Ein Angreifer kann mehrere Schwachstellen in Roundcube ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen und vertrauliche Informationen preiszugeben. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE] [mittel] Roundcube: Mehrere…
Author: IT Security News Bot
Open source has a malware problem, and it’s getting worse
Sonatype has published its Q2 2025 Open Source Malware Index, identifying 16,279 malicious open source packages across major ecosystems such as npm and PyPI. This brings the total number of malware packages discovered by the company to 845,204. Compared to…
GitPhish: New Tool Automates GitHub Device Code Phishing Attacks
Security researchers revealed the dangers of GitHub Device Code Phishing—a technique that leverages the OAuth 2.0 Device Authorization Grant flow. This method can turn a simple eight-digit code and a phone call into a full compromise of an organization’s GitHub…
McDonald’s AI Hiring Bot Exposed with ‘123456’ Password — Millions of Job‑Seekers’ Data at Risk
A shocking security vulnerability in McDonald’s AI-powered hiring system has exposed the personal information of millions of job applicants, after security researchers discovered they could access the entire database using the laughably weak password “123456.” The breach affects McHire.com, McDonald’s…
Critical mcp‑remote Vulnerability Enables LLM Clients to Remote Code Execution
The JFrog Security Research team has discovered a critical security vulnerability in mcp-remote, a widely used tool that enables Large Language Model clients to communicate with remote servers, potentially allowing attackers to achieve full system compromise through remote code execution.…
C-suites step up on OT cybersecurity, and it’s paying off
There has been a significant increase in the global trend of corporations planning to integrate cybersecurity under the CISO or other executives, according to Fortinet. Growing maturity in OT cybersecurity processes and solutions (Source: Fortinet) OT security moves up the…
Microsoft Confirms Teams Outage for Users, Investigation Underway – Updated
Microsoft acknowledged a significant outage affecting its popular communication platform, Microsoft Teams, leaving numerous users unable to access critical services. The company has confirmed the issue and is actively investigating the root cause while working to ensure a swift resolution…
Global software supply chain visibility remains critically low
Only 23% of organizations are confident that they have very high visibility of their software supply chain, according to LevelBlue’s Data Accelerator. The limited visibility reported by organizations significantly impacts their cyber resilience. Poor risk visibility leaves software supply chains…
ISC Stormcast For Thursday, July 10th, 2025 https://isc.sans.edu/podcastdetail/9520, (Thu, Jul 10th)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ISC Stormcast For Thursday, July 10th, 2025…
How passkeys work: Do your favorite sites even support passkeys?
Join us on a typical passkey journey from discovery to registration to authentication to deletion. This article has been indexed from Latest stories for ZDNET in Security Read the original article: How passkeys work: Do your favorite sites even support…
DoNot APT is expanding scope targeting European foreign ministries
DoNot APT, likely an India-linked cyberespionage group, targets European foreign ministries with LoptikMod malware. The DoNot APT group, likely linked to India, has expanded its operations and is targeting European foreign ministries with a new malware, called LoptikMod. The Donot…
SSH Tunneling in Action: direct-tcp requests [Guest Diary], (Wed, Jul 9th)
[This is a Guest Diary by Sihui Neo, an ISC intern as part of the SANS.edu BACS program] This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: SSH Tunneling in Action: direct-tcp requests…
How to trick ChatGPT into revealing Windows keys? I give up
No, really, those are the magic words A clever AI bug hunter found a way to trick ChatGPT into disclosing Windows product keys, including at least one owned by Wells Fargo bank, by inviting the AI model to play a…
Security-Bericht: On-Premises-Angebote erleben Renaissance
Unternehmen sorgen sich um Bedrohungen durch KI und den Verlust von Daten – On-premises wird wieder beliebter. Das geht aus einer Umfrage hervor. Dieser Artikel wurde indexiert von heise security News Lesen Sie den originalen Artikel: Security-Bericht: On-Premises-Angebote erleben Renaissance
What Is an 888 Area Code and Are Calls From It Safe?
When an unfamiliar number starting with 888 pops up on your phone, your first instinct might be to ignore it. But what is it: a… The post What Is an 888 Area Code and Are Calls From It Safe? appeared…
MSPs Under More Scrutiny From Customers on Cyber Than Ever
New research by Cybersmart has revealed that over half (58%) of MSP leaders globally believe their customers are at more risk today than this time last year. As a result, MSPs are being relied upon more than ever by customers…
Huntress and Microsoft Collaborate to Strengthen Cybersecurity for Businesses Worldwide
Huntress has announced a new collaboration with Microsoft aimed at enhancing cybersecurity for businesses of all sizes. As cyberattacks grow increasingly sophisticated, this partnership seeks to equip organisations, especially those with limited resources and in-house expertise, with the tools and…
Top 5 Remote-Access And RMM Tools Most Abused By Threat Actors
Remote monitoring and management (RMM) tools are a go-to for IT teams, but that same power makes them a favorite trick up attackers’ sleeves, too. In the first half of 2025, ANY.RUN analysts reviewed thousands of real-world malware detonations in…
McDonald’s AI Hiring Bot Exposed Millions of Applicants’ Data to Hackers Using the Password ‘123456’
Basic security flaws left the personal info of tens of millions of McDonald’s job-seekers vulnerable on the “McHire” site built by AI software firm Paradox.ai. This article has been indexed from Security Latest Read the original article: McDonald’s AI Hiring…
API Use is Growing Fast, but Security is Lacking: Raidiam
A survey by UK company Raidiam found that even as the use of APIs continues to growth, most organizations have woefully inadequate protections in place to safeguard the increasingly sensitive data the APIs carry, exposing them up cyberattacks. The post…