
Category: Threat Intel Reports
-
Google’s government deal is the ‘first of many’ to come, DOGE says
Google’s government deal is the ‘first of many’ to come, DOGE says================================================================== Eva Marie Uzcategui/Getty Images | Get…
-
Microsoft Defender will isolate undiscovered endpoints to block attacks
Microsoft is testing a new Defender for Endpoint capability that will block traffic to and from undiscovered endpoints to thwart…
-
Microsoft total recalls Recall totally to Copilot+ PCs
#### [OSes](/software/oses/)**34** Microsoft total recalls Recall totally to Copilot+ PCs======================================================**34** Redmond hopes you’ve forgotten or got over why everyone hated…
-
Beware Developers! Malicious NPM Packages Targeting PayPal Users to Steal Sensitive Data
FortiGuard Labs, Fortinet’s AI-driven threat intelligence arm, has uncovered a series of [malicious NPM packages](https://cybersecuritynews.com/lazarus-adds-new-malicious-npm-packages/) designed to steal sensitive information…
-
RansomHub Ransomware-as-a-service Facing Internal Conflict as Affiliates Lost Access to Chat Portals
RansomHub, a relatively newer player in the ransomware-as-a-service (RaaS) landscape, is experiencing significant internal turmoil after affiliates suddenly lost access…
-
NVIDIA’s Incomplete Patch for Critical Flaw Lets Attackers Steal AI Model Data
A critical vulnerability in NVIDIA’s Container Toolkit, CVE-2024-0132, remains exploitable due to an incomplete patch, endangering AI infrastructure and sensitive…
-
Sapphire Werewolf Enhances Toolkit With New Amethyst Stealer to Attack Energy Companies
Cybersecurity experts have detected a sophisticated campaign targeting energy sector companies, as the threat actor known as Sapphire Werewolf deploys…
-
Google Unveils A2A Protocol That Enable AI Agents Collaborate to Automate Workflows
Google has announced the launch of Agent2Agent Protocol (A2A), a groundbreaking open protocol designed to enable AI agents to communicate…
-
Hackers Actively Exploit Patched Fortinet FortiGate Devices to Gain Root Access Using Symbolic Link
Fortinet has uncovered a sophisticated post-exploitation technique used by a threat actor to maintain unauthorized access to FortiGate devices, even…

