Cybersecurity Threats | Remote Code Execution | SAP Vulnerabilities Interconnected SAP exploits allow remote code execution
Cybersecurity Threats | Data Exfiltration Techniques | Malware Analysis ERMAC V3.0 Banking Trojan source code reveals complete malware infrastructure
Automotive Hacking | Cybersecurity Vulnerabilities | Data Privacy Risks Deficiencies in the dealership systems of a leading automotive manufacturer facilitated car hacking and the theft of personal information.
HTTP Vulnerability | Protocol Upgrades | Security Mitigations A critical flaw in HTTP/1.1 has put millions of websites at risk of being seized by malicious actors.
Cybersecurity Threats | Data Breaches | Social Engineering Tactics Salesforce instances at Google have been compromised in a continuing attack, resulting in hackers stealing user information.
Cybersecurity Threats | Phishing and Social Engineering Techniques | Remote Monitoring and Management Exploitation Threat actors are exploiting Remote Monitoring and Management (RMM) tools to gain control of systems and extract sensitive information.
Cybercrime | Data Theft | Malware Techniques A novel Python-based PXA stealer distributed through Telegram has reportedly compromised 200,000 unique passwords alongside numerous credit card details.
Ransomware Threats Following the decline of the prominent RansomHub Ransomware as a Service (RaaS), there has been a significant increase in the Qilin Ransomware.
Cybersecurity | Remote Code Execution (RCE) The Cursor AI Code Editor has addressed a vulnerability that permitted attackers to execute commands through prompt injection.