top of page

Notícias

Tentativas de Invasão

25 de abril de 2025

SAP Fixes Critical Vulnerability After Evidence of Exploitation

A maximum severity flaw affecting SAP NetWeaver has been exploited by threat actors

25 de abril de 2025

BreachLock AEV simulates Real attacks to validate and prioritize exposures

BreachLock AEV automates multistep, threat-intelligence-led attack scenarios—helping security teams uncover real exposures and prioritize what matters most. Going beyond just showing security teams their risk, BreachLock Adversarial Exposure Validation simulates how real-world adversaries would exploit it by mirroring their behavior with business-aware context throughout each phase of the BreachLock AEV workflow -- from discovery to exploitation. BreachLock AEV enables enterprises to launch automated multi-stage, complex red teaming engagements supercharged by generative AI across multiple threat … More → The post BreachLock AEV simulates Real attacks to validate and prioritize exposures appeared first on Help Net Security.

25 de abril de 2025

BreachLock AEV simulates real attacks to validate and prioritize exposures

BreachLock AEV automates multistep, threat-intelligence-led attack scenarios—helping security teams uncover real exposures and prioritize what matters most. Going beyond just showing security teams their risk, BreachLock Adversarial Exposure Validation simulates how real-world adversaries would exploit it by mirroring their behavior with business-aware context throughout each phase of the BreachLock AEV workflow -- from discovery to exploitation. BreachLock AEV enables enterprises to launch automated multi-stage, complex red teaming engagements supercharged by generative AI across multiple threat … More → The post BreachLock AEV simulates real attacks to validate and prioritize exposures appeared first on Help Net Security.

25 de abril de 2025

SAP zero-day vulnerability under widespread active exploitation

Researchers attribute the attacks to an initial access broker who is exploiting the 10.0 critical vulnerability. The post SAP zero-day vulnerability under widespread active exploitation appeared first on CyberScoop.

24 de abril de 2025

Data in Danger: Detecting Cross-Site Scripting in Grafana

Learn how SonarQube detected a Cross-Site Scripting (XSS) vulnerability in Grafana, a popular open-source data observability platform. The post Data in Danger: Detecting Cross-Site Scripting in Grafana appeared first on Security Boulevard.

24 de abril de 2025

Backdoor Found in Official XRP Ledger NPM Package

XRP Ledger SDK hit by supply chain attack: Malicious NPM versions stole private keys; users urged to update…

24 de abril de 2025

Understanding 2024 cyber attack trends

Mandiant has released the M-Trends 2025 report, which outlines global cyber attack trends based on their own incident response engagements from 2024. Key trends and insights In 2024, Mandiant handled more incidents in the financial sector than in any other industry: 17.4%. Other popular targets? Companies in business and professional services (11.1%), high tech (10.6%), government (9.5%), and healthcare (9.3%). Exploitation of a vulnerability is still the most common initial infection vector (33%), followed by … More → The post Understanding 2024 cyber attack trends appeared first on Help Net Security.

23 de abril de 2025

Research reveals mass scanning and exploitation campaigns

Research reveals mass scanning and exploitation campaigns associated with Proton66.

23 de abril de 2025

Vulnerability Exploitation and Credential Theft Now Top Initial Access Vectors

Mandiant's M-Trends report found that credential theft rose significantly in 2024, driven by the growing use of infostealers

23 de abril de 2025

Verizon's DBIR Reveals 34% Jump in Vulnerability Exploitation

After a 180% rise in last year's report, the exploitation of vulnerabilities continues to grow, now accounting for 20% of all breaches

bottom of page