cloud security: Webinar on AI-Driven Cloud Forensics for Rapid Incident Response

A recent webinar highlighted the challenges of cloud forensics and the necessity of modern techniques to investigate breaches effectively.
Ciberseguridad, vulnerabilidades y privacidad

A recent webinar highlighted the challenges of cloud forensics and the necessity of modern techniques to investigate breaches effectively.

A recent SmartLoader attack has been identified, leveraging a trojanized version of the Oura MCP server to deploy the StealC infostealer, targeting sensitive user data.

Google has released a patch for a high-severity zero-day vulnerability in Chrome, tracked as CVE-2026-2441, which is currently under active exploitation.

The Dutch telecommunications provider Odido has reported a significant data breach impacting millions of customers, with personal information accessed but no passwords or sensitive call data compromised.

Google's Threat Intelligence Group has attributed a previously undocumented hacking group, potentially linked to Russian intelligence, to a series of malware attacks against Ukrainian organizations using CANFAIL.

A critical SQL injection vulnerability in Microsoft Configuration Manager, patched in October 2024, is now being actively exploited, according to CISA.

Recent findings reveal that supply chain attacks are evolving into a complex ecosystem of cybercrime, linking various forms of breaches and identity theft.

Recent cyber espionage campaigns have targeted Indian defense and government organizations using cross-platform remote access trojans (RATs).

A newly identified malicious add-in for Microsoft Outlook has been found to steal user credentials through a phishing scheme, affecting thousands of users.

UK officials address legacy IT challenges in preventing data leaks following the Afghan informants incident, while emphasizing the need for improved security measures.