Cybersecurity
Cybersecurity
Why Civil Society Says Swiss Data Retention Plans Go Too Far
Civil society groups say expanded data retention would violate fundamental rights
VPNs, messaging apps, and social platforms could be forced to store user...
Cybersecurity
Unit 42 Warns of On Demand Phishing Pages Powered by Legitimate LLM APIs
Attackers can use LLM APIs to generate phishing pages in real time inside a victim’s browser.
Each victim may see a different JavaScript...
Cybersecurity
CrowdStrike and Nord Security bring Falcon protection into NordLayer for SMBs
CrowdStrike Falcon Go and Falcon Enterprise are being integrated into NordLayer for SMB customers.
The bundle combines endpoint protection with business VPN and...
Cybersecurity
Microsoft Adds Another Security Shield to Teams, This Time for Fake Brand Calls
Microsoft Teams will warn users about possible brand impersonation calls from first time external callers.
Users will be able to accept, block, or...
Cybersecurity
FortiGate firewalls targeted in automated account creation and data theft campaign
Attackers are exploiting a FortiGate SSO weakness to create rogue admin accounts.
They are stealing firewall configuration data, likely using automation.
FortiOS 7.4.10...
Cybersecurity
Hackers Found a New Way to Trick Gemini Through Calendar Invites
Researchers found a prompt injection method that used Google Calendar invites to manipulate Gemini.
Attackers could hide instructions inside event details to make...
Cybersecurity
Hacker flaunts stolen government data on Instagram
Nicholas Moore pleaded guilty to repeatedly hacking the US Supreme Court’s electronic filing system.
New court filings say he also accessed AmeriCorps and...
Cybersecurity
Hackers are exploiting a critical WordPress flaw in Modular DS
Modular DS versions 2.5.1 and older have a critical security flaw
Attackers can bypass authentication and gain admin access remotely
The issue is...
Cybersecurity
Pax8 data exposure puts thousands of MSP relationships under scrutiny
Pax8 accidentally emailed a spreadsheet containing sensitive partner and customer business data.
Around 1,800 MSPs were affected through a file shared with fewer...
Cybersecurity
Hackers Allege Massive Theft of Target Source Code After Cyber Incident
Hackers claim to be selling 860GB of internal Target source code and documentation
Sample repositories reference payment, identity, and gift card systems
Target...
Cybersecurity
US Agencies Urged to Patch Actively Exploited Gogs Flaw
Gogs has a high severity flaw that allows remote code execution without authentication.
The vulnerability is actively exploited and hundreds of servers are...
