Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Critical Site Takeover Flaw Affects 400K WordPress Sites

Attackers are already targeting a vulnerability in the Post SMTP plug-in that allows them to fully compromise an account and website for nefarious purposes.

DARKReading
#vulnerability#web#wordpress
Closing the AI Execution Gap in Cybersecurity — A CISO Framework

CISOs must navigate five critical dimensions of AI in cybersecurity: augmenting security with AI, automating security with AI, protecting AI systems, defending against AI-powered threats, and aligning AI strategies with business goals. Neglecting any of these areas is a recipe for disaster.

Risk 'Comparable' to SolarWinds Incident Lurks in Popular Software Update Tool

Some of the world's biggest technology companies use a program liable to introduce malware into their software. The potential consequences are staggering, but there's an easy fix.

Elusive Iranian APT Phishes Influential US Policy Wonks

Iran is spying on American foreign policy influencers. But exactly which of its government's APTs is responsible remains a mystery.

Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users

The well-known North Korean threat group continues to improve the obfuscation and anti-analysis features of its attack toolchain.

AI App Spending Report: Where Are the Security Tools?

An analysis of startup firms' spending on AI applications finds the top categories to be productivity and content-generation. Security? Not so much.

Pro-Russian Hackers Use Linux VMs to Hide in Windows

A threat actor known as "Curly COMrades" is using Linux VMs to remain undetected in Windows environments while conducting Russia-aligned activities.

Inside the Playbook of Ransomware's Most Profitable Players

Successful ransomware groups have three key elements in common. Spoiler alert: indicators of success don't all revolve around artificial intelligence.

Europe Sees Increase in Ransomware, Extortion Attacks

European organizations face an escalating cyber threat landscape as attackers leverage geopolitical tensions and AI-enhanced social engineering for attacks.

SesameOp Backdoor Uses OpenAI API for Covert C2

Malware used in a months-long attack demonstrates how bad actors are misusing generative AI services in unique and stealthy ways.