Category: eSecurity Planet

4.3 Billion Records Exposed in Massive Lead-Generation Data Leak

An unsecured database exposed 4.3 billion LinkedIn-derived records, enabling large-scale phishing and identity-based attacks. The post 4.3 Billion Records Exposed in Massive Lead-Generation Data Leak appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…

Phantom Stealer Uses ISO Files to Breach Windows Systems

Operation MoneyMount-ISO uses malicious ISO files to deliver Phantom Stealer to Windows. The post Phantom Stealer Uses ISO Files to Breach Windows Systems appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article:…

Fake Leonardo DiCaprio Torrent Spreads Agent Tesla Malware

A fake Leonardo DiCaprio movie torrent is spreading Agent Tesla malware through trusted Windows tools. The post Fake Leonardo DiCaprio Torrent Spreads Agent Tesla Malware appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…

Windows Defender Firewall Bug Leaks Sensitive Memory

A Windows Defender Firewall flaw lets privileged attackers read sensitive memory, showing how low-severity bugs can still enable data exposure. The post Windows Defender Firewall Bug Leaks Sensitive Memory appeared first on eSecurity Planet. This article has been indexed from…

Malicious VS Code Extensions Hide Malware in PNG Files

Malicious VS Code extensions hid malware in PNG files, compromising developer environments and supply chains. The post Malicious VS Code Extensions Hide Malware in PNG Files appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…

Rust-Based 01flip Ransomware Hits Windows and Linux

A new Rust-based ransomware called 01flip is targeting both Windows and Linux systems in coordinated attacks on critical infrastructure. The post Rust-Based 01flip Ransomware Hits Windows and Linux appeared first on eSecurity Planet. This article has been indexed from eSecurity…

Fake ChatGPT Support Installs AMOS Infostealer on macOS

Fake ChatGPT support sessions are being used to trick macOS users into installing the AMOS infostealer via malicious terminal commands. The post Fake ChatGPT Support Installs AMOS Infostealer on macOS appeared first on eSecurity Planet. This article has been indexed…

Cisco-Trained Hackers Lead Sophisticated Attacks on Cisco Devices

Cisco-trained hackers led a nation-state espionage campaign against global telecom networks. The post Cisco-Trained Hackers Lead Sophisticated Attacks on Cisco Devices appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Cisco-Trained Hackers…

Critical GitLab Vulnerabilities Expose DevOps Pipelines

GitLab patched critical flaws that could enable XSS, denial-of-service attacks, and authentication bypasses. The post Critical GitLab Vulnerabilities Expose DevOps Pipelines appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Critical GitLab…

Jenkins DoS Vulnerability Lets Attackers Freeze CI/CD Pipelines

A Jenkins denial-of-service vulnerability allows attackers to freeze CI/CD pipelines and disrupt build operations. The post Jenkins DoS Vulnerability Lets Attackers Freeze CI/CD Pipelines appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original…

Check Point Warns of 40,000 Finance-Themed Phishing Attacks

Over 40,000 SharePoint- and DocuSign-themed phishing emails reveal the rising threat of cloud impersonation attacks. The post Check Point Warns of 40,000 Finance-Themed Phishing Attacks appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…

Eleventh Hour: Cyberwarfare Emerges as an Imminent Threat

Cyberwarfare now resembles Stranger Things: the danger comes from the gaps you can’t see. The post Eleventh Hour: Cyberwarfare Emerges as an Imminent Threat appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original…

APT28’s Toolkit: AI, Wi-Fi Intrusions, Cloud C2

APT28’s new “LameHug” malware uses LLMs to generate basic commands, a strikingly clumsy move from an otherwise advanced threat group. The post APT28’s Toolkit: AI, Wi-Fi Intrusions, Cloud C2 appeared first on eSecurity Planet. This article has been indexed from…

Broadside Mirai Botnet Hijacks Ship Cameras for DDoS

The Broadside Mirai variant exploits vulnerable maritime DVRs to gain stealthy access and threaten global shipping. The post Broadside Mirai Botnet Hijacks Ship Cameras for DDoS appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…