Category: eSecurity Planet

Critical Zoom Vulnerability Exposes Windows Users to Attacks

A new Zoom Workplace flaw (CVE-2025-64740) lets attackers escalate privileges on Windows. The post Critical Zoom Vulnerability Exposes Windows Users to Attacks appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Critical…

Monsta FTP Remote Code Execution Vulnerability (CVE-2025-34299)

Critical flaw in Monsta FTP (CVE-2025-34299) allows remote code execution without authentication, putting thousands of servers at risk. The post Monsta FTP Remote Code Execution Vulnerability (CVE-2025-34299)  appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…

Iranian Cyber Espionage: Proofpoint Uncovers UNK_SmudgedSerpent

Proofpoint uncovered UNK_SmudgedSerpent, an Iranian-linked espionage campaign that exploits trust and blurs attribution. The post Iranian Cyber Espionage: Proofpoint Uncovers UNK_SmudgedSerpent appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Iranian Cyber…

18,000 Files Stolen: Intel Faces Insider Threat Challenge

The Intel case underscores the ongoing risk of insider threats and the need for stronger data protection measures. The post 18,000 Files Stolen: Intel Faces Insider Threat Challenge appeared first on eSecurity Planet. This article has been indexed from eSecurity…

Malicious NuGet Packages Hide Time-Delayed Sabotage Code

Researchers found nine NuGet packages hiding time-delayed code that can crash apps or corrupt industrial systems. The post Malicious NuGet Packages Hide Time-Delayed Sabotage Code appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…

Congressional Budget Office Hit by Cyberattack During Shutdown

The CBO breach exposes how the government shutdown is weakening federal cybersecurity defenses when they’re needed most. The post Congressional Budget Office Hit by Cyberattack During Shutdown appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…

Amazon WorkSpaces Linux Bug Lets Attackers Steal Credentials

A flaw in Amazon WorkSpaces for Linux lets attackers steal authentication tokens. The post Amazon WorkSpaces Linux Bug Lets Attackers Steal Credentials appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Amazon…

Cisco ISE Bug Exposes Networks to Remote Restart Attacks

A critical flaw in Cisco ISE allows remote attackers to trigger system restarts, disrupting authentication and exposing networks to denial-of-service attacks. The post Cisco ISE Bug Exposes Networks to Remote Restart Attacks appeared first on eSecurity Planet. This article has…

Google Warns of AI-Driven Threat Escalation in 2026

Google’s 2026 forecast warns that AI has become both the hacker’s greatest weapon and cybersecurity’s most vital defense. The post Google Warns of AI-Driven Threat Escalation in 2026 appeared first on eSecurity Planet. This article has been indexed from eSecurity…

Generative AI Supercharges Reverse Engineering

Check Point shows how generative AI accelerates XLoader analysis, uncovering real C2s and enabling faster, smarter malware defense. The post Generative AI Supercharges Reverse Engineering appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…