News
AI-Driven Phishing Attacks Bypass Email Filters, Land in Inboxes
21+ hour, 7+ min ago (684+ words) AI-generated phishing is rapidly reshaping email risk, with more attacks slipping past filters and landing directly in users" inboxes, even though AI-generated emails remain a minority of total phishing. The human element remains central: 68% of breaches involve people, and 8095% of…...
Microsoft Copilot Email and Teams Summarization Flaw Opens Door to Phishing Attacks
5+ hour, 31+ min ago (370+ words) Microsoft Copilot integrates directly into these workflows, pulling context from various Microsoft 365 applications to streamline tasks. However, this convenience introduces a new security boundary: what happens when Copilot follows hidden instructions written by an attacker inside an email?" This technique,…...
Signal Confirms Sophisticated Phishing Scheme Caused Account Compromises
3+ day, 3+ hour ago (252+ words) The breaches stem entirely from external social engineering tactics rather than technical vulnerabilities within the application itself. Threat actors execute these account takeovers by manipulating users into voluntarily surrendering their sensitive authentication data, as reported by Signal. The primary objective…...
Cloudflare Pingora Flaws Enable Request Smuggling and Cache Poisoning Attacks
3+ day, 50+ min ago (355+ words) In a recent security advisory, Cloudflare disclosed multiple HTTP request smuggling and cache poisoning vulnerabilities in its open-source Pingora framework. Cloudflare has explicitly confirmed that its own Content Delivery Network and customer traffic are completely safe. Because Cloudflare does not…...
What Influences the Cost of Accessing Blocked Websites
1+ week, 6+ day ago (1183+ words) Last year, my neighbor's eight-year-old son was upset when he got home from school and'couldn't'access his favorite learning website on the family computer. "It says this page isn't allowed," he told his mom, pointing at the screen as if the…...
MaaS VIP Keylogger Campaign Uses Steganography to Steal Credentials at Scale
3+ day, 23+ hour ago (266+ words) Researchers observed fraudulent purchase-order emails that encouraged victims to open an attached RAR file. While the social engineering lures and packaging layouts varied, the core payload behavior and in-memory execution style remained consistent. In the first observed case, the malware…...
AWS-LC Flaw Exposes Amazon Users to Attacks by Bypassing Certificate Chain Validation
1+ week, 2+ hour ago (182+ words) Discovered through a coordinated disclosure process with the AISLE Research Team, these flaws pose a serious risk to cloud infrastructure. Developers rely heavily on AWS-LC as a general-purpose library to secure digital communications. Amazon strongly recommends that all customers upgrade…...
Apache ActiveMQ Flaw Enables DoS Attacks via Malformed Network Packets
1+ week, 51+ min ago (411+ words) Security researchers have uncovered a significant vulnerability in Apache ActiveMQ, a popular open-source message broker used by enterprises to route data between applications. A successful attack against a message broker can halt critical internal communications and disrupt entire application ecosystems....
Cyberattack Alert: Hackers Impersonate LastPass Support to Steal Vault Passwords
1+ week, 1+ day ago (343+ words) The phishing campaign uses'fake email chains'that appear to be forwarded internal messages about suspicious account activity. Attackers craft messages to make it appear that someone else is attempting unauthorized actions, such as'exporting vault data,'recovering full accounts, or'registering new trusted…...
RedAlert Mobile Espionage Campaign Exploits Trojanized Rocket Alert App to Spy on Civilians
1+ week, 1+ day ago (310+ words) The campaign targets civilians by distributing a'trojanized version of the Israeli Home Front Command's official Rocket Alert application, aiming to harvest sensitive personal and geolocation data under the guise of legitimate security notifications. These fraudulent messages trick users into sideloading…...