security

📅 Kalender

< February 2026 >
Mo
Di
Mi
Do
Fr
Sa
So
1
2
3
4
5
6
7
8
9
1011
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
security

How Are You Blocking Open Source Reconnaissance Tools?

How Are You Blocking Open Source Reconnaissance Tools? Today, a large portion of internet traffic is generated by automated systems that continuously scan and interact with internet-facing infrastructure. These systems are known as reconnaissance tools, or benign scanners, and are designed to map the internet for legitimate purposes, such as security research, vulnerability discovery, and […]

Mehr lesen →
soc

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-53521 F5 BIG-IP Remote Code Execution Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant […]

Mehr lesen →
security

ShadowPrompt: Zero-Click Prompt Injection Chain in Anthropic’s Claude Chrome Extension

ShadowPrompt: Zero-Click Prompt Injection Chain in Anthropic’s Claude Chrome Extension A vulnerability chain nicknamed ShadowPrompt affected Anthropic’s official Claude Google Chrome extension. Simply visiting a malicious webpage could allow an attacker to inject prompts into Claude as if the user typed them. This matters because routine browsing can become an AI control-plane risk, especially for […]

Mehr lesen →