The North Korean hacker group Konni (Opal Sleet, TA406) is using AI-generated PowerShell malware to target developers and engineers in the blockchain sector. [...]
Two malicious extensions inย Microsoft's Visual Studio Code (VSCode) Marketplace that were collectively installedย 1.5 million times, exfiltrate developer data toย China-based servers. [...]
The Cybersecurity andย Infrastructure Security Agency (CISA) in the U.S. warned of active exploitation of four vulnerabilities impacting enterprise software from Versa and Zimbra, the Vite frontend tooling framework, and the Prettier code formatter. [...]
A coordinated campaign has been observed targeting a recently disclosedย critical-severity vulnerability that has been present in theย GNU InetUtils telnetd server for 11 years. [...]
Hackers began exploiting an authentication bypass vulnerability in SmarterTools' SmarterMail email server and collaboration tool that allows resetting admin passwords. [...]
Two high-severity vulnerabilities in Chainlit, a popular open-source framework for building conversational AI applications, allow reading any file on the server and leak sensitive information. [...]
A new family of Android click-fraud trojans leverages TensorFlow machine learning models to automatically detect and interact with specific advertisement elements. [...]
PcComponentes, a major technology retailer in Spain,ย has denied claims of a data breach on its systems impacting 16 million customers, but confirmed it suffered a credential stuffing attack. [...]
LastPass is warning of a new phishing campaign disguised as a maintenance notification from the service, asking users to back up their vaults in the next 24 hours. [...]
Threat actors are exploiting misconfiguredย web applications used for security training and internal penetration testing, such as DVWA, OWASP Juice Shop, Hackazon, and bWAPP, to gainย access to cloud environments of Fortune 500 companies and security vendors. [...]
A critical-severity vulnerability in the Advanced Custom Fields: Extended (ACF Extended) plugin for WordPress can be exploited remotely by unauthenticated attackers to obtain administrative permissions. [...]
The recently discovered cloud-focused VoidLink malware framework is believed to have been developed by a single person with the help of an artificial intelligence model. [...]
Using only natural language instructions, researchers were able to bypass Google Gemini's defenses against malicious prompt injectionย and create misleading events to leak private Calendar data. [...]
A malvertising campaign is using a fake ad-blocking Chrome and Edge extension namedย NexShieldย that intentionally crashes the browser in preparation for ClickFix attacks. [...]
Ransomware attackers targeting a Fortune 100 company in the finance sector used a new malware strain, dubbed PDFSider, to deliver malicious payloads on Windows systems. [...]
The U.K. government is warning of continued malicious activity from Russian-aligned hacktivist groups targeting critical infrastructure and local government organizations in the country in disruptive denial-of-service (DDoS) attacks. [...]
The Canadian Investment Regulatory Organization (CIRO) confirmed that the data breach it suffered last year impacts about 750,000 Canadian investors. [...]
Another set of 17 malicious extensions linked to the GhostPoster campaign hasย been discovered in Chrome, Firefox, and Edge stores, where they accumulated a total ofย 840,000 installations. [...]
A cross-site scripting (XSS) flaw in the web-based control panel used by operators of the StealC info-stealing malware allowed researchers to observe active sessions and gather intelligence on the attackers' hardware. [...]