Attackers are using patched bugs to potentially gain unfettered access to an organization’s Windows environment under certain conditions.
Автор: Jai Vijayan, Contributing Writer
President Trump to Nominate Former RNC Official as National Cyber Director
Sean Cairncross will be one of the primary advisers to the administration on national cybersecurity matters.
Microsoft’s February Patch a Lighter Lift Than January’s
But there’s plenty in it — including two zero-days — that need immediate attention.
XE Group Shifts From Card Skimming to Supply Chain Attacks
The likely Vietnam-based threat actor has been using two zero-days in VeraCore’s warehouse management software in some of its latest cyberattacks.
DeepSeek Phishing Sites Pursue User Data, Crypto Wallets
Riding the wave of notoriety from the Chinese company’s R1 AT chatbot, attackers are spinning up lookalike sites for different malicious use cases.
Abandoned AWS Cloud Storage: A Major Cyberattack Vector
New research highlights how bad actors could abuse deleted AWS S3 buckets to create all sorts of mayhem, including a SolarWinds-style supply chain attack.
‘Constitutional Classifiers’ Technique Mitigates GenAI Jailbreaks
Anthropic says its Constitutional Classifiers approach offers a practical way to make it harder for bad actors to try and coerce an AI model off its guardrails.
PrintNightmare Aftermath: Windows Print Spooler is Better. What’s Next?
While Microsoft has boosted the security of Windows Print Spooler in the three years since the disclosure of the PrintNightmare vulnerability, the service remains a spooky threat that organizations cannot afford to ignore.
Researchers Uncover Lazarus Group Admin Layer for C2 Servers
The threat actor is using a sophisticated network of VPNs and proxies to centrally manage command-and-control servers from Pyongyang.
OAuth Flaw Exposed Millions of Airline Users to Account Takeovers
The now-fixed vulnerability involved a major travel services company that’s integrated with dozens of airline websites worldwide.