Aggregator
BQTLOCK Ransomware Attacking Windows Users Via Telegram to Encrypt Files and Delete Backup
Security researchers have uncovered a new Ransomware-as-a-Service (RaaS) strain named BQTLOCK that is actively targeting Windows users through Telegram channels and dark web forums. Since mid-July, affiliates of the service have been distributing a ZIP archive containing a malicious executable that encrypts a wide range of file types, appends a custom “.bqtlock” extension, and deletes […]
The post BQTLOCK Ransomware Attacking Windows Users Via Telegram to Encrypt Files and Delete Backup appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Salesforce Patches Critical ForcedLeak Bug Exposing CRM Data via AI Prompt Injection
ForcedLeak Flaw in Salesforce Agentforce AI Agent Exposed CRM Data
GitHub под прицелом. Сервис для программистов могут приравнять к соцсетям, чтобы ограничить доступ детям
Qilin
You must login to view this content
Qilin
You must login to view this content
Qilin
You must login to view this content
XCSSET evolves again: Analyzing the latest updates to XCSSET’s inventory
Microsoft Threat Intelligence has uncovered a new variant of the XCSSET malware, which is designed to infect Xcode projects, typically used by software developers building Apple or macOS-related applications.
The post XCSSET evolves again: Analyzing the latest updates to XCSSET’s inventory appeared first on Microsoft Security Blog.
True Threat Prevention Demands Browser Security & File Sanitization
The post True Threat Prevention Demands Browser Security & File Sanitization appeared first on Votiro.
The post True Threat Prevention Demands Browser Security & File Sanitization appeared first on Security Boulevard.
USENIX 2025: PEPR ’25 – Privacy Paradigms For Law Enforcement Response
Creators, Authors and Presenters: Lukas Bundonis, Netflix; Ben Ballard, MITRE
Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel.
The post USENIX 2025: PEPR ’25 – Privacy Paradigms For Law Enforcement Response appeared first on Security Boulevard.
Introducing Scoped Organization Tokens for SonarQube Cloud
Secure your CI/CD pipelines with SonarQube Cloud's Scoped Organization Tokens (SOT). A resilient, user-decoupled way to manage authentication and prevent broken builds.
The post Introducing Scoped Organization Tokens for SonarQube Cloud appeared first on Security Boulevard.
XCSSET evolves again: Analyzing the latest updates to XCSSET’s inventory
Microsoft Threat Intelligence has uncovered a new variant of the XCSSET malware, which is designed to infect Xcode projects, typically used by software developers building Apple or macOS-related applications.
The post XCSSET evolves again: Analyzing the latest updates to XCSSET’s inventory appeared first on Microsoft Security Blog.
Phishing Campaign Evolves into PureRAT Deployment, Linked to Vietnamese Threat Actors
Cisco uncovers new SNMP vulnerability used in attacks on IOS devices
Cisco Systems has issued security updates to address a critical vulnerability in its widely deployed IOS and IOS XE network operating systems, after confirming the flaw is being exploited in active attacks. Designated CVE-2025-20352, the vulnerability resides in the Simple Network Management Protocol (SNMP) subsystem of Cisco’s core network software. According to Cisco, the weakness […]
The post Cisco uncovers new SNMP vulnerability used in attacks on IOS devices appeared first on CyberScoop.
Их цель — уничтожение. «Касперский» предупредил о новой кампании хактивистов против Россиян
Chinese State-Sponsored Hackers Targeting Telecommunications Infrastructure to Steal Sensitive Data
Chinese state-sponsored cyber threat group Salt Typhoon has intensified long-term espionage operations against global telecommunications infrastructure, according to recent legal and intelligence reporting. Aligned with the Ministry of State Security (MSS) and active since at least 2019, Salt Typhoon has systematically exploited network edge devices to establish deep persistence and exfiltrate highly sensitive communications metadata, […]
The post Chinese State-Sponsored Hackers Targeting Telecommunications Infrastructure to Steal Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
AI 实战指南:通过提示词注入提取系统提示词的完整流程
Где ломается ДНК? Вот она — точка, с которой начинаются скрытые мутации
Microsoft spots LLM-obfuscated phishing attack
Cybercriminals are increasingly using AI-powered tools and (malicious) large language models to create convincing, error-free emails, deepfakes, online personas, lookalike/fake websites, and malware. There’s even been a documented instance of an attacker using the agentic AI coding assistant Claude Code (along with Kali Linux) for nearly all steps of a data extortion operation. More recently, Microsoft Threat Intelligence spotted and blocked an attack campaign delivering an LLM-obfuscated malicious attachment. The phishing campaign and the LLM-obfuscated … More →
The post Microsoft spots LLM-obfuscated phishing attack appeared first on Help Net Security.