Skip to content
InfosecToday.com
  • Cybersecurity News
  • Cybersecurity Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com
Researchers have outlined a Windows EPM poisoning exploit sequence that can result in escalated privileges within a domain.
Remote Procedure Call Security | Spoofing Attacks  | Vulnerability Disclosure

Researchers have outlined a Windows EPM poisoning exploit sequence that can result in escalated privileges within a domain.

Scientists have discovered vulnerabilities in GPT-5 that allow for jailbreaks and zero-click AI agent attacks, which threaten the security of cloud and IoT systems.
AI Security Risks  | Jailbreak Techniques | Model Vulnerabilities 

Scientists have discovered vulnerabilities in GPT-5 that allow for jailbreaks and zero-click AI agent attacks, which threaten the security of cloud and IoT systems.

A vulnerability in Lenovo webcams that run on Linux can be exploited remotely, allowing for potential BadUSB attacks.
BadUSB Attacks | Cybersecurity Vulnerabilities  | Remote Exploitation Techniques 

A vulnerability in Lenovo webcams that run on Linux can be exploited remotely, allowing for potential BadUSB attacks.

Complimentary Wi-Fi makes buses susceptible to hacking from remote locations.
Cybersecurity | Public Transportation | Vulnerabilities

Complimentary Wi-Fi makes buses susceptible to hacking from remote locations.

RubyGems and PyPI have both experienced attacks involving harmful packages that are designed to steal credentials and cryptocurrency
Credential Theft  | Malicious Software | Social Media Automation Tools 

RubyGems and PyPI have both experienced attacks involving harmful packages that are designed to steal credentials and cryptocurrency

Exploring the emerging trends in cyber deception threats of 2025, from counterfeit CAPTCHAs to Remote Access Trojans (RATs).
Cybersecurity Threats | Remote Access Tools  | Social Engineering Tactics

Exploring the emerging trends in cyber deception threats of 2025, from counterfeit CAPTCHAs to Remote Access Trojans (RATs).

Fraud prevention measures do not ensure that consumers will have confidence.
AI in Fraud Detection | Consumer Trust and Security Concerns | Types of Fraud Threats 

Fraud prevention measures do not ensure that consumers will have confidence.

Red Teams have successfully bypassed GPT-5’s safeguards, cautioning that it has become ‘almost impractical’ for business use.
AI Security  | Vulnerability Exploitation

Red Teams have successfully bypassed GPT-5’s safeguards, cautioning that it has become ‘almost impractical’ for business use.

AI technologies utilised for Brazilian phishing scam
Financial Fraud Techniques  | Generative AI in Cybercrime | Phishing Campaigns

AI technologies utilised for Brazilian phishing scam

Help Desks in jeopardy: Scattered Spider highlights an often ignored threat.
Cybersecurity Threats | Help Desk Vulnerabilities | Social Engineering Attacks 

Help Desks in jeopardy: Scattered Spider highlights an often ignored threat.

Leaked Credentials Increase by 160%: Exploits Utilized by Attackers
Credential Leaks | Cybersecurity Threats | Malicious Exploitation 

Leaked Credentials Increase by 160%: Exploits Utilized by Attackers

A data breach at Columbia University has affected 860,000 individuals.
Cybersecurity | Data Breach | Personal Information Protection 

A data breach at Columbia University has affected 860,000 individuals.

Bouygues, a French telecommunications company, has reported that a data breach has impacted 6.4 million of its customers.
Customer Privacy  | Cybersecurity | Data Breach

Bouygues, a French telecommunications company, has reported that a data breach has impacted 6.4 million of its customers.

GreedyBear has swindled $1 million in cryptocurrency by employing over 150 harmful Firefox wallet extensions.
Cryptocurrency Theft | Cybersecurity Threats | Malicious Browser Extensions

GreedyBear has swindled $1 million in cryptocurrency by employing over 150 harmful Firefox wallet extensions.

ChatGPT-5 Launch: Discover the Latest Features of the Next-Gen AI Assistant
AI Model Architecture | Performance Enhancements | Safety Measures 

ChatGPT-5 Launch: Discover the Latest Features of the Next-Gen AI Assistant

Recent techniques for lateral movement within Active Directory have emerged that circumvent authentication measures and enable data exfiltration.
Authentication Vulnerabilities | Lateral Movement Techniques | Tenant Compromise Methods 

Recent techniques for lateral movement within Active Directory have emerged that circumvent authentication measures and enable data exfiltration.

Cybercriminals are utilizing legitimate drivers to disable antivirus programs and weaken the security measures of a system.
Cybersecurity Threats | Malware Exploitation | Ransomware Attacks 

Cybercriminals are utilizing legitimate drivers to disable antivirus programs and weaken the security measures of a system.

Organizations Alerted to Security Flaw in Microsoft Exchange Hybrid Setup
Cloud Security | Cybersecurity | Vulnerability Management 

Organizations Alerted to Security Flaw in Microsoft Exchange Hybrid Setup

Recent HTTP request smuggling attacks have affected content delivery networks (CDNs), large organizations, and millions of websites.
Bug Bounty Programs | Cybersecurity Threats | HTTP Vulnerabilities

Recent HTTP request smuggling attacks have affected content delivery networks (CDNs), large organizations, and millions of websites.

Nvidia has stated that its chips do not contain any backdoors, kill switches, or spyware.
Cybersecurity Principles | Hardware Vulnerabilities | Trust in Technology 

Nvidia has stated that its chips do not contain any backdoors, kill switches, or spyware.

HeartCrypt’s EDR Killer Tools called ‘AVKiller’ are currently being utilized in ransomware attacks.
Cybersecurity Threats | Malware Evasion Techniques | Ransomware Deployment Strategies 

HeartCrypt’s EDR Killer Tools called ‘AVKiller’ are currently being utilized in ransomware attacks.

1.2 million healthcare devices and systems have had their data exposed online, putting patient records in jeopardy of being compromised.
Cybersecurity Vulnerabilities  | Medical Device Exposure | Patient Data Risks 

1.2 million healthcare devices and systems have had their data exposed online, putting patient records in jeopardy of being compromised.

Zero-Day Vulnerabilities in HashiCorp Vault Allow Attackers to Execute Code Remotely
Exploits | Security Management  | Vulnerabilities

Zero-Day Vulnerabilities in HashiCorp Vault Allow Attackers to Execute Code Remotely

Techniques for Preventing Python Supply Chain Attacks
Modern Attack Techniques  | Python Package Vulnerabilities | Supply Chain Security

Techniques for Preventing Python Supply Chain Attacks

Gemini compromised through a prompt injection in a Google Calendar invitation
AI Exploitation Techniques | Cybersecurity Threats | Smart Home Vulnerabilities 

Gemini compromised through a prompt injection in a Google Calendar invitation

A critical flaw in HTTP/1.1 has put millions of websites at risk of being seized by malicious actors.
HTTP Vulnerability | Protocol Upgrades  | Security Mitigations

A critical flaw in HTTP/1.1 has put millions of websites at risk of being seized by malicious actors.

Microsoft has revealed a vulnerability in Exchange Server that allows for discreet access to cloud services in hybrid configurations.
Cybersecurity Mitigations  | Exchange Server | Security Vulnerability

Microsoft has revealed a vulnerability in Exchange Server that allows for discreet access to cloud services in hybrid configurations.

CISA Issues Urgent Advisory Calling on Federal Agencies to Fix Exchange Server Flaw by Monday.
Cybersecurity Advisory | Hybrid Deployment Mitigation  | Microsoft Exchange Vulnerability

CISA Issues Urgent Advisory Calling on Federal Agencies to Fix Exchange Server Flaw by Monday.

The ‘DarkWeb’ firmware for Flipper Zero circumvents rolling code security systems used by several leading car manufacturers.
Firmware Vulnerabilities | Keyless Entry Exploits | Vehicle Security

The ‘DarkWeb’ firmware for Flipper Zero circumvents rolling code security systems used by several leading car manufacturers.

WhatsApp has removed 6.8 million accounts associated with harmful activities.
Cybersecurity

WhatsApp has removed 6.8 million accounts associated with harmful activities.

Page navigation

Previous PagePrevious 1 … 5 6 7 8 9 … 13 Next PageNext

© 2026 InfosecToday.com - WordPress Theme by Kadence WP

How cybersecure is your business? Take our free quiz and find out
Cyber risk scorecard
  • Cybersecurity News
  • Cybersecurity Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search