22 posts were published in the last hour 14:4 : Perplexity’s Comet AI Browser Tricked Into Phishing Scam Within Four Minutes 14:4 : Apple Patches Coruna WebKit Exploit 13:32 : Ericsson US Discloses Data Breach – Hackers Stolen Employees and…
ShinyHunters Threatens Data Leak After Alleged Salesforce Breach
The hacking group ShinyHunters has warned roughly 400 companies that it may publish stolen data online if ransom demands are not met. The group claims it accessed private records through websites built on Salesforce Experience Cloud, a platform companies…
Perplexity’s Comet AI Browser Tricked Into Phishing Scam Within Four Minutes
Agentic browser at risk Agentic web browsers that use AI tools to autonomously do tasks across various websites for a user could be trained and fooled into phishing attacks. Hackers exploit the AI browsers’ tendency to assert their actions and…
Apple Patches Coruna WebKit Exploit
Apple has recently extended security patches for a critical WebKit vulnerability to older device models after discovering the flaw was exploited by the Coruna exploit kit. This article has been indexed from CyberMaterial Read the original article: Apple Patches Coruna…
Ericsson US Discloses Data Breach – Hackers Stolen Employees and Customers Data
The U.S. subsidiary of a Swedish telecommunications multinational has disclosed a data breach exposing the personal information of employees and customers. The incident did not occur on Ericsson’s internal network, but rather targeted one of the company’s third-party service providers.…
Paloalto Cortex XDR Broker Vulnerability Attackers to Obtain and Modify Sensitive Information
A security advisory has been issued for a newly discovered vulnerability affecting the Cortex XDR Broker Virtual Machine (VM). This flaw could allow a highly privileged, authenticated attacker to access and alter sensitive system information. Fortunately, the issue was discovered…
This Android vulnerability can break your lock screen in under 60 seconds
Researchers showed how attackers could pull encryption keys, recover the PIN, and access sensitive data from affected devices. This article has been indexed from Malwarebytes Read the original article: This Android vulnerability can break your lock screen in under 60…
Meta Launches New Protection Tools as It Helps Disrupt Scam Centers
The social media giant has disabled more than 150,000 accounts powering scam centers in Asia. The post Meta Launches New Protection Tools as It Helps Disrupt Scam Centers appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Socure Launch enables startups to deploy identity verification and fraud controls
Socure has announced Socure Launch, providing every organization with immediate access to industry tested, pre-built identity and fraud solutions. This marks a new era for Socure, providing startups an enterprise level of identity verification, fraud detection, and compliance decisioning. With…
WhatsApp is giving parents peace of mind over their kids’ privacy
WhatsApp has introduced parent-managed accounts designed for pre-teens, giving parents and guardians new controls over contacts, group participation, and how the app is used. These accounts are limited to messaging and calling and do not include access to features such…
Mimecast adds AI investigation and adaptive controls to manage human risk
Mimecast has announced major platform capabilities designed for a new enterprise reality as AI agents and automated workflows scale across the business and establish the human layer as the new security control plane. According to Mimecast’s The State of Human…
ENISA advisory examines package manager security risks
Developers install external libraries with a single command, and that step can introduce more code than expected into a project environment. Dependency resolution inside package managers extends software supply chains across large collections of external components. ENISA’s Technical Advisory for…
Meta Adds New Anti-Scam Tools
Meta is rolling out enhanced security measures across its social media and messaging platforms to preemptively block fraudulent activities. This article has been indexed from CyberMaterial Read the original article: Meta Adds New Anti-Scam Tools
235K Affected In Wisconsin Ambulance Hack
Wisconsin’s largest ambulance provider, Bell Ambulance, recently confirmed that a 2024 cyberattack by the Medusa ransomware gang compromised the sensitive data of over 235,000 individuals. This article has been indexed from CyberMaterial Read the original article: 235K Affected In Wisconsin…
Hackers Hijack Bonk.fun Domain
The Bonk.fun team has warned users to avoid their website following a security breach where hackers used a compromised account to deploy a malicious wallet-draining prompt. This article has been indexed from CyberMaterial Read the original article: Hackers Hijack Bonk.fun…
Iran-Linked Hackers Hit Albania Parliament
Albania’s parliament recently reported a sophisticated cyberattack intended to wipe data and disable internal systems, though the official website remained functional. This article has been indexed from CyberMaterial Read the original article: Iran-Linked Hackers Hit Albania Parliament
WhatsApp Launches Parent-Managed Accounts
WhatsApp is introducing specialized accounts for pre-teens that allow parents to oversee contact lists and group memberships. This article has been indexed from CyberMaterial Read the original article: WhatsApp Launches Parent-Managed Accounts
AI-Driven Phishing Attacks Bypass Email Filters, Land in Inboxes
AI-generated phishing is rapidly reshaping email risk, with more attacks slipping past filters and landing directly in users’ inboxes, even though AI-generated emails remain a minority of total phishing. The human element remains central: 68% of breaches involve people, and…
Ally WordPress Plugin Flaw Exposes Over 200,000 Websites to Attacks
The issue allows attackers to inject SQL queries and extract sensitive information from the database. The post Ally WordPress Plugin Flaw Exposes Over 200,000 Websites to Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
SOC Prime’s DetectFlow Enterprise moves threat detection to the data ingestion layer
SOC Prime has announced the release of DetectFlow Enterprise, a solution that brings real-time threat detection to the ingestion layer, turning data pipelines into detection pipelines. Running tens of thousands of Sigma detections on live Kafka streams with millisecond MTTD…
Zscaler enhances data sovereignty controls with regional processing and logging
Zscaler has expanded its data sovereignty capabilities globally, powered by the Zscaler Zero Trust Exchange cloud security platform. For global enterprises, the conflict between protecting data and enabling cross-border collaboration is a major compliance and business challenge to growth. Zscaler…
CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws
CISA issued urgent directive as attackers exploit Cisco SD-WAN flaw granting admin access to networks This article has been indexed from www.infosecurity-magazine.com Read the original article: CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws
Ask Me Anything Cyber: Threat Hunters
This special edition features Teresa Pereira, Cyber Threat Hunter at Siemens Energy This article has been indexed from CyberMaterial Read the original article: Ask Me Anything Cyber: Threat Hunters
4,000+ Routers Compromised by KadNap Malware Exploiting Vulnerabilities
A newly uncovered malware campaign dubbed KadNap has silently conscripted more than 14,000 internet‑exposed routers and edge devices into a stealth proxy botnet, with Asus routers the primary victims. More than 60% of known victims are located in the United States, with…