Man-in-the-Prompt: The invisible attack threatening ChatGPT and other AI systems

Man-in-the-Prompt: The invisible attack threatening ChatGPT and other AI systems

Man-in-the-Prompt: The invisible attack threatening ChatGPT and other AI systems Man-in-the-Prompt: a new threat targeting AI tools like ChatGPT and Gemini via simple browser extensions, no complex attack needed. A new type of threat is alarming the world of cyber security: it is called Man-in-the-Prompt and is capable of compromising interactions with leading generative artificial … Ler mais

POC liberado para a falha de injeção de comando fortinet fortisiem

PoC Released for Fortinet FortiSIEM Command Injection Flaw

Os pesquisadores de segurança descobriram uma grave vulnerabilidade de injeção de comando pré-autenticação na plataforma Fortinet Fortisiem, que permite que os invasores comprometam completamente os sistemas de monitoramento de segurança corporativa sem credenciais. A vulnerabilidade, designada CVE-2025-25256já foi explorado pelos atacantes em cenários do mundo real, levantando preocupações urgentes sobre a segurança das ferramentas críticas … Ler mais

Researcher to release exploit for full auth bypass on FortiWeb

Picus Blue Report 2025

A security researcher has released a partial proof of concept exploit for a vulnerability in the FortiWeb web application firewall that allows a remote attackerto bypass authentication. The flaw was reported responsibly to Fortinet and is now tracked as CVE-2025-52970. Fortinetreleased a fixon August 12. Security researcher Aviv Y named the vulnerability FortMajeure and describes … Ler mais

Microsoft Teams to protect against malicious URLs, dangerous file types

Picus Blue Report 2025

Microsoft recently revealed that it’s currently enhancing protection against dangerous file types and malicious URLs in Teams chats and channels. “Microsoft Teams now blocks messages containing weaponizable file types, such as executables, in chats and channels, increasing protection against malware and other file-based attacks,” the company said in a Microsoft 365 roadmap update this week. … Ler mais

Ameaças atores abusam de contas do desenvolvedor da NPM seqüestradas para espalhar pacotes maliciosos

Threat Actors Abuse npm Developer Accounts Hijacked to Spread Malicious Packages

Uma campanha de phishing sofisticada direcionada ao mantenedor da Eslint-Config-Prettty, um pacote NPM amplamente usado com mais de 3,5 bilhões de downloads, resultou em que o código malicioso foi distribuído a milhares de projetos de desenvolvedores em todo o mundo. O incidente, descoberto em 18 de julho por reverteringlabs ‘automatizado Detecção de ameaças O sistema, … Ler mais

Hackers chineses exploram a infraestrutura de hospedagem na web para ataques cibernéticos

Chinese Hackers Exploit Web Hosting Infrastructure for Cyberattacks

Os pesquisadores da Cisco Talos descobriram um sofisticado grupo de ameaça persistente (APT) de língua chinesa, designada UAT-7237, que tem como alvo ativamente a infraestrutura de hospedagem na web em Taiwan desde pelo menos 2022. O grupo demonstra sobreposições operacionais significativas ao ator de ameaças identificado anteriormente UAT-5918, sugerindo atividades coordenadas sob um guarda-chuva mais … Ler mais

EncryptHub abuses Brave Support in new campaign exploiting MSC EvilTwin flaw

EncryptHub abuses Brave Support in new campaign exploiting MSC EvilTwin flaw

EncryptHub abuses Brave Support in new campaign exploiting MSC EvilTwin flaw EncryptHub actor exploits Windows flaw CVE-2025-26633 (“MSC EvilTwin”) with rogue MSC files and social engineering to drop malware. The threat actor EncryptHub exploits the now-patched Windows flaw CVE-2025-26633 (“MSC EvilTwin”) using rogue MSC files and social engineering to deliver malware, warns Trustwave SpiderLabs. The … Ler mais

Taiwan Web Infrastructure targeted by APT UAT-7237 with custom toolset

Taiwan Web Infrastructure targeted by APT UAT-7237 with custom toolset

Taiwan Web Infrastructure targeted by APT UAT-7237 with custom toolset APT group UAT-7237, linked to UAT-5918, targets web infrastructure in Taiwan using customized open-source tools to maintain long-term access. A Chinese-speaking advanced persistent threat (APT) group, tracked as UAT-7237, has been observed targeting web infrastructure entities in Taiwan using customized versions of open-sourced tools with … Ler mais

Multiple Vulnerabilities in Cisco Security Products Could Allow for Arbitrary Code Execution

MS-ISAC ADVISORY NUMBER: 2025-073 DATE(S) ISSUED: 08/15/2025 OVERVIEW: Multiple vulnerabilities have been discovered in Cisco security products that could allow for arbitrary code execution. Cisco Secure Firewall Management Center (FMC) is a centralized management solution for Cisco Secure Firewall devices, enabling policy control, event monitoring, and threat analysis. Cisco Firepower 2100 Series is a family … Ler mais

Friday Squid Blogging: Squid-Shaped UFO Spotted Over Texas – Schneier on Security

Here’s the story. The commenters on X (formerly Twitter) are unimpressed. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy. Tags: squid Posted on August 15, 2025 at 5:07 PM • 0 Comments Sidebar photo of Bruce Schneier by … Ler mais