Palo Alto Networks has issued patches for its PAN-OS firewall platform after a researcher uncovered a high-severity vulnerability which could be exploited…
News
Possible software supply chain attack through AWS CodeBuild service blunted
An AWS misconfiguration in its code building service could have led to a massive number of compromised key AWS GitHub code repositories…
Eurail customer database hacked
Utrecht-based Eurail BV has acknowledged that customer information has been involved in a cybersecurity incident. According to an official statement, an unauthorized person…
Interrail-Kundendatenbank gehackt
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2121877784.jpg?quality=50&strip=all 2768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2121877784.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2121877784.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2121877784.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2121877784.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2121877784.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2121877784.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2121877784.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2121877784.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2121877784.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2121877784.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Researchers warn of long‑running FortiSIEM root exploit vector as new CVE emerges
A critical command injection issue in Fortinet FortiSIEM has been disclosed along with public exploit code, and researchers claim attackers could have…
Schlag gegen Cyberkriminelle in Deutschland
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2701236855.jpg?quality=50&strip=all 5234w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2701236855.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2701236855.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2701236855.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2701236855.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2701236855.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2701236855.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2701236855.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2701236855.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2701236855.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2701236855.jpg?resize=444%2C250&quality=50&strip=all 444w”…
From typos to takeovers: Inside the industrialization of npm supply chain attacks
A massive surge in attacks on the npm ecosystem over the past year reveals a stark shift in the software supply‑chain threat…
What is AI fuzzing? And what tools, threats and challenges generative AI brings
AI fuzzing definition AI fuzzing has expanded beyond machine learning to use generative AI and other advanced techniquesto find vulnerabilities in an…
Ransomware gangs extort victims by citing compliance violations
Ransomware attacks remain among the most common attack methods. As recent analyses show, cyber gangs are increasingly threatening their victims with reporting…
Sophisticated VoidLink malware framework targets Linux cloud servers
Researchers have uncovered a new sophisticated and modular malware framework designed to operate stealthily inside Linux systems and containers. The framework seems…