DarkCloud Stealer Targets Windows Systems to Harvest Login Credentials and Financial Data
08
Aug
2025

DarkCloud Stealer Targets Windows Systems to Harvest Login Credentials and Financial Data

A new variant of the DarkCloud information-stealer malware has been observed targeting Microsoft Windows systems, primarily affecting Windows users by…

AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims
08
Aug
2025

AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims

Cybersecurity researchers are drawing attention to a new campaign that’s using legitimate generative artificial intelligence (AI)-powered website building tools like…

08
Aug
2025

The Worst AI Metric

The “how many r’s in strawberry” test for AI intelligence is dumb. As a writer to write a quality sentence…

A Misconfiguration That Haunts Corporate Streaming Platforms Could Expose Sensitive Data
08
Aug
2025

A Misconfiguration That Haunts Corporate Streaming Platforms Could Expose Sensitive Data

Top streaming services like Netflix and Disney+ have made sustained investments over the years to lock their content down. Whenever…

Axis Camera Server Vulnerabilities Expose Thousands of Organizations to Attack
08
Aug
2025

Axis Camera Server Vulnerabilities Expose Thousands of Organizations to Attack

Claroty’s Team82 research unit has unveiled four vulnerabilities affecting Axis Communications’ widely deployed video surveillance ecosystem, potentially endangering thousands of…

Ingram Micro restores global operations following hack
08
Aug
2025

Financially motivated cluster a key player in ToolShell exploitation

A financially motivated threat actor has been involved in a cluster of activity linked to the ToolShell vulnerability in Microsoft…

Microsoft’s software licensing playbook is a national security risk
08
Aug
2025

Microsoft: An organization without a response plan will be hit harder by a security incident

LAS VEGAS — Businesses that don’t treat security with the gravity it requires — exhibited by lackluster or nonexistent preparation,…

Gavel
08
Aug
2025

U.S. Judiciary confirms breach of court electronic records service

The U.S. Federal Judiciary confirms that it suffered a cyberattack on its electronic case management systems hosting confidential court documents…

PyPI Issues Advisory to Prevent ZIP Parser Confusion Attacks on Python Package Installers
08
Aug
2025

PyPI Issues Advisory to Prevent ZIP Parser Confusion Attacks on Python Package Installers

The Python Package Index (PyPI) has announced new restrictions aimed at mitigating ZIP parser confusion attacks that could exploit discrepancies…

Research reveals possible privacy gaps in Apple Intelligence’s data handling
08
Aug
2025

Research reveals possible privacy gaps in Apple Intelligence’s data handling

LAS VEGAS — One of the big worries during the generative AI boom is where exactly data is traveling when…

Are You Sending the Wrong Signals?
08
Aug
2025

Are You Sending the Wrong Signals?

The Salt team has spent the last 5-10 years producing blogs, comparison documents and webinars which highlight our credentials versus…

Windows UAC Bypass Exploits Character Map Tool for Privilege Escalation
08
Aug
2025

Windows UAC Bypass Exploits Character Map Tool for Privilege Escalation

Cybersecurity researchers have uncovered a new technique that allows attackers to bypass Windows User Account Control (UAC) protections by exploiting…