Aggregator
Don’t just fight fraud, hunt it
As traditional fraud markers become obsolete, we must treat digital identity as critical infrastructure and adopt a layered, real-time defense to neutralize sophisticated crime rings.
The post Don’t just fight fraud, hunt it appeared first on CyberScoop.
OPSWAT adds predictive AI engine to MetaDefender for pre-execution threat detection
OPSWAT has announced OPSWAT Predictive Alin AI, its first proprietary AI-based threat detection engine for the MetaDefender Platform. This AI-based innovation introduces a new category of capability within the MetaDefender Platform, a high-confidence predictive layer that works alongside existing detection and prevention engines to assess malicious intent before execution, driving greater efficiency across the platform. This enables organizations to act immediately, while minimizing the operational impacts of false positives. “At OPSWAT, we’ve always believed that … More →
The post OPSWAT adds predictive AI engine to MetaDefender for pre-execution threat detection appeared first on Help Net Security.
ИИ стерпит всё, а жена вряд ли. Украденная база откровенных чатов MyLovelyAI — идеальное оружие для кибершантажа
New macOS Malware notnullOSX Targets Crypto Wallets Over $10K
How Phishing Is Targeting Germany’s Economy: Active Threats from Finance to Manufacturing
Germany’s economy is a precision machine: finance fuels it, manufacturing builds it, telecom connects it, IT optimizes it, and healthcare sustains it. The country sits at the crossroads of industrial power and digital transformation, making it irresistibly attractive to attackers. In this article, we explore real-world attacks targeting five critical German industries, analyzed by ANY.RUN’s analysts using Interactive […]
The post How Phishing Is Targeting Germany’s Economy: Active Threats from Finance to Manufacturing appeared first on ANY.RUN's Cybersecurity Blog.
Acrobat Reader zero-day exploited in the wild for many months
Unknown attackers have exploited a zero-day Adobe Acrobat Reader vulnerability since November 2025 and possibly even earlier, security researcher Haifei Li has discovered. PDF files carry the exploit Haifei Li is one of the creators of EXPMON, a sandbox-based cybersecurity system for detecting advanced file-based exploits. It does so by analyzing suspicious files submitted through its public web interface or API. “Just few weeks ago, on March 26, someone submitted a PDF sample to EXPMON. … More →
The post Acrobat Reader zero-day exploited in the wild for many months appeared first on Help Net Security.
CVE-2023-2276 | WooCommerce Memberships for Multivendor Marketplace Plugin authorization (ID 2907455)
CVE-2023-2732 | MStore API Plugin up to 3.9.2 on WordPress improper authentication
CVE-2023-2500 | Go Pricing Plugin up to 3.3.19 on WordPress injection
CVE-2023-2734 | MStore API Plugin up to 3.9.1 on WordPress improper authentication
CVE-2023-2733 | MStore API Plugin up to 3.9.0 on WordPress improper authentication
CVE-2023-2987 | Wordapp Plugin up to 1.5.0 on WordPress Cryptographic Signature authorization
CVE-2023-2436 | Blog-in-Blog Plugin up to 1.1.1 on WordPress Shortcode cross site scripting
CVE-2023-2435 | Blog-in-Blog Plugin up to 1.1.1 on WordPress Shortcode file inclusion
The Identity Gap Blocking Agentic AI at Scale
FBI 称 2025 年美国因网络犯罪损失 210 亿美元
The Hidden Security Risks of Shadow AI in Enterprises
Hackers Impersonate Linux Foundation Leader in Slack to Target Open Source Developers
Open source developers are facing a growing and sophisticated threat — one that does not rely on complex exploits or hidden vulnerabilities but instead uses something far simpler: trust. A social engineering campaign is actively targeting developers through Slack, where an attacker poses as a respected Linux Foundation community leader to trick victims into downloading […]
The post Hackers Impersonate Linux Foundation Leader in Slack to Target Open Source Developers appeared first on Cyber Security News.
Intruder expands cloud security with agentless container image scanning
Intruder has announced the release of Container Image Scanning, a new upgrade to its cloud security capabilities that automatically scans container images for vulnerabilities, granting customers actionable insight into container risk without deploying and maintaining scanning agents across their estates. Leveraging existing integrations with major cloud providers, Intruder supports Amazon Web Services Elastic Container Registry, Google Cloud Artifact Registry and Azure Container Registry. New images and updated versions are scanned daily for vulnerabilities, and users … More →
The post Intruder expands cloud security with agentless container image scanning appeared first on Help Net Security.