Skip to content
InfosecToday.com
  • Cybersecurity News
  • Cybersecurity Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com
Serious vulnerability in Android system components permits remote code execution without requiring any user interaction.
Android Security Vulnerabilities | Remote Code Execution Risks | Security Patch Management 

Serious vulnerability in Android system components permits remote code execution without requiring any user interaction.

SonicWall is looking into a possible zero-day vulnerability in its SSL VPN following reports of over 20 targeted attacks.
Cybersecurity Threats | Ransomware Attacks  | Vulnerability Investigation

SonicWall is looking into a possible zero-day vulnerability in its SSL VPN following reports of over 20 targeted attacks.

A vulnerability chain in NVIDIA Triton has the potential to allow attackers to gain control over AI servers.
AI Security Risks  | Remote Code Execution | Vulnerability Exploitation

A vulnerability chain in NVIDIA Triton has the potential to allow attackers to gain control over AI servers.

A new Android malware is disguising itself as SBI Card and Axis Bank applications to extract users’ financial information.
Financial Fraud  | Malware Campaign | Phishing Techniques 

A new Android malware is disguising itself as SBI Card and Axis Bank applications to extract users’ financial information.

Raspberry Robin malware downloader is targeting Windows systems by utilizing a new exploit related to a frequently used vulnerability in the Log File System Driver.
Evasion Strategies  | Exploitation Techniques | Malware Threats 

Raspberry Robin malware downloader is targeting Windows systems by utilizing a new exploit related to a frequently used vulnerability in the Log File System Driver.

WAF protection was circumvented to execute XSS payloads through JavaScript injection by utilizing parameter pollution.
Cross-Site Scripting (XSS) Exploits  | HTTP Parameter Pollution Techniques | Web Application Firewall Vulnerabilities

WAF protection was circumvented to execute XSS payloads through JavaScript injection by utilizing parameter pollution.

Malicious actors are currently taking advantage of weaknesses in the open-source ecosystem to distribute harmful software.
Cybersecurity Threats | Malicious Software Techniques  | Supply Chain Vulnerabilities

Malicious actors are currently taking advantage of weaknesses in the open-source ecosystem to distribute harmful software.

M&S Cyberattacks: Stunning Technique Exposes Vulnerable Users
Cybersecurity

M&S Cyberattacks: Stunning Technique Exposes Vulnerable Users

Stay Safe from Scams: 5 Must-Have Tips for Protection
Cybersecurity

Stay Safe from Scams: 5 Must-Have Tips for Protection

Fraud Prevention: 6 Effortless Steps to Stay Safe
Cybersecurity

Fraud Prevention: 6 Effortless Steps to Stay Safe

Protecting Yourself After Data Breaches: Why We Need Stronger Cybersecurity Laws Now
Cybersecurity

Protecting Yourself After Data Breaches: Why We Need Stronger Cybersecurity Laws Now

Navigating the New Frontiers of Cybercrime: Essential Tips for Staying Safe in a Blending World
Cybersecurity

Navigating the New Frontiers of Cybercrime: Essential Tips for Staying Safe in a Blending World

How M&S’s Cyber Attack Response May Shape Its Future and Customer Trust
Cybersecurity

How M&S’s Cyber Attack Response May Shape Its Future and Customer Trust

Protecting Your Data Privacy: Key Reasons Why It’s at Risk and How You Can Safeguard It
Cybersecurity

Protecting Your Data Privacy: Key Reasons Why It’s at Risk and How You Can Safeguard It

Illicit Markets: Stunning Data Breaches Sell Your Info Cheap
Cybersecurity

Illicit Markets: Stunning Data Breaches Sell Your Info Cheap

Enhancing Global AI Security: Why the G7 Must Champion Federated Learning
Cybersecurity

Enhancing Global AI Security: Why the G7 Must Champion Federated Learning

How Data Breaches Power Illicit Marketplaces Selling Your Personal Information to Criminals
Cybersecurity

How Data Breaches Power Illicit Marketplaces Selling Your Personal Information to Criminals

Governments’ Losing Battle: Exclusive Backdoor Access Failures
Cybersecurity

Governments’ Losing Battle: Exclusive Backdoor Access Failures

Governments Struggle to Reclaim Backdoor Access to Encrypted Communications
Cybersecurity

Governments Struggle to Reclaim Backdoor Access to Encrypted Communications

Malicious individuals are leveraging artificial intelligence to enhance their operations, speed up their attacks, and target autonomous AI systems.
Advanced Social Engineering Techniques  | AI-Enhanced Cyber Attacks | Generative AI in Malware Development

Malicious individuals are leveraging artificial intelligence to enhance their operations, speed up their attacks, and target autonomous AI systems.

Claude vulnerabilities allow attackers to execute unauthorized commands by leveraging the system itself.
AI Security Vulnerabilities | Command Injection Techniques  | Exploit Development

Claude vulnerabilities allow attackers to execute unauthorized commands by leveraging the system itself.

A ransomware assault targeting a phone repair and insurance firm resulted in damages totaling millions.
Cybersecurity Threats | Incident Response Challenges  | Ransomware Tactics

A ransomware assault targeting a phone repair and insurance firm resulted in damages totaling millions.

The vulnerabilities in Nvidia Triton represent a significant threat to AI models.
AI Vulnerabilities | Cybersecurity | Software Patching 

The vulnerabilities in Nvidia Triton represent a significant threat to AI models.

SonicWall VPNs are being actively targeted due to a zero-day vulnerability that allows attackers to circumvent multi-factor authentication (MFA) and install ransomware.
Cybersecurity Threats | Ransomware Attacks  | Vulnerability Exploitation

SonicWall VPNs are being actively targeted due to a zero-day vulnerability that allows attackers to circumvent multi-factor authentication (MFA) and install ransomware.

A novel Python-based PXA stealer distributed through Telegram has reportedly compromised 200,000 unique passwords alongside numerous credit card details.
Cybercrime | Data Theft | Malware Techniques 

A novel Python-based PXA stealer distributed through Telegram has reportedly compromised 200,000 unique passwords alongside numerous credit card details.

Vulnerabilities in NVIDIA Triton allow unauthenticated attackers to run code and take control of AI servers.
AI Model Protection  | Remote Code Execution | Security Vulnerabilities

Vulnerabilities in NVIDIA Triton allow unauthenticated attackers to run code and take control of AI servers.

A newly discovered LegalPwn attack leverages Gemini, ChatGPT, and various other AI tools to execute harmful code by manipulating disclaimers.
AI Security Vulnerabilities | Malicious Code Execution  | Prompt Injection Techniques

A newly discovered LegalPwn attack leverages Gemini, ChatGPT, and various other AI tools to execute harmful code by manipulating disclaimers.

Vietnamese cybercriminals have employed the PXA Stealer tool to target 4,000 IP addresses, successfully compromising 200,000 passwords worldwide.
Cybercrime | Data Exfiltration  | Malware Distribution

Vietnamese cybercriminals have employed the PXA Stealer tool to target 4,000 IP addresses, successfully compromising 200,000 passwords worldwide.

A vulnerability in FUJIFILM printers could allow attackers to initiate a Denial of Service (DoS) condition.
Mitigation Strategies  | Printer Models | Security Vulnerability

A vulnerability in FUJIFILM printers could allow attackers to initiate a Denial of Service (DoS) condition.

Mozilla has issued a warning regarding phishing attacks aimed at the accounts of add-on developers.
Cybersecurity Awareness | Developer Security Practices  | Phishing Campaigns

Mozilla has issued a warning regarding phishing attacks aimed at the accounts of add-on developers.

Page navigation

Previous PagePrevious 1 … 9 10 11 12 13 Next PageNext

© 2026 InfosecToday.com - WordPress Theme by Kadence WP

How cybersecure is your business? Take our free quiz and find out
Cyber risk scorecard
  • Cybersecurity News
  • Cybersecurity Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search