Malicious Script That Gets Rid of ADS, (Wed, Apr 1st)
Today, most malware are called âfilelessâ because they try to reduce their footprint on the infected computer filesystem to the bare minimum. But they need to write s
Today, most malware are called âfilelessâ because they try to reduce their footprint on the infected computer filesystem to the bare minimum. But they need to write s
Ask the Expert: Cybersecurity teams need to expand their field of view to include new, unique threat sources, rather than relying on past, proven threat actors.
Google has fixed the fourth Chrome vulnerability exploited in zero-day attacks since the start of the year. […]
Azure ExpressRoute Direct verbindet lokale Infrastrukturen über dedizierte Ports an weltweit verteilten Peeringstandorten mit dem Microsoft-Backbone. Die Lösung eignet sich für umfangreiche Datentr
CVE-2025-53521: F5 BIG-IP APM Flaw Reclassified as Unauthenticated RCE CVE-2025-Adresse geschuetzt F5 BIG-IP Access Policy Manager (APM) that was initially treated as a denial-of-service condition in 2025, then reclassified recently as a potential unauthenticated remote code execution (RCE) issue in certain deployments. BIG-IP APM often sits directly in the authentication and remote access path, so a pre-auth […]
Das NIS-2-Umsetzungsgesetz erweitert die Anforderungen im Energiewirtschaftsgesetz (EnWG). Erstmals fallen auch digitale Energiedienste wie virtuelle Kraftwerke unter die Regulierung. Der ne
A long-lived NPM access token was used to bypass the GitHub Actions OIDC-based CI/CD publishing workflow and push backdoored package versions.
The post Axios NPM Package Breached in North Korean Suppl
Der Maintainer-Account für das Paket axios auf npm wurde geknackt, um einen Remote-Access-Trojaner für Windows, macOS und Linux einzuschleusen.
Palo Alto Networks has disclosed the details of its analysis of Google Cloud Platform’s Vertex AI.
The post Google Addresses Vertex Security Issues After Researchers Weaponize AI Agents appeared fir
Im Podcast geht es um kürzlich entdeckte Lücken in uraltem Unix, aktuelle Angriffe auf Apple-Geräte, quantensichere Zertifikate fürs Web und einiges mehr.