Automated Credential Harvesting Campaign Exploits React2Shell Flaw
An emerging threat cluster tracked as UAT-Adresse geschuetzt.js apps and using an automated tool to exfiltrate credentials, secrets, and other system data.
An emerging threat cluster tracked as UAT-Adresse geschuetzt.js apps and using an automated tool to exfiltrate credentials, secrets, and other system data.
WatchGuard-Firewalls der Firebox-Serie und die Produkte Dimension und WebBlockerServer sind verwundbar. Sicherheitspatches sind verfĂźgbar.
Medical professionals are not going to stop using AI tools to manage growing workloads. Organizations should prioritize bolstering security protocols to limit their blast radius.
Ein neuer Report Bericht von Omada zeigt, dass obwohl 85 Prozent der Unternehmen KI bereits nutzen, SicherheitslĂźcken dabei die grĂśĂte Sorge sind. Aufgrund unzureichender Reportings wĂźrden viele blind gegenĂźber den Risiken bleiben.
In recognition of 21 generative AI risks, the standards groups recommends that companies take separate but linked approaches to defending GenAI and agentic AI systems.
Wichtige Sicherheitspatches schlieĂen zwei Softwareschwachstellen in der Endpoint-Management-Plattform HCL BigFix.
Einsatzkräfte fordern beim Digitalfunk Breitband und robuste Rßckfallebenen. Der Bund setzt vorerst auf die Modernisierung und Evolution des Bestandsnetzes.
Alleged TrakCare Access, PowerLab Leak, U.S. Driver IDs, Hong Kong HA Data and More SOCRadarâs Dark Web Team identified several new underground posts this week, including an alleged unauthorized access offering tied to TrakCare and InterSystems environments, a small French retailer database leak claim, and multiple high-risk datasets marketed with identity and healthcare-related fields. Another […]
Der axios-Maintainer beschreibt, wie Cyberkriminelle den HTTP-Client mit Schadcode verseuchen konnten. Derweil gibt es ähnliche Attacken auf weitere Maintainer.
Pro-Iran Cyberattacks on Financial Services: 144 Incidents Financial services is the #2 most targeted sector in the entire campaign, and for reasons that are deliberate, documented, and rooted in more than a decade of Iranian cyber doctrine. Between February 28 and April 6, 2026, SOCRadar tracked 1,583 verified incidents across Operation Epic Fury. Of those, […]