Skip to content
InfosecToday.com
  • D3f3ndo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com
AWS CISO explains cloud-native security
Cloud-Native Security | Security Management  | Shared Responsibility Model 

AWS CISO explains cloud-native security

Adobe patches 60+ security flaws in 13 products
Product Patching  | Security Vulnerabilities | Software Updates

Adobe patches 60+ security flaws in 13 products

Fortinet and Ivanti issue new security updates
Patch Updates | Security Advisories | Vulnerability Management 

Fortinet and Ivanti issue new security updates

PS1Bot malware executes multi-stage attacks
Information Theft Techniques  | Malvertising Campaigns | Modular Malware Frameworks

PS1Bot malware executes multi-stage attacks

N-able N-Central vulnerabilities actively exploited (CISA)
Cybersecurity Vulnerabilities  | Remote Monitoring and Management | Software Updates and Patches 

N-able N-Central vulnerabilities actively exploited (CISA)

Pro-Russian hackers probably sabotaged Norwegian dam
Cybersecurity | Infrastructure Security  | Sabotage

Pro-Russian hackers probably sabotaged Norwegian dam

Charon Ransomware targets Middle East businesses with advanced evasion strategies
Advanced Persistent Threats (APTs) | Cybersecurity Techniques  | Ransomware Attacks 

Charon Ransomware targets Middle East businesses with advanced evasion strategies

Microsoft addresses 111 new vulnerabilities including Kerberos zero-day flaw
Microsoft Software Updates  | Privilege Escalation  | Security Vulnerabilities

Microsoft addresses 111 new vulnerabilities including Kerberos zero-day flaw

Investigators have identified XZ Utils backdoor embedded in Docker Hub images
Cybersecurity Threats | Open Source Vulnerabilities  | Software Supply Chain Risks

Investigators have identified XZ Utils backdoor embedded in Docker Hub images

Global brute-force attack targeting Fortinet SSL VPNs
Brute-Force Attacks | Cybersecurity Threats | Vulnerability Exploitation

Global brute-force attack targeting Fortinet SSL VPNs

Exploring the Dark Web’s Economy: How Cybercriminals Market Access to Business Networks
Corporate Network Access | Cybercrime Marketplace | Hacker Services 

Exploring the Dark Web’s Economy: How Cybercriminals Market Access to Business Networks

Trend Micro enhances SIEM efficiency through the use of agent-based AI.
AI-Driven Security Operations | Enhanced Threat Detection and Response | Streamlined Compliance Support 

Trend Micro enhances SIEM efficiency through the use of agent-based AI.

Rubrik Agent Rewind allows businesses to reverse errors caused by autonomous AI
AI Error Management | Data Recovery Solutions | Observability and Auditability 

Rubrik Agent Rewind allows businesses to reverse errors caused by autonomous AI

New APT group ‘Curly COMrades’ targeting Georgia and Moldova
Credential Theft  | Cyber Espionage | Malware Persistence 

New APT group ‘Curly COMrades’ targeting Georgia and Moldova

SAP has addressed a significant vulnerability in S/4HANA by releasing patches.
Critical Vulnerabilities | S/4HANA Patching  | SAP Security Updates

SAP has addressed a significant vulnerability in S/4HANA by releasing patches.

Operational Technology (OT) networks are being extensively targeted due to vulnerabilities found in Erlang/OTP.
Cybersecurity | Industrial Control Systems  | Vulnerability Exploitation

Operational Technology (OT) networks are being extensively targeted due to vulnerabilities found in Erlang/OTP.

Citrix NetScaler vulnerability CVE-2025-6543 actively exploited in crucial industries
Cybersecurity Vulnerabilities  | Exploitation Techniques

Citrix NetScaler vulnerability CVE-2025-6543 actively exploited in crucial industries

Recent vulnerabilities in TETRA radio encryption have revealed potential risks to law enforcement communication security.
Cybersecurity Vulnerabilities  | Encryption Weaknesses  | TETRA Communications Protocol

Recent vulnerabilities in TETRA radio encryption have revealed potential risks to law enforcement communication security.

Researchers have observed a significant increase in remote code execution (RCE) exploits targeting the Erlang/OTP SSH protocol, with 70% of these attacks aimed at operational technology (OT) firewalls.
Cybersecurity Vulnerabilities  | Exploitation of Operational Technology | Targeted Industries

Researchers have observed a significant increase in remote code execution (RCE) exploits targeting the Erlang/OTP SSH protocol, with 70% of these attacks aimed at operational technology (OT) firewalls.

Balancing trust and risk in AI: Anticipating hallucinations before they occur.
AI Trust Management | Predictive Modeling in AI Systems  | Risk Assessment in AI

Balancing trust and risk in AI: Anticipating hallucinations before they occur.

Deficiencies in the dealership systems of a leading automotive manufacturer facilitated car hacking and the theft of personal information.
Automotive Hacking | Cybersecurity Vulnerabilities  | Data Privacy Risks

Deficiencies in the dealership systems of a leading automotive manufacturer facilitated car hacking and the theft of personal information.

Russian hackers took advantage of a WinRAR zero-day vulnerability to launch attacks in Europe and Canada.
Cybersecurity | Exploits | Threat Actors 

Russian hackers took advantage of a WinRAR zero-day vulnerability to launch attacks in Europe and Canada.

RomCom hackers are utilizing a zero-day vulnerability in WinRAR to conduct specific targeted attacks.
Cyberespionage | Cybersecurity | Vulnerabilities

RomCom hackers are utilizing a zero-day vulnerability in WinRAR to conduct specific targeted attacks.

Despite increases in breaches and budgets, the safety of healthcare systems has not improved.
Cybersecurity Threats | Leadership and Preparedness  | Supply Chain Vulnerabilities

Despite increases in breaches and budgets, the safety of healthcare systems has not improved.

Penetration testing has become a fundamental component of the strategy for Chief Information Security Officers (CISOs).
Cybersecurity Concerns | Generative AI Threats  | Third-Party Software Risks

Penetration testing has become a fundamental component of the strategy for Chief Information Security Officers (CISOs).

Researchers have outlined a Windows EPM poisoning exploit sequence that can result in escalated privileges within a domain.
Remote Procedure Call Security | Spoofing Attacks  | Vulnerability Disclosure

Researchers have outlined a Windows EPM poisoning exploit sequence that can result in escalated privileges within a domain.

Scientists have discovered vulnerabilities in GPT-5 that allow for jailbreaks and zero-click AI agent attacks, which threaten the security of cloud and IoT systems.
AI Security Risks  | Jailbreak Techniques | Model Vulnerabilities 

Scientists have discovered vulnerabilities in GPT-5 that allow for jailbreaks and zero-click AI agent attacks, which threaten the security of cloud and IoT systems.

A vulnerability in Lenovo webcams that run on Linux can be exploited remotely, allowing for potential BadUSB attacks.
BadUSB Attacks | Cybersecurity Vulnerabilities  | Remote Exploitation Techniques 

A vulnerability in Lenovo webcams that run on Linux can be exploited remotely, allowing for potential BadUSB attacks.

Complimentary Wi-Fi makes buses susceptible to hacking from remote locations.
Cybersecurity | Public Transportation | Vulnerabilities

Complimentary Wi-Fi makes buses susceptible to hacking from remote locations.

RubyGems and PyPI have both experienced attacks involving harmful packages that are designed to steal credentials and cryptocurrency
Credential Theft  | Malicious Software | Social Media Automation Tools 

RubyGems and PyPI have both experienced attacks involving harmful packages that are designed to steal credentials and cryptocurrency

Page navigation

Previous PagePrevious 1 … 4 5 6 7 8 … 13 Next PageNext

© 2026 InfosecToday.com - WordPress Theme by Kadence WP

  • D3f3ndo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search