“Cyber warfare is as much about psychological strategy as technical prowess.”
― James Scott
-
SonicWall Confirms Active Exploitation of Flaws Affecting Multiple Appliance Models [email protected] (The Hacker News)
SonicWall has revealed that two now-patched security flaws impacting its SMA100 Secure Mobile Access (SMA) appliances have been exploited in the wild. The vulnerabilities in question are listed below – CVE-2023-44221 (CVSS score: 7.2) – Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege toRead…
-
Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense [email protected] (The Hacker News)
As the field of artificial intelligence (AI) continues to evolve at a rapid pace, new research has found how techniques that render the Model Context Protocol (MCP) susceptible to prompt injection attacks could be used to develop security tooling or identify malicious tools, according to a new report from Tenable. MCP, launched by Anthropic in…
-
End users can code with AI, but IT must be wary
The scale and speed of generative AI coding — known as vibe coding — are powerful, but users might be misapplying this technology to create efficiency and security problems.Read More
-
[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats [email protected] (The Hacker News)
How Many Gaps Are Hiding in Your Identity System? It’s not just about logins anymore. Today’s attackers don’t need to “hack” in—they can trick their way in. Deepfakes, impersonation scams, and AI-powered social engineering are helping them bypass traditional defenses and slip through unnoticed. Once inside, they can take over accounts, move laterally, and cause…
-
Chinese Hackers Abuse IPv6 SLAAC for AitM Attacks via Spellbinder Lateral Movement Tool [email protected] (The Hacker News)
A China-aligned advanced persistent threat (APT) group called TheWizards has been linked to a lateral movement tool called Spellbinder that can facilitate adversary-in-the-middle (AitM) attacks. “Spellbinder enables adversary-in-the-middle (AitM) attacks, through IPv6 stateless address autoconfiguration (SLAAC) spoofing, to move laterally in the compromised network, intercepting packets andRead More
-
Customer Account Takeovers: The Multi-Billion Dollar Problem You Don’t Know About [email protected] (The Hacker News)
Everyone has cybersecurity stories involving family members. Here’s a relatively common one. The conversation usually goes something like this: “The strangest thing happened to my streaming account. I got locked out of my account, so I had to change my password. When I logged back in, all my shows were gone. Everything was in Spanish…
-
Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware Attacks [email protected] (The Hacker News)
Cybersecurity researchers have shed light on a Russian-speaking cyber espionage group called Nebulous Mantis that has deployed a remote access trojan called RomCom RAT since mid-2022. RomCom “employs advanced evasion techniques, including living-off-the-land (LOTL) tactics and encrypted command and control (C2) communications, while continuously evolving its infrastructure – leveragingRead More
-
RansomHub Went Dark April 1; Affiliates Fled to Qilin, DragonForce Claimed Control [email protected] (The Hacker News)
Cybersecurity researchers have revealed that RansomHub’s online infrastructure has “inexplicably” gone offline as of April 1, 2025, prompting concerns among affiliates of the ransomware-as-a-service (RaaS) operation. Singaporean cybersecurity company Group-IB said that this may have caused affiliates to migrate to Qilin, given that “disclosures on its DLS [data leak site] have doubled sinceRead More
-
Meta Launches LlamaFirewall Framework to Stop AI Jailbreaks, Injections, and Insecure Code [email protected] (The Hacker News)
Meta on Tuesday announced LlamaFirewall, an open-source framework designed to secure artificial intelligence (AI) systems against emerging cyber risks such as prompt injection, jailbreaks, and insecure code, among others. The framework, the company said, incorporates three guardrails, including PromptGuard 2, Agent Alignment Checks, and CodeShield. PromptGuard 2 is designed to detect directRead More
-
Indian Court Orders Action to Block Proton Mail Over AI Deepfake Abuse Allegations [email protected] (The Hacker News)
A high court in the Indian state of Karnataka has ordered the blocking of end-to-end encrypted email provider Proton Mail across the country. The High Court of Karnataka, on April 29, said the ruling was in response to a legal complaint filed by M Moser Design Associated India Pvt Ltd in January 2025. The complaint…
“Security used to be an inconvenience sometimes, but now it’s a necessity all the time.”
― Martina Navratilova