A significant vulnerability has been identified in the Laravel framework, specifically affecting versions between 11.9.0 and 11.35.1. The issue revolves around improper encoding of request parameters on the error page when the application is running in debug mode, leading to…
Category: EN
North Korea-linked APT Moonstone used Qilin ransomware in limited attacks
Microsoft researchers reported that North Korea-linked APT tracked as Moonstone Sleet has employed the Qilin ransomware in limited attacks. Microsoft observed a North Korea-linked APT group, tracked as Moonstone Sleet, deploying Qilin ransomware in limited attacks since February 2025. The…
Researchers Jailbreaked 17 Popular LLM Models To Communicate Sensitive Data
A comprehensive study by Palo Alto Networks’ Unit 42 has revealed that 17 popular generative AI web applications remain vulnerable to various jailbreaking techniques. These vulnerabilities potentially allow malicious actors to bypass AI safety mechanisms to extract sensitive information or…
Google Paid Out $12 Million via Bug Bounty Programs in 2024
In 2024, Google paid out nearly $12 million in bug bounties through its revamped vulnerability reward programs. The post Google Paid Out $12 Million via Bug Bounty Programs in 2024 appeared first on SecurityWeek. This article has been indexed from…
UK AI Research Under Threat From Nation-State Hackers
The Alan Turing institute urged government and academia to address systemic cultural and structural security barriers in UK AI research This article has been indexed from www.infosecurity-magazine.com Read the original article: UK AI Research Under Threat From Nation-State Hackers
Navigating AI 🤝 Fighting Skynet
Using AI can be a great tool for adversarial engineering. This was just a bit of fun to see if it was possible todo and to learn more about automation but also proving you cannot trust git commit history nor…
Mass Exploitation of Critical PHP Vulnerability Begins
GreyNoise warns of mass exploitation of a critical vulnerability in PHP leading to remote code execution on vulnerable servers. The post Mass Exploitation of Critical PHP Vulnerability Begins appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
SimSpace Stack Optimizer allows organizations to measure their security technologies
SimSpace launched Stack Optimizer, designed to help organizations evaluate, test, and optimize their security and IT infrastructure. By leveraging SimSpace’s realistic simulated environments, organizations can perform comprehensive security performance benchmarking, validate detection engineering strategies, optimize operational workflows, and validate compliance…
⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact
Cyber threats today don’t just evolve—they mutate rapidly, testing the resilience of everything from global financial systems to critical infrastructure. As cybersecurity confronts new battlegrounds—ranging from nation-state espionage and ransomware to manipulated AI chatbots—the landscape becomes increasingly complex, prompting vital…
Why The Modern Google Workspace Needs Unified Security
The Need For Unified Security Google Workspace is where teams collaborate, share ideas, and get work done. But while it makes work easier, it also creates new security challenges. Cybercriminals are constantly evolving, finding ways to exploit misconfigurations, steal sensitive…
Switzerland Mandates Cyber-Attack Reporting for Critical Infrastructure
Starting April 2025, Swiss critical infrastructure organizations will have to report cyber-attacks to the country’s authorities within 24 hours of discovery This article has been indexed from www.infosecurity-magazine.com Read the original article: Switzerland Mandates Cyber-Attack Reporting for Critical Infrastructure
Navigating AI 🤝 Fighting Skynet
Using AI can be a great tool for adversarial engineering. This was just a bit of fun to see if it was possible todo and to learn more about automation but also proving you cannot trust git commit history nor…
Critical Vulnerabilities in Moxa Switches Enable Unauthorized Access
A critical vulnerability identified as CVE-2024-12297 has been discovered in Moxa’s PT series of network switches, affecting multiple models across different product lines. This security flaw involves an authorization logic disclosure that can be exploited to bypass authentication mechanisms, allowing…
Large-scale cryptocurrency miner campaign targets Russian users with SilentCryptoMiner
Experts warn of a large-scale cryptocurrency miner campaign targeting Russian users with SilentCryptoMiner. Kaspersky researchers discovered a mass malware campaign spreading SilentCryptoMiner by disguising it as a tool to bypass internet restrictions. While investigating the increased use of Windows Packet…
Thousands of WordPress Websites Infected with Malware
The malware includes four separate backdoors: Creating four backdoors facilitates the attackers having multiple points of re-entry should one be detected and removed. A unique case we haven’t seen before. Which introduces another type of attack made possibly by abusing…
Phantom Goblin Leveraging Social Engineering Tactics To Deliver Stealer Malware
Cyble Research and Intelligence Labs (CRIL) has identified a sophisticated malware operation named ‘Phantom Goblin’ that employs deceptive social engineering techniques to distribute information-stealing malware. The attack begins with RAR file attachments containing malicious shortcut (LNK) files disguised as legitimate…
⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact
Cyber threats today don’t just evolve—they mutate rapidly, testing the resilience of everything from global financial systems to critical infrastructure. As cybersecurity confronts new battlegrounds—ranging from nation-state espionage and ransomware to manipulated AI chatbots—the landscape becomes increasingly complex, prompting vital…
Navigating AI 🤝 Fighting Skynet
Using AI can be a great tool for adversarial engineering. This was just a bit of fun to see if it was possible todo and to learn more about automation but also proving you cannot trust git commit history nor…
Cobalt Strike Exploitation by Hackers Drops, Report Reveals
A collaborative initiative involving Microsoft’s Digital Crimes Unit (DCU), Fortra, and the Health Information Sharing and Analysis Center (Health-ISAC) has reported a major drop in the use of unauthorized versions of the cyber tool Cobalt Strike by hackers. Since the…
The NHS security culture problem is a crisis years in the making
Insiders say board members must be held accountable and drive positive change from the top down Analysis Walk into any hospital and ask the same question – “Which security system should we invest in?” – to both a doctor and…