Category: EN

Malware Campaign Masquerades as Tesla in Poisoned Google Ads

A malware operation has surfaced in the context of a complex cyber threat landscape, using tainted Google Ads to pose as Tesla and trick consumers into placing fictitious preorders for the unannounced Optimus humanoid robot. Security researchers have identified multiple…

UK Red Teamers “Deeply Skeptical” of AI

Commercial red team experts believe AI’s current impact on cyber is overstated This article has been indexed from www.infosecurity-magazine.com Read the original article: UK Red Teamers “Deeply Skeptical” of AI

Windows RPC Protocol Exploited to Launch Server Spoofing Attacks

A vulnerability in Microsoft Windows’ Remote Procedure Call (RPC) protocol has been discovered that allows attackers to manipulate core system communications and launch sophisticated server spoofing attacks. The flaw, designated CVE-2025-49760, enables unprivileged users to masquerade as legitimate system services…

SSHamble: New Open-Source Tool Targets SSH Protocol Flaws

Security researchers have unveiled SSHamble, a powerful new open-source tool designed to identify vulnerabilities and misconfigurations in SSH implementations across networks. Developed by HD Moore and Rob King, the tool represents a significant advancement in SSH security testing capabilities, addressing…