Category: EN

Agent Session Smuggling: How Malicious AI Hijacks Victim Agents

Security researchers have uncovered a sophisticated attack technique that exploits the trust relationships built into AI agent communication systems. The attack, termed agent session smuggling, allows a malicious AI agent to inject covert instructions into established cross-agent communication sessions, effectively…

Hackers Hide SSH–Tor Backdoor Inside Weaponized Military Documents

In October 2025, cybersecurity researchers at Cyble Research and Intelligence Labs (CRIL) uncovered a sophisticated malware campaign distributing weaponized ZIP archives disguised as military documents. The attack specifically targeted Belarusian military personnel through a lure document titled “ТЛГ на убытие…

CISA Alerts on Linux Kernel Vulnerability Exploited in Ransomware Attacks

The U.S. Cybersecurity and Infrastructure Security Agency has added a critical Linux kernel vulnerability to its Known Exploited Vulnerabilities catalog, warning that threat actors are actively leveraging the security vulnerability in ransomware campaigns targeting organizations worldwide. The vulnerability, tracked as…

Reassuring Secrets Rotation for Compliance

How Do Non-Human Identities Impact Cloud Security? How do organizations ensure that their cloud are secure from potential threats? Non-Human Identities (NHIs) are critical components in cybersecurity, especially in cloud-based environments. These machine identities, essentially a combination of encrypted secrets…

Stay Relaxed with Enhanced Data Security

How Can Organizations Achieve Enhanced Data Security with Non-Human Identities? Have you ever wondered how modern organizations can achieve enhanced data security while maintaining efficient workflows? The management of Non-Human Identities (NHIs) plays a vital role in ensuring robust protection…

Powerful Tools to Manage Machine Identities

Why Are Non-Human Identities Critical in Cybersecurity? What happens when machine identities are not managed efficiently? Cybersecurity is rapidly transforming with increasing reliance on machine identities, also referred to as Non-Human Identities (NHIs). These identities are often overlooked but hold…

AdaptixC2: When Open-Source Tools Become Weapons

Cybercriminals are turning AdaptixC2, an open-source security tool, into a weapon for ransomware attacks. The post AdaptixC2: When Open-Source Tools Become Weapons appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: AdaptixC2:…

A Framework for Securing Open-Source Observability at the Edge

The Edge Observability Security Challenge  Deploying an open-source observability solution to distributed retail edge locations creates a fundamental security challenge. With thousands of locations processing sensitive data like payments and customers’ personally identifiable information (PII), every telemetry component running on…