KI in der Cybersicherheit: Gekommen, um zu bleiben
Post Content
Casio has completed its investigation into the data breach caused by a recent ransomware attack and found that thousands of individuals are impacted. The post Thousands Impacted by Casio Data Breach appeared first on SecurityWeek.
Hackers aren’t kicking down the door anymore. They just use the same tools we use every day — code packages, cloud accounts, email, chat, phones, and “trusted” partners — and turn them against us. One bad download can leak your keys. One weak vendor can expose many customers at once. One guest invite, one link…
Jessica Lyons reports: The call came into the help desk at a large US retailer. An employee had been locked out of their corporate accounts. But the caller wasn’t actually a company employee. He was a Scattered Spider criminal trying to break into the retailer’s systems – and he was really good, according to Jon…
The North Korean threat actors behind the Contagious Interview campaign have been observed using updated versions of a cross-platform malware called OtterCookie with capabilities to steal credentials from web browsers and other files. NTT Security Holdings, which detailed the new findings, said the attackers have “actively and continuously” updated the malware, introducing versions v3 and…
Ivanti has released patches for multiple vulnerabilities in Endpoint Manager (EPM), including four critical-severity flaws. The post Ivanti Patches Critical Vulnerabilities in Endpoint Manager appeared first on SecurityWeek.
The threat actor known as TA558 has been attributed to a fresh set of attacks delivering various remote access trojans (RATs) like Venom RAT to breach hotels in Brazil and Spanish-speaking markets. Russian cybersecurity vendor Kaspersky is tracking the activity, observed in summer 2025, to a cluster it tracks as RevengeHotels. “The threat actors continue…