Tag: EN

Examining the Risk of AI-Assisted MedusaLocker Ransomware Attacks

Researchers at Cato CTRL have demonstrated that the feature, designed to streamline AI workflows, can be easily weaponized to deploy MedusaLocker ransomware without the user’s knowledge. A new cybersecurity investigation has revealed a critical oversight in Anthropic’s rapidly growing “Claude…

CISA Issues Alert on Actively Exploited Android Zero-Day Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has added two critical Android Framework vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, signaling active exploitation in the wild and prompting immediate action from organizations and device users worldwide. The vulnerabilities CVE-2025-48572…

Implementing Zero Trust on Google Cloud

Cybersecurity now requires more than just perimeter defences. As you adopt microservices, hybrid workloads, and AI pipelines on Google Cloud, identity becomes your new perimeter. Zero Trust means never trust and always verify. It is no longer optional but essential.…

Attackers have a new way to slip past your MFA

Attackers are using a tool called Evilginx to steal session cookies, letting them bypass the need for a multi-factor authentication (MFA) token. This article has been indexed from Malwarebytes Read the original article: Attackers have a new way to slip…