access ai android api apple attack authentication backdoor breach business ceo china cisa cisco ciso cloud compliance control credentials crypto cve cyber cyberattack cybercrime cybersecurity data data-breach defense detection email exploit finance flaw framework fraud germany google governance government group hacker hacking healthcare identity infrastructure intelligence Internet jobs law leak linux malicious malware microsoft monitoring network open-source password phishing privacy ransomware remote-code-execution resilience risk russia scam service software strategy supply-chain technology theft threat tool unclassified update usa vulnerability windows zero-day
-
Nach Cyberangriff: Hacker erpressen Vimeo mit Nutzerdaten
Ein bekannter Cyberakteur hat Nutzerdaten von Vimeo erbeutet und verlangt nun ein Lösegeld. Andernfalls landen die Daten öffentlich im Darknet. First seen on golem.de Jump to article: www.golem.de/news/cyberangriff-trifft-videoplattform-hacker-erbeuten-nutzerdaten-von-vimeo-2604-208149.html also interesting: 4 Wege zu neuer Cyberabwehrstärke Junge Onliner tappen oft in Phishing-Fallen Nach Trivy-Hack: Hacker sollen Quellcode von Cisco erbeutet haben “I’m Just Scared”: Teen Hacker…
-
Critical Flaw Turns Vect Ransomware into Data Destroying Wiper
The Vect 2.0 ransomware wipes large files instead of merely encrypting them, making recovery impossible even for the attackers First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/critical-flaw-vect-ransomware-data/ also interesting: Veeam issues patch for critical RCE bug Model Context Protocol Flaw Allows Attackers to Compromise Victim Systems New ransomware Yurei adopts open-source tools for double-extortion campaigns…
-
Critical Flaw Turns Vect Ransomware into Data Destroying Wiper
The Vect 2.0 ransomware wipes large files instead of merely encrypting them, making recovery impossible even for the attackers First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/critical-flaw-vect-ransomware-data/ also interesting: Feds Drop Probe Into Progress Software Over MOVEit Zero-Day Critical Commvault SSRF could allow attackers to execute code remotely Commvault warns of critical Command Center flaw…
-
Critical Flaw Turns Vect Ransomware into Data Destroying Wiper
The Vect 2.0 ransomware wipes large files instead of merely encrypting them, making recovery impossible even for the attackers First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/critical-flaw-vect-ransomware-data/ also interesting: Feds Drop Probe Into Progress Software Over MOVEit Zero-Day Critical Commvault SSRF could allow attackers to execute code remotely Commvault warns of critical Command Center flaw…
-
Critical cPanel Authentication Vulnerability Identified, Update Your Server Immediately
cPanel has released security updates to address a security issue impacting various authentication paths that could allow an attacker to obtain access to the control panel software.The problem affects all currently supported versions, according to an alert released by cPanel on Tuesday. The issue has been addressed in the following versions -11.110.0.9711.118.0.6311.126.0.5411.132.0.29 First seen on…
-
CISA orders feds to patch Windows flaw exploited as zero-day
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to secure their Windows systems against a vulnerability exploited in zero-day attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-windows-flaw-exploited-in-zero-day-attacks/ also interesting: The 2024 cyberwar playbook: Tricks used by nation-state actors Cybersecurity Snapshot: CISA’s Best Cyber Advice on Securing Cloud, OT, Apps and…
-
CISA, Microsoft warn of active exploitation of Windows Shell vulnerability (CVE-2026-32202)
Attackers are exploiting CVE-2026-32202, a zero-click Windows Shell spoofing vulnerability that causes victims’ systems to authenticate the attacker’s server, CISA … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/29/windows-cve-2026-32202-exploited/ also interesting: Cybersecurity Snapshot: Prompt Injection and Data Disclosure Top OWASP’s List of Cyber Risks for GenAI LLM Apps Cybersecurity Snapshot: Industrial Systems in Crosshairs of…
-
Why a recent supply-chain attack singled out security firms Checkmarx and Bitwarden
Security firms find themselves especially exposed. First seen on arstechnica.com Jump to article: arstechnica.com/information-technology/2026/04/why-a-recent-supply-chain-attack-singled-out-security-firms-checkmarx-and-bitwarden/ also interesting: Preview: Hot Sessions at Infosecurity Europe 2025 in London Malicious npm packages use Ethereum blockchain for malware delivery Supply Chain Attack >>Shai-Halud<< Targets 477 NPM Packages You May Have to Wait a Little Longer for That Jaguar in the…
-
MCP Permission Models: Designing Secure Interactions
6 min readMCP standardizes how AI agents connect to tools, but every agent needs delegated authority and precise permission controls to match. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/mcp-permission-models-designing-secure-interactions/ also interesting: When Good Tools Go Bad: Dual-Use in Cybersecurity Old threats, new consequences: 90% of cyber claims stem from email and remote access How…
-
ISOP Traffic Forensics
When a customer business system experiences a security incident, they often need to conduct forensic analysis on historical network traffic to identify the source of the intrusion and reconstruct the entire incident for targeted emergency response. In scenarios where customers have such traffic-analysis requirements, we can leverage the traffic forensics capabilities of the ISOP platform……
-
Why Traditional IAM Is No Match for Agentic AI
6 min readLegacy IAM can’t govern autonomous AI agents that spin up, execute and terminate in seconds. New identity patterns are now emerging. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/why-traditional-iam-is-no-match-for-agentic-ai/ also interesting: IAM Predictions for 2025: Identity as the Linchpin of Business Resilience Aembit Extends Workload IAM to Microsoft Ecosystem, Securing Hybrid Access for…
-
ISOP’s Integration with NSFOCUS Devices
Tags: wafISOP device management can display information about the underlying NSFOCUS devices that are connected to the interface. The NSFOCUS devices that can be integrated include RSAS, BVS, WVSS, WSM, NIPS, WAF, NF, NIDS, NTA, SAS, and UTS. The displayed information includes device name, device IP address, device type, status, version, certificate status, memory, CPU, disk,……
-
What Is IAM for Agentic AI? The New Perimeter of Trust in 2026
6 min readMost CISOs fear AI agent risks, but legacy IAM can’t govern autonomous systems. A new identity model built on attestation is emerging. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/what-is-iam-for-agentic-ai-the-new-perimeter-of-trust-in-2026/ also interesting: Not all cuts are equal: Security budget choices disproportionately impact risk Cybersecurity Snapshot: CISA’s Best Cyber Advice on Securing Cloud, OT,…
-
What Is IAM for Agentic AI? The New Perimeter of Trust in 2026
6 min readMost CISOs fear AI agent risks, but legacy IAM can’t govern autonomous systems. A new identity model built on attestation is emerging. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/what-is-iam-for-agentic-ai-the-new-perimeter-of-trust-in-2026/ also interesting: Not all cuts are equal: Security budget choices disproportionately impact risk Cybersecurity Snapshot: CISA’s Best Cyber Advice on Securing Cloud, OT,…
-
Data Privacy Leaks The Drip, Drip, Drip of Exposure
Beyond the “headline breach,” modern enterprises face a persistent threat: steady-state data leakage. Learn why traditional privacy definitions fail and how “authorized” data flows in workplace apps create continuous legal and operational risk. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/data-privacy-leaks-the-drip-drip-drip-of-exposure/ also interesting: How to Find Old Accounts for Deletion Privacy Roundup: Week 6 of…
-
Drohende Angriffe mittels Quantencomputing vermeiden – Gerüstet für den ‘Q-Day”
Tags: cyberattackFirst seen on security-insider.de Jump to article: www.security-insider.de/geruestet-fuer-den-q-day-a-80521bd2c8c6cb2aefdb3f12f252a8f3/ also interesting: Cyberangriff auf eine Ingenieurgesellschaft aus den USA 19-Year-Old Hacker Admits Guilt in Major Cyberattack on PowerSchool Qantas confirms customer data breach amid Scattered Spider attacks Hackers Exploit Tuoni C2 Framework to Stealthily Deploy In-Memory Payloads
-
A Quarter of Healthcare Organizations Report Medical Device Cyber-Attacks
RunSafe report reveals most attacks on medical devices disrupt patient care First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/quarter-healthcare-medical-device/ also interesting: Qilin Ransomware Leaks 400GB of NHS and Patient Data on Telegram Next-gen cybercrime: The need for collaboration in 2025 North Korean Kimsuky and Lazarus Teams Target Critical Sectors with Zero-Day Exploits CISO Julie Chatman…
-
VECT 2.0 Ransomware Wipes Large Files Across Windows, Linux ESXi
The “new” VECT 2.0 ransomware is essentially a cross”‘platform data wiper that permanently destroys most enterprise files rather than encrypting them for recovery. For any file larger than 131,072 bytes (128 KB), VECT processes four separate chunks using four different randomly generated ChaCha20″‘IETF nonces, but only writes the last nonce to disk at the end…
-
GoDaddy customer claims registrar transferred 27-year-old domain without any security checks
32 phone calls, 17 email chains, a 5-day ordeal, and no help during the daddy of all stuffups, claim those affected First seen on theregister.com Jump to article: www.theregister.com/2026/04/29/godaddy_megagaffe_wrongly_transferred_27yearold/ also interesting: Why Cloud Phone Systems are The Future of Business Communication Bug in jury systems used by several US states exposed sensitive personal data Apple…
-
GoDaddy customer claims registrar transferred 27-year-old domain without any security checks
32 phone calls, 17 email chains, a 5-day ordeal, and no help during the daddy of all stuffups, claim those affected First seen on theregister.com Jump to article: www.theregister.com/2026/04/29/godaddy_megagaffe_wrongly_transferred_27yearold/ also interesting: Data protection challenges abound as volumes surge and threats evolve What to do if you can’t get into your Facebook or Instagram account Don’t…
-
GitHub Fixes Critical RCE Bug CVE-2026-3854 Within Hours of Discovery
Tags: cloud, cve, cvss, cybersecurity, flaw, github, infrastructure, rce, remote-code-execution, vulnerabilityCybersecurity researchers have revealed critical details about a newly identified RCE vulnerability, tracked as CVE-2026-3854, affecting both GitHub’s cloud infrastructure and GitHub Enterprise Server deployments. The flaw, which carries a high CVSS score of 8.7, could allow an authenticated user to execute arbitrary code on affected systems with a single crafted First seen on thecyberexpress.com…
-
AI-powered honeypots: Turning the tables on malicious AI agents
Just as AI brings time-saving advantages to our lives, it brings similar advantages to threat actors. We can take the advantage back. This blog shows how generative AI can be used to rapidly deploy adaptive honeypot systems. First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/ai-powered-honeypots-turning-the-tables-on-malicious-ai-agents/ also interesting: AirMDR Tackles Security Burdens for SMBs With AI Hackers…
-
The Tyranny of Security
Tags: emailMy wife is currently away, leaving me in charge of our domestic administration. I admit that I do enjoy the power trip. She asked me last night if I could pay an invoice, “the email should have details.” It sounded easy enough. It’s not like she was asking me to assemble an Ikea wardrobe. In……
-
AI Usage Monitoring: How to See Everything Your Employees Are Doing with AI FireTail Blog
Tags: access, ai, ciso, compliance, control, data, detection, GDPR, guide, login, monitoring, network, regulation, risk, toolApr 29, 2026 – Lina Romero – What is AI usage monitoring? AI usage monitoring is the practice of logging, tracking, and analysing how employees and systems interact with AI tools, both sanctioned and unsanctioned. FireTail provides centralised AI activity logging that gives security teams a real-time view of AI usage across the entire organisation.…
-
AI Governance and Risk Insights for Enterprises – Kovrr
Articles related to cyber risk quantification, cyber risk management, and cyber resilience. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/ai-governance-and-risk-insights-for-enterprises-kovrr-2/ also interesting: 8 KI-Sicherheitsrisiken, die Unternehmen übersehen Digital health can’t scale if cybersecurity falls behind The 5 power skills every CISO needs to master in the AI era The 12 Months of Innovation: How Salt…
-
AI Governance and Risk Insights for Enterprises – Kovrr
Articles related to cyber risk quantification, cyber risk management, and cyber resilience. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/ai-governance-and-risk-insights-for-enterprises-kovrr-2/ also interesting: 8 KI-Sicherheitsrisiken, die Unternehmen übersehen Digital health can’t scale if cybersecurity falls behind The 5 power skills every CISO needs to master in the AI era The 12 Months of Innovation: How Salt…
-
AI Governance and Risk Insights for Enterprises – Kovrr
Articles related to cyber risk quantification, cyber risk management, and cyber resilience. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/ai-governance-and-risk-insights-for-enterprises-kovrr-2/ also interesting: 8 KI-Sicherheitsrisiken, die Unternehmen übersehen Digital health can’t scale if cybersecurity falls behind The 5 power skills every CISO needs to master in the AI era The 12 Months of Innovation: How Salt…
-
AI Governance and Risk Insights for Enterprises – Kovrr
Articles related to cyber risk quantification, cyber risk management, and cyber resilience. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/ai-governance-and-risk-insights-for-enterprises-kovrr/ also interesting: Conquering complexity and risk with data security posture insights Demystifying risk in AI Turning AI Risk Awareness Into Robust AI Governance – Kovrr How to make LLMs a defensive advantage without creating a…
-
Entschlüsselung unmöglich: Ransomware-Panne führt zu Datenverlust
Tags: ransomwareWer der Vect-Ransomware zum Opfer fällt, sollte nicht mit einer Datenrettung per Lösegeldzahlung rechnen. Ein Bug vernichtet einen Großteil der Daten. First seen on golem.de Jump to article: www.golem.de/news/datenverlust-durch-bug-ransomware-panne-macht-verschluesselte-daten-unbrauchbar-2604-208141.html also interesting: Unwrapping the emerging Interlock ransomware attack Westfalia Opfer zweier Hacks in einer Woche? Autohaus Ruland ebenfalls Opfer? Akira ransomware gang claims Lush cyber attack…
-
Das KPI-Paradox: Viele Zahlen, wenig Steuerung – Fünf Security-KPIs, die der Vorstand wirklich braucht
Tags: unclassifiedFirst seen on security-insider.de Jump to article: www.security-insider.de/security-kpis-vorstand-board-reporting-wirksamkeit-a-871fd137c8750558ecc9746dcf2b0ee8/ also interesting: 10 Holiday Gifts for Stressed-Out Security Pros Fünf Schritte zur Cyberresilienz – So schützen Unternehmen sich vor millionenschweren Schäden Mit KI/ML das Potenzial von Managed SD-WAN-Lösungen ausschöpfen Metropolitan Police hails facial recognition tech after record year for arrests
-
CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV
Tags: cisa, cve, cybersecurity, exploit, flaw, infrastructure, kev, microsoft, vulnerability, windowsThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting ConnectWise ScreenConnect and Microsoft Windows to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.The vulnerabilities are listed below -CVE-2024-1708 (CVSS score: 8.4) – A path traversal vulnerability in ConnectWise ScreenConnect First seen on thehackernews.com Jump to…
-
CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV
Tags: cisa, cve, cybersecurity, exploit, flaw, infrastructure, kev, microsoft, vulnerability, windowsThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting ConnectWise ScreenConnect and Microsoft Windows to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.The vulnerabilities are listed below -CVE-2024-1708 (CVSS score: 8.4) – A path traversal vulnerability in ConnectWise ScreenConnect First seen on thehackernews.com Jump to…
-
CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV
Tags: cisa, cve, cybersecurity, exploit, flaw, infrastructure, kev, microsoft, vulnerability, windowsThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting ConnectWise ScreenConnect and Microsoft Windows to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.The vulnerabilities are listed below -CVE-2024-1708 (CVSS score: 8.4) – A path traversal vulnerability in ConnectWise ScreenConnect First seen on thehackernews.com Jump to…
-
CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV
Tags: cisa, cve, cybersecurity, exploit, flaw, infrastructure, kev, microsoft, vulnerability, windowsThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting ConnectWise ScreenConnect and Microsoft Windows to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.The vulnerabilities are listed below -CVE-2024-1708 (CVSS score: 8.4) – A path traversal vulnerability in ConnectWise ScreenConnect First seen on thehackernews.com Jump to…
-
CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV
Tags: cisa, cve, cybersecurity, exploit, flaw, infrastructure, kev, microsoft, vulnerability, windowsThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting ConnectWise ScreenConnect and Microsoft Windows to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.The vulnerabilities are listed below -CVE-2024-1708 (CVSS score: 8.4) – A path traversal vulnerability in ConnectWise ScreenConnect First seen on thehackernews.com Jump to…
-
Microsoft says backend change broke Teams Free chat and calls
Tags: microsoftMicrosoft is working to resolve a known issue that prevents some Microsoft Teams Free users from chatting and calling others. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-says-backend-change-broke-teams-free-chat-and-calls/ also interesting: Microsoft retires Windows updates causing 0x80070643 errors Massives Datenleck in Cloud-Speichern Cybersecurity Snapshot: New Standard for AI System Security Published, While Study Finds Cyber Teams…
-
Top AI-Powered Vendor Risk Management Platforms for SaaS Companies in 2026
Top AI-powered vendor risk platforms for SaaS companies in 2026, compare tools, features, and how to choose the… First seen on hackread.com Jump to article: hackread.com/ai-powered-vendor-risk-management-platforms-saas-companies-2026/ also interesting: Meta1st embraces AI for new approach to Human Risk Management Data protection challenges abound as volumes surge and threats evolve Autonomous AI hacking and the future of…
-
Cursor AI IDE vulnerability allows code execution via hidden Git hooks
Novee researchers find high-severity CVE-2026-26268 flaw in Cursor AI, allowing hackers to run malicious code when developers clone repositories. First seen on hackread.com Jump to article: hackread.com/cursor-ai-ide-vulnerability-code-execution-git-hooks/ also interesting: Top 12 ways hackers broke into your systems in 2024 Treasury Department Breach: A Crucial Reminder for API Security in the Public Sector Cybersecurity Snapshot: AI…
-
AWS leans on prior ingenuity to face future AI and quantum threats
Tags: access, ai, attack, authentication, breach, cloud, communications, computer, computing, control, credentials, crypto, cryptography, cybersecurity, data, defense, encryption, exploit, google, Hardware, identity, infrastructure, Internet, lessons-learned, malicious, penetration-testing, phishing, risk, service, technology, threat, tool, updateSymmetric cryptography and the quantum threat: Back in the early 2010s, most hardware security modules used asymmetric cryptography to protect security keys. Asymmetric cryptography, the kind used to secure online communications, involves pairs of keys, one to lock, another to unlock. It’s a very useful and convenient approach when dealing with multiple parties.Amazon chose to…
-
AWS leans on prior ingenuity to face future AI and quantum threats
Tags: access, ai, attack, authentication, breach, cloud, communications, computer, computing, control, credentials, crypto, cryptography, cybersecurity, data, defense, encryption, exploit, google, Hardware, identity, infrastructure, Internet, lessons-learned, malicious, penetration-testing, phishing, risk, service, technology, threat, tool, updateSymmetric cryptography and the quantum threat: Back in the early 2010s, most hardware security modules used asymmetric cryptography to protect security keys. Asymmetric cryptography, the kind used to secure online communications, involves pairs of keys, one to lock, another to unlock. It’s a very useful and convenient approach when dealing with multiple parties.Amazon chose to…
-
ISOP Disk Special Features
System Introduction Currently, the ISOP system deployment includes a system disk and a data disk. The system disk primarily contains ISOP-related user information as well as the configuration directory for the A interface. The data disk is mainly used to store facility logs, configuration files, access logs, and event index files. 1. ISOP system disk……
-
Per Git-Push-Befehl: Angreifer hätten Millionen von Github-Repos kapern können
Git-Push-Befehle gehören für viele Entwickler zum Alltag. Nur einer davon hätte gereicht, um tief in die Infrastruktur von Github einzudringen. First seen on golem.de Jump to article: www.golem.de/news/per-git-push-befehl-angreifer-haetten-millionen-von-github-repos-kapern-koennen-2604-208133.html also interesting: Top.gg supply chain attack highlights subtle risks Cybersecurity Snapshot: CISA Analyzes Malware Used in SharePoint Attacks, as U.K. Boosts Cyber Assessment Framework How GlassWorm wormed…
-
Studie von Rubrik Zero Labs zeigt bedenkliche Defizite in der Identity Governance
Neue Studie von Rubrik Zero Labs zeigt bedenkliche Defizite in der Identity Governance: Unternehmen setzen autonome Systeme ohne Überwachung ein First seen on infopoint-security.de Jump to article: www.infopoint-security.de/studie-von-rubrik-zero-labs-zeigt-bedenkliche-defizite-in-der-identity-governance/a44817/ also interesting: BalkanID Launches Self-Service IGA Lite with Transparent Pricing for Identity Governance What to look for in a data protection platform for hybrid clouds What to…
-
LofyStealer Targets Minecraft Players via Node.js Loader and Browser Injection
Minecraft players are being lured with a fake hacking tool called “Slinky” that secretly installs a powerful infostealer dubbed LofyStealer (also tracked as GrabBot), linked to the Brazilian cybercrime group LofyGang. The malware uses a Node. js-based loader and an in-memory C++ payload to steal browser data and exfiltrate it to a command-and-control (C2) server…
-
Vimeo Confirms Data Breach After Hackers Access User Database
Tags: access, breach, cyber, data, data-breach, hacker, risk, security-incident, software, supply-chain, vulnerabilityVimeo has officially confirmed a data breach affecting its user database. The security incident did not originate with Vimeo, but rather with Anodot, a third-party analytics vendor used by the video hosting platform. This event highlights the ongoing risks associated with software supply chains, where a vulnerability in one vendor can compromise multiple downstream companies.…
-
SLOTAGENT Malware Hides API Calls and Strings to Thwart Analysis
A previously unknown remote access trojan (RAT), dubbed SLOTAGENT, after analyzing a suspicious ZIP archive uploaded from Japan to a public malware repository in early 2026. The malware demonstrates advanced evasion techniques and flexible post-exploitation capabilities, making it a notable addition to the evolving threat landscape. The ZIP file contains a malicious executable, WindowsOobeAppHost.AOT.exe, which triggers the…
-
SLOTAGENT Malware Hides API Calls and Strings to Thwart Analysis
A previously unknown remote access trojan (RAT), dubbed SLOTAGENT, after analyzing a suspicious ZIP archive uploaded from Japan to a public malware repository in early 2026. The malware demonstrates advanced evasion techniques and flexible post-exploitation capabilities, making it a notable addition to the evolving threat landscape. The ZIP file contains a malicious executable, WindowsOobeAppHost.AOT.exe, which triggers the…
-
SLOTAGENT Malware Hides API Calls and Strings to Thwart Analysis
A previously unknown remote access trojan (RAT), dubbed SLOTAGENT, after analyzing a suspicious ZIP archive uploaded from Japan to a public malware repository in early 2026. The malware demonstrates advanced evasion techniques and flexible post-exploitation capabilities, making it a notable addition to the evolving threat landscape. The ZIP file contains a malicious executable, WindowsOobeAppHost.AOT.exe, which triggers the…
-
ShinyHunters exploit Anodot incident to target Vimeo
The video platform Vimeo confirmed a security breach via Anodot that exposed metadata, video titles, and some user emails. Vimeo said some user data was accessed after a breach at Anodot. Anodot is a company that provides AI-driven data analytics and anomaly detection tools. Most of the exposed information includes technical data, video titles, and…
-
U.S. CISA adds Microsoft Windows Shell and ConnectWise ScreenConnect flaws to its Known Exploited Vulnerabilities catalog
Tags: cisa, cve, cybersecurity, exploit, flaw, infrastructure, kev, microsoft, vulnerability, windowsU.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Windows Shell and ConnectWise ScreenConnect flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Windows Shell and ConnectWise ScreenConnect flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the flaws added to the catalog: CVE-2024-02-21 is a path traversal vulnerability…

