New research shows attackers increasingly abusing APIs at machine speed as AI-driven systems widen exposure and amplify impact. The post API Threats Grow in Scale as AI Expands the Blast Radius appeared first on SecurityWeek.
Publicerad: 2026-02-17 15:00:00 CETAs nation-state actors, ransomware groups, and aging infrastructure collide, organizations must rethink how they defend critical operations through resilience, visibility, and modern security strategies. The post Cyber Insights 2026: The…
Publicerad: 2026-02-17 15:00:00 CETPolish police said they found evidence of cybercrime on the 47-year-old suspect’s devices. The post Man Linked to Phobos Ransomware Arrested in Poland appeared first on SecurityWeek.
Publicerad: 2026-02-17 13:54:34 CETCybersecurity researchers have disclosed details of a new SmartLoader campaign that involves distributing a trojanized version of a Model Context Protocol (MCP) server associated with Oura Health to deliver an information stealer known as…
Publicerad: 2026-02-17 13:42:00 CETCloud attacks move fast — faster than most incident response teams. In data centers, investigations had time. Teams could collect disk images, review logs, and build timelines over days. In the cloud, infrastructure is short-lived. A…
Publicerad: 2026-02-17 12:59:00 CETMy objectiveThe role of NDR in SOC workflowsStarting up the NDR systemHow AI complements the human responseWhat else did I try out?What could I see with NDR that I wouldn’t otherwise?Am I ready to be a network security analyst now? My…
Publicerad: 2026-02-17 12:30:00 CETIndustrial cybersecurity firm Dragos has published its 9th Year in Review OT/ICS Cybersecurity Report. The post 3 Threat Groups Started Targeting ICS/OT in 2025: Dragos appeared first on SecurityWeek.
Publicerad: 2026-02-17 12:05:26 CETNew research from Microsoft has revealed that legitimate businesses are gaming artificial intelligence (AI) chatbots via the "Summarize with AI" button that's being increasingly placed on websites in ways that mirror classic search engine…
Publicerad: 2026-02-17 10:31:00 CETResearchers at ETH Zurich have tested the security of Bitwarden, LastPass, Dashlane, and 1Password password managers. The post Password Managers Vulnerable to Vault Compromise Under Malicious Server appeared first on SecurityWeek.
Publicerad: 2026-02-17 10:30:46 CETApple on Monday released a new developer beta of iOS and iPadOS with support for end-to-end encryption (E2EE) in Rich Communications Services (RCS) messages. The feature is currently available for testing in iOS and iPadOS 26.4 Beta, and…
Publicerad: 2026-02-17 07:44:00 CETCybersecurity researchers disclosed they have detected a case of an information stealer infection successfully exfiltrating a victim's OpenClaw (formerly Clawdbot and Moltbot) configuration environment. "This finding marks a significant…
Publicerad: 2026-02-16 19:43:00 CETA new study has found that multiple cloud-based password managers, including Bitwarden, Dashlane, and LastPass, are susceptible to password recovery attacks under certain conditions. "The attacks range in severity from integrity violations…
Publicerad: 2026-02-16 19:06:00 CETThe GS7 cyberthreat group targets US financial institutions with near-perfect imitations of corporate portals to steal credentials and gain remote access.
Publicerad: 2026-02-16 19:05:55 CETLuxury brands were among the dozens of major companies whose Salesforce instances were targeted by Scattered LAPSUS$ Hunters. The post Dior, Louis Vuitton, Tiffany Fined $25 Million in South Korea After Data Breaches appeared first on SecurityWeek.
Publicerad: 2026-02-16 16:09:13 CET30 copycat apps tricked users, and Google itself, into thinking they're legitimate AI tools.
Publicerad: 2026-02-16 15:00:00 CETThe latest Android version continues to improve security and privacy, according to its developers. The post Android 17 Beta Strengthens Secure-by-Default Design for Privacy and App Security appeared first on SecurityWeek.
Publicerad: 2026-02-16 14:50:36 CETThis week’s recap shows how small gaps are turning into big entry points. Not always through new exploits, often through tools, add-ons, cloud setups, or workflows that people already trust and rarely question. Another signal: attackers…
Publicerad: 2026-02-16 13:55:00 CETAttackers are using DNS requests to deliver a RAT named ModeloRAT to targeted users. The post Microsoft Warns of ClickFix Attack Abusing DNS Lookups appeared first on SecurityWeek.
Publicerad: 2026-02-16 12:56:12 CETPresentation of the KTU Consortium Mission ‘A Safe and Inclusive Digital Society’ at the Innovation Agency event ‘Innovation Breakfast: How Mission-Oriented Science and Innovation Programmes Will Address Societal Challenges’. Technologies…
Publicerad: 2026-02-16 12:55:00 CETAmazon’s smart doorbell maker Ring has terminated a partnership with police surveillance tech company Flock Safety. The post Amazon Scraps Partnership With Surveillance Company After Super Bowl Ad Backlash appeared first on SecurityWeek.
Publicerad: 2026-02-16 12:40:34 CETCybersecurity researchers have disclosed details of a new mobile spyware platform dubbed ZeroDayRAT that's being advertised on Telegram as a way to grab sensitive data and facilitate real-time surveillance on Android and iOS devices. "The…
Publicerad: 2026-02-16 11:24:00 CETZscaler's acquisition of SquareX comes as competitors like CrowdStrike and Palo Alto Networks also invest in secure browser technologies.
Publicerad: 2026-02-13 22:58:19 CETThreat actors are exploiting security gaps to weaponize Windows drivers and terminate security processes in targeted networks, and there may be no easy fixes in sight.
Publicerad: 2026-02-13 18:08:59 CETEspionage groups from China, Russia and other nations burned at least two dozen zero-days in edge devices in attempts to infiltrate defense contractors' networks.
Publicerad: 2026-02-13 18:07:24 CETAs AI deployments scale and start to include packs of agents autonomously working in concert, organizations face a naturally amplified attack surface.
Publicerad: 2026-02-13 17:49:39 CETUpdated information to include CVSS scores. This is an informational change only.
Publicerad: 2026-02-13 17:00:00 CETDownload links fixed
Publicerad: 2026-02-13 17:00:00 CETA vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco…
Publicerad: 2026-02-13 16:21:01 CETIdag kom nyheten om ett nytt samarbete gällande cybersäkerhet mellan Sverige och Ukraina, något som går att ta del av i veckobrevet. Utöver det kan du läsa om andra nyheter, rapporter och analyser inom cybersäkerhetsområdet.
Publicerad: 2026-02-13 13:37:00 CETA vulnerability in the text rendering subsystem of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an…
Publicerad: 2026-02-13 02:37:39 CETBeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)contain an OS command injection vulnerability. Successful exploitation could allow an unauthenticated remote attacker to execute operating system commands in the context of…
Publicerad: 2026-02-13 01:00:00 CETIt's time to phase out the "patch and pray" approach, eliminate needless public interfaces, and enforce authentication controls, one expert says.
Publicerad: 2026-02-12 23:05:32 CETThe AI-powered product delivers expert-grade malware analysis and reverse engineering in minutes.
Publicerad: 2026-02-12 22:23:06 CETDrawing on years of adversary tradecraft, SpecterOps experts work alongside customers to analyze and eliminate attack paths, protect critical assets, and stay ahead of emerging threats.
Publicerad: 2026-02-12 22:11:52 CETMen should take extra care on Valentine’s Day because they are nearly twice as likely as women to fall victim to romance scams.
Publicerad: 2026-02-12 22:04:25 CETMultiple Cisco products are affected by vulnerabilities in the HTTP Multipurpose Internet Mail Extensions (MIME) Decoder that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to leak possible sensitive…
Publicerad: 2026-02-12 19:38:13 CETAdded an FAQ and updated the CVSS score. This is an informational change only.
Publicerad: 2026-02-12 09:00:00 CETAdded FAQ information. This is an informational change only.
Publicerad: 2026-02-12 09:00:00 CETApple iOS, macOS, tvOS, watchOS, and visionOS contain an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow an attacker with memory write the capability to execute arbitrary code. |…
Publicerad: 2026-02-12 01:00:00 CETMicrosoft Configuration Manager contains an SQL injection vulnerability. An unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the target environment which are processed in an unsafe manner…
Publicerad: 2026-02-12 01:00:00 CETNotepad++ when using the WinGUp updater, contains a download of code without integrity check vulnerability that could allow an attacker to intercept or redirect update traffic to download and execute an attacker-controlled installer. This…
Publicerad: 2026-02-12 01:00:00 CETSolarWinds Web Help Desk contains a security control bypass vulnerability that could allow an unauthenticated attacker to gain access to certain restricted functionality. | Åtgärd: Apply mitigations per vendor instructions, follow…
Publicerad: 2026-02-12 01:00:00 CETIngen sammanfattning tillgänglig.
Publicerad: 2026-02-11 18:00:00 CETIngen sammanfattning tillgänglig.
Publicerad: 2026-02-11 18:00:00 CETIngen sammanfattning tillgänglig.
Publicerad: 2026-02-11 18:00:00 CETFlera leverantörer har släppt sina månatliga säkerhetsuppdateringar för februari.
Publicerad: 2026-02-11 12:50:00 CETAcknowledgement added. This is an informational change only.
Publicerad: 2026-02-11 09:00:00 CETChanges made to the security updates links and information. This is an informational change only.
Publicerad: 2026-02-11 09:00:00 CETMultiple Cisco products are affected by vulnerabilities in the processing of Distributed Computing Environment Remote Procedure Call (DCE/RPC) requests that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection…
Publicerad: 2026-02-11 05:42:07 CETAccess of resource using incompatible type ('type confusion') in Desktop Window Manager allows an authorized attacker to elevate privileges locally.
Publicerad: 2026-02-10 09:00:00 CETImproper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio Code allows an unauthorized attacker to bypass a security feature over a network.
Publicerad: 2026-02-10 09:00:00 CETServer-side request forgery (ssrf) in Azure DevOps Server allows an authorized attacker to perform spoofing over a network.
Publicerad: 2026-02-10 09:00:00 CETHeap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to elevate privileges locally.
Publicerad: 2026-02-10 09:00:00 CETCVSSv3 Score: 6.4 An Improper Link Resolution Before File Access vulnerability [CWE-59] in FortiClient Windows may allow a local low-privilege attacker to perform an arbitrary file write with elevated permissions via crafted named pipe messages. Revised on 2026-02-10 00:00:00
Publicerad: 2026-02-10 09:00:00 CETCVSSv3 Score: 3.8 An Improper Verification of Source of a Communication Channel vulnerability [CWE-940] in FortiOS FSSO Terminal Services Agent may allow an authenticated user with knowledge of FSSO policy configurations to gain…
Publicerad: 2026-02-10 09:00:00 CETCVSSv3 Score: 6.7 A Use of Externally-Controlled Format String vulnerability [CWE-134] in FortiGate may allow an authenticated admin to execute unauthorized code or commands via specifically crafted configuration. Revised on 2026-02-10 00:00:00
Publicerad: 2026-02-10 09:00:00 CETCVSSv3 Score: 7.5 An Authentication Bypass by Primary Weakness vulnerability [CWE-305] in FortiOS fnbamd may allow an unauthenticated attacker to bypass LDAP authentication of Agentless VPN or FSSO policy, under specific LDAP server configuration. Revised on 2026-02-10 00:00:00
Publicerad: 2026-02-10 09:00:00 CETCVSSv3 Score: 6.8 A missing authorization vulnerability [CWE-862] in FortiAuthenticator may allow a read-only admin to make modification to local users via a file upload to an unprotected endpoint. Revised on 2026-02-10 00:00:00
Publicerad: 2026-02-10 09:00:00 CETCVSSv3 Score: 5.2 An HTTP request smuggling vulnerability [CWE-444] in FortiOS may allow an unauthenticated attacker to smuggle an unlogged http request through the firewall policies via a specially crafted header Revised on 2026-02-10 00:00:00
Publicerad: 2026-02-10 09:00:00 CETCVSSv3 Score: 5.3 An Exposure of Sensitive Information to an Unauthorized Actor vulnerability [CWE-200] in FortiOS SSL-VPN may allow a remote unauthenticated attacker to bypass the patch developed for the symbolic link persistency…
Publicerad: 2026-02-10 09:00:00 CETCVSSv3 Score: 7.9 An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiSandbox may allow an unauthenticated attacker to execute commands via crafted requests.FortiSandbox…
Publicerad: 2026-02-10 09:00:00 CETMicrosoft MSHTML Framework contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network. | Åtgärd: Apply mitigations per vendor instructions, follow applicable…
Publicerad: 2026-02-10 01:00:00 CETMicrosoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally. | Åtgärd: Apply mitigations per vendor instructions, follow applicable BOD 22-01…
Publicerad: 2026-02-10 01:00:00 CETMicrosoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network. | Åtgärd: Apply mitigations per vendor instructions, follow applicable BOD…
Publicerad: 2026-02-10 01:00:00 CETMicrosoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally. | Åtgärd: Apply mitigations per vendor instructions, follow applicable…
Publicerad: 2026-02-10 01:00:00 CETMicrosoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally. | Åtgärd: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for…
Publicerad: 2026-02-10 01:00:00 CETIngen sammanfattning tillgänglig.
Publicerad: 2026-02-09 18:30:00 CETBehöver din organisation stärka sin förmåga att hantera cyberhot och arbeta effektivt med informationsdelning?
Publicerad: 2026-02-09 10:30:00 CETMåndagen 9 februari lanseras MISP-SE, något som du kan läsa mer om nedan tillsammans med andra nyheter, rapporter och analyser inom cybersäkerhetsområdet.
Publicerad: 2026-02-06 15:15:00 CETCVSSv3 Score: 9.1 An improper neutralization of special elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiClientEMS may allow an unauthenticated attacker to execute unauthorized code or commands via…
Publicerad: 2026-02-06 09:00:00 CETA vulnerability in the web-based management interface of Cisco Prime Infrastructure could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against users of the interface of an affected system.…
Publicerad: 2026-02-05 01:00:00 CETA vulnerability in the Dynamic Vectoring and Streaming (DVS) Engine implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass the anti-malware scanner, allowing…
Publicerad: 2026-02-05 01:00:00 CETA vulnerability in the Certificate Management feature of Cisco Meeting Management could allow an authenticated, remote attacker to upload arbitrary files, execute arbitrary commands, and elevate privileges to root on an affected system.…
Publicerad: 2026-02-05 01:00:00 CETA vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This…
Publicerad: 2026-02-05 01:00:00 CETDenna vecka har det rapporterats om ett flertal sårbarheter, bland annat gällande nolldagssårbarheter i Microsoft Office och Fortinet FortiOS. Utöver detta går det även att läsa CERT-PL:s rapport om angreppet mot polska energianläggningar som skedde i december.
Publicerad: 2026-01-30 14:50:00 CETIvanti har publicerat säkerhetsuppdateringar för två kritiska sårbarheter i Ivanti Endpoint Manager Mobile (EPMM). [1]
Publicerad: 2026-01-30 10:05:00 CETCVSSv3 Score: 9.8 CVE-2025-15467Parsing CMS AuthEnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially…
Publicerad: 2026-01-30 09:00:00 CETSolarWinds har publicerat uppdateringar som åtgärdar följande fyra kritiska sårbarheter i SolarWinds Web Help Desk: CVE-2025-40551 CVE-2025-40552 CVE-2025-40553 CVE-2025-40554
Publicerad: 2026-01-29 15:15:00 CETMicrosoft har publicerat information om en nolldagssårbarhet i Microsoft Office som exploateras av hotaktörer [1]. Sårbarheten (CVE-2026-21509) har fått CVSS-klassificering 7.8 (CVSS v.3.1) av Microsoft [2] och kan ge en oautentiserad…
Publicerad: 2026-01-27 12:30:00 CETEU-kommissionen har under veckan presenterat ett nytt cybersäkerhetspaket, där cybersäkerhetsmyndigheten ENISA får en tydlig förstärkning. Detta går att läsa om i veckobrevet tillsammans med flera nyheter, rapporter och analyser inom cybersäkerhetsområdet.
Publicerad: 2026-01-23 15:25:00 CETA vulnerability in the SSH service of Cisco IEC6400 Wireless Backhaul Edge Compute Software could allow an unauthenticated, remote attacker to cause the SSH service to stop responding. This vulnerability exists because the SSH service…
Publicerad: 2026-01-22 01:00:00 CETA vulnerability in the read-only maintenance shell of Cisco Intersight Virtual Appliance could allow an authenticated, local attacker with administrative privileges to elevate privileges to root on the virtual appliance. This vulnerability…
Publicerad: 2026-01-21 17:00:00 CETOracle har publicerat information om en sårbarhet i Oracle HTTP Server och WebLogic Server Proxy Plug-in. Sårbarheten, CVE-2026-21962, är kritisk och har fått en CVSS-klassning på 10. [1]
Publicerad: 2026-01-21 13:00:00 CETIngen sammanfattning tillgänglig.
Publicerad: 2026-01-14 18:00:00 CETIngen sammanfattning tillgänglig.
Publicerad: 2025-12-19 22:55:00 CETIngen sammanfattning tillgänglig.
Publicerad: 2025-11-12 18:00:00 CETIngen sammanfattning tillgänglig.
Publicerad: 2025-11-12 18:00:00 CETIngen sammanfattning tillgänglig.
Publicerad: 2025-11-03 18:00:00 CETIngen sammanfattning tillgänglig.
Publicerad: 2025-10-08 18:00:00 CESTA vulnerability classified as problematic has been found in Ortus Solutions ColdBox Elixir 3.1.6. This affects an unknown part of the file src/defaultConfig.js of the component ENV Variable Handler. The manipulation leads to information…
Publicerad: 2023-11-06 09:15:21 CETA vulnerability was found in Vaerys-Dawn DiscordSailv2 up to 2.10.2. It has been rated as critical. Affected by this issue is some unknown functionality of the component Tag Handler. The manipulation leads to improper access controls.…
Publicerad: 2023-11-06 02:15:08 CET** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Magnesium-PHP up to 0.3.0. It has been classified as problematic. Affected is the function formatEmailString of the file…
Publicerad: 2023-11-05 22:15:09 CETA vulnerability was found in Vaerys-Dawn DiscordSailv2 up to 2.10.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Command Mention Handler. The manipulation leads to improper…
Publicerad: 2023-11-05 22:15:09 CETA security issue was discovered in kube-apiserver that allows an aggregated API server to redirect client traffic to any URL. This could lead to the client performing unexpected actions as well as forwarding the client's API server credentials to third parties.
Publicerad: 2023-11-03 21:15:08 CETIvanti Avalanche Smart Device Service Missing Authentication Local Privilege Escalation Vulnerability
Publicerad: 2023-11-03 21:15:08 CETIvanti Avalanche Printer Device Service Missing Authentication Local Privilege Escalation Vulnerability
Publicerad: 2023-11-03 21:15:08 CETA locally authenticated attacker with low privileges can bypass authentication due to insecure inter-process communication.
Publicerad: 2023-11-03 21:15:08 CETIn swtpm before 0.4.2 and 0.5.x before 0.5.1, a local attacker may be able to overwrite arbitrary files via a symlink attack against a temporary file such as TMP2-00.permall.
Publicerad: 2023-11-03 05:15:15 CETbcrypt password hashing in Botan before 2.1.0 does not correctly handle passwords with a length between 57 and 72 characters, which makes it easier for attackers to determine the cleartext password.
Publicerad: 2023-11-03 02:15:07 CET2.5 million people were affected, in a breach that could spell more trouble down the line.
Publicerad: 2022-08-31 14:57:48 CESTResearchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.
Publicerad: 2022-08-30 18:00:43 CESTOver 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.
Publicerad: 2022-08-29 16:56:19 CESTLockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.
Publicerad: 2022-08-26 18:44:27 CESTTens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.
Publicerad: 2022-08-25 20:47:15 CESTTwitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk.
Publicerad: 2022-08-24 16:17:04 CESTCISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.
Publicerad: 2022-08-23 15:19:58 CESTFake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels.
Publicerad: 2022-08-22 15:59:06 CESTSeparate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack.
Publicerad: 2022-08-19 17:25:56 CESTAn insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.
Publicerad: 2022-08-18 16:31:38 CEST