Tag: cyberattack
-
Japanese retailer Askul confirms data leak after cyberattack claimed by Russia-linked group
The company said the breach exposed contact information and inquiry details from users of its online stores, Askul, Lohaco and Soloel Arena, as well as supplier data stored on its internal servers. First seen on therecord.media Jump to article: therecord.media/askul-confirms-data-breach-ransomware-incident
-
Webseiten der Stadt Trier wegen DDoS offline (3. Nov. 2025)
Ein Blog-Leser aus dem Raum Trier hat mich per E-Mail informiert (danke dafür), dass die öffentlichen Seiten der Stadt Trier seit dem Wochenende offline seien. Ein massiver DDoS-Angriff hat wohl das betreffende Angebot aus dem Web gefegt, sprich Besucher konnten … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/11/03/webseiten-der-stadt-trier-wegen-ddos-offline/
-
Cyberkriminelle stehlen Fracht per Fernwartungstool
Tags: cyberattackIn der Transport- und Logistikbranche häufen sich Berichte über digitale Angriffe, die direkt auf Warenlieferungen abzielen. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/cyberkriminelle-stehlen-fracht-per-fernwartungstool
-
YouGov-Umfrage – Mehrheit der Deutschen sieht Bedrohung durch hybride Angriffe
Tags: cyberattackFirst seen on security-insider.de Jump to article: www.security-insider.de/deutschland-bedrohung-durch-cyber-hybride-angriffe-laut-umfrage-a-e53347813693985599f20b1f7c8f6060/
-
Hackers are attacking Britain’s drinking water suppliers
The U.K.’s water suppliers have reported five cyberattacks since January 2024, according to information reviewed by Recorded Future News. The incidents did not affect the safety of water supplies, but they highlight an increasing threat. First seen on therecord.media Jump to article: therecord.media/britain-water-supply-cybersecurity-incident-reports-dwi-nis
-
Hackers are attacking Britain’s drinking water suppliers
The U.K.’s water suppliers have reported five cyberattacks since January 2024, according to information reviewed by Recorded Future News. The incidents did not affect the safety of water supplies, but they highlight an increasing threat. First seen on therecord.media Jump to article: therecord.media/britain-water-supply-cybersecurity-incident-reports-dwi-nis
-
Hackers are attacking Britain’s drinking water suppliers
The U.K.’s water suppliers have reported five cyberattacks since January 2024, according to information reviewed by Recorded Future News. The incidents did not affect the safety of water supplies, but they highlight an increasing threat. First seen on therecord.media Jump to article: therecord.media/britain-water-supply-cybersecurity-incident-reports-dwi-nis
-
âš¡ Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More
Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage of new security problems”, some just hours after being found. No system was fully safe.From spying and fake job scams to strong ransomware and tricky phishing, the attacks came from all sides. Even encrypted…
-
âš¡ Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More
Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage of new security problems”, some just hours after being found. No system was fully safe.From spying and fake job scams to strong ransomware and tricky phishing, the attacks came from all sides. Even encrypted…
-
Anthropic Claude Unternehmensdaten gefährdet
Tags: ai, api, bug, bug-bounty, cyberattack, data, exploit, google, infrastructure, injection, network, risk, vulnerabilityEin aktueller Report zeigt, wie sich über Anthropic Claude sensible Daten extrahieren lassen.Eine kürzlich bekannt gewordene Schwachstelle im KI-Assistenten Claude von Anthropic könnte von Angreifern ausgenutzt werden, um heimlich Unternehmensdaten zu exfiltrieren. Dabei lassen sich auch Sicherheitskonfigurationen umgehen, die solche Attacken eigentlich verhindern sollen. Wie sich das mithilfe indirekter Prompt-Injection-Techniken und Claudes Code Interpreter bewerkstelligen…
-
Cyberbedrohungen in vernetzten Haushalten haben sich im letzten Jahr verdreifacht
Smart-TVs, Streaming-Boxen, Router und Kameras das Internet-of-Things-Ökosystem (IoT) in Haushalten wächst. Mit ihm nimmt auch die Gefahr dramatisch zu, dass Verbraucher Opfer von Cyberangriffen werden. Angreifer nutzen verstärkt Automatisierung, unsichere Firmware und veraltete Geräte, um digitale Haushalte in großem Umfang zu kompromittieren. Zu diesem Schluss kommen Bitdefender und Netgear im aktuellen ‘2025 IoT Security […]…
-
Webformulare als Phishing-Einfallstor
Cyberkriminelle entwickeln ihre Methoden stetig weiter, um Phishing-Angriffe glaubwürdiger zu gestalten und Sicherheitsmechanismen zu umgehen. Der jüngste Bericht des KnowBe4-Threat-Lab zeigt, wie Angreifer zunehmend legitime Kommunikationskanäle missbrauchen, von kompromittierten E-Mail-Konten bis hin zu Webformularen auf seriösen Websites. Von BEC zu CBC: Wenn ganze Unternehmen kompromittiert werden Business-E-Mail-Compromise (BEC) zählt seit Jahren zu den effektivsten […]…
-
Anthropic Claude Unternehmensdaten gefährdet
Tags: ai, api, bug, bug-bounty, cyberattack, data, exploit, google, infrastructure, injection, network, risk, vulnerabilityEin aktueller Report zeigt, wie sich über Anthropic Claude sensible Daten extrahieren lassen.Eine kürzlich bekannt gewordene Schwachstelle im KI-Assistenten Claude von Anthropic könnte von Angreifern ausgenutzt werden, um heimlich Unternehmensdaten zu exfiltrieren. Dabei lassen sich auch Sicherheitskonfigurationen umgehen, die solche Attacken eigentlich verhindern sollen. Wie sich das mithilfe indirekter Prompt-Injection-Techniken und Claudes Code Interpreter bewerkstelligen…
-
New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea
Tags: attack, backdoor, cyberattack, email, korea, north-korea, phishing, spear-phishing, threat, vpnThe North Korea-linked threat actor known as Kimsuky has distributed a previously undocumented backdoor codenamed HttpTroy as part of a likely spear-phishing attack targeting a single victim in South Korea.Gen Digital, which disclosed details of the activity, did not reveal any details on when the incident occurred, but noted that the phishing email contained a…
-
Proof of Concept für Angriff auf weitverbreitete DNS-Lösung öffentlich – Schwachstelle in BIND ausnutzbar
First seen on security-insider.de Jump to article: www.security-insider.de/gefaehrliche-sicherheitsluecken-bind-dns-server-software-a-29d7fa8b2275c3c28fbe052a314b9ca2/
-
IT-Grundhygiene als Basis für Sicherheit: 5 Schritte zu stabiler IT-Security
Ohne Basics kein hinreichender Schutz. Zero Trust, KI oder Quantenkryptographie moderne Security-Konzepte sind in aller Munde. Doch die Realität zeigt, dass fehlende Basics oft die Ursache für den Erfolg von Cyberangriffen sind. Ungepatchte Systeme, schwache Passwörter oder offene Ports machen Unternehmen angreifbar und das oft über Jahre hinweg. Selbst moderne Verteidigungsstrategien scheitern, wenn… First seen…
-
Cyberangriffe 2025: Wenn KI zur Waffe wird
Angriffe auf Unternehmen werden zunehmend raffinierter und die Täter immer schwerer zu erkennen. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/cyberangriffe-2025-ki-waffe
-
Australia warns of BadCandy infections on unpatched Cisco devices
The Australian government is warning about ongoing cyberattacks against unpatched Cisco IOS XE devices in the country to infect routers with the BadCandy webshell. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/australia-warns-of-badcandy-infections-on-unpatched-cisco-devices/
-
Cyberspionage – Hybride Angriffe auf Europas Drohnenindustrie
First seen on security-insider.de Jump to article: www.security-insider.de/cyberspionage-desinformationskampagnen-gefahr-europas-drohnenindustrie-a-6941492a7051af8da7e3148f3762d375/
-
Stolen Credentials Drive the Rise of Financially Motivated Cyberattacks
Throughout the first half of 2025, the FortiGuard Incident Response team investigated dozens of security breaches across multiple industries driven by financially motivated threat actors. What emerged from these investigations was a striking pattern: attackers are abandoning complex, malware-heavy approaches in favor of a deceptively simple method”, simply logging in using stolen credentials and leveraging…
-
Stolen Credentials Drive the Rise of Financially Motivated Cyberattacks
Throughout the first half of 2025, the FortiGuard Incident Response team investigated dozens of security breaches across multiple industries driven by financially motivated threat actors. What emerged from these investigations was a striking pattern: attackers are abandoning complex, malware-heavy approaches in favor of a deceptively simple method”, simply logging in using stolen credentials and leveraging…
-
Ukrainian Conti Ransomware Suspect Extradited to US from Ireland
Ukrainian man accused of helping run Conti ransomware extradited from Ireland to the U.S. to face charges over global cyberattacks and $150M in ransom payments. First seen on hackread.com Jump to article: hackread.com/ukraine-conti-ransomware-extradite-us-ireland/
-
Ukrainian Conti Ransomware Suspect Extradited to US from Ireland
Ukrainian man accused of helping run Conti ransomware extradited from Ireland to the U.S. to face charges over global cyberattacks and $150M in ransom payments. First seen on hackread.com Jump to article: hackread.com/ukraine-conti-ransomware-extradite-us-ireland/
-
Cyberangriffe auf Satelliten gefährden kritische Infrastrukturen – Wie verwundbar Europas Satellitenkommunikation wirklich ist
Tags: cyberattackFirst seen on security-insider.de Jump to article: www.security-insider.de/satelliten-cyberangriffe-europa-a-437d63d47e5f053b0861379952af6eb8/
-
Cyberangriffe auf Satelliten gefährden kritische Infrastrukturen – Wie verwundbar Europas Satellitenkommunikation wirklich ist
Tags: cyberattackFirst seen on security-insider.de Jump to article: www.security-insider.de/satelliten-cyberangriffe-europa-a-437d63d47e5f053b0861379952af6eb8/
-
Suspected Chinese actors compromise U.S. Telecom firm Ribbon Communications
A nation-state actor, likely a China-nexus one, hacked the U.S.-based technology company Ribbon Communications. Ribbon Communications is a U.S.-based technology company that provides telecommunications and networking. Ribbon Communications employs approximately 3,052 people as of December 31, 2024. The company reported annual revenue of US $834 million in 2024. The U.S. telecom provider disclosed a cyberattack…
-
Threat Actors Exploiting Open-Source C2 Frameworks to Deploy Malicious Payloads
Tags: control, cyber, cyberattack, cybercrime, exploit, framework, hacking, intelligence, malicious, open-source, russia, threat, toolThreat intelligence researchers have uncovered a growing campaign where cybercriminals are weaponizing AdaptixC2, a legitimate open-source Command and Control framework designed for authorized penetration testers. The discovery reveals how threat actors are exploiting ethical hacking tools to conduct sophisticated cyberattacks, with significant ties linking the framework’s development to Russian criminal networks. Silent Push threat analysts…

