These sorts of attacks reveal growing adversary interest in secure messaging apps used by high-value targets for communication, Google says.
Автор: Jai Vijayan, Contributing Writer
Xerox Printer Vulnerabilities Enable Credential Capture
Attackers are using patched bugs to potentially gain unfettered access to an organization’s Windows environment under certain conditions.
President Trump to Nominate Former RNC Official as National Cyber Director
Sean Cairncross will be one of the primary advisers to the administration on national cybersecurity matters.
Microsoft’s February Patch a Lighter Lift Than January’s
But there’s plenty in it — including two zero-days — that need immediate attention.
XE Group Shifts From Card Skimming to Supply Chain Attacks
The likely Vietnam-based threat actor has been using two zero-days in VeraCore’s warehouse management software in some of its latest cyberattacks.
DeepSeek Phishing Sites Pursue User Data, Crypto Wallets
Riding the wave of notoriety from the Chinese company’s R1 AT chatbot, attackers are spinning up lookalike sites for different malicious use cases.
Abandoned AWS Cloud Storage: A Major Cyberattack Vector
New research highlights how bad actors could abuse deleted AWS S3 buckets to create all sorts of mayhem, including a SolarWinds-style supply chain attack.
‘Constitutional Classifiers’ Technique Mitigates GenAI Jailbreaks
Anthropic says its Constitutional Classifiers approach offers a practical way to make it harder for bad actors to try and coerce an AI model off its guardrails.
PrintNightmare Aftermath: Windows Print Spooler is Better. What’s Next?
While Microsoft has boosted the security of Windows Print Spooler in the three years since the disclosure of the PrintNightmare vulnerability, the service remains a spooky threat that organizations cannot afford to ignore.
Researchers Uncover Lazarus Group Admin Layer for C2 Servers
The threat actor is using a sophisticated network of VPNs and proxies to centrally manage command-and-control servers from Pyongyang.