Skip to content
InfosecToday.com
  • D3f3ndo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com
Exploring the emerging trends in cyber deception threats of 2025, from counterfeit CAPTCHAs to Remote Access Trojans (RATs).
Cybersecurity Threats | Remote Access Tools  | Social Engineering Tactics

Exploring the emerging trends in cyber deception threats of 2025, from counterfeit CAPTCHAs to Remote Access Trojans (RATs).

Fraud prevention measures do not ensure that consumers will have confidence.
AI in Fraud Detection | Consumer Trust and Security Concerns | Types of Fraud Threats 

Fraud prevention measures do not ensure that consumers will have confidence.

Red Teams have successfully bypassed GPT-5’s safeguards, cautioning that it has become ‘almost impractical’ for business use.
AI Security  | Vulnerability Exploitation

Red Teams have successfully bypassed GPT-5’s safeguards, cautioning that it has become ‘almost impractical’ for business use.

AI technologies utilised for Brazilian phishing scam
Financial Fraud Techniques  | Generative AI in Cybercrime | Phishing Campaigns

AI technologies utilised for Brazilian phishing scam

Help Desks in jeopardy: Scattered Spider highlights an often ignored threat.
Cybersecurity Threats | Help Desk Vulnerabilities | Social Engineering Attacks 

Help Desks in jeopardy: Scattered Spider highlights an often ignored threat.

Leaked Credentials Increase by 160%: Exploits Utilized by Attackers
Credential Leaks | Cybersecurity Threats | Malicious Exploitation 

Leaked Credentials Increase by 160%: Exploits Utilized by Attackers

A data breach at Columbia University has affected 860,000 individuals.
Cybersecurity | Data Breach | Personal Information Protection 

A data breach at Columbia University has affected 860,000 individuals.

Bouygues, a French telecommunications company, has reported that a data breach has impacted 6.4 million of its customers.
Customer Privacy  | Cybersecurity | Data Breach

Bouygues, a French telecommunications company, has reported that a data breach has impacted 6.4 million of its customers.

GreedyBear has swindled $1 million in cryptocurrency by employing over 150 harmful Firefox wallet extensions.
Cryptocurrency Theft | Cybersecurity Threats | Malicious Browser Extensions

GreedyBear has swindled $1 million in cryptocurrency by employing over 150 harmful Firefox wallet extensions.

ChatGPT-5 Launch: Discover the Latest Features of the Next-Gen AI Assistant
AI Model Architecture | Performance Enhancements | Safety Measures 

ChatGPT-5 Launch: Discover the Latest Features of the Next-Gen AI Assistant

Recent techniques for lateral movement within Active Directory have emerged that circumvent authentication measures and enable data exfiltration.
Authentication Vulnerabilities | Lateral Movement Techniques | Tenant Compromise Methods 

Recent techniques for lateral movement within Active Directory have emerged that circumvent authentication measures and enable data exfiltration.

Cybercriminals are utilizing legitimate drivers to disable antivirus programs and weaken the security measures of a system.
Cybersecurity Threats | Malware Exploitation | Ransomware Attacks 

Cybercriminals are utilizing legitimate drivers to disable antivirus programs and weaken the security measures of a system.

Organizations Alerted to Security Flaw in Microsoft Exchange Hybrid Setup
Cloud Security | Cybersecurity | Vulnerability Management 

Organizations Alerted to Security Flaw in Microsoft Exchange Hybrid Setup

Recent HTTP request smuggling attacks have affected content delivery networks (CDNs), large organizations, and millions of websites.
Bug Bounty Programs | Cybersecurity Threats | HTTP Vulnerabilities

Recent HTTP request smuggling attacks have affected content delivery networks (CDNs), large organizations, and millions of websites.

Nvidia has stated that its chips do not contain any backdoors, kill switches, or spyware.
Cybersecurity Principles | Hardware Vulnerabilities | Trust in Technology 

Nvidia has stated that its chips do not contain any backdoors, kill switches, or spyware.

HeartCrypt’s EDR Killer Tools called ‘AVKiller’ are currently being utilized in ransomware attacks.
Cybersecurity Threats | Malware Evasion Techniques | Ransomware Deployment Strategies 

HeartCrypt’s EDR Killer Tools called ‘AVKiller’ are currently being utilized in ransomware attacks.

1.2 million healthcare devices and systems have had their data exposed online, putting patient records in jeopardy of being compromised.
Cybersecurity Vulnerabilities  | Medical Device Exposure | Patient Data Risks 

1.2 million healthcare devices and systems have had their data exposed online, putting patient records in jeopardy of being compromised.

Zero-Day Vulnerabilities in HashiCorp Vault Allow Attackers to Execute Code Remotely
Exploits | Security Management  | Vulnerabilities

Zero-Day Vulnerabilities in HashiCorp Vault Allow Attackers to Execute Code Remotely

Techniques for Preventing Python Supply Chain Attacks
Modern Attack Techniques  | Python Package Vulnerabilities | Supply Chain Security

Techniques for Preventing Python Supply Chain Attacks

Gemini compromised through a prompt injection in a Google Calendar invitation
AI Exploitation Techniques | Cybersecurity Threats | Smart Home Vulnerabilities 

Gemini compromised through a prompt injection in a Google Calendar invitation

A critical flaw in HTTP/1.1 has put millions of websites at risk of being seized by malicious actors.
HTTP Vulnerability | Protocol Upgrades  | Security Mitigations

A critical flaw in HTTP/1.1 has put millions of websites at risk of being seized by malicious actors.

Microsoft has revealed a vulnerability in Exchange Server that allows for discreet access to cloud services in hybrid configurations.
Cybersecurity Mitigations  | Exchange Server | Security Vulnerability

Microsoft has revealed a vulnerability in Exchange Server that allows for discreet access to cloud services in hybrid configurations.

CISA Issues Urgent Advisory Calling on Federal Agencies to Fix Exchange Server Flaw by Monday.
Cybersecurity Advisory | Hybrid Deployment Mitigation  | Microsoft Exchange Vulnerability

CISA Issues Urgent Advisory Calling on Federal Agencies to Fix Exchange Server Flaw by Monday.

The ‘DarkWeb’ firmware for Flipper Zero circumvents rolling code security systems used by several leading car manufacturers.
Firmware Vulnerabilities | Keyless Entry Exploits | Vehicle Security

The ‘DarkWeb’ firmware for Flipper Zero circumvents rolling code security systems used by several leading car manufacturers.

WhatsApp has removed 6.8 million accounts associated with harmful activities.
Cybersecurity

WhatsApp has removed 6.8 million accounts associated with harmful activities.

A hacker has been extradited to the United States for his involvement in tax fraud schemes that resulted in the theft of more than $2.5 million.
Cybercrime | Data Breach | Tax Fraud

A hacker has been extradited to the United States for his involvement in tax fraud schemes that resulted in the theft of more than $2.5 million.

Cybercriminals are exploiting SVG files by embedding harmful JavaScript to deploy malware on Windows systems.
Cybersecurity Threats | Malware Distribution Methods  | Phishing Techniques 

Cybercriminals are exploiting SVG files by embedding harmful JavaScript to deploy malware on Windows systems.

SocGholish malware is distributed through advertising tools and provides access to various groups such as LockBit and Evil Corp.
Cybercrime Operations | Malware Distribution | Traffic Distribution Systems

SocGholish malware is distributed through advertising tools and provides access to various groups such as LockBit and Evil Corp.

WhatsApp developers are facing threats from malicious npm packages that come with a remote kill switch.
Cybersecurity Threats | Malicious Software | Supply Chain Attacks

WhatsApp developers are facing threats from malicious npm packages that come with a remote kill switch.

SonicWall has verified that there are no new zero-day vulnerabilities in SSLVPN, stating that the recent ransomware attack is associated with an older vulnerability.
Customer Guidance  | Cybersecurity Vulnerabilities  | Ransomware Attacks 

SonicWall has verified that there are no new zero-day vulnerabilities in SSLVPN, stating that the recent ransomware attack is associated with an older vulnerability.

Page navigation

Previous PagePrevious 1 … 5 6 7 8 9 … 13 Next PageNext

© 2025 InfosecToday.com - WordPress Theme by Kadence WP

  • D3f3ndo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search