Ransomware’s New Era: Moving at AI Speed
Threat actors bypass security tools and use AI to launch faster ransomware attacks that exploit valid credentials and target data.
Threat actors bypass security tools and use AI to launch faster ransomware attacks that exploit valid credentials and target data.
The idea of a "human in the loop" in AI deployment was challenged during a security executive panel at the RSAC 2026 Conference this week.
A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran’s time zone or have Farsi set as the default language.
A phishing campaign targeting healthcare, government, hospitality, and education sectors in various countries uses several evasion techniques to avoid detection.
AstraZeneca Data Breach: What You Need to Know A newly surfaced Dark Web post is drawing attention to an alleged AstraZeneca data breach linked to the LAPSUS$ threat group. Based on the materials reviewed, the claim goes beyond a routine leak post and suggests possible exposure of internal code repositories, access-related data, cloud and infrastructure […]
CVE-2025-32975: Quest KACE SMA SSO Authentication Bypass Enables Admin Takeover Quest KACE Systems Management Appliance (SMA) has a maximum-severity vulnerability, CVE-2025-32975, that allows an attacker to bypass authentication in the product’s SSO authentication handling. An unauthenticated attacker can potentially impersonate legitimate users and work toward full administrative takeover. Reporting in March 2026 tied suspicious, real-world […]
Trend Micro warnt, dass der derzeitige Vorteil der Verteidiger in der Cybersecurity schwindet, da Kriminelle zunehmend lernen, KI-gestützte Technologien effektiv zu nutzen und dadurch schneller reagieren können als bestehende Schutzmechanismen implementiert werden.
Drei Sicherheitslücken, die bereits beim März-Patchday von Microsoft behoben wurden, erhalten nun einen Hotpatch, der keinen Neustart mehr erfordert. Dies war nicht für alle Nutzer möglich, sodass Microsoft eine schnelle Alternative bieten musste.
Attackers can execute arbitrary code without authentication if Oracle’s Identity or Web Services Managers are exposed to the Web.