Researchers demonstrated how AI safety approval prompts can be manipulated to trigger remote code execution. The post AI Safety Prompts Abused to Trigger Remote Code Execution appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…
Category: eSecurity Planet
125,000 WatchGuard Firewalls Vulnerable to Remote Attacks
A critical zero-day flaw is being actively exploited to remotely compromise more than 125,000 WatchGuard Firebox firewalls. The post 125,000 WatchGuard Firewalls Vulnerable to Remote Attacks appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…
HubSpot Phishing Campaign Bypasses Trusted Email Defenses
A phishing campaign targeting HubSpot users bypassed email defenses by abusing trusted platforms and authenticated infrastructure. The post HubSpot Phishing Campaign Bypasses Trusted Email Defenses appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…
OpenAI Launches GPT-5.2-Codex for Secure Coding
OpenAI has launched GPT-5.2-Codex, an agentic coding model that boosts real-world software engineering and AI-powered vulnerability research. The post OpenAI Launches GPT-5.2-Codex for Secure Coding appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…
Amazon Detects North Korean IT Infiltrator via Latency Clues
Amazon uncovered a North Korean IT infiltrator through keystroke latency, highlighting risks in remote hiring and the need for stronger identity controls. The post Amazon Detects North Korean IT Infiltrator via Latency Clues appeared first on eSecurity Planet. This article…
Cybersecurity Marketing Trends for 2026
Buyer Shifts, Growth Opportunities, and How Marketers Win in a New Security Era The post Cybersecurity Marketing Trends for 2026 appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Cybersecurity Marketing Trends…
AI Agent Attacks in Q4 2025 Signal New Risks for 2026
Q4 2025 attacks show early AI agents are already expanding the attack surface, pushing enterprises to rethink AI security for 2026. The post AI Agent Attacks in Q4 2025 Signal New Risks for 2026 appeared first on eSecurity Planet. This…
140K Childcare Records Exposed in CRM Database Leak
A misconfigured childcare CRM exposed 140,000 records linking parents and children. The post 140K Childcare Records Exposed in CRM Database Leak appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: 140K Childcare…
Moonwalk++ Bypasses EDR by Spoofing Windows Call Stacks
A new Moonwalk++ proof-of-concept (PoC) shows how malware can spoof Windows call stacks while staying encrypted in memory, bypassing modern EDR detection. The research highlights blind spots in stack-based telemetry increasingly relied on by enterprise defenders. “Public detection tools fail…
GhostPoster Malware Hit 50K Users via Firefox Extension Icons
The GhostPoster campaign hid malware inside Firefox extension icons, infecting tens of thousands of users through trusted add-ons. The post GhostPoster Malware Hit 50K Users via Firefox Extension Icons appeared first on eSecurity Planet. This article has been indexed from…
SoundCloud Breach Potentially Affects Millions of Accounts
SoundCloud confirmed a breach that exposed user data through an internal dashboard, potentially affecting millions of accounts. The post SoundCloud Breach Potentially Affects Millions of Accounts appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…
Actively Exploited Fortinet Flaws Enable Security Appliance Takeover
Attackers are actively exploiting Fortinet flaws to bypass authentication and take over security appliances. The post Actively Exploited Fortinet Flaws Enable Security Appliance Takeover appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original…
Azure CLI Trust Abused in ConsentFix Account Takeovers
ConsentFix abuses trusted Azure CLI OAuth flows to hijack Microsoft accounts without passwords or MFA. The post Azure CLI Trust Abused in ConsentFix Account Takeovers appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…
SantaStealer Joins the Naughty List of New Infostealers
SantaStealer is a new malware-as-a-service infostealer that steals credentials and data using largely in-memory techniques. The post SantaStealer Joins the Naughty List of New Infostealers appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…
Google Finds Server Takeovers Linked to React2Shell Exploitation
Google warns that attackers are actively exploiting React2Shell to hijack unpatched servers. The post Google Finds Server Takeovers Linked to React2Shell Exploitation appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Google…
MFA Advantages & Weaknesses
Learn the strengths and weaknesses of MFA, how attackers bypass it, and how phishing-resistant MFA reduces identity-based attacks. The post MFA Advantages & Weaknesses appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original…
What Is Security Service Edge (SSE): All You Need to Know
Learn how Security Service Edge (SSE) works, its benefits, key components, use cases, and why it matters for securing modern hybrid and cloud environments. The post What Is Security Service Edge (SSE): All You Need to Know appeared first on…
4.3 Billion Records Exposed in Massive Lead-Generation Data Leak
An unsecured database exposed 4.3 billion LinkedIn-derived records, enabling large-scale phishing and identity-based attacks. The post 4.3 Billion Records Exposed in Massive Lead-Generation Data Leak appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…
Phantom Stealer Uses ISO Files to Breach Windows Systems
Operation MoneyMount-ISO uses malicious ISO files to deliver Phantom Stealer to Windows. The post Phantom Stealer Uses ISO Files to Breach Windows Systems appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article:…
Apple Zero-Day Exploits Used in Targeted iPhone Spyware Attacks
Apple confirmed two WebKit zero-days exploited in targeted iPhone spyware attacks. The post Apple Zero-Day Exploits Used in Targeted iPhone Spyware Attacks appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Apple…