A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts This article has been indexed from WeLiveSecurity Read the original article: ESET Threat Report H2 2025
Category: EN
GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads
A new campaign named GhostPoster has leveraged logo files associated with 17 Mozilla Firefox browser add-ons to embed malicious JavaScript code designed to hijack affiliate links, inject tracking code, and commit click and ad fraud. The extensions have been collectively…
Alternative Apps Surge After Australia Social Media Ban
Downloads jump for lower-profile apps such as ByteDance’s Lemon8 and Yope after Australia bans social media for under-16s This article has been indexed from Silicon UK Read the original article: Alternative Apps Surge After Australia Social Media Ban
Auto Parts Giant LKQ Confirms Oracle EBS Breach
LKQ said the personal information of thousands of individuals was compromised as a result of the hacker attack. The post Auto Parts Giant LKQ Confirms Oracle EBS Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Chinese Ink Dragon Group Hides in European Government Networks
China’s Ink Dragon is using European government networks to hide its espionage activity This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese Ink Dragon Group Hides in European Government Networks
The Hidden Cyber Risks of BYOD: Why Conventional Defences Aren’t Enough
BYOD boosts flexibility and savings, but hidden mobile cyber risks expose organisations to breaches, compliance failures and national security threats. This article has been indexed from Silicon UK Read the original article: The Hidden Cyber Risks of BYOD: Why Conventional…
Former Chancellor George Osborne Joins OpenAI
Osborne to lead OpenAI for Countries, which seeks to expand countries’ AI capabilities and ensure they use US technology This article has been indexed from Silicon UK Read the original article: Former Chancellor George Osborne Joins OpenAI
U.S. CISA adds a flaw in multiple Fortinet products to its Known Exploited Vulnerabilities catalog
U.S. CISA adds a vulnerability impacting multiple products to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability, tracked as CVE-2025-59718 (CVSS Score of 9.1), to its Known Exploited…
XM Cyber bridges external attack surface management with validated internal attack paths
XM Cyber announced an update to its platform that connects External Attack Surface Management with internal risk validation, closing the gap between what’s exposed outside and what exists inside. By bridging these two worlds, XM Cyber now allows security teams…
Trellix advances NDR to close the OT-IT threat detection-to-response gap
Trellix announced Trellix NDR innovations, strengthening OT-IT security with integrated visibility across complex environments, enhanced detection capabilities, and automated investigation and response to reduce the threat detection-to-response gap. “We know cybercriminals are increasingly targeting the OT-IT boundary, where threats can…
Beyond the Buzz: Why Zero Trust Matters More in the Age of AI
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Beyond the Buzz: Why Zero Trust Matters More in the Age of…
AI Pulse: How AI Bots Surface Your Content
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: AI Pulse: How AI Bots Surface Your Content
Businesses Push Back Expectations For AI Adoption
Businesses expected to delay AI spending next year, according to research, as they say tech’s capabilities have been ‘oversold’ This article has been indexed from Silicon UK Read the original article: Businesses Push Back Expectations For AI Adoption
New GhostPoster Attack Leverages PNG Icon to Infect 50,000 Firefox Users
A sophisticated new malware campaign dubbed “GhostPoster” has been uncovered, leveraging a clever steganography technique to compromise approximately 50,000 Firefox users. The attack vector primarily involves seemingly innocent browser extensions, such as “Free VPN Forever,” which conceal malicious payloads within…
Vectra AI redefines hybrid resilience across the attack lifecycle
Vectra AI redefines hybrid attack resilience across the full attack lifecycle by unifying controls pre-and-post compromise within the Vectra AI Platform. Vectra AI’s control philosophy empowers defenders with continuous control through proactive threat exposure management, 360 degree response, and posture…
Hadrian launches offensive agentic AI to expose vulnerabilities before attackers
Hadrian launched the latest iteration of its offensive Agentic AI Platform, designed to take an offensive approach to find external exposures and test them for exploitability. Instead of waiting for attacks to happen, Hadrian’s AI agents act like hackers themselves,…
Rogue NuGet package steals data, Venezuela’s PDVSA suffers attack, patched Fortinet flaws exploited
Rogue NuGet package steals data Venezuela’s PDVSA suffers attack Patched Fortinet flaws exploited Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Picture a “new hire”…
China Approves First Level 3 Autonomous Cars
Chinese government approves cars from Changan Auto and BAIC that allow drivers to take hands off wheel, in boost for auto industry This article has been indexed from Silicon UK Read the original article: China Approves First Level 3 Autonomous…
CISA Alerts on Actively Exploited Gladinet CentreStack and Triofox Flaws
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a new alert regarding a critical security vulnerability affecting Gladinet CentreStack and Triofox. The agency has added this flaw to its Known Exploited Vulnerabilities (KEV) catalog, indicating that hackers are actively…
Cellik Android Malware Uses One-Click APK Builder to Hide in Play Store Apps
A newly discovered Android Remote Access Trojan (RAT) called Cellik is democratizing sophisticated mobile surveillance attacks by bundling advanced spyware capabilities with an automated tool that allows attackers to inject malicious code into legitimate Google Play Store applications seamlessly. The…