Proofpoint uncovered UNK_SmudgedSerpent, an Iranian-linked espionage campaign that exploits trust and blurs attribution. The post Iranian Cyber Espionage: Proofpoint Uncovers UNK_SmudgedSerpent appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Iranian Cyber…
Category: eSecurity Planet
18,000 Files Stolen: Intel Faces Insider Threat Challenge
The Intel case underscores the ongoing risk of insider threats and the need for stronger data protection measures. The post 18,000 Files Stolen: Intel Faces Insider Threat Challenge appeared first on eSecurity Planet. This article has been indexed from eSecurity…
LANDFALL: Advanced Commercial-Grade Spyware Targeting Samsung Devices
The discovery of LANDFALL highlights the need for stronger mobile defenses and proactive cybersecurity against advanced spyware. The post LANDFALL: Advanced Commercial-Grade Spyware Targeting Samsung Devices appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…
Malicious NuGet Packages Hide Time-Delayed Sabotage Code
Researchers found nine NuGet packages hiding time-delayed code that can crash apps or corrupt industrial systems. The post Malicious NuGet Packages Hide Time-Delayed Sabotage Code appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…
ClickFix Malware Evolves with Multi-OS Support and Video Tutorials
The ClickFix malware now uses videos, timers, and OS-specific tricks to deceive users into infecting their own devices. The post ClickFix Malware Evolves with Multi-OS Support and Video Tutorials appeared first on eSecurity Planet. This article has been indexed from…
Phishing Campaign “I Paid Twice” Targets Booking.com Hotels and Guests
Cybercriminals are exploiting hotel booking platforms in a global phishing scheme that tricks guests into paying for reservations twice. The post Phishing Campaign “I Paid Twice” Targets Booking.com Hotels and Guests appeared first on eSecurity Planet. This article has been…
Congressional Budget Office Hit by Cyberattack During Shutdown
The CBO breach exposes how the government shutdown is weakening federal cybersecurity defenses when they’re needed most. The post Congressional Budget Office Hit by Cyberattack During Shutdown appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…
Cisco Warns of Active Exploitation of ASA and FTD 0-Day Vulnerability
Cisco warns that hackers are actively exploiting a 0-day flaw in its firewall software, putting unpatched systems at risk of full compromise. The post Cisco Warns of Active Exploitation of ASA and FTD 0-Day Vulnerability appeared first on eSecurity Planet.…
Amazon WorkSpaces Linux Bug Lets Attackers Steal Credentials
A flaw in Amazon WorkSpaces for Linux lets attackers steal authentication tokens. The post Amazon WorkSpaces Linux Bug Lets Attackers Steal Credentials appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Amazon…
Cisco ISE Bug Exposes Networks to Remote Restart Attacks
A critical flaw in Cisco ISE allows remote attackers to trigger system restarts, disrupting authentication and exposing networks to denial-of-service attacks. The post Cisco ISE Bug Exposes Networks to Remote Restart Attacks appeared first on eSecurity Planet. This article has…
Google Warns of AI-Driven Threat Escalation in 2026
Google’s 2026 forecast warns that AI has become both the hacker’s greatest weapon and cybersecurity’s most vital defense. The post Google Warns of AI-Driven Threat Escalation in 2026 appeared first on eSecurity Planet. This article has been indexed from eSecurity…
Threat Actors Leverage AI to Accelerate Ransomware Attacks Across Europe
CrowdStrike’s 2025 report reveals how AI is accelerating ransomware attacks and reshaping Europe’s cyber threat landscape. The post Threat Actors Leverage AI to Accelerate Ransomware Attacks Across Europe appeared first on eSecurity Planet. This article has been indexed from eSecurity…
Generative AI Supercharges Reverse Engineering
Check Point shows how generative AI accelerates XLoader analysis, uncovering real C2s and enabling faster, smarter malware defense. The post Generative AI Supercharges Reverse Engineering appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…
React Vulnerability Endangers Millions of Downloads
A critical React Native flaw exposes millions of developers to remote code attacks. The post React Vulnerability Endangers Millions of Downloads appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: React Vulnerability…
European Authorities Dismantle €600 Million Crypto Fraud Network
European authorities dismantled a €600 million crypto fraud network in a coordinated international operation. The post European Authorities Dismantle €600 Million Crypto Fraud Network appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original…
Microsoft Teams Flaws Let Hackers Impersonate Executives
Researchers found Microsoft Teams bugs letting attackers spoof executives, alter messages, and erode trust in workplace communication. The post Microsoft Teams Flaws Let Hackers Impersonate Executives appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…
Tiny Bug, Huge Loss: $100M+ Balancer Exploit Rocks DeFi
A tiny rounding bug in Balancer’s code led to a massive $100M DeFi exploit, exposing critical flaws in smart contract security. The post Tiny Bug, Huge Loss: $100M+ Balancer Exploit Rocks DeFi appeared first on eSecurity Planet. This article has…
Apple Patches Major iOS and iPadOS Flaws in Critical Update
Apple’s iOS 26.1 and iPadOS 26.1 updates fix major security bugs in WebKit, Kernel, and privacy features. Update now to stay protected. The post Apple Patches Major iOS and iPadOS Flaws in Critical Update appeared first on eSecurity Planet. This…
Android Zero-Click Flaw Lets Hackers Take Over Devices
A critical zero-click flaw in Android allows hackers to take over devices without user interaction, prompting Google to issue urgent security updates. The post Android Zero-Click Flaw Lets Hackers Take Over Devices appeared first on eSecurity Planet. This article has…
Hackers Hijack OpenAI API in Stealthy New Backdoor Attack
Hackers created a stealthy backdoor that exploits OpenAI’s API for covert command-and-control operations. The post Hackers Hijack OpenAI API in Stealthy New Backdoor Attack appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original…