A critical n8n vulnerability allows authenticated users to execute arbitrary code, putting automation workflows at risk. The post Critical n8n Vulnerability Enables Authenticated RCE appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original…
Category: eSecurity Planet
1M Customer Records Allegedly Stolen in Brightspeed Breach
Brightspeed is investigating claims that the Crimson Collective stole data from more than one million customers. The post 1M Customer Records Allegedly Stolen in Brightspeed Breach appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…
900,000 Users Hit as Chrome Extensions Steal AI Chat Data
Malicious Chrome extensions stole AI chat data from over 900,000 users. The post 900,000 Users Hit as Chrome Extensions Steal AI Chat Data appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article:…
Flare Researchers Analyze SafePay Ransomware Leak Data
Flare researchers analyzed SafePay leak data, showing how the group targets regulated SMBs to maximize pressure. The post Flare Researchers Analyze SafePay Ransomware Leak Data appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…
WordPress Admins Targeted by Renewal Email Phishing Scam
A phishing campaign targeting WordPress admins uses fake renewal emails to steal credit card data and 2FA codes in real time. The post WordPress Admins Targeted by Renewal Email Phishing Scam appeared first on eSecurity Planet. This article has been…
macOS Flaw Enables Silent Bypass of Apple Privacy Controls
A macOS vulnerability (CVE-2025-43530) allows attackers to silently bypass TCC privacy controls and access sensitive user data. The post macOS Flaw Enables Silent Bypass of Apple Privacy Controls appeared first on eSecurity Planet. This article has been indexed from eSecurity…
NordVPN Says Breach Claims Involve Dummy Test Data
NordVPN says breach claims involved only dummy data from an isolated test environment. The post NordVPN Says Breach Claims Involve Dummy Test Data appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article:…
Critical SmarterMail Bug Enables Unauthenticated File Uploads
A critical SmarterMail flaw allows unauthenticated file uploads, putting thousands of mail servers at risk of remote code execution. The post Critical SmarterMail Bug Enables Unauthenticated File Uploads appeared first on eSecurity Planet. This article has been indexed from eSecurity…
2M Devices at Risk as Kimwolf Botnet Abuses Proxy Networks
The Kimwolf botnet is abusing residential proxies to spread through consumer devices, putting roughly two million systems at risk worldwide. The post 2M Devices at Risk as Kimwolf Botnet Abuses Proxy Networks appeared first on eSecurity Planet. This article has…
Google Tasks Used to Deliver Stealth Phishing Attacks
Attackers are abusing Google Tasks notifications to deliver trusted-domain phishing emails that bypass traditional email security controls. The post Google Tasks Used to Deliver Stealth Phishing Attacks appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…
Handala Leak Shows Telegram Account Risk, Not iPhone Hacks
The Handala incident shows how Telegram account takeovers can expose sensitive data without compromising entire devices. The post Handala Leak Shows Telegram Account Risk, Not iPhone Hacks appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…
Security Professionals Plead Guilty in ALPHV Ransomware Case
Two U.S. cybersecurity professionals pleaded guilty to working as ALPHV/BlackCat ransomware affiliates, highlighting insider threat risks. The post Security Professionals Plead Guilty in ALPHV Ransomware Case appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…
APT36 Uses Malicious Windows Shortcuts to Target Indian Government
APT36 is targeting Indian government entities using malicious Windows shortcut files disguised as PDFs. The post APT36 Uses Malicious Windows Shortcuts to Target Indian Government appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…
DarkSpectre Malware Hit 8.8M Browsers via Malicious Extensions
DarkSpectre infected over 8.8 million browser users by abusing trusted extensions and advanced evasion techniques. The post DarkSpectre Malware Hit 8.8M Browsers via Malicious Extensions appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…
Critical Flaw Puts WHILL Electric Wheelchairs at Risk of Hijacking
A critical Bluetooth flaw could allow nearby attackers to remotely control WHILL electric wheelchairs, posing serious safety risks. The post Critical Flaw Puts WHILL Electric Wheelchairs at Risk of Hijacking appeared first on eSecurity Planet. This article has been indexed…
TriZetto Data Breach Triggers Class-Action Lawsuits Against Cognizant
Cognizant faces lawsuits after a prolonged TriZetto data breach exposed sensitive healthcare data. The post TriZetto Data Breach Triggers Class-Action Lawsuits Against Cognizant appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article:…
Malicious Jackson Lookalike Library Slips Into Maven Central
A malicious Jackson lookalike library was used to distribute Cobalt Strike malware through Maven Central. The post Malicious Jackson Lookalike Library Slips Into Maven Central appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…
EmEditor Website Breach Turns Trusted Installer Into Infostealer Malware
A supply chain attack on the EmEditor website delivered a trojanized installer that installed infostealer malware. The post EmEditor Website Breach Turns Trusted Installer Into Infostealer Malware appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…
Bluetooth Headphones Can Be Weaponized to Hack Phones
High-severity flaws in popular Bluetooth headphones can enable eavesdropping and smartphone hijacking, with many devices still unpatched. The post Bluetooth Headphones Can Be Weaponized to Hack Phones appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…
Copilot Studio Feature Enables Silent AI Backdoors
Copilot Studio’s Connected Agents feature can be abused to create silent AI backdoors that bypass visibility and audit controls. The post Copilot Studio Feature Enables Silent AI Backdoors appeared first on eSecurity Planet. This article has been indexed from eSecurity…