Tag: EN

Treasury Sanctions Russian Exploit Brokerage

The U.S. sanctioned Russia-linked Operation Zero for trafficking stolen zero-day exploits tied to national security risks. The post Treasury Sanctions Russian Exploit Brokerage appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article:…

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.  CVE-2022-20775 Cisco Catalyst SD-WAN Path Traversal Vulnerability CVE-2026-20127 Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability  These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal…

Emulating the Mutative BlackByte Ransomware

AttackIQ has released a new attack graph that emulates the behaviors exhibited by BlackByte ransomware, a strain operated under the Ransomware-as-a-Service (RaaS) model that emerged in July 2021. Since its emergence, BlackByte has targeted organizations worldwide, including entities within U.S.…

ShinyHunters Claims Wynn Resorts Data Theft

Wynn Resorts confirmed unauthorized access to employee data after ShinyHunters claimed to have stolen over 800,000 records. The post ShinyHunters Claims Wynn Resorts Data Theft appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…

New IT Rules Mandate Three Hour Deadline for Deepfake Takedowns

For the first time in India’s digital governance landscape, the Union government has formally placed artificial intelligence-generated content within an enforceable regulatory framework, including deepfake videos, synthetic audio fabrications, and digitally altered visuals. It has been announced through a Gazette…

Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

Cybersecurity researchers have disclosed multiple security vulnerabilities in Anthropic’s Claude Code, an artificial intelligence (AI)-powered coding assistant, that could result in remote code execution and theft of API credentials. “The vulnerabilities exploit various configuration mechanisms, including Hooks, Model Context Protocol…