Skip to content
InfosecToday.com
  • D3f3ndo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com
WAF protection was circumvented to execute XSS payloads through JavaScript injection by utilizing parameter pollution.
Cross-Site Scripting (XSS) Exploits  | HTTP Parameter Pollution Techniques | Web Application Firewall Vulnerabilities

WAF protection was circumvented to execute XSS payloads through JavaScript injection by utilizing parameter pollution.

Malicious actors are currently taking advantage of weaknesses in the open-source ecosystem to distribute harmful software.
Cybersecurity Threats | Malicious Software Techniques  | Supply Chain Vulnerabilities

Malicious actors are currently taking advantage of weaknesses in the open-source ecosystem to distribute harmful software.

M&S Cyberattacks: Stunning Technique Exposes Vulnerable Users
Cybersecurity

M&S Cyberattacks: Stunning Technique Exposes Vulnerable Users

Stay Safe from Scams: 5 Must-Have Tips for Protection
Cybersecurity

Stay Safe from Scams: 5 Must-Have Tips for Protection

Fraud Prevention: 6 Effortless Steps to Stay Safe
Cybersecurity

Fraud Prevention: 6 Effortless Steps to Stay Safe

Protecting Yourself After Data Breaches: Why We Need Stronger Cybersecurity Laws Now
Cybersecurity

Protecting Yourself After Data Breaches: Why We Need Stronger Cybersecurity Laws Now

Navigating the New Frontiers of Cybercrime: Essential Tips for Staying Safe in a Blending World
Cybersecurity

Navigating the New Frontiers of Cybercrime: Essential Tips for Staying Safe in a Blending World

How M&S’s Cyber Attack Response May Shape Its Future and Customer Trust
Cybersecurity

How M&S’s Cyber Attack Response May Shape Its Future and Customer Trust

Protecting Your Data Privacy: Key Reasons Why It’s at Risk and How You Can Safeguard It
Cybersecurity

Protecting Your Data Privacy: Key Reasons Why It’s at Risk and How You Can Safeguard It

Illicit Markets: Stunning Data Breaches Sell Your Info Cheap
Cybersecurity

Illicit Markets: Stunning Data Breaches Sell Your Info Cheap

Enhancing Global AI Security: Why the G7 Must Champion Federated Learning
Cybersecurity

Enhancing Global AI Security: Why the G7 Must Champion Federated Learning

How Data Breaches Power Illicit Marketplaces Selling Your Personal Information to Criminals
Cybersecurity

How Data Breaches Power Illicit Marketplaces Selling Your Personal Information to Criminals

Governments’ Losing Battle: Exclusive Backdoor Access Failures
Cybersecurity

Governments’ Losing Battle: Exclusive Backdoor Access Failures

Governments Struggle to Reclaim Backdoor Access to Encrypted Communications
Cybersecurity

Governments Struggle to Reclaim Backdoor Access to Encrypted Communications

Malicious individuals are leveraging artificial intelligence to enhance their operations, speed up their attacks, and target autonomous AI systems.
Advanced Social Engineering Techniques  | AI-Enhanced Cyber Attacks | Generative AI in Malware Development

Malicious individuals are leveraging artificial intelligence to enhance their operations, speed up their attacks, and target autonomous AI systems.

Claude vulnerabilities allow attackers to execute unauthorized commands by leveraging the system itself.
AI Security Vulnerabilities | Command Injection Techniques  | Exploit Development

Claude vulnerabilities allow attackers to execute unauthorized commands by leveraging the system itself.

A ransomware assault targeting a phone repair and insurance firm resulted in damages totaling millions.
Cybersecurity Threats | Incident Response Challenges  | Ransomware Tactics

A ransomware assault targeting a phone repair and insurance firm resulted in damages totaling millions.

The vulnerabilities in Nvidia Triton represent a significant threat to AI models.
AI Vulnerabilities | Cybersecurity | Software Patching 

The vulnerabilities in Nvidia Triton represent a significant threat to AI models.

SonicWall VPNs are being actively targeted due to a zero-day vulnerability that allows attackers to circumvent multi-factor authentication (MFA) and install ransomware.
Cybersecurity Threats | Ransomware Attacks  | Vulnerability Exploitation

SonicWall VPNs are being actively targeted due to a zero-day vulnerability that allows attackers to circumvent multi-factor authentication (MFA) and install ransomware.

A novel Python-based PXA stealer distributed through Telegram has reportedly compromised 200,000 unique passwords alongside numerous credit card details.
Cybercrime | Data Theft | Malware Techniques 

A novel Python-based PXA stealer distributed through Telegram has reportedly compromised 200,000 unique passwords alongside numerous credit card details.

Vulnerabilities in NVIDIA Triton allow unauthenticated attackers to run code and take control of AI servers.
AI Model Protection  | Remote Code Execution | Security Vulnerabilities

Vulnerabilities in NVIDIA Triton allow unauthenticated attackers to run code and take control of AI servers.

A newly discovered LegalPwn attack leverages Gemini, ChatGPT, and various other AI tools to execute harmful code by manipulating disclaimers.
AI Security Vulnerabilities | Malicious Code Execution  | Prompt Injection Techniques

A newly discovered LegalPwn attack leverages Gemini, ChatGPT, and various other AI tools to execute harmful code by manipulating disclaimers.

Vietnamese cybercriminals have employed the PXA Stealer tool to target 4,000 IP addresses, successfully compromising 200,000 passwords worldwide.
Cybercrime | Data Exfiltration  | Malware Distribution

Vietnamese cybercriminals have employed the PXA Stealer tool to target 4,000 IP addresses, successfully compromising 200,000 passwords worldwide.

A vulnerability in FUJIFILM printers could allow attackers to initiate a Denial of Service (DoS) condition.
Mitigation Strategies  | Printer Models | Security Vulnerability

A vulnerability in FUJIFILM printers could allow attackers to initiate a Denial of Service (DoS) condition.

Mozilla has issued a warning regarding phishing attacks aimed at the accounts of add-on developers.
Cybersecurity Awareness | Developer Security Practices  | Phishing Campaigns

Mozilla has issued a warning regarding phishing attacks aimed at the accounts of add-on developers.

AI Safety Measures Criticized: Cisco’s Demonstration Reveals Vulnerabilities in AI Systems
AI Security Vulnerabilities | Chatbot Exploitation Techniques  | Data Privacy Risks

AI Safety Measures Criticized: Cisco’s Demonstration Reveals Vulnerabilities in AI Systems

The United States has declared a funding allocation of $100 million aimed at enhancing cybersecurity for state, local, and tribal governments.
Cybersecurity Funding | Government Grants | State and Local Initiatives 

The United States has declared a funding allocation of $100 million aimed at enhancing cybersecurity for state, local, and tribal governments.

A recent malware attack is utilizing LNK files to deploy the REMCOS backdoor on Windows systems.
Cybersecurity Threats | Malware Delivery Techniques | Remote Access Tools 

A recent malware attack is utilizing LNK files to deploy the REMCOS backdoor on Windows systems.

CNCERT has alleged that U.S. intelligence agencies are targeting Chinese military-industrial entities.
Cybersecurity Threats | Malware Exploitation Techniques  | Military Industrial Espionage

CNCERT has alleged that U.S. intelligence agencies are targeting Chinese military-industrial entities.

Researchers took advantage of kernelCTF instances on Google and a zero-day vulnerability in Debian 12.
Code Auditing  | Kernel Security | Vulnerability Exploitation

Researchers took advantage of kernelCTF instances on Google and a zero-day vulnerability in Debian 12.

Page navigation

Previous PagePrevious 1 … 9 10 11 12 13 Next PageNext

© 2025 InfosecToday.com - WordPress Theme by Kadence WP

  • D3f3ndo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search