Aggregator
16 000 + 35 000 + 1 000 000 = 0: как считают мошенники в Telegram
Play
You must login to view this content
Play
You must login to view this content
Play
You must login to view this content
Play
You must login to view this content
Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage
The sudden emergence of the Royal ransomware in early 2023 marked a significant escalation in cyber threats targeting service providers across Europe. Exploiting unpatched VPN and remote-desktop gateways, attackers initiated brute-force and credential-stuffing campaigns to breach perimeter defenses. Once inside, the malware deployed a custom encryption engine that leveraged AES-256 for file encryption and RSA-4096 […]
The post Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage appeared first on Cyber Security News.
Alleged Data Sale of Legiit
Qilin
You must login to view this content
Китай создаёт дронов, которые уворачиваются от ракет — и выживают в 87% случаев
Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help
Two high-severity vulnerabilities in Anthropic’s Claude Code could allow attackers to escape restrictions and execute unauthorized commands. Most remarkably, Claude itself unwittingly assisted in developing the exploits used against its own security mechanisms. The vulnerabilities uncovered by Elad Beber from Cymulate, CVE-2025-54794 and CVE-2025-54795, demonstrate how AI systems’ analytical capabilities can be turned against their […]
The post Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help appeared first on Cyber Security News.
Alleged Data Sale of Northrop Grumman
CVE-2025-51534 | Austrian Archaeological Institute OpenAtlas 8.11.0 Name cross site scripting
CVE-2025-51535 | Austrian Archaeological Institute OpenAtlas 8.11.0 sql injection
CVE-2025-50422 | Freedesktop Poppler 25.04.0 PDF Stream Object information disclosure
CVE-2024-45183 | Samsung Mobile Processor Exynos up to 2400 JPEG out-of-bounds write
CVE-2025-46206 | Artifex mupdf 1.25.5/1.25.6 mutool clean utility /Next strip_outline recursion
CVE-2025-38739 | Dell Digital Delivery up to 5.6.1.0 insufficiently protected credentials (dsa-2025-302)
Threat Actors Using AI to Scale Operations, Accelerate Attacks and Attack Autonomous AI Agents
The cybersecurity landscape has witnessed an unprecedented evolution as threat actors increasingly weaponize artificial intelligence to amplify their attack capabilities and target the very AI systems organizations depend upon. According to the CrowdStrike 2025 Threat Hunting Report, adversaries are no longer merely using AI as an auxiliary tool but have integrated generative AI technologies into […]
The post Threat Actors Using AI to Scale Operations, Accelerate Attacks and Attack Autonomous AI Agents appeared first on Cyber Security News.