Skip to content
InfosecToday.com
  • D3f3ndo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com
Guide for Preventing Man-in-the-Middle Attacks
Cybersecurity Threats | Man-in-the-Middle Attacks | Network Vulnerabilities 

Guide for Preventing Man-in-the-Middle Attacks

Critical Vulnerability in Squid Allows Remote Code Execution by Attackers
Mitigation Strategies  | Remote Code Execution | Vulnerability

Critical Vulnerability in Squid Allows Remote Code Execution by Attackers

Cybercriminals are leveraging artificial intelligence to develop a harmful NPM package that can deplete your cryptocurrency wallet.
AI-Driven Cybercrime  | Malicious Software | Supply Chain Attacks

Cybercriminals are leveraging artificial intelligence to develop a harmful NPM package that can deplete your cryptocurrency wallet.

A surge in exploitation efforts by threat actors can serve as a preliminary warning of emerging cyber vulnerabilities.
Attacker Methodologies  | Threat Detection | Vulnerability Management 

A surge in exploitation efforts by threat actors can serve as a preliminary warning of emerging cyber vulnerabilities.

Cybersecurity M&A Summary: 44 Transactions Reported in July 2025
Market Expansion | Strategic Partnerships  | Technology Integration

Cybersecurity M&A Summary: 44 Transactions Reported in July 2025

Cybercriminals have the ability to alter BitLocker registry keys through WMI, enabling them to run harmful code as if they were an interactive user.
BitLocker Vulnerabilities | Lateral Movement Techniques | Windows Security Exploits 

Cybercriminals have the ability to alter BitLocker registry keys through WMI, enabling them to run harmful code as if they were an interactive user.

THE BIGGEST Bitcoin HACK EVER, WORTH $3.5 BILLION, HAS BEEN DISCOVERED
Bitcoin Holdings  | Cryptocurrency Hacks | Security Vulnerabilities

THE BIGGEST Bitcoin HACK EVER, WORTH $3.5 BILLION, HAS BEEN DISCOVERED

A data breach at Northwest Radiologists has affected 350,000 residents of Washington.
Data Breach | Healthcare Security  | Personal Information Theft

A data breach at Northwest Radiologists has affected 350,000 residents of Washington.

A significant vulnerability in HashiCorp has been identified, allowing attackers to run arbitrary code on the underlying host system.
Mitigation Measures  | Security Vulnerability | Software Impact

A significant vulnerability in HashiCorp has been identified, allowing attackers to run arbitrary code on the underlying host system.

Multiple security flaws have been fixed in the AI Code Editor named Cursor.
Code Execution | Software Security  | Vulnerabilities

Multiple security flaws have been fixed in the AI Code Editor named Cursor.

Vulnerability in the NestJS Framework Allows Attackers to Run Arbitrary Code on Developers’ Machines.
Remote Code Execution | Security Vulnerability | Software Update 

Vulnerability in the NestJS Framework Allows Attackers to Run Arbitrary Code on Developers’ Machines.

A vulnerability in the AI-powered Cursor IDE allows for the execution of remote code without requiring any interaction from the user.
AI Security  | Remote Code Execution | Vulnerability

A vulnerability in the AI-powered Cursor IDE allows for the execution of remote code without requiring any interaction from the user.

Illumina, a leading company in gene sequencing, has agreed to pay $9.8 million to settle issues related to product vulnerabilities.
Cybersecurity

Illumina, a leading company in gene sequencing, has agreed to pay $9.8 million to settle issues related to product vulnerabilities.

The PlayPraetor Android Trojan has infected over 11,000 devices by using counterfeit Google Play pages and advertisements on Meta.
Cybersecurity

The PlayPraetor Android Trojan has infected over 11,000 devices by using counterfeit Google Play pages and advertisements on Meta.

APT37 Cybercriminals Utilize JPEG Images to Target Windows Systems Exploiting “mspaint.exe”
Cybersecurity

APT37 Cybercriminals Utilize JPEG Images to Target Windows Systems Exploiting “mspaint.exe”

Interlock Ransomware Utilizes ClickFix Method to Execute Harmful Commands on Windows Systems
Cybersecurity

Interlock Ransomware Utilizes ClickFix Method to Execute Harmful Commands on Windows Systems

The Microsoft PlayReady digital rights management system, utilized by platforms like Netflix, Amazon, and Disney+, has been exposed online.
Cybersecurity

The Microsoft PlayReady digital rights management system, utilized by platforms like Netflix, Amazon, and Disney+, has been exposed online.

Following the decline of the prominent RansomHub Ransomware as a Service (RaaS), there has been a significant increase in the Qilin Ransomware.
Ransomware Threats

Following the decline of the prominent RansomHub Ransomware as a Service (RaaS), there has been a significant increase in the Qilin Ransomware.

SafePay ransomware has compromised over 260 victims in various nations.
Cybersecurity

SafePay ransomware has compromised over 260 victims in various nations.

Lazarus Hackers Exploit 234 Packages on npm and PyPI to Compromise Developers
Cybersecurity

Lazarus Hackers Exploit 234 Packages on npm and PyPI to Compromise Developers

Akira Ransomware is actively exploiting a zero-day vulnerability in SonicWall Firewall devices.
Cybersecurity

Akira Ransomware is actively exploiting a zero-day vulnerability in SonicWall Firewall devices.

A new undetectable malware strain is targeting Linux servers to establish lasting SSH access.
Cybersecurity

A new undetectable malware strain is targeting Linux servers to establish lasting SSH access.

Summary of Cybersecurity Updates – Vulnerabilities in Chrome and Gemini, malware targeting Linux, and a new Man-in-the-Prompt attack.
Cybersecurity

Summary of Cybersecurity Updates – Vulnerabilities in Chrome and Gemini, malware targeting Linux, and a new Man-in-the-Prompt attack.

Echo Secures $15 Million in Seed Capital to Create Vulnerability-Free Container Images
Cybersecurity

Echo Secures $15 Million in Seed Capital to Create Vulnerability-Free Container Images

Cyber attackers are exploiting counterfeit OAuth applications in conjunction with the Tycoon Kit to compromise Microsoft 365 accounts.
Cybersecurity

Cyber attackers are exploiting counterfeit OAuth applications in conjunction with the Tycoon Kit to compromise Microsoft 365 accounts.

The Cursor AI Code Editor has addressed a vulnerability that permitted attackers to execute commands through prompt injection.
Cybersecurity | Remote Code Execution (RCE)

The Cursor AI Code Editor has addressed a vulnerability that permitted attackers to execute commands through prompt injection.

A new backdoor called ‘Plague’ has emerged that compromises critical Linux systems, allowing for covert theft of credentials.
Cybersecurity

A new backdoor called ‘Plague’ has emerged that compromises critical Linux systems, allowing for covert theft of credentials.

CL-STA-0969 Deploys Hidden Malware in Telecommunications Infrastructures Throughout a 10-Month Intelligence Gathering Operation.

CL-STA-0969 Deploys Hidden Malware in Telecommunications Infrastructures Throughout a 10-Month Intelligence Gathering Operation.

Cyber risk management company Safe has secured $70 million in funding.
Cybersecurity

Cyber risk management company Safe has secured $70 million in funding.

According to Microsoft, Russian cyberspies are conducting AitM attacks on foreign embassies located in Moscow.
Cybersecurity

According to Microsoft, Russian cyberspies are conducting AitM attacks on foreign embassies located in Moscow.

Page navigation

Previous PagePrevious 1 … 10 11 12 13 Next PageNext

© 2025 InfosecToday.com - WordPress Theme by Kadence WP

  • D3f3ndo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search