$ page 5/35

'BlueHammer' Windows zero-day exploit signals Microsoft bug disclosure issues

A researcher, citing a dispute with Microsoft, released a zero-day exploit for Windows that allows for full system takeover, highlighting ongoing tens

5 min readApr 10

Apple Intelligence AI guardrails bypassed in new attack

Researchers from Luta Security have successfully bypassed Apple Intelligence's AI guardrails using a novel prompt injection technique called "Neural E

5 min readApr 10

Bitter-linked hack-for-hire group expands espionage campaign to MENA journalists

A joint investigation reveals that the Bitter APT group, with suspected ties to India, has expanded its operations, targeting journalists and activist

6 min readApr 9

A fragile ceasefire won't halt Iran-linked cyberattacks

A fragile ceasefire on the physical battlefield is unlikely to stop Iran-linked hackers, who see digital warfare as a persistent, ingrained part of co

6 min readApr 9

Critical vulnerability in Ninja Forms exposes over a million WordPress sites

A critical flaw in the popular Ninja Forms WordPress plugin allows unauthenticated attackers to upload malicious files, leading to full site compromis

2 min readApr 9

‘GrafanaGhost’ bypasses Grafana’s AI defenses without leaving a trace

Researchers discovered a flaw in Grafana's AI that lets attackers steal corporate data by hiding commands in dashboards, turning the AI into a spy.

2 min readApr 9

The anatomy of a non-leak: How a public Orbán quote became a cybersecurity myth

A viral story claimed a 'leaked call' exposed a Hungarian leader's comments. The truth? It was a public interview. A case study in misinformation.

6 min readApr 9

FBI and Pentagon warn of Iranian hackers targeting U.S. operational technology

A joint federal advisory warns that Iranian hackers are targeting U.S. water and energy sectors by exploiting default passwords on operational technol

6 min readApr 9

Iran-linked hackers disrupt US critical infrastructure via PLC attacks

A federal warning highlights how an Iran-linked group exploited default passwords on industrial controllers to disrupt a US water utility, a stark rem

6 min readApr 9

Predatory Sparrow claims attack on Iranian oil refinery amid escalating cyber conflict

A deep-dive analysis of the cyberattack on Iran's Lavan oil refinery, claimed by the Predatory Sparrow hacking group, and its geopolitical implication

6 min readApr 9

TikTok dismantles covert influence networks targeting Hungarian elections

TikTok removed covert networks using fake accounts to amplify political attacks against both the government and opposition ahead of Hungary's election

6 min readApr 9

The remediation crisis: why HackerOne is rethinking bug bounties in the age of AI

AI tools are finding bugs faster than open source projects can fix them, creating a remediation crisis that is forcing bug bounty platforms like Hacke

7 min readApr 9