A new quality of malware
Researchers from security company ESET have discovered an unusual malware that uses artificial intelligence in a new way.
New attack technique discovered
Passkeys and FIDO authentication are designed to provide robust protection against phishing attacks. However, researchers have now discovered a critical loophole that can undermine even strong passkey authentication. Attackers can exploit a targeted downgrade technique to force users into using insecure login methods. This risk grows as FIDO adoption
Back door for hackers
Security researchers from Check Point have discovered a serious vulnerability in the popular AI-based developer tool Cursor. The vulnerability allows attackers to permanently inject malicious code into development projects completely unnoticed.
New cyber espionage campaign
Security researchers at Arctic Wolf Labs have discovered a sophisticated cyberattack campaign targeting the Turkish defense industry.
Recipe for a disaster
From a harmless kitchen helper to a cyber threat – the case of the “RecipeLister” app shows how cleverly malware is disguised today.
From technically sophisticated to disturbingly creative
The infamous Trojan from 2019 is once again making headlines. Security researchers from ESET have discovered that AsyncRAT is now even more dangerous and has spread much more widely thanks to new variants.
Data from various Infostealers
Several collections of login data reveal one of the largest data thefts in history. As cybernews reports, a total of 16 billion login credentials were exposed. The data most likely originated from various infostealers.
BeyondTrust Report 2025 warns
Microsoft is increasingly in the crosshairs of hackers. According to the latest Microsoft Vulnerabilities Report from security company BeyondTrust, a total of 1,360 vulnerabilities were recorded in Microsoft systems in 2024 – more than ever before.
Incident response plan necessary
ClickFix is already being used by a number of nation-state actors such as APT 28 and Kimsuky. The distribution of stealer malware such as Lumma Stealer via the social engineering campaign is particularly popular.
Gesundheitsholding Lüneburg GmbH
Lüneburg
Gesundheitsholding Lüneburg GmbH
Lüneburg
spectrumK GmbH
Berlin, Essen (Ruhr), Schwerin (Mecklenburg-Vorpommern)
Meistgelesene Artikel
27. Oktober 2025
24. Oktober 2025
23. Oktober 2025
20. Oktober 2025
20. Oktober 2025