Skip to content
InfosecToday.com
  • D3f3ndo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com
Vulnerabilities addressed in Rockwell’s FactoryTalk, Micro800, and ControlLogix products
Industrial Automation Security | Software Patching  | Vulnerability Management 

Vulnerabilities addressed in Rockwell’s FactoryTalk, Micro800, and ControlLogix products

Open-Source Obot MCP Gateway for secure MCP server management
IT Governance | MCP Server Management | User Access and Discovery 

Open-Source Obot MCP Gateway for secure MCP server management

Taiwan Web Servers Breached by UAT-7237 using Open-Source Hacking Tools
Advanced Persistent Threats  | Cybersecurity Threats | Malware Techniques 

Taiwan Web Servers Breached by UAT-7237 using Open-Source Hacking Tools

Employee-Created personalized AI applications pose security dangers
Agentic AI | Generative AI Platforms | On-Premises AI Deployment  | Shadow AI

Employee-Created personalized AI applications pose security dangers

Google announces Android pKVM framework SESIP Level 5 certification
Android Technology  | Certification Standards | Mobile Security

Google announces Android pKVM framework SESIP Level 5 certification

Malicious actors exploiting video download site to distribute Proxyware malware
Bandwidth Theft  | Cybersecurity Threats | Malware Distribution

Malicious actors exploiting video download site to distribute Proxyware malware

Recent developments in phishing attacks are emerging as cybercriminals increasingly leverage AI to enhance their tactics.
AI-Powered Phishing Techniques | Deepfake Technology in Cybercrime | Evasion Tactics Using Legitimate Services 

Recent developments in phishing attacks are emerging as cybercriminals increasingly leverage AI to enhance their tactics.

In July, Qilin Ransomware has emerged as a significant threat, claiming over 70 victims.
Ransomware Trends | Targeted Sectors  | Vulnerability Exploitation

In July, Qilin Ransomware has emerged as a significant threat, claiming over 70 victims.

New FireWood malware targeting Linux systems
Linux Security Threats | Malware Variants | Remote Access Trojans 

New FireWood malware targeting Linux systems

Cisco Secure Firewall vulnerability enables remote shell command injections
Cisco Products | Mitigation Strategies  | Security Vulnerability

Cisco Secure Firewall vulnerability enables remote shell command injections

CVE-2025-8088 – WinRAR path traversal vulnerability exploited to run malicious software
Cybersecurity Threats | Malware Exploitation | Software Vulnerabilities

CVE-2025-8088 – WinRAR path traversal vulnerability exploited to run malicious software

EncryptHub using Brave Support Platform to weaponise MMC vulnerability
Attack Methodologies | Cyber Threats  | Vulnerability Exploitation

EncryptHub using Brave Support Platform to weaponise MMC vulnerability

Brivo’s Visitor Management system, enhanced by Envoy, enhances security at the front desk.
Enhanced Security Solutions | Streamlined Workplace Experience  | Visitor Management Integration

Brivo’s Visitor Management system, enhanced by Envoy, enhances security at the front desk.

Hacked police and government emails for sale: $40 ono
Account Compromise Methods | Cybersecurity Threats | Institutional Trust Exploitation 

Hacked police and government emails for sale: $40 ono

How ShinyHunters Infiltrated Google, Adidas, Louis Vuitton, and Other Brands
Collaborative Threat Actors  | Cybercriminal Tactics | Data Breaches 

How ShinyHunters Infiltrated Google, Adidas, Louis Vuitton, and Other Brands

SmartLoader malware spread through GitHub repositories
Cybersecurity Threats | Malware Distribution | Software Exploitation 

SmartLoader malware spread through GitHub repositories

Cybercriminals using CrossC2 to extend Cobalt Strike beacons to Linux and macOS
Command-and-Control Frameworks | Cybersecurity Threats | Malware Analysis

Cybercriminals using CrossC2 to extend Cobalt Strike beacons to Linux and macOS

Weaknesses in the Xerox Print Orchestration Product allow remote code execution
Remote Code Execution | Security Patches | Vulnerabilities

Weaknesses in the Xerox Print Orchestration Product allow remote code execution

Canadian House of Commons targeted by SharePoint Toolshell cyberattack
Cybersecurity Breach | Government Cyber Threats  | Microsoft Vulnerabilities

Canadian House of Commons targeted by SharePoint Toolshell cyberattack

Apache Tomcat vulnerabilities allow Denial of Service (DoS) attacks
Denial of Service | Security Vulnerability | Software Update 

Apache Tomcat vulnerabilities allow Denial of Service (DoS) attacks

Android malware targeting banking applications through NFC relay scams and call hijacking
Cybercrime | Financial Fraud  | Malware

Android malware targeting banking applications through NFC relay scams and call hijacking

MadeYouReset vulnerability in HTTP2 facilitates large-scale DDoS attacks
Cybersecurity Threats | DDoS Attacks | HTTP/2 Vulnerabilities 

MadeYouReset vulnerability in HTTP2 facilitates large-scale DDoS attacks

Bypassing Passkey Login through Manipulation of the WebAuthn Process
Authentication Vulnerabilities | Cybersecurity | WebAuthn Exploits 

Bypassing Passkey Login through Manipulation of the WebAuthn Process

Hackers using specialized phishing tools for downgrade attacks on FIDO authentication
Authentication Vulnerabilities | Cybersecurity Threats | Phishing Techniques 

Hackers using specialized phishing tools for downgrade attacks on FIDO authentication

AI-assisted SOC boosts efficiency and cuts investigation time
AI Integration in Security Operations | Challenges in SOC Efficiency | Enhancements in Threat Detection and Response 

AI-assisted SOC boosts efficiency and cuts investigation time

Croatian research institute targeted by ToolShell ransomware attack
Cybersecurity Incident | Data Protection Measures  | Ransomware Attack

Croatian research institute targeted by ToolShell ransomware attack

Microsoft has addressed the “BadSuccessor” Kerberos vulnerability identified as CVE-2025-53779.
Exploitation Risks | Patch Management  | Security Vulnerabilities

Microsoft has addressed the “BadSuccessor” Kerberos vulnerability identified as CVE-2025-53779.

NIST releases lightweight cryptography standard for IoT devices
Cybersecurity Standards  | Internet of Things (IoT) | Lightweight Cryptography

NIST releases lightweight cryptography standard for IoT devices

Manpower has reported that a data breach resulting from a ransomware attack has affected 140,000 individuals.
Data Breach | Information Security

Manpower has reported that a data breach resulting from a ransomware attack has affected 140,000 individuals.

New Zoom and Xerox security updates address privilege escalation and remote code execution (RCE)
Remote Code Execution | Security Vulnerabilities | Software Updates

New Zoom and Xerox security updates address privilege escalation and remote code execution (RCE)

Page navigation

Previous PagePrevious 1 … 3 4 5 6 7 … 13 Next PageNext

© 2025 InfosecToday.com - WordPress Theme by Kadence WP

  • D3f3ndo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search