security

📅 Kalender

< March 2026 >
Mo
Di
Mi
Do
Fr
Sa
So
1
2
3
4
5
6
7
8
9
1011
12
13
14
15
16
1718192021222324252627
28
29
30
31
Gefiltert nach: 24. März 2026
security

KI-Tools in der Entwicklung schaffen neue Angriffsflächen

KI-gestützte Entwicklung steigert die Produktivität, doch eine Studie zeigt: Nach nur fünf Iterationen nehmen kritische Sicherheitslücken um 37,6 Prozent zu. Prompt-Injection-Angriffe, autonome Spionagekampagnen und verwundbare KI-Frameworks machen deutlich, dass Geschwindigkeit nicht vor Sicherheit gehen darf. Sieben Maßnahmen helfen, KI-Risiken zu begrenzen.

Mehr lesen →
soc

TeamPCP Unleashes Iran-Targeted CanisterWorm Kubernetes Wiper

CanisterWorm’s latest evolution turns TeamPCP’s cloud-native toolkit into a geopolitically tuned wiper, capable of bricking entire Kubernetes clusters when it lands on systems configured for Iran. The campaign reuses the same Internet Computer Protocol (ICP) canister C2 and backdoor infrastructure seen in the earlier Trivy and NPM CanisterWorm incidents. However, it now adds selective destruction […]

The post TeamPCP Unleashes Iran-Targeted CanisterWorm Kubernetes Wiper appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Mehr lesen →
soc

Dell Wyse Management Flaws Could Lead to Full System Compromise

Security researcher Aleksandr Zhurnakov from PT Security has discovered a critical exploit chain in Dell Wyse Management Suite. By combining seemingly minor logic flaws, an attacker can achieve unauthenticated remote code execution. This attack targets the On-Premises version of the software, impacting both Standard and Pro editions. Vulnerability Details The exploit relies on two newly […]

The post Dell Wyse Management Flaws Could Lead to Full System Compromise appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Mehr lesen →
soc

Multiple Vulnerabilities in TP-Link Devices Enable Arbitrary Command Execution

TP-Link recently published a critical security advisory addressing four high-severity vulnerabilities in its Archer series routers. The flaws impact the Archer NX200, NX210, NX500, and NX600 models. If successfully exploited, these vulnerabilities enable threat actors to bypass authentication, execute unauthorised operating system commands, and manipulate sensitive device configuration files. Vulnerability Details The advisory highlights a […]

The post Multiple Vulnerabilities in TP-Link Devices Enable Arbitrary Command Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Mehr lesen →