Author: IT Security News Bot

New “LameHug” Malware Deploys AI-Generated Commands

Ukraine’s CERT-UA has identified a new AI-powered malware, dubbed “LameHug,” which executes commands on compromised Windows systems in cyber-attacks, targeting the nation’s security and defense sector This article has been indexed from www.infosecurity-magazine.com Read the original article: New “LameHug” Malware…

[UPDATE] [hoch] PHP: Mehrere Schwachstellen

Ein Angreifer kann mehrere Schwachstellen in PHP ausnutzen, um Denial of Service oder Server-Side Request-Forgery Angriffe durchzuführen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE] [hoch] PHP: Mehrere Schwachstellen

[UPDATE] [mittel] Python (CPython): Schwachstelle ermöglicht Denial of Service

Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Python ausnutzen, um einen Denial of Service Angriff durchzuführen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE] [mittel] Python (CPython): Schwachstelle…

Russian Vodka Maker Beluga Struck by Ransomware Attack

Novabev Group, the parent company of premium vodka brand Beluga, has confirmed it was hit by a sophisticated ransomware attack on July 14, 2025, temporarily disrupting operations and affecting IT infrastructure across the company and its WineLab subsidiary. The Russian…

Retail Becomes New Target as Healthcare Ransomware Attacks Slow

Comparitech found that healthcare ransomware attacks rose 4% in H1 2025, a significantly lower rate than the cross-sector average of 50% This article has been indexed from www.infosecurity-magazine.com Read the original article: Retail Becomes New Target as Healthcare Ransomware Attacks…

Veeam Phishing via Wav File, (Fri, Jul 18th)

A interesting phishing attempt was reported by a contact. It started with a simple email that looked like a voice mail notification like many VoIP systems deliver when the call is missed. There was a WAV file attached to the…

10 Best XDR (Extended Detection & Response) Solutions 2025

In 2025, the cybersecurity landscape is more fragmented and perilous than ever before. Organizations face an explosion of data sources, an increasing attack surface spanning endpoints, networks, cloud environments, and identities, and a relentless onslaught of sophisticated, multi-stage attacks. Traditional…

CISA Publishes 13 ICS Security Advisories on Critical Flaws

The Cybersecurity and Infrastructure Security Agency (CISA) released thirteen Industrial Control Systems (ICS) security advisories on July 17, 2025, highlighting critical vulnerabilities that could compromise essential infrastructure operations. This coordinated disclosure represents one of the most significant advisory releases of…

‘Daemon Ex Plist’ Vulnerability Grants Root Access on macOS

A newly disclosed vulnerability dubbed “Daemon Ex Plist” allows attackers to escalate privileges from standard user to root access on macOS systems, exploiting a timing flaw in how the operating system handles daemon configuration files. Security researcher Egor Filatov published details of…

Operation Eastwood: NoName057(16) am Ende oder noch im Rennen?

Die jüngsten internationalen Maßnahmen gegen NoName057(16) werden ihre Aktivitäten wahrscheinlich nicht dauerhaft beenden, sagt Rafa Lopez von Checkpoint. Dieser Artikel wurde indexiert von IT-News Cybersicherheit – silicon.de Lesen Sie den originalen Artikel: Operation Eastwood: NoName057(16) am Ende oder noch im…