Hackers hijack real-world cargo, stealing shipments like coffee through cyberattacks. The post Hackers Steal Your Coffee: Cyber Gangs Hijack Real-World Cargo appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Hackers Steal…
Tag: eSecurity Planet
Ex-L3Harris Exec Sold U.S. Cyber Secrets to Russia, Pleads Guilty
Former L3Harris executive Peter Williams admitted selling U.S. cyber tools to a Russian broker, endangering national security. The post Ex-L3Harris Exec Sold U.S. Cyber Secrets to Russia, Pleads Guilty appeared first on eSecurity Planet. This article has been indexed from…
Sketchy Graphics: Windows GDI Flaws Open RCE and Data Loss
Check Point finds Windows GDI bugs enabling RCE and data leaks. Learn how Microsoft patched and how to protect your systems. The post Sketchy Graphics: Windows GDI Flaws Open RCE and Data Loss appeared first on eSecurity Planet. This article…
Unauthenticated RCE in WSUS Puts Organizations at Risk
Microsoft patches WSUS RCE flaw letting attackers gain SYSTEM access. Learn how to secure servers and prevent exploitation. The post Unauthenticated RCE in WSUS Puts Organizations at Risk appeared first on eSecurity Planet. This article has been indexed from eSecurity…
Nation-State Hackers Breach Major Telecom Provider Ribbon Communications
Nation-state hackers breached Ribbon Communications, exposing data and highlighting rising cyber threats to critical infrastructure. The post Nation-State Hackers Breach Major Telecom Provider Ribbon Communications appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…
Airstalk Malware Turns MDM Tools into Covert Spy Channels
Airstalk discovery reveals nation-state hackers exploiting trusted tools to infiltrate supply chains undetected. The post Airstalk Malware Turns MDM Tools into Covert Spy Channels appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original…
Aardvark: OpenAI’s Autonomous AI Agent Aims to Redefine Software Security
OpenAI’s GPT-5–powered Aardvark autonomously finds and fixes software vulnerabilities, redefining AI-driven cybersecurity. The post Aardvark: OpenAI’s Autonomous AI Agent Aims to Redefine Software Security appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original…
Progress Fixes High-Severity MOVEit Transfer Vulnerability
Progress patches a MOVEit Transfer flaw letting attackers exhaust resources and cause denial-of-service without authentication. The post Progress Fixes High-Severity MOVEit Transfer Vulnerability appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article:…
AzureHound Tool Weaponized to Map Azure and Entra ID Environments
Threat actors misuse AzureHound to map Azure and Entra ID, turning a security tool into a powerful cloud reconnaissance weapon. The post AzureHound Tool Weaponized to Map Azure and Entra ID Environments appeared first on eSecurity Planet. This article has…
AdaptixC2: When Open-Source Tools Become Weapons
Cybercriminals are turning AdaptixC2, an open-source security tool, into a weapon for ransomware attacks. The post AdaptixC2: When Open-Source Tools Become Weapons appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: AdaptixC2:…
UNC6384 Exploits Zero-Day to Target European Diplomats
Chinese-linked group UNC6384 targets European diplomats with a Windows shortcut exploit to deploy PlugX malware. The post UNC6384 Exploits Zero-Day to Target European Diplomats appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original…
New Exploit Can Crash Chromium Browsers Worldwide
A new exploit called Brash can crash Chromium browsers in seconds by overloading the tab title API. The post New Exploit Can Crash Chromium Browsers Worldwide appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…
Hidden npm Malware Exposes New Supply Chain Weakness
Hidden npm malware steals developer credentials, exposing major software supply chain risks in the open-source ecosystem. The post Hidden npm Malware Exposes New Supply Chain Weakness appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…
Public Exploit Code Released for Critical BIND 9 DNS Vulnerability
A public exploit for a critical BIND 9 flaw renews DNS cache-poisoning risk, enabling forged records and traffic redirection. The post Public Exploit Code Released for Critical BIND 9 DNS Vulnerability appeared first on eSecurity Planet. This article has been…
Canada Warns of Cyberattacks Targeting Industrial Control Systems
Hackers breached Canadian water, energy, and farm systems, prompting national warnings to secure industrial control networks. The post Canada Warns of Cyberattacks Targeting Industrial Control Systems appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read…
Russian-Linked Cyberattacks Continue to Target Ukrainian Organizations
Sandworm targets Ukrainian networks using stealthy, low-malware attacks that exploit legitimate Windows tools to evade detection. The post Russian-Linked Cyberattacks Continue to Target Ukrainian Organizations appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…
When Windows Helpers Turn Hostile: DLL Hijacks Return
A Windows flaw in the Narrator tool enables DLL hijacks and persistence. Learn how attackers exploit it and how to harden systems. The post When Windows Helpers Turn Hostile: DLL Hijacks Return appeared first on eSecurity Planet. This article has…
Herodotus: The Android Trojan That Types Like a Human
The new Android Trojan Herodotus mimics human behavior to evade modern anti-fraud systems. The post Herodotus: The Android Trojan That Types Like a Human appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original…
SessionReaper Comes Calling: Magento Exploit Haunts Halloween
A critical Magento flaw, SessionReaper (CVE-2025-54236), is exploited in the wild. Learn how to patch and protect your e-commerce systems. The post SessionReaper Comes Calling: Magento Exploit Haunts Halloween appeared first on eSecurity Planet. This article has been indexed from…
Ubuntu Kernel Flaw Opens the Door to Privilege Escalation
A new Ubuntu kernel flaw lets local attackers gain root access through patch inconsistencies. The post Ubuntu Kernel Flaw Opens the Door to Privilege Escalation appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the…