the latest international collaboration against...
Analysis to action: Operationalizing your threat intelligence – Source: go.theregister.com
Source: go.theregister.com – Author: Joe Kaden, senior technical account manager, Prelude Security Partner content When a new security advisory drops or an alarming new ransomware campaign...
Microsoft slows Windows 11 24H2 Patch Tuesday due to a ‘compatibility issue’ – Source: go.theregister.com
Source: go.theregister.com – Author: Richard Speed updated Microsoft set a new record with June’s security update for the time between release and an admission of borkage....
CISO who helped unmask Badbox warns: Version 3 is coming – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons Badbox 2.0, the botnet that infected millions of smart TV boxes and connected devices before private security researchers and law...