AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
12
Jun
2025

AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar

Jun 12, 2025The Hacker NewsArtificial Intelligence / SaaS Security AI is changing everything — from how we code, to how…

Apple encryption row: Does law enforcement need to use Technical Capability Notices?
12
Jun
2025

Apple encryption row: Does law enforcement need to use Technical Capability Notices?

How far are criminal investigations inhibited by the wide availability of end-to-end encryption (E2E)? The Home Office and UK law…

AitM Phishing Attacks Targeting Microsoft 365 and Google to Steal Login Credentials
12
Jun
2025

AitM Phishing Attacks Targeting Microsoft 365 and Google to Steal Login Credentials

Organizations worldwide are facing an unprecedented surge in sophisticated phishing attacks that specifically target Microsoft 365 and Google accounts through…

Privilege Escalation in PAN-OS Web Interface Allows Admin Users to Perform Root Actions
12
Jun
2025

Privilege Escalation in PAN-OS Web Interface Allows Admin Users to Perform Root Actions

Palo Alto Networks disclosed a medium-severity command injection vulnerability on June 11, 2025, designated as CVE-2025-4231, affecting the management web…

EchoLeak Zero-Click AI Attack in Microsoft Copilot Exposes Company Data
12
Jun
2025

New ‘Zero-Click’ AI Flaw Found in Microsoft 365 Copilot, Exposing Data

Cybersecurity firm Aim Labs has uncovered a serious new security problem, named EchoLeak, affecting Microsoft 365 (M365) Copilot, a popular…

How to Address the Expanding Security Risk
12
Jun
2025

How to Address the Expanding Security Risk

Human identities management and control is pretty well done with its set of dedicated tools, frameworks, and best practices. This…

GitLab
12
Jun
2025

GitLab patches high severity account takeover, missing auth issues

GitLab has released security updates to address multiple vulnerabilities in the company’s DevSecOps platform, including ones enabling attackers to take…

Threat Actors Allegedly Selling MaaS Botnet on Hackers Forums
12
Jun
2025

Threat Actors Allegedly Selling MaaS Botnet on Hackers Forums

Threat actors are allegedly offering the complete source code of a sophisticated Malware-as-a-Service (MaaS) botnet for sale.  This advanced malicious…

Trend Micro Apex One Zero-Day Vulnerability Enables Attackers to Inject Malicious Code
12
Jun
2025

Trend Micro Apex One Zero-Day Vulnerability Enables Attackers to Inject Malicious Code

Trend Micro has issued an urgent security bulletin addressing five critical vulnerabilities in its Apex One endpoint security platform that…

Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
12
Jun
2025

Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction

A novel attack technique named EchoLeak has been characterized as a “zero-click” artificial intelligence (AI) vulnerability that allows bad actors…

Sweden gets help pulling its sovereign AI socks up
12
Jun
2025

Sweden gets help pulling its sovereign AI socks up

Financiers picked up the pace of funding in artificial intelligence (AI) infrastructure in Sweden last month, after an urgent government…

U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog
12
Jun
2025

SinoTrack GPS device flaws allow remote vehicle control and location tracking

SinoTrack GPS device flaws allow remote vehicle control and location tracking Pierluigi Paganini June 12, 2025 Two vulnerabilities in SinoTrack…