Source: securityaffairs.com – Author: Pierluigi Paganini A 20-year-old flaw in End-of-Train and Head-of-Train systems could let hackers trigger emergency braking, finally getting proper attention. US CISA...
Day: July 15, 2025
Interlock ransomware group deploys new PHP-based RAT via FileFix – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Interlock ransomware group deploys new PHP-based RAT via FileFix (a ClickFix variant) in a widespread campaign targeting multiple industries. The...
Global Louis Vuitton data breach impacts UK, South Korea, and Turkey – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Louis Vuitton data breach affects customers in the UK, South Korea, Turkey, and possibly more countries, with notifications underway. Customers...
Gender Reservation in Indian Engineering Education: Policies, Progress, and Perspectives
Swastika Chatterjee-Das shares data and reflections on how gender-based quotas are shaping engineering education and industry outcomes in India. Source Views: 0
How Amar Dabaja’s Passion for Reading Led Her to Electrical Engineering
After a personal tragedy, electrical engineer Amar Dabaja built a career designing automotive technology that saves lives. Source Views: 0
North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign – Source:thehackernews.com
Source: thehackernews.com – Author: . The North Korean threat actors linked to the Contagious Interview campaign have been observed publishing another set of 67 malicious packages...
Abacus Market Shutters After Exit Scam, Say Experts – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The Western world’s highest-grossing dark web marketplace went offline earlier this month in a likely exit scam, according to industry experts. Blockchain...
NCSC Launches Vulnerability Research Institute to Boost UK Resilience – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The UK’s National Cyber Security Centre (NCSC) has launched a new initiative designed to enhance its understanding of vulnerability research and improve...
Fake Android Money Transfer App Targeting Bengali-Speaking Users – Source:www.mcafee.com
Source: www.mcafee.com – Author: McAfee Labs. Authored by Dexter Shin McAfee’s Mobile Research Team discovered a new and active Android malware campaign targeting Bengali-speaking users, mainly...
Web-Inject Campaign Debuts Fresh Interlock RAT Variant – Source: www.darkreading.com
Source: www.darkreading.com – Author: Alexander Culafi Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Military Veterans May Be What Cybersecurity Is Looking For – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Google Gemini AI Bug Allows Invisible, Malicious Prompts – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
The Dark Side of Global Power Shifts & Demographic Decline – Source: www.darkreading.com
Source: www.darkreading.com – Author: Ty Greenhalgh Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
AI poisoning and the CISO’s crisis of trust – Source: www.csoonline.com
Source: www.csoonline.com – Author: The CISO’s role has always been to protect the organization from threats it does not yet understand. AI poisoning requires CISOs to...
How defenders use the dark web – Source: www.csoonline.com
Source: www.csoonline.com – Author: Gathering threat intelligence, finding the perpetrators of cyber attacks and bringing down whole ransomware gangs are some of the ways the dark...
Google Gemini-Lücke ermöglicht versteckte Phishing-Angriffe – Source: www.csoonline.com
Source: www.csoonline.com – Author: Ein Bug in Google Gemini erlaubt es Angreifern, E-Mail-Zusammenfassungen zu kapern und Phishing-Attacken zu starten. Hacker können Google Gemini nutzen, um versteckte...
The 10 most common IT security mistakes – Source: www.csoonline.com
Source: www.csoonline.com – Author: In practice, incident response teams repeatedly encounter the same weaknesses. What are they and how can they be resolved? Encrypted files and...
New Grok-4 AI breached within 48 hours using ‘whispered’ jailbreaks – Source: www.csoonline.com
Source: www.csoonline.com – Author: Just days after launch, Elon Musk’s Grok-4 is compromised by researchers using a stealthy blend of Echo Chamber and Crescendo techniques, exposing...
Hacker sollen 170 Cyberangriffe in Deutschland verübt haben – Source: www.csoonline.com
Source: www.csoonline.com – Author: Die Angreifer sollen zum “Wizard Spider”-Netzwerk gehören. Alliance Images – shutterstock.com Eine international agierende Hackergruppe soll in Deutschland mindestens 170 Cyberangriffe verübt...
Survey Finds AI Adoption Outpacing Security Readiness – Source: securityboulevard.com
Source: securityboulevard.com – Author: George V. Hulme As organizations continue to deploy AI, security professionals find themselves confronting critical gaps in their level of preparedness, according...
Rethinking Defense in the Age of AI-Generated Malware – Source: securityboulevard.com
Source: securityboulevard.com – Author: Mike Wiacek Attackers are using public models and automation tools to generate malware that is unique to every campaign. It doesn’t look...
Security in the Era of AI-speed Exploits – Source: securityboulevard.com
Source: securityboulevard.com – Author: Bob Tinker Modern AI attacks require runtime guardrails capable of spanning application, container and node/host runtime environments comprehensively. The post Security in...
McDonald’s Hiring Bot: Would You Like A Side of PII With That? – Source: securityboulevard.com
Source: securityboulevard.com – Author: Teri Robinson An AI hiring bot intended to streamline the job application process has instead created a super-sized privacy headache for McDonald’s. ...
Russian Basketball Star Daniil Kasatkin Arrested in Ransomware Probe – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. Russian professional basketball player Daniil Kasatkin, previously playing for Moscow’s MBA team, was taken into custody last month at Charles...
Researchers Jailbreak Elon Musk’s Grok-4 AI Within 48 Hours of Launch – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. Elon Musk’s Grok-4 AI was compromised within 48 hours. Discover how NeuralTrust researchers combined “Echo Chamber” and “Crescendo” techniques to...
Louis Vuitton UK Hit by Cyberattack, Third LVMH Breach in 3 Months – Source:hackread.com
Source: hackread.com – Author: Waqas. Luxury fashion house Louis Vuitton is investigating a data breach that exposed customer information tied to its UK operations. The attack...
Dedicated Proxies: A Key Tool for Online Privacy, Security and Speed – Source:hackread.com
Source: hackread.com – Author: Owais Sultan. Online privacy, security, and performance today are more important than ever. For professionals and businesses working online, it’s essential to...
Report from the Cambridge Cybercrime Conference – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments anon • July 14, 2025 5:50 PM From one of the papers: Our findings contribute to a deeper...
Grok-4 Jailbroken Two Days After Release Using Combined Attack – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Just 48 hours after its public debut, Grok-4 was successfully jailbroken using a newly enhanced attack method. Researchers from NeuralTrust combined two...
IoT Devices at Risk Due to eSIM Flaw in Kigen eUICC Cards – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A newly disclosed vulnerability in Kigen’s eUICC cards has exposed potentially billions of IoT devices to malicious attacks through flaws in eSIM...