#vulnerability-exploitation

[ follow ]
Information security
fromThe Hacker News
2 days ago

From Exposure to Exploitation: How AI Collapses Your Response Window

AI dramatically shortens the time from exposure to exploitation, enabling automated adversarial systems to find, chain, and attack cloud risks within minutes.
Information security
fromTheregister
3 weeks ago

Vulnerability exploits now dominate intrusions

Exploit of disclosed vulnerabilities now causes most intrusions, with attackers weaponizing new flaws within hours while many organizations patch slowly.
fromDataBreaches.Net
1 month ago

US, Australia say 'MongoBleed' bug being exploited - DataBreaches.Net

U.S. and Australian cyber agencies confirmed that hackers are exploiting a vulnerability that emerged over the Christmas holiday and is impacting data storage systems from the company MongoDB. The issue drew concern on December 25 when a prominent researcher published exploit code for CVE-2025-14847 - a vulnerability MongoDB announced on December 15 and patched on December 19.
Information security
Information security
fromTheregister
1 month ago

Tabletop exercises look a little different this year

Run tabletop cyber-incident exercises that account for AI-accelerated attacks and defenders' AI use to ensure rapid detection, containment, and organizational resilience.
Information security
fromThe Hacker News
2 months ago

Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure

GRU-linked APT44 ran a 2021–2025 campaign targeting Western critical infrastructure, exploiting misconfigured network edge devices and known software vulnerabilities.
Information security
fromThe Hacker News
3 months ago

Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More

Cyberattacks are increasingly sophisticated, exploiting new vulnerabilities, trusted systems, and encrypted backups to conduct espionage, ransomware, and phishing across diverse targets.
Information security
fromIT Pro
4 months ago

Foreign states ramp up cyber attacks on EU with AI-driven phishing and DDoS campaigns

EU public administration faces intense state-aligned cyberespionage; phishing drives initial intrusions, hacktivist DDoS dominates incident counts, and vulnerability exploitation remains significant.
#cybersecurity
Remote teams
fromThe Hacker News
9 months ago

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

UAT-6382 exploited a vulnerability in Trimble Cityworks to establish persistent access through advanced malware and web shells.
Privacy professionals
fromMail Online
10 months ago

Urgent warning to all 3b Gmail users over 'sophisticated' hack

Google has encountered a sophisticated phishing attack threatening 1.8 billion Gmail users, which exploits existing vulnerabilities in its infrastructure.
[ Load more ]