Microsoft has taken a significant step toward enhancing cybersecurity by introducing a new phishing attack protection feature for Microsoft Teams. The feature aims to safeguard users from brand impersonation in chats initiated by external domains, a common tactic used by…
Microsoft tests ‘scareware blocker’ for Edge that uses computer vision to detect scams
Microsoft is rolling out a new tool dubbed “scareware blocker,” which uses machine learning and computer vision to identify a very pervasive type of online scam. “Scareware” has blighted the web almost since its inception, often in the form of…
ENGlobal Says Personal Information Accessed in Ransomware Attack
ENGlobal has informed the SEC that personal information was compromised in a November 2024 ransomware attack. The post ENGlobal Says Personal Information Accessed in Ransomware Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Ransomware Threats, Led by FunkSec, Rise to New Heights
Ransomware attacks surged to a record high in December 2024, with 574 incidents reported, according to an NCC Group report. FunkSec, a newly identified group combining hacktivism and cybercrime, accounted for over 100 attacks (18% of the total), making it…
EU Sanctions Three Russians For 2020 Cyber-Attack on Estonia
The three Russian hackers are believed to be part of Unit 29155 of the GRU, also known as Cadet Blizzard, Ember Bear and Ruinous Ursa This article has been indexed from www.infosecurity-magazine.com Read the original article: EU Sanctions Three Russians…
D-LINK DSL-3788 Router: Schwachstelle ermöglicht Codeausführung
In D-LINK DSL-3788 Routern gibt es ein Sicherheitsproblem. Eine Funktion prüft nicht genau, wie lang eine empfangene Nachricht ist. Dadurch kann ein Angreifer von außen eine manipulierte Nachricht senden und eigenen Code ausführen. Dieser Artikel wurde indexiert von BSI Warn-…
[NEU] [hoch] D-LINK DSL-3788 Router: Schwachstelle ermöglicht Codeausführung
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in D-LINK DSL-3788 Routern ausnutzen, um beliebigen Programmcode auszuführen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [NEU] [hoch] D-LINK DSL-3788 Router: Schwachstelle…
Trump Says DeepSeek Is AI ‘Wake-Up Call’
US president Donald Trump says success of DeepSeek’s low-cost AI model should be ‘wake-up call’ to US industry, after market shock This article has been indexed from Silicon UK Read the original article: Trump Says DeepSeek Is AI ‘Wake-Up Call’
SonicWall Confirms Exploitation of New SMA Zero-Day
SonicWall has confirmed that an SMA 1000 zero-day tracked as CVE-2025-23006 has been exploited in the wild. The post SonicWall Confirms Exploitation of New SMA Zero-Day appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Apple zero-day vulnerability exploited to target iPhone users (CVE-2025-24085)
Apple has shipped a fix for a zero-day vulnerability (CVE-2025-24085) that is being leveraged by attackers against iPhone users. About CVE-2025-24085 CVE-2025-24085 is a use after free bug in CoreMedia, a framework used by Apple devices for the processing of…
How Long Does It Take Hackers to Crack Modern Hashing Algorithms?
While passwords remain the first line of defense for protecting user accounts against unauthorized access, the methods for creating strong passwords and protecting them are continually evolving. For example, NIST password recommendations are now prioritizing password length over complexity. Hashing,…
Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations
Cybersecurity researchers have found that ransomware attacks targeting ESXi systems are also leveraging the access to repurpose the appliances as a conduit to tunnel traffic to command-and-control (C2) infrastructure and stay under the radar. “ESXi appliances, which are unmonitored, are…
heise-Angebot: Sichere Softwareentwicklung mit KI: Online-Konferenz hilft Gefahren abzuwehren
Am 8. April zeigt die Online-Konferenz “KI und Security”, welche Angriffe auf KI-Anwendungen und -Tools möglich sind und wie man sich davor schützt. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: heise-Angebot: Sichere Softwareentwicklung mit KI:…
Grafik zeigt: Diese PIN-Codes sollten Nutzer besser meiden
Einige PINs sind beliebter als andere. Das wissen auch Angreifer. Eine neue Grafik zeigt, bei welchen Ziffernfolgen das Risiko besonders hoch ist. (Passwort, Security) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Grafik zeigt: Diese…
[NEU] [hoch] Apple macOS, iPadOS und iOS: Mehrere Schwachstellen
Ein Angreifer kann mehrere Schwachstellen in Apple macOS, Apple iPadOS und Apple iOS ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, beliebigen Code auszuführen, sensible Daten offenzulegen, Dateien zu manipulieren, erhöhte Rechte zu erlangen – einschließlich Root-Rechte, Sicherheitsmaßnahmen zu umgehen und einen…
[UPDATE] [mittel] GitLab: Mehrere Schwachstellen
Ein entfernter authentisierter Angreifer kann mehrere Schwachstellen in GitLab ausnutzen, um Dateien zu manipulieren, vertrauliche Informationen preiszugeben, die Authentifizierung zu umgehen und einen Denial-of-Service-Zustand zu erzeugen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen…
New TorNet backdoor seen in widespread campaign
Cisco Talos discovered an ongoing malicious campaign operated by a financially motivated threat actor targeting users, predominantly in Poland and Germany. This article has been indexed from Cisco Talos Blog Read the original article: New TorNet backdoor seen in widespread…
Apple Security Update – Patch for iOS Zero-day, MacOS & More
Apple has responded to a newly discovered zero-day vulnerability affecting its operating systems by releasing an array of security updates to protect users from potential exploitation. The updates span iOS, iPadOS, macOS, watchOS, tvOS, visionOS, and Safari, demonstrating Apple’s commitment…
EU announced sanctions on three members of Russia’s GRU Unit 29155
The EU sanctioned three members of Russia’s GRU Unit 29155 for cyberattacks on Estonia’s government agencies in 2020. The European Union announced sanctions for three members (Nikolay Korchagin, Vitaly Shevchenko, and Yuriy Denisov) of Unit 29155 of Russia’s military intelligence…
Hackers Using Hidden Text Salting Technique To Confuse Spam Filters & Evade Detection
Cybercriminals are increasingly employing a technique known as “hidden text salting” to bypass spam filters and evade detection. This method, which saw a surge in usage during the latter half of 2024, poses a significant threat to organizations relying on…
New Attack Mimics USPS To Deliver Malicious PDF In To Attack Mobile Devices
A sophisticated phishing campaign has been uncovered, leveraging malicious PDFs disguised as official U.S. Postal Service (USPS) communications to target mobile users. This attack, identified by Zimperium’s zLabs team, employs a novel obfuscation technique to bypass traditional endpoint security measures…
Apple Patches First Exploited iOS Zero-Day of 2025
Apple has released fixes for dozens of vulnerabilities in its mobile and desktop products, including an iOS zero-day exploited in attacks. The post Apple Patches First Exploited iOS Zero-Day of 2025 appeared first on SecurityWeek. This article has been indexed…
IT Security News Hourly Summary 2025-01-28 12h : 23 posts
23 posts were published in the last hour 10:36 : Apple macOS, iPadOS und iOS: : Mehrere Schwachstellen 10:36 : Juniper-Router: Maßgeschneiderte Backdoors warten auf Magic Packets 10:36 : Fix nur vor Ort möglich: Zyxel schickt Firewalls per Update in…
Apple macOS, iPadOS und iOS: : Mehrere Schwachstellen
Apple hat mehrere Schwachstellen in seinen Produkten Safari, iOS, iPadOS und macOS behoben. Ein Angreifer kann diese Schwachstellen ausnutzen, um Schadcode auszuführen, das System oder eine Anwendung zum Absturz bringen, um sensible Benutzerdaten preiszugeben, Dateien zu manipulieren, erweiterte Rechte bis…