Tag: attack method

  • The Register: Beijing-backed burglars master .NET to target government web servers

    Source URL: https://www.theregister.com/2025/10/01/phantom_taurus_apt/ Source: The Register Title: Beijing-backed burglars master .NET to target government web servers Feedly Summary: ‘Phantom Taurus’ created custom malware to hunt secrets across Asia, Africa, and the Middle East Threat-hunters at Palo Alto Networks’ Unit 42 have decided a gang they spotted two years ago is backed by China, after seeing…

  • Schneier on Security: Abusing Notion’s AI Agent for Data Theft

    Source URL: https://www.schneier.com/blog/archives/2025/09/abusing-notions-ai-agent-for-data-theft.html Source: Schneier on Security Title: Abusing Notion’s AI Agent for Data Theft Feedly Summary: Notion just released version 3.0, complete with AI agents. Because the system contains Simon Willson’s lethal trifecta, it’s vulnerable to data theft though prompt injection. First, the trifecta: The lethal trifecta of capabilities is: Access to your private…

  • Docker: The Trust Paradox: When Your AI Gets Catfished

    Source URL: https://www.docker.com/blog/mcp-prompt-injection-trust-paradox/ Source: Docker Title: The Trust Paradox: When Your AI Gets Catfished Feedly Summary: The fundamental challenge with MCP-enabled attacks isn’t technical sophistication. It’s that hackers have figured out how to catfish your AI. These attacks work because they exploit the same trust relationships that make your development team actually functional. When your…

  • Docker: MCP Horror Stories: The Drive-By Localhost Breach

    Source URL: https://www.docker.com/blog/mpc-horror-stories-cve-2025-49596-local-host-breach/ Source: Docker Title: MCP Horror Stories: The Drive-By Localhost Breach Feedly Summary: This is Part 4 of our MCP Horror Stories series, where we examine real-world security incidents that expose the devastating vulnerabilities in AI infrastructure and demonstrate how Docker MCP Gateway provides enterprise-grade protection against sophisticated attack vectors. The Model Context…

  • The Register: ‘FileFix’ attacks use fake Facebook security alerts to trick victims into running infostealers

    Source URL: https://www.theregister.com/2025/09/16/filefix_attacks_facebook_security_alert/ Source: The Register Title: ‘FileFix’ attacks use fake Facebook security alerts to trick victims into running infostealers Feedly Summary: Tech evolved from PoC to global campaign in under two months An attack called FileFix is masquerading as a Facebook security alert before ultimately dropping the widely used StealC infostealer and malware downloader.……

  • Krebs on Security: Microsoft Patch Tuesday, September 2025 Edition

    Source URL: https://krebsonsecurity.com/2025/09/microsoft-patch-tuesday-september-2025-edition/ Source: Krebs on Security Title: Microsoft Patch Tuesday, September 2025 Edition Feedly Summary: Microsoft Corp. today issued security updates to fix more than 80 vulnerabilities in its Windows operating systems and software. There are no known “zero-day" or actively exploited vulnerabilities in this month’s bundle from Redmond, which nevertheless includes patches for…