Securing GenAI in the Browser: Policy, Isolation, and Data Controls That Actually Work

The browser has become the main interface to GenAI for most enterprises: from web-based LLMs and copilots, to GenAI‑powered extensions and agentic browsers like ChatGPT Atlas. Employees are leveraging the power of GenAI to draft emails, summarize docum… Continue reading Securing GenAI in the Browser: Policy, Isolation, and Data Controls That Actually Work

Posted in Uncategorized

Following the digital trail: what happens to data stolen in a phishing attack

Kaspersky experts detail the journey of the victims’ data after a phishing attack. We break down the use of email-based phishing kits, Telegram bots, and customized administration panels. Continue reading Following the digital trail: what happens to data stolen in a phishing attack

React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urged federal agencies to patch the recent React2Shell vulnerability by December 12, 2025, amid reports of widespread exploitation.
The critical vulnerability, tracked as CVE-2025-551… Continue reading React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation

Posted in Uncategorized

Turn me on, turn me off: Zigbee assessment in industrial environments

Kaspersky expert describes the Zigbee wireless protocol and presents two application-level attack vectors that allow Zigbee endpoints to be turned on and off. Continue reading Turn me on, turn me off: Zigbee assessment in industrial environments

$320,000 Paid Out at Zeroday.Cloud for Open Source Software Exploits

Participants earned rewards at the hacking competition for Grafana, Linux Kernel, Redis, MariaDB, and PostgreSQL vulnerabilities.
The post $320,000 Paid Out at Zeroday.Cloud for Open Source Software Exploits appeared first on SecurityWeek.
Continue reading $320,000 Paid Out at Zeroday.Cloud for Open Source Software Exploits