Google researchers say China-linked UNC6384 combined social engineering, signed malware, and adversary-in-the-middle attacks to evade detection. The post China-Linked Hackers Hijack Web Traffic to Deliver Backdoor appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Category: securityweek
Hundreds of Salesforce Customers Hit by Widespread Data Theft Campaign
Google says the hackers systematically exported corporate data, focusing on secrets such as AWS and Snowflake keys. The post Hundreds of Salesforce Customers Hit by Widespread Data Theft Campaign appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Nevada State Offices Closed Following Disruptive Cyberattack
State websites and phone lines were taken offline, but officials say emergency services and personal data remain unaffected. The post Nevada State Offices Closed Following Disruptive Cyberattack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Infostealers: The Silent Smash-and-Grab Driving Modern Cybercrime
Competition among malware-as-a-service developers has transformed infostealers into refined, accessible tools for cybercriminals worldwide. The post Infostealers: The Silent Smash-and-Grab Driving Modern Cybercrime appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Infostealers: The…
PromptLock: First AI-Powered Ransomware Emerges
Proof-of-concept ransomware uses AI models to generate attack scripts in real time. The post PromptLock: First AI-Powered Ransomware Emerges appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: PromptLock: First AI-Powered Ransomware Emerges
Citrix Patches Exploited NetScaler Zero-Day
Zero-day exploited in the wild forces Citrix and CISA to push emergency patch deadlines for federal agencies. The post Citrix Patches Exploited NetScaler Zero-Day appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Citrix…
Beyond the Prompt: Building Trustworthy Agent Systems
Building secure AI agent systems requires a disciplined engineering approach focused on deliberate architecture and human oversight. The post Beyond the Prompt: Building Trustworthy Agent Systems appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Healthcare Services Group Data Breach Impacts 624,000
The personal information of many individuals was stolen from Healthcare Services Group’s computer systems in 2024. The post Healthcare Services Group Data Breach Impacts 624,000 appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
Docker Desktop Vulnerability Leads to Host Compromise
A critical vulnerability in Docker Desktop allows attackers to modify the filesystem of Windows hosts to become administrators. The post Docker Desktop Vulnerability Leads to Host Compromise appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
AI Systems Vulnerable to Prompt Injection via Image Scaling Attack
Researchers show how popular AI systems can be tricked into processing malicious instructions by hiding them in images. The post AI Systems Vulnerable to Prompt Injection via Image Scaling Attack appeared first on SecurityWeek. This article has been indexed from…
Hundreds of Thousands Affected by Auchan Data Breach
Auchan confirms that the personal information of hundreds of thousands of customers was stolen in a data breach. The post Hundreds of Thousands Affected by Auchan Data Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
FTC Calls on Tech Firms to Resist Foreign Anti-Encryption Demands
Tech giants have received a letter from the FTC urging them not to weaken security and privacy at the request of foreign governments. The post FTC Calls on Tech Firms to Resist Foreign Anti-Encryption Demands appeared first on SecurityWeek. This…
Organizations Warned of Exploited Git Vulnerability
CISA urges federal agencies to immediately patch an exploited arbitrary file write vulnerability in Git that leads to remote code execution. The post Organizations Warned of Exploited Git Vulnerability appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail
Researchers unveil OneFlip, a Rowhammer-based attack that flips a single bit in neural network weights to stealthily backdoor AI systems without degrading performance. The post OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail…
Pakistani Hackers Back at Targeting Indian Government Entities
Pakistani state-sponsored hacking group APT36 is targeting Linux systems in a fresh campaign aimed at Indian government entities. The post Pakistani Hackers Back at Targeting Indian Government Entities appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Aspire Rural Health System Data Breach Impacts Nearly 140,000
Aspire Rural Health System was targeted last year by the BianLian ransomware group, which claimed to have stolen sensitive data. The post Aspire Rural Health System Data Breach Impacts Nearly 140,000 appeared first on SecurityWeek. This article has been indexed…
Chip Programming Firm Data I/O Hit by Ransomware
Data I/O has disclosed a ransomware attack that disrupted the company’s operations, including communications, shipping and production. The post Chip Programming Firm Data I/O Hit by Ransomware appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Anatsa Android Banking Trojan Now Targeting 830 Financial Apps
The Anatsa Android banking trojan has expanded its target list to new countries and more cryptocurrency applications. The post Anatsa Android Banking Trojan Now Targeting 830 Financial Apps appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
CISA Requests Public Feedback on Updated SBOM Guidance
CISA has updated the Minimum Elements for a Software Bill of Materials (SBOM) guidance and is seeking public comment. The post CISA Requests Public Feedback on Updated SBOM Guidance appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
SASE Company Netskope Files for IPO
Netskope has an annual recurring revenue of more than $707 million, but it’s still not profitable, reporting a net loss of $170 million in H1. The post SASE Company Netskope Files for IPO appeared first on SecurityWeek. This article has…