Tag: cyberattack
-
Warum KI das klassische Sicherheitsmodell aushebelt
KI beschleunigt Angriffe schneller, als klassische Sicherheitsmodelle reagieren können. Warum Erkennung und Reaktion nicht mehr ausreichen und weshalb Eindämmung zur entscheidenden Disziplin für Unternehmenssicherheit wird. Jahrelang war »assume a breach«, also »von einem Sicherheitsvorfall auszugehen« eine nützliche Denkweise in der Sicherheit, um eine bessere Erkennung und Reaktion zu fördern. Mit Initiativen wie Project… First seen…
-
On Anthropic’s Mythos Preview and Project Glasswing
The cybersecurity industry is obsessing over Anthropic’s new model, Claude Mythos Preview, and its effects on cybersecurity. Anthropic said that it is not releasing it to the general public because of its cyberattack capabilities, and has launched Project Glasswing to run the model against a whole slew of public domain and proprietary software, with the…
-
Hacker group threatens to release Grand Theft Auto VI data in Rockstar Games attack
The group named ShinyHunters have accessed a third party server and have given the company a deadline of 14 April to enter ransom negotiations Rockstar Games, the studio behind Grand Theft Auto, has been the target of a cyberattack for the second time in three years. A hacker group called ShinyHunters said it would release…
-
Rockstar Games receives “pay or leak” warning after cyberattack
Rockstar Games, the developer behind titles such as Grand Theft Auto and Red Dead Redemption, has confirmed a cyberattack claimed by hacking group ShinyHunters, which says it … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/13/rockstar-games-data-breach-shinyhunters/
-
Gym giant Basic-Fit confirms data on a million members stolen in cyberattack
Names, addresses, dates of birth, and bank details accessed, though not passwords First seen on theregister.com Jump to article: www.theregister.com/2026/04/13/basicfit_breach/
-
Iran-linked group Handala claims to have breached three major UAE organizations
Iran-linked group Handala claims to have breached three major UAE organizations, Dubai Courts, Dubai Land Department, and Dubai Roads & Transport Authority The group Handala claimed a major cyberattack against the UAE, targeting Dubai Courts Department, Dubai Land Department, and Dubai Roads and Transport Authority. They alleged destroying 6 petabytes of data and stealing 149 TB…
-
Intoxalock Vehicle Breathalyzers Downed by Cyberattack, Leave Drivers Stranded
Tags: cyberattackParking lots were filled with cars that couldn’t be moved and drivers had to awkwardly explain to employers why they couldn’t make it to work after a cyberattack took down the Intoxalock vehicle breathalyzer system. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/intoxalock-vehicle-breathalyzers-downed-by-cyberattack-leave-drivers-stranded/
-
42 % der Organisationen berichten über einen Anstieg böswilliger Insider-Bedrohungen
Globale Studie zeigt Diskrepanz zwischen Sicherheitsbewusstsein und technischen Kontrollen während KI-gestützte Angriffe zunehmen und Kollaborationstools die Angriffsfläche vergrößern. Mimecast, ein Anbieter von Cybersicherheitslösungen, der die Absicherung menschlicher Risiken durch präzise entwickelte KI neu definieren will, veröffentlichte seinen 9. State of Human Risk Report. Die Studie zeigt: 42 Prozent der Organisationen verzeichneten im vergangenen… First seen…
-
Mensch im Fokus: Fünf Stellhebel gegen Insider”‘Risiken und KI”‘gestützte Angriffe
Gute Sicherheitsstrategien scheitern heute weniger am fehlenden Wissen über Bedrohungen als an der konsequenten Umsetzung wirksamer Maßnahmen. Trotz wachsender Risiken durch Insider, KI”‘gestützte Angriffe und erweiterte Kollaborationsplattformen arbeiten viele Unternehmen weiterhin mit fragmentierten Sicherheitsansätzen. Welche fünf Handlungsfelder sind jetzt entscheidend, um menschliche Risiken wirksam zu reduzieren? Das Problem in den meisten Organisationen ist nicht… First…
-
Mensch im Fokus: Fünf Stellhebel gegen Insider”‘Risiken und KI”‘gestützte Angriffe
Gute Sicherheitsstrategien scheitern heute weniger am fehlenden Wissen über Bedrohungen als an der konsequenten Umsetzung wirksamer Maßnahmen. Trotz wachsender Risiken durch Insider, KI”‘gestützte Angriffe und erweiterte Kollaborationsplattformen arbeiten viele Unternehmen weiterhin mit fragmentierten Sicherheitsansätzen. Welche fünf Handlungsfelder sind jetzt entscheidend, um menschliche Risiken wirksam zu reduzieren? Das Problem in den meisten Organisationen ist nicht… First…
-
Mensch im Fokus: Fünf Stellhebel gegen Insider”‘Risiken und KI”‘gestützte Angriffe
Gute Sicherheitsstrategien scheitern heute weniger am fehlenden Wissen über Bedrohungen als an der konsequenten Umsetzung wirksamer Maßnahmen. Trotz wachsender Risiken durch Insider, KI”‘gestützte Angriffe und erweiterte Kollaborationsplattformen arbeiten viele Unternehmen weiterhin mit fragmentierten Sicherheitsansätzen. Welche fünf Handlungsfelder sind jetzt entscheidend, um menschliche Risiken wirksam zu reduzieren? Das Problem in den meisten Organisationen ist nicht… First…
-
Censys finds 5,219 devices exposed to attacks by Iranian APTs, majority in U.S.
Tags: apt, attack, automation, cisa, cyberattack, data-breach, exploit, infrastructure, Internet, iran, technology, threatCensys researchers found 5,219 exposed Rockwell PLCs online, mostly in the U.S., urging defenders to secure or disconnect them. On April 7, 2026, U.S. agencies, including FBI, CISA, and NSA, warned of Iran-linked APTs exploiting internet-exposed Rockwell Automation PLCs. Threat actors are carrying out cyberattacks targeting internet-connected operational technology (OT) across multiple critical infrastructure sectors.…
-
News brief: Iran cyberattacks escalate, U.S. targets named
Check out the latest security news from the Informa TechTarget team. First seen on techtarget.com Jump to article: www.techtarget.com/searchsecurity/news/366641212/News-brief-Iran-cyberattacks-escalate-US-targets-named
-
Claude and ChatGPT Exploited in Sweeping Cyber Campaign Against Government Agencies
In a groundbreaking technical report released by Gambit Security researcher Eyal Sela, new details have emerged about a massive cyberattack targeting government infrastructure. A single threat actor successfully leveraged artificial intelligence platforms to breach nine Mexican government agencies. The campaign, which operated from late December 2025 through mid-February 2026, resulted in the exfiltration of hundreds…
-
TDL 019 – The Psychology Behind a Cyber Breach and the Leaders Who Survive It – Nim Nadarajah
Tags: access, ai, apple, automation, breach, business, cctv, ceo, cio, ciso, cloud, computing, conference, control, corporate, crowdstrike, cve, cyber, cyberattack, cybersecurity, data, dns, edr, email, finance, firewall, governance, group, healthcare, incident, incident response, infrastructure, injection, insurance, Internet, jobs, law, LLM, metric, microsoft, msp, network, office, powershell, privacy, programming, psychology, risk, saas, service, siem, soar, soc, software, startup, strategy, supply-chain, switch, technology, threat, tool, training, usa, vulnerability, windows, zero-trustLeading Through the Cyber Abyss In Episode 019 of The Defender’s Log, host David Redekop sits down with Nim Nadarajah, CISO and Managing Partner of Critical Matrix, to explore the evolving landscape of cybersecurity leadership. From the “annual pilgrimage” of RSAC 2026 to the front lines of incident response, the conversation shifts from technical bits…
-
TDL 019 – The Psychology Behind a Cyber Breach and the Leaders Who Survive It – Nim Nadarajah
Tags: access, ai, apple, automation, breach, business, cctv, ceo, cio, ciso, cloud, computing, conference, control, corporate, crowdstrike, cve, cyber, cyberattack, cybersecurity, data, dns, edr, email, finance, firewall, governance, group, healthcare, incident, incident response, infrastructure, injection, insurance, Internet, jobs, law, LLM, metric, microsoft, msp, network, office, powershell, privacy, programming, psychology, risk, saas, service, siem, soar, soc, software, startup, strategy, supply-chain, switch, technology, threat, tool, training, usa, vulnerability, windows, zero-trustLeading Through the Cyber Abyss In Episode 019 of The Defender’s Log, host David Redekop sits down with Nim Nadarajah, CISO and Managing Partner of Critical Matrix, to explore the evolving landscape of cybersecurity leadership. From the “annual pilgrimage” of RSAC 2026 to the front lines of incident response, the conversation shifts from technical bits…
-
Stryker warns of earnings fallout from March cyberattack
The medtech company was targeted in a wiper attack linked to an Iran-sponsored threat group. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/stryker-Iran-cyberattack-material-impact-earnings/817211/
-
Nearly 4,000 US industrial devices exposed to Iranian cyberattacks
The attack surface targeted by Iranian-linked hackers in cyberattacks against U.S. critical infrastructure networks includes thousands of Internet-exposed programmable logic controllers (PLCs) manufactured by Rockwell Automation. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/nearly-4-000-us-industrial-devices-exposed-to-iranian-cyberattacks/
-
Wie Unternehmen sich gegen die Industrialisierung moderner Cyberangriffe verteidigen können
Neue Analysen der SentinelLABS- und Wayfinder-Teams zeigen, wie Angreifer gezielt die Reibungsflächen zwischen IT-Sicherheit und operativem Betrieb ausnutzen. SentinelOne hat seinen aktuellen Annual Threat Report veröffentlicht [1]ngen. Sie gehen einen Schritt weiter und nutzen systematisch genau jene Identitäts-, Infrastruktur- und Automatisierungssysteme aus, auf denen moderne Unternehmen aufgebaut sind. Im Zeitalter industrialisierter Angriffe stehen Sicherheitsteams vor……
-
Zwei Drittel aller OT-Angriffe zielen auf Perimeter-Geräte – Industrielle Router im Fadenkreuz von Cyberangreifern
First seen on security-insider.de Jump to article: www.security-insider.de/forescout-honeypot-ot-perimeter-geraete-angriffe-ssh-telnet-a-73cd48de480367ed69f0dfbfcb1dd385/
-
TeamPCP griff EU und Cisco an – Massive Supply-Chain-Angriffe über Trivy-Tool und Telnyx-PyPI
First seen on security-insider.de Jump to article: www.security-insider.de/teampcp-supply-chain-angriffe-trivy-telnyx-a-ce4e1dc1ec2f5930ec814664eefd2541/
-
Missbrauch als Einfallstor für Cyberangriffe mittels KI-Automatisierung
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/linkedin-missbrauch-einfallstor-cyberangriffe-ki-automatisierung
-
Do Ceasefires Slow Cyberattacks? History Suggests Not
The cybersecurity community is waiting with bated breath to see if Iranian hackers will honor a ceasefire that doesn’t actually name or directly involve them. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-analytics/ceasefires-slow-cyberattacks-history
-
Russia accuses former Radio Free Europe journalist of aiding cyberattacks for Ukraine
In a statement to state-owned media, the FSB said the suspect joined a Telegram channel controlled by the Security Service of Ukraine (SBU) and passed information about a local print publication covering Russia’s war in Ukraine. First seen on therecord.media Jump to article: therecord.media/russia-accuses-radio-free-europe-journalist-aiding-ukraine-cyberattack
-
Russia accuses former Radio Free Europe journalist of aiding cyberattacks for Ukraine
In a statement to state-owned media, the FSB said the suspect joined a Telegram channel controlled by the Security Service of Ukraine (SBU) and passed information about a local print publication covering Russia’s war in Ukraine. First seen on therecord.media Jump to article: therecord.media/russia-accuses-radio-free-europe-journalist-aiding-ukraine-cyberattack
-
Russia accuses former Radio Free Europe journalist of aiding cyberattacks for Ukraine
In a statement to state-owned media, the FSB said the suspect joined a Telegram channel controlled by the Security Service of Ukraine (SBU) and passed information about a local print publication covering Russia’s war in Ukraine. First seen on therecord.media Jump to article: therecord.media/russia-accuses-radio-free-europe-journalist-aiding-ukraine-cyberattack
-
Nach Cyberangriff auf FBI-Chef – USA melden iranischen Hackerangriff auf Infrastruktur
First seen on security-insider.de Jump to article: www.security-insider.de/iran-nahe-hacker-angriffe-us-infrastruktur-iranwire-a-099bb19960db4464add450892a23b058/
-
Nach Cyberangriff auf FBI-Chef – USA melden iranischen Hackerangriff auf Infrastruktur
First seen on security-insider.de Jump to article: www.security-insider.de/iran-nahe-hacker-angriffe-us-infrastruktur-iranwire-a-099bb19960db4464add450892a23b058/

