Skip to content
InfosecToday.com
  • D3f3ndo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com
How Poor Certificate Management Creates Vulnerabilities for Phishing and Man-in-the-Middle Attacks
Certificate Management | Phishing Techniques  | Security Risks

How Poor Certificate Management Creates Vulnerabilities for Phishing and Man-in-the-Middle Attacks

A newly identified MCPoison attack utilizes the Cursor IDE’s MCP validation process to run arbitrary commands within the system.
AI Development Tools  | Cybersecurity | Software Vulnerabilities

A newly identified MCPoison attack utilizes the Cursor IDE’s MCP validation process to run arbitrary commands within the system.

Microsoft’s Project Ire independently reverse engineers software to detect malware.
AI Technology | Cybersecurity | Malware Detection 

Microsoft’s Project Ire independently reverse engineers software to detect malware.

A vulnerability in the Cursor AI Code Editor allows for remote code execution (RCE) by swapping in a malicious MCP file after it has been approved.
AI Development Risks | Cybersecurity Vulnerabilities  | Remote Code Execution

A vulnerability in the Cursor AI Code Editor allows for remote code execution (RCE) by swapping in a malicious MCP file after it has been approved.

Google’s August update addresses two Qualcomm vulnerabilities that have been actively exploited.
Android Updates | Qualcomm Exploits  | Security Vulnerabilities

Google’s August update addresses two Qualcomm vulnerabilities that have been actively exploited.

Cisco Experienced a Security Breach – Cybercriminals Obtained User Profile Information from Cisco.com
Cybersecurity Incident | Data Breach | Social Engineering

Cisco Experienced a Security Breach – Cybercriminals Obtained User Profile Information from Cisco.com

Cloudflare has accused Perplexity AI of circumventing firewalls and scraping websites by modifying its user agent.
Evasion Tactics | Legal and Ethical Implications  | Web Scraping Techniques

Cloudflare has accused Perplexity AI of circumventing firewalls and scraping websites by modifying its user agent.

A newly discovered vulnerability in Streamlit enables cybercriminals to execute cloud account takeover attacks.
Cloud Security Risks | Financial Data Manipulation  | Vulnerability Exploitation

A newly discovered vulnerability in Streamlit enables cybercriminals to execute cloud account takeover attacks.

APT36 Hackers Targeting Indian Government Organizations to Harvest Login Information
Credential Theft  | Cybersecurity Threats | Phishing Campaign

APT36 Hackers Targeting Indian Government Organizations to Harvest Login Information

Cisco announces that user information was compromised during a CRM breach.
Cybersecurity Incident | Data Breach | User Accounts

Cisco announces that user information was compromised during a CRM breach.

North Korean cybercriminals are exploiting NPM packages to pilfer cryptocurrency and confidential information.
Cybersecurity Threats | Malware Distribution | Supply Chain Attacks

North Korean cybercriminals are exploiting NPM packages to pilfer cryptocurrency and confidential information.

SonicWall has issued a warning about a rise in cyberattacks aimed at their Generation 7 firewalls over the past 72 hours.
Cybersecurity Threats | Mitigation Strategies  | Vulnerability Management 

SonicWall has issued a warning about a rise in cyberattacks aimed at their Generation 7 firewalls over the past 72 hours.

Kimsuky APT hackers are utilizing LNK files as a means to deploy reflective malware, successfully evading detection by Windows Defender.
Cyber Espionage | Malware Techniques  | Social Engineering

Kimsuky APT hackers are utilizing LNK files as a means to deploy reflective malware, successfully evading detection by Windows Defender.

Approov Secures $6.7 Million in Funding to Enhance Mobile App Security
API Security Solutions | Mobile Application Security | Series A Funding 

Approov Secures $6.7 Million in Funding to Enhance Mobile App Security

Vibe Coding: If Everyone Becomes a Developer, Who is Responsible for Code Security?
Application Security | Non-Developer Challenges  | Software Development Accessibility

Vibe Coding: If Everyone Becomes a Developer, Who is Responsible for Code Security?

A summary of the key announcements from vendors at Black Hat USA 2025 (Part 1).
Cybersecurity Innovations | Industry Trends  | Product Launches

A summary of the key announcements from vendors at Black Hat USA 2025 (Part 1).

Misconfigurations Should Not Be Considered Vulnerabilities: The Expensive Misunderstanding Surrounding Security Threats.
Misconfiguration | Shared Responsibility Model  | Vulnerability

Misconfigurations Should Not Be Considered Vulnerabilities: The Expensive Misunderstanding Surrounding Security Threats.

Cybercriminals have the ability to access IIS machine keys by taking advantage of a vulnerability in SharePoint’s deserialization process.
Cybersecurity Threats | Remote Code Execution | Vulnerability Exploitation

Cybercriminals have the ability to access IIS machine keys by taking advantage of a vulnerability in SharePoint’s deserialization process.

The August 2025 update for Android addresses a Qualcomm vulnerability that has been exploited.
Mobile Technology  | Security Updates | Vulnerability Management 

The August 2025 update for Android addresses a Qualcomm vulnerability that has been exploited.

How Leading CISOs Manage Their SOCs to Avoid Alert Overload and Ensure No Genuine Incidents are Overlooked
Automation in SOCs | Incident Response Efficiency  | Threat Analysis

How Leading CISOs Manage Their SOCs to Avoid Alert Overload and Ensure No Genuine Incidents are Overlooked

Well-known Chollima APT hackers are targeting job applicants and organizations to distribute JavaScript-based malware.
Cybersecurity Threats | Malware Distribution Techniques  | Social Engineering Tactics

Well-known Chollima APT hackers are targeting job applicants and organizations to distribute JavaScript-based malware.

Chanel, a leading fashion brand, has been targeted in a series of cyberattacks linked to vulnerabilities in Salesforce.
Customer Data Protection | Cybersecurity Breaches | Social Engineering Attacks 

Chanel, a leading fashion brand, has been targeted in a series of cyberattacks linked to vulnerabilities in Salesforce.

SonicWall is actively searching for zero-day vulnerabilities following a significant increase in attacks targeting firewalls.
Firewall Exploitation  | Ransomware Attacks  | Zero-Day Vulnerabilities

SonicWall is actively searching for zero-day vulnerabilities following a significant increase in attacks targeting firewalls.

Microsoft is providing a $5 million prize at the Zero Day Quest hacking competition.
AI Security  | Cloud Security | Hacking Competitions 

Microsoft is providing a $5 million prize at the Zero Day Quest hacking competition.

A campaign utilizing artificial intelligence has created 15,000 counterfeit TikTok Shop websites that distribute malware and steal cryptocurrency.
Cybersecurity Threats | E-commerce Fraud  | Phishing and Malware Campaigns

A campaign utilizing artificial intelligence has created 15,000 counterfeit TikTok Shop websites that distribute malware and steal cryptocurrency.

Serious vulnerability in Android system components permits remote code execution without requiring any user interaction.
Android Security Vulnerabilities | Remote Code Execution Risks | Security Patch Management 

Serious vulnerability in Android system components permits remote code execution without requiring any user interaction.

SonicWall is looking into a possible zero-day vulnerability in its SSL VPN following reports of over 20 targeted attacks.
Cybersecurity Threats | Ransomware Attacks  | Vulnerability Investigation

SonicWall is looking into a possible zero-day vulnerability in its SSL VPN following reports of over 20 targeted attacks.

A vulnerability chain in NVIDIA Triton has the potential to allow attackers to gain control over AI servers.
AI Security Risks  | Remote Code Execution | Vulnerability Exploitation

A vulnerability chain in NVIDIA Triton has the potential to allow attackers to gain control over AI servers.

A new Android malware is disguising itself as SBI Card and Axis Bank applications to extract users’ financial information.
Financial Fraud  | Malware Campaign | Phishing Techniques 

A new Android malware is disguising itself as SBI Card and Axis Bank applications to extract users’ financial information.

Raspberry Robin malware downloader is targeting Windows systems by utilizing a new exploit related to a frequently used vulnerability in the Log File System Driver.
Evasion Strategies  | Exploitation Techniques | Malware Threats 

Raspberry Robin malware downloader is targeting Windows systems by utilizing a new exploit related to a frequently used vulnerability in the Log File System Driver.

Page navigation

Previous PagePrevious 1 … 8 9 10 11 12 13 Next PageNext

© 2025 InfosecToday.com - WordPress Theme by Kadence WP

  • D3f3ndo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search