Tag: EN

US Nuclear Weapons Data Compromised via SharePoint Zero-Day Attack

A significant cybersecurity breach has exposed vulnerabilities in critical US government infrastructure, as the National Nuclear Security Administration (NNSA) was reportedly compromised through a Microsoft SharePoint zero-day exploit linked to Chinese government-affiliated hacking groups. Chinese Hackers Target Critical Infrastructure The…

A Special Mission to Nowhere

Following the Israel-Iran ceasefire, FortiGuard Labs uncovered a phishing campaign posing as a private jet evacuation service from Tel Aviv to New York. Learn how attackers used crisis-driven fear to steal personal and financial data.        This article has been…

Should We Trust AI? Three Approaches to AI Fallibility

Experts unpack the risks of trusting agentic AI, arguing that fallibility, hype, and a lack of transparency demand caution—before automation outpaces our understanding. The post Should We Trust AI? Three Approaches to AI Fallibility appeared first on SecurityWeek. This article…

Lumma Stealer Masquerades as Pirated Apps to Steal Logins and Data

Lumma Stealer, a notorious information-stealing malware-as-a-service (MaaS) platform, has swiftly reemerged after a coordinated global law enforcement operation in May 2025. The U.S. Department of Justice, alongside international partners, seized approximately 2,300 malicious domains integral to Lumma’s command-and-control (C&C) infrastructure,…

Coyote Banking Trojan First to Abuse Microsoft UIA

Akamai’s analysis of the Coyote malware revealed that it abuses Microsoft’s UIA accessibility framework to obtain data. The post Coyote Banking Trojan First to Abuse Microsoft UIA appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

New ZuRu Malware Variant Targets macOS via Termius SSH Exploit

A sophisticated new variant of the macOS.ZuRu malware, originally identified in 2021, has resurfaced, employing a trojanized version of the Termius SSH client to deploy a modified Khepri command-and-control (C2) beacon. This iteration, detected in late May 2025, demonstrates advanced…

Redefining DNS Protection

ADNS leverages Precision AI®, our proprietary AI system combining deep learning, machine learning and generative AI to deliver DNS-layer protection. The post Redefining DNS Protection appeared first on Palo Alto Networks Blog. This article has been indexed from Palo Alto…