Tag: eSecurity Planet

Critical n8n Vulnerability Enables Authenticated RCE

A critical n8n vulnerability allows authenticated users to execute arbitrary code, putting automation workflows at risk. The post Critical n8n Vulnerability Enables Authenticated RCE appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original…

1M Customer Records Allegedly Stolen in Brightspeed Breach

Brightspeed is investigating claims that the Crimson Collective stole data from more than one million customers. The post 1M Customer Records Allegedly Stolen in Brightspeed Breach appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…

Flare Researchers Analyze SafePay Ransomware Leak Data

Flare researchers analyzed SafePay leak data, showing how the group targets regulated SMBs to maximize pressure. The post Flare Researchers Analyze SafePay Ransomware Leak Data appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…

macOS Flaw Enables Silent Bypass of Apple Privacy Controls

A macOS vulnerability (CVE-2025-43530) allows attackers to silently bypass TCC privacy controls and access sensitive user data. The post macOS Flaw Enables Silent Bypass of Apple Privacy Controls appeared first on eSecurity Planet. This article has been indexed from eSecurity…

NordVPN Says Breach Claims Involve Dummy Test Data

NordVPN says breach claims involved only dummy data from an isolated test environment. The post NordVPN Says Breach Claims Involve Dummy Test Data  appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article:…

Critical SmarterMail Bug Enables Unauthenticated File Uploads

A critical SmarterMail flaw allows unauthenticated file uploads, putting thousands of mail servers at risk of remote code execution. The post Critical SmarterMail Bug Enables Unauthenticated File Uploads appeared first on eSecurity Planet. This article has been indexed from eSecurity…

2M Devices at Risk as Kimwolf Botnet Abuses Proxy Networks

The Kimwolf botnet is abusing residential proxies to spread through consumer devices, putting roughly two million systems at risk worldwide. The post 2M Devices at Risk as Kimwolf Botnet Abuses Proxy Networks appeared first on eSecurity Planet. This article has…

Google Tasks Used to Deliver Stealth Phishing Attacks

Attackers are abusing Google Tasks notifications to deliver trusted-domain phishing emails that bypass traditional email security controls. The post Google Tasks Used to Deliver Stealth Phishing Attacks  appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…

Handala Leak Shows Telegram Account Risk, Not iPhone Hacks

The Handala incident shows how Telegram account takeovers can expose sensitive data without compromising entire devices. The post Handala Leak Shows Telegram Account Risk, Not iPhone Hacks appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…

Security Professionals Plead Guilty in ALPHV Ransomware Case

Two U.S. cybersecurity professionals pleaded guilty to working as ALPHV/BlackCat ransomware affiliates, highlighting insider threat risks. The post Security Professionals Plead Guilty in ALPHV Ransomware Case appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…

DarkSpectre Malware Hit 8.8M Browsers via Malicious Extensions

DarkSpectre infected over 8.8 million browser users by abusing trusted extensions and advanced evasion techniques. The post DarkSpectre Malware Hit 8.8M Browsers via Malicious Extensions appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…

Malicious Jackson Lookalike Library Slips Into Maven Central

A malicious Jackson lookalike library was used to distribute Cobalt Strike malware through Maven Central. The post Malicious Jackson Lookalike Library Slips Into Maven Central appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…

Bluetooth Headphones Can Be Weaponized to Hack Phones

High-severity flaws in popular Bluetooth headphones can enable eavesdropping and smartphone hijacking, with many devices still unpatched. The post Bluetooth Headphones Can Be Weaponized to Hack Phones  appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet…

Copilot Studio Feature Enables Silent AI Backdoors

Copilot Studio’s Connected Agents feature can be abused to create silent AI backdoors that bypass visibility and audit controls. The post Copilot Studio Feature Enables Silent AI Backdoors appeared first on eSecurity Planet. This article has been indexed from eSecurity…