Tag: software
-
PyPI invalidates tokens stolen in GhostAction supply chain attack
The Python Software Foundation team has invalidated all PyPI tokens stolen in the GhostAction supply chain attack in early September, confirming that the threat actors didn’t abuse them to publish malware. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/pypi-invalidates-tokens-stolen-in-ghostaction-supply-chain-attack/
-
Brute force attacks hitting SonicWall firewall configuration backups
Tags: attack, authentication, backup, breach, cloud, computer, computing, credentials, data, defense, encryption, firewall, Hardware, login, mfa, password, phishing, software, technology, threatWhat are brute force attacks?: Brute force attacks use trial and error to crack passwords, login credentials, and encryption keys. They’ve been around since the beginning of the computer age, yet are still effective. Why? In part because people still use easily guessable passwords like ‘1234’, or their company’s name, or default passwords left on…
-
Wie veraltete Software Unternehmen angreifbar macht
Tags: softwareVeraltete Software ist weit verbreitet oft auch dort, wo man es nicht sofort vermuten würde. Beispiele für besonders langlebige Anwendungen sind das SABRE-Flugbuchungssystem oder die IRS-Systeme “Individual Master File” und “Business Master File” für Steuerdaten, die seit den frühen 1960er-Jahren im Einsatz sind. Während solche Anwendungen ihren Zweck bis heute erfüllen, existiert daneben eine […]…
-
Wie veraltete Software Unternehmen angreifbar macht
Tags: softwareVeraltete Software ist weit verbreitet oft auch dort, wo man es nicht sofort vermuten würde. Beispiele für besonders langlebige Anwendungen sind das SABRE-Flugbuchungssystem oder die IRS-Systeme “Individual Master File” und “Business Master File” für Steuerdaten, die seit den frühen 1960er-Jahren im Einsatz sind. Während solche Anwendungen ihren Zweck bis heute erfüllen, existiert daneben eine […]…
-
Qualys kommentiert die Risiken durch veraltete Software
Jede Software hat einen Lebenszyklus. Selbst Systeme, die jahrzehntelang zentrale Funktionen erfüllen, werden irgendwann ersetzt. Die zentrale Herausforderung liegt darin, Abhängigkeiten zu vermeiden, bei denen das Abschalten selbst als Risiko gilt. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/qualys-kommentiert-die-risiken-durch-veraltete-software/a42061/
-
AI is altering entry-level cyber hiring, and the nature of the skills gap
The certification trap and broken pipelines: Other experts argued that an over reliance on CVs and certifications is one of the biggest barriers to hiring success in cybersecurity because it acts to shut out otherwise qualified candidates.”Despite bringing valuable experience and perspectives, people with 10 years of work experience are put off because there is…
-
Zero Day Malware
Cybersecurity is a race against time. Every day, businesses face sophisticated threats designed to exploit the smallest vulnerabilities. Among the most dangerous of these are Zero Day Malware attacks, malicious software that targets unknown flaws before vendors or defenders even know they exist. Zero day malware represents the pinnacle of stealth and danger. Unlike First…
-
Zero Day Malware
Cybersecurity is a race against time. Every day, businesses face sophisticated threats designed to exploit the smallest vulnerabilities. Among the most dangerous of these are Zero Day Malware attacks, malicious software that targets unknown flaws before vendors or defenders even know they exist. Zero day malware represents the pinnacle of stealth and danger. Unlike First…
-
Warning: Brute force attacks hitting SonicWall firewall configuration backups
Tags: attack, authentication, backup, breach, cloud, computer, computing, credentials, data, defense, encryption, firewall, Hardware, login, mfa, password, phishing, software, technology, threatWhat are brute force attacks?: Brute force attacks use trial and error to crack passwords, login credentials, and encryption keys. They’ve been around since the beginning of the computer age, yet are still effective. Why? In part because people still use easily guessable passwords like ‘1234’, or their company’s name, or default passwords left on…
-
Malicious PyPI Packages Deliver SilentSync RAT
IntroductionZscaler ThreatLabz regularly monitors for threats in the popular Python Package Index (PyPI), which contains open source libraries that are frequently used by many Python developers. In July 2025, a malicious Python package named termncolor was identified by ThreatLabz. Just a few weeks later, on August 4, 2025, ThreatLabz uncovered two more malicious Python packages…
-
Raven Stealer Scavenges Chromium Data Via Telegram
The new lightweight stealer, distributed via underground forums and cracked software, demonstrates an important evolution in the stealth of commodity infostealing malware. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/raven-stealer-scavenges-chrome-data-telegram
-
Apple patches critical zero-day in ImageIO amid reports of targeted exploits
Attackers shifting to core image services: Attackers seem to be moving focus to image processing modules in core system software, rather than going after obvious network-facing services or applications. Last week, Samsung patched a critical bug (CVE-2025-21043) affecting its supplied image library ‘libimagecodec.quram.so’ that allowed remote code execution via a crafted image with zero user…
-
Apple patches critical zero-day in ImageIO amid reports of targeted exploits
Attackers shifting to core image services: Attackers seem to be moving focus to image processing modules in core system software, rather than going after obvious network-facing services or applications. Last week, Samsung patched a critical bug (CVE-2025-21043) affecting its supplied image library ‘libimagecodec.quram.so’ that allowed remote code execution via a crafted image with zero user…
-
World-Patient-Safety-Day 2025 Schutz von Patienten vor KI-gesteuerten Cyberangriffen
Check Point Software Technologies warnt zum World-Patient-Safety-Day 2025 vor der wachsenden Bedrohung durch KI-gestützte Cyber-Angriffe auf den Gesundheitssektor. Laut Health-ISAC erlebten im vergangenen Jahr 92 Prozent aller Gesundheitseinrichtungen mindestens einen Cyber-Vorfall, bei dem weltweit über 276 Millionen Patientendatensätze offengelegt wurden. Diese Angriffe beschränken sich nicht mehr nur auf Datendiebstahl, sondern verursachen auch verschobene Operationen, erzwungene…
-
Eine wohlüberlegte IT-Infrastruktur ist unerlässlich für den Erfolg einer Talent-Management-Software
Die Implementierung von Talent-Management-Software erfordert eine robuste IT-Infrastruktur, um ihre volle Leistungsfähigkeit zu entfalten. Durch die Optimierung von Serverkapazität, Cloud-Überwachung und Systemintegrationen können Unternehmen Effizienz und Skalierbarkeit sicherstellen. Praktische Einblicke helfen Ihnen, Ihre IT-Infrastruktur für ein nahtloses Talent-Management zu optimieren. Die Anpassung Ihrer IT-Infrastruktur ist der Schlüssel zur erfolgreichen Einführung von Talent-Management-Software. Dabei geht es…
-
5 steps for deploying agentic AI red teaming
Tags: access, ai, application-security, attack, automation, blizzard, business, cloud, control, data, defense, exploit, framework, gartner, governance, infrastructure, malicious, open-source, RedTeam, risk, risk-assessment, service, software, threat, tool, zero-trustFive steps to take towards implementing agentic red teaming: 1. Change your attitude Perhaps the biggest challenge for agentic red teaming is adjusting your perspective in how to defend your enterprise. “The days where database admins had full access to all data are over,” says Suer. “We need to have a fresh attitude towards data…
-
Supply Chain Attack >>Shai-Halud<< Targets 477 NPM Packages
A major supply chain attack dubbed >>Shai-Halud>Shai-Halud
-
Supply Chain Attack >>Shai-Halud<< Targets 477 NPM Packages
A major supply chain attack dubbed >>Shai-Halud>Shai-Halud
-
No More Blind Spots: Achieving Complete SDLC Visibility in a Multi-Cloud World
Tags: access, attack, breach, business, ciso, cloud, compliance, container, control, data, exploit, identity, infrastructure, least-privilege, monitoring, programming, risk, service, software, threat, vulnerabilityStruggling with a messy, multi-cloud environment? Learn how Tenable’s unified cloud security approach helps you eliminate dangerous blind spots, attain complete visibility and control, and secure your assets from the first line of code to full production. Key takeaways Fragmented multi-cloud environments create risky blind spots, making unified visibility essential to identify and manage security…
-
Warning: Hackers have inserted credential-stealing code into some npm libraries
Tags: api, attack, authentication, ciso, cloud, credentials, github, google, hacker, Hardware, incident response, malware, mfa, monitoring, open-source, phishing, sans, software, supply-chain, threatMore than 40 packages affected: One of the researchers who found and flagged the hack Monday was French developer François Best, and it was also described in blogs from StepSecurity, Socket, ReversingLabs and Ox Security. These blogs contain a full list of compromised packages and indicators of compromise.Researchers at Israel-based Ox Security said there was a…
-
Self-Replicating ‘Shai-hulud’ Worm Targets NPM Packages
The newly emerged worm has spread across hundreds of open source software packages, stealing credentials and infecting other components without much direct attacker input. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/self-replicating-shai-hulud-worm-npm-packages
-
Apple addresses dozens of vulnerabilities in latest software for iPhones, iPads and Macs
The tech giant doesn’t provide details about the severity of vulnerabilities it discloses, but none of the new defects are under active attack. First seen on cyberscoop.com Jump to article: cyberscoop.com/apple-security-updates-september-2025/
-
Check Point erwirbt Lakera zur Absicherung von LLMs, GenAI und KI-Agenten
Check Point Software Technologies gab den Abschluss einer Vereinbarung zur Übernahme von Lakera bekannt, einer der weltweit führenden KI-nativen Sicherheitsplattformen für agentenbasierte KI-Anwendungen. Mit dieser Akquisition setzt Check Point einen neuen Standard in der Cyber-Sicherheit und wird einen vollständigen End-to-End-KI-Sicherheits-Stack anbieten, der Unternehmen bei der Beschleunigung ihrer KI-Transformation schützt. ‘KI verändert jeden Geschäftsprozess, schafft aber…
-
Self-Replicating Worm Hits 180+ npm Packages to Steal Credentials in Latest Supply Chain Attack
Cybersecurity researchers have flagged a fresh software supply chain attack targeting the npm registry that has affected more than 40 packages that belong to multiple maintainers.”The compromised versions include a function (NpmModule.updatePackage) that downloads a package tarball, modifies package.json, injects a local script (bundle.js), repacks the archive, and republishes it, enabling First seen on thehackernews.com…
-
40+ npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials
Cybersecurity researchers have flagged a fresh software supply chain attack targeting the npm registry that has affected more than 40 packages that belong to multiple maintainers.”The compromised versions include a function (NpmModule.updatePackage) that downloads a package tarball, modifies package.json, injects a local script (bundle.js), repacks the archive, and republishes it, enabling First seen on thehackernews.com…
-
Top 10 Best Dynamic Application Security Testing (DAST) Platforms in 2025
In today’s fast-paced software development world, where applications are released at an unprecedented rate, ensuring their security is more critical than ever. Dynamic Application Security Testing (DAST) has emerged as a fundamental practice for modern development teams. DAST tools, often referred to as >>black box
-
Größter Supply-Chain-Angriff in der Geschichte von npm
Die Sicherheitsforscher von Check Point Software Technologies arbeiten den großen npm-Diebstahl auf: Am 8. September 2025 erlebte das Javascript-Ökosystem den größten Supply-Chain-Angriff in der Geschichte von npm. Durch eine gezielte Phishing-Kampagne wurde das Konto eines bekannten Maintainers kompromittiert. In der Folge schleusten die Angreifer Malware mit Krypto-Stealer-Funktion in mehr als 18 zentrale npm-Pakete ein. Diese…

