By SecurityWeek News
Noteworthy stories that might have slipped under the radar: communications of dozens of Iranian ships disrupted, only apps from verified developers will run on Android devices, and AI used across multiple phases of malicious attacks.
The post In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
By Ionut Arghire
The automotive company said it disconnected its systems, which severely impacted both retail and manufacturing operations.
The post Jaguar Land Rover Operations ‘Severely Disrupted’ by Cyberattack appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
By Eduard Kovacs
An AI supply chain issue named Model Namespace Reuse can allow attackers to deploy malicious models and achieve code execution.
The post AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
By Eduard Kovacs
Researchers show how popular AI systems can be tricked into processing malicious instructions by hiding them in images.
The post AI Systems Vulnerable to Prompt Injection via Image Scaling Attack appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
By Kevin Townsend
AI-powered phishing attacks leverage ConnectWise ScreenConnect for remote access, underscoring their sophistication.
The post Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
By Ionut Arghire
Authorities say VerifTools sold fake driver’s licenses and passports worldwide, enabling fraudsters to bypass KYC checks and access online accounts.
The post VerifTools Fake ID Operation Dismantled by Law Enforcement appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
By Ionut Arghire
Attack disrupted email, phones, and websites for weeks, but officials say no ransom was paid.
The post Pennsylvania Attorney General Confirms Ransomware Behind Weeks-Long Outage appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »
By algerj@bnpmedia.com (Jordyn Alger)
Jaguar Land Rover experienced a cyber incident that has impacted business operations.
Source:: Security magazin
Posted in Uncategorized | No Comments »
By algerj@bnpmedia.com (Jordyn Alger)
Agentic AI, while performing routine tasks such as shopping online, could be tricked into carrying out certain actions.
Source:: Security magazin
Posted in Uncategorized | No Comments »
By Ionut Arghire
A critical vulnerability in Docker Desktop allows attackers to modify the filesystem of Windows hosts to become administrators.
The post Docker Desktop Vulnerability Leads to Host Compromise appeared first on SecurityWeek.
Source:: securityweek
Posted in Uncategorized | No Comments »