KI in der Cybersicherheit: Gekommen, um zu bleiben
Post Content
Threat actors with links to the Play ransomware family exploited a recently patched security flaw in Microsoft Windows as a zero-day as part of an attack targeting an unnamed organization in the United States. The attack, per the Symantec Threat Hunter Team, part of Broadcom, leveraged CVE-2025-29824, a privilege escalation flaw in the Common Log…
Enterprise data backup platform Commvault has revealed that an unknown nation-state threat actor breached its Microsoft Azure environment by exploiting CVE-2025-3928 but emphasized there is no evidence of unauthorized data access. “This activity has affected a small number of customers we have in common with Microsoft, and we are working with those customers to provide…
Dr. Stefan Schuppert and Valentin Reiter of Hogan Lovells write: While the NIS2 Directive remains to be implemented in several EU Member States, including Germany, companies should use the time to assess whether they fall within the scope of the Directive and prepare for its implementation. When making this assessment, particular attention should be paid……
Cybersecurity researchers have flagged a new malware called PLAYFULGHOST that comes with a wide range of information-gathering features like keylogging, screen capture, audio capture, remote shell, and file transfer/execution. The backdoor, according to Google’s Managed Defense team, shares functional overlaps with a known remote administration tool referred to as Gh0st RAT, which had its source
Developed with the help of AI, the emerging FunkSec ransomware claimed over 80 victims in December 2024. The post Emerging FunkSec Ransomware Developed Using AI appeared first on SecurityWeek.
This is an absolutely mind-boggling breach. How could no one looking at the list of participants in a Signal chat not question what a reporter was doing in a war plans chat? Jeffrey Goldberg reports: The world found out shortly before 2 p.m. eastern time on March 15 that the United States was bombing Houthi…