Category: Data Breaches

Your blog category

  • Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts

    Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts

    Cybersecurity researchers have demonstrated a new prompt injection technique called PromptFix that tricks a generative artificial intelligence (GenAI) model into carrying out intended actions by embedding the malicious instruction inside a fake CAPTCHA check on a web page.
    Described by Guardio Labs an “AI-era take on the ClickFix scam,” the attack technique demonstrates how AI-driven browsers,

  • 🕵️ Webinar: Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do

    🕵️ Webinar: Discover and Control Shadow AI Agents in Your Enterprise Before Hackers Do

    Do you know how many AI agents are running inside your business right now?
    If the answer is “not sure,” you’re not alone—and that’s exactly the concern.
    Across industries, AI agents are being set up every day. Sometimes by IT, but often by business units moving fast to get results. That means agents are running quietly in the background—without proper IDs, without owners, and without logs of

  • From Impact to Action: Turning BIA Insights Into Resilient Recovery

    From Impact to Action: Turning BIA Insights Into Resilient Recovery

    Modern businesses face a rapidly evolving and expanding threat landscape, but what does this mean for your business? It means a growing number of risks, along with an increase in their frequency, variety, complexity, severity, and potential business impact.
    The real question is, “How do you tackle these rising threats?” The answer lies in having a robust BCDR strategy. However, to build a

  • North Korea Uses GitHub in Diplomat Cyber Attacks as IT Worker Scheme Hits 320+ Firms

    North Korea Uses GitHub in Diplomat Cyber Attacks as IT Worker Scheme Hits 320+ Firms

    North Korean threat actors have been attributed to a coordinated cyber espionage campaign targeting diplomatic missions in their southern counterpart between March and July 2025.
    The activity manifested in the form of at least 19 spear-phishing emails that impersonated trusted diplomatic contacts with the goal of luring embassy staff and foreign ministry personnel with convincing meeting invites

  • DOJ Charges 22-Year-Old for Running RapperBot Botnet Behind 370,000 DDoS Attacks

    DOJ Charges 22-Year-Old for Running RapperBot Botnet Behind 370,000 DDoS Attacks

    A 22-year-old man from the U.S. state of Oregon has been charged with allegedly developing and overseeing a distributed denial-of-service (DDoS)-for-hire botnet called RapperBot.
    Ethan Foltz of Eugene, Oregon, has been identified as the administrator of the service, the U.S. Department of Justice (DoJ) said. The botnet has been used to carry out large-scale DDoS-for-hire attacks targeting

  • New GodRAT Trojan Targets Trading Firms Using Steganography and Gh0st RAT Code

    New GodRAT Trojan Targets Trading Firms Using Steganography and Gh0st RAT Code

    Financial institutions like trading and brokerage firms are the target of a new campaign that delivers a previously unreported remote access trojan called GodRAT.
    The malicious activity involves the “distribution of malicious .SCR (screen saver) files disguised as financial documents via Skype messenger,” Kaspersky researcher Saurabh Sharma said in a technical analysis published today.
    The

  • Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution

    Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution

    A new exploit combining two critical, now-patched security flaws in SAP NetWeaver has emerged in the wild, putting organizations at risk of system compromise and data theft.
    The exploit in question chains together CVE-2025-31324 and CVE-2025-42999 to bypass authentication and achieve remote code execution, SAP security company Onapsis said.

    CVE-2025-31324 (CVSS score: 10.0) – Missing

  • U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback

    U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback

    The U.K. government has apparently abandoned its plans to force Apple to weaken encryption protections and include a backdoor that would have enabled access to the protected data of U.S. citizens.
    U.S. Director of National Intelligence (DNI) Tulsi Gabbard, in a statement posted on X, said the U.S. government had been working with its partners with the U.K. over the past few months to ensure that

  • Why Your Security Culture is Critical to Mitigating Cyber Risk

    Why Your Security Culture is Critical to Mitigating Cyber Risk

    After two decades of developing increasingly mature security architectures, organizations are running up against a hard truth: tools and technologies alone are not enough to mitigate cyber risk. As tech stacks have grown more sophisticated and capable, attackers have shifted their focus. They are no longer focusing on infrastructure vulnerabilities alone. Instead, they are increasingly

  • PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks

    PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks

    The maintainers of the Python Package Index (PyPI) repository have announced that the package manager now checks for expired domains to prevent supply chain attacks.
    “These changes improve PyPI’s overall account security posture, making it harder for attackers to exploit expired domain names to gain unauthorized access to accounts,” Mike Fiedler, PyPI safety and security engineer at the Python