Tag: EN

New Loader “CountLoader” Uses PDFs to Launch Ransomware Attacks

Security researchers have uncovered a sophisticated new malware loader called “CountLoader” that leverages weaponized PDF files to deliver ransomware payloads to victims across multiple regions, with particular focus on Ukrainian targets. CountLoader represents a significant escalation in malware delivery techniques,…

Cybersecurity Today – The Good News Edition

Cybersecurity Today: The Good News Edition In this episode, host Jim Love addresses a previous mistake regarding the location of Yellowknife and announces a special ‘good news’ edition. Key stories include Microsoft’s dismantling of a global phishing-as-a-service operation Raccoon 0365,…

SolarWinds Issues Advisory Following Salesloft Drift Security Breach

SolarWinds Corporation has released an official security advisory in response to a significant data breach involving Salesforce systems. This resulted in unauthorized access to sensitive customer information through compromised OAuth tokens linked to the Salesloft Drift integration. Understanding the Breach…

0-Click ChatGPT Agent Flaw Exposes Gmail Data to Attackers

Researchers have discovered a critical zero-click vulnerability in ChatGPT’s Deep Research agent that allows attackers to silently steal sensitive Gmail data without any user interaction. This sophisticated attack leverages service-side exfiltration techniques, making it invisible to traditional security defenses and representing a significant escalation…

Shifting supply chains and rules test CPS security strategies

Cyber-physical systems are getting harder to protect as the business landscape keeps shifting. Economic pressures, supply chain changes, and new regulations are creating more openings for attackers while complicating how organizations manage security. A new report from Claroty, based on…

The unseen side of malware and how to find it

Security teams rely on threat reports to understand what’s out there and to keep their organizations safe. But a new report shows that these reports might only reveal part of the story. Hidden malware variants are quietly slipping past defenses,…

New infosec products of the week: September 19, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Absolute Security, Catchpoint, Nagomi Security, Neon Cyber, and QuSecure. Absolute Security Rehydrate restores compromised endpoints Rehydrate delivers business continuity endpoint restoration through a fully remote,…

ShadowLeak: Radware Uncovers Zero-Click Attack on ChatGPT

Radware discovered a server-side data theft attack, dubbed ShadowLeak, targeting ChatGPT. OpenAI patched the zero-click vulnerability. Researchers at Radware uncovered a server-side data theft attack targeting ChatGPT, called ShadowLeak. The experts discovered a zero-click vulnerability in ChatGPT’s Deep Research agent when connected to Gmail…

Authorizing access to data with RAG implementations

Organizations are increasingly using large language models (LLMs) to provide new types of customer interactions through generative AI-powered chatbots, virtual assistants, and intelligent search capabilities. To enhance these interactions, organizations are using Retrieval-Augmented Generation (RAG) to incorporate proprietary data, industry-specific…

How Enterprise SEO Solutions Improve Brand Authority

Now, especially in a very competitive environment, it is essential to make your name shine. Enterprise SEO solutions… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: How Enterprise…