Google reports a significant rise in malicious AI prompt injection attacks, noting that while current threats are mostly unsophisticated, they are growing in both number and potential risk. Experts warn of a maturing threat landscape as attackers adapt.
Within 13 hours of public disclosure, attackers exploited a high-severity SSRF flaw in LMDeploy’s AI toolkit, targeting cloud metadata and internal networks. The incident underscores the urgent need for rapid patching in the AI infrastructure space.
A newly revealed flaw in Apache ActiveMQ, dormant for over a decade, is now being exploited in the wild. Federal agencies and organizations are racing to patch as attacks escalate.
Three critical Windows Defender vulnerabilities, leaked in protest by a security researcher, are being actively exploited in the wild. While Microsoft has patched one, two remain unaddressed, exposing millions of systems to risk.
#Windows vulnerabilities | #Cyber attacks | #Microsoft Defender
Google has uncovered and disrupted a Chinese proxy network company allegedly powering a new generation of mass cyber weapons. The operation highlights the growing risks as legitimate internet tools are repurposed for global cybercrime and espionage.
CISA has added six newly exploited software vulnerabilities—including a critical zero-click flaw in Fortinet—to its KEV catalog. With active attacks already underway, organizations face a tight deadline to patch or risk major breaches.
Major security flaws have been detected in Apache Tomcat, the popular web server powering millions of websites. Experts warn of potential attacks and urge immediate updates to safeguard sensitive data.
Kubernetes misconfigurations are enabling cybercriminals to breach cloud accounts and steal millions, as seen in recent high-profile attacks. Discover how attackers exploit weak configurations and what organizations can do to defend their cloud infrastructure.
North Korean hackers have launched advanced multi-stage attacks on South Korea, using GitHub as a covert command center while leveraging legitimate Windows tools for stealth and persistence. This new wave of cybercrime blends seamlessly with everyday internet traffic, making detection increasingly difficult.
#North Korean hackers | #GitHub exploitation | #cyber attacks
A new wave of cyber threats is emerging, with hackers chaining minor flaws, bypassing logs, and reviving old bugs to infiltrate networks. Discover why the smallest vulnerabilities are now the biggest risks.