44Articles
7Categories
2025-04-15Date
๐Ÿ›
Critical Apache Roller Vulnerability (CVSS 10.0) Enables Unauthorized Session Persistence
๐Ÿ›
Gladinetโ€™s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability
๐Ÿ›
CVE-2025-27745 Microsoft Office Remote Code Execution Vulnerability
๐Ÿ›
CVE-2025-27746 Microsoft Office Remote Code Execution Vulnerability
๐Ÿ›
CVE-2025-27748 Microsoft Office Remote Code Execution Vulnerability
๐Ÿ›
CVE-2025-27749 Microsoft Office Remote Code Execution Vulnerability
๐Ÿ›
CVE-2025-27751 Microsoft Excel Remote Code Execution Vulnerability
๐Ÿ›
CVE-2025-27752 Microsoft Excel Remote Code Execution Vulnerability
๐Ÿ›
CVE-2025-27750 Microsoft Excel Remote Code Execution Vulnerability
๐Ÿ›
CVE-2025-29791 Microsoft Excel Remote Code Execution Vulnerability
๐Ÿ›
CVE-2025-29820 Microsoft Word Remote Code Execution Vulnerability
๐Ÿ›
CVE-2025-29822 Microsoft OneNote Security Feature Bypass Vulnerability
๐Ÿ›
CVE-2025-29817 Microsoft Power Automate Desktop Information Disclosure Vulnerability
๐Ÿ›
CVE-2025-26642 Microsoft Office Remote Code Execution Vulnerability
๐Ÿ›
CVE-2025-29816 Microsoft Word Security Feature Bypass Vulnerability
๐Ÿ›
MITRE funding for the Common Vulnerabilities and Exposures (CVE) program will expire on April 16th
โš ๏ธ
Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool
โš ๏ธ
Malicious PyPI Package Targets MEXC Trading API to Steal Credentials and Redirect Orders
โš ๏ธ
CISA Releases Nine Industrial Control Systems Advisories
โš ๏ธ
Threat actors misuse Node.js to deliver malware and other malicious payloads
โš ๏ธ
UK Organizations Cite Phishing as the Most Disruptive Type of Cyberattack
โš ๏ธ
Notorious image board 4chan hacked and internal data leaked
โš ๏ธ
Strengthen Security with Cyber Risk Advisory
โš ๏ธ
4chan Is Down Following What Looks to Be a Major Hack Spurred By Meme War
๐Ÿ“ข
Trump Revenge Tour Targets Cyber Leaders, Elections
๐Ÿ”ฅ
Online Services Again Abused to Exfiltrate Data, (Tue, Apr 15th)
๐Ÿ”ฅ
RansomHouse ransomware: what you need to know
๐Ÿ”ฅ
ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains
๐Ÿ•ต๏ธ
Slopsquatting
๐Ÿ•ต๏ธ
Crypto Developers Targeted by Python Malware Disguised as Coding Challenges
๐Ÿ•ต๏ธ
ISC Stormcast For Tuesday, April 15th, 2025 https://isc.sans.edu/podcastdetail/9408, (Tue, Apr 15th)
๐Ÿ•ต๏ธ
โ€‹โ€‹Transforming securityโ€‹ with Microsoft Security Exposure Management initiativesโ€‹
๐Ÿ•ต๏ธ
CyberheistNews Vol 15 #15 [HEADS UP] North Korea Expands Its Fraudulent IT Worker Operations
๐Ÿ•ต๏ธ
My Take: Is Amazonโ€™s Alexa+ a Gutenberg moment โ€” or a corporate rerun of historyโ€™s greatest co-opt?
๐Ÿ•ต๏ธ
Landmark Admin now says info on 1.6M people stolen from it
๐Ÿ•ต๏ธ
Threat actors misuse Node.js to deliver malware and other malicious payloads
๐ŸŒ
The AI Fix #46: AI can read minds now, and is your co-host a clone?
๐Ÿ“ก
Sophos Firewall v21.5: NDR Essentials
๐Ÿ“ก
Majority of Browser Extensions Can Access Sensitive Enterprise Data, New Report Finds
๐Ÿ“ก
Meta Resumes E.U. AI Training Using Public User Data After Regulator Approval
๐Ÿ“ก
Android phones will soon reboot themselves after sitting unused for 3 days
๐Ÿ“ก
For security, Android phones will now auto-reboot after three days
๐Ÿ“ก
Top 10 for LLM & Gen AI Project Ranked by OWASP
๐Ÿ“ก
CISO priorities in 2025 | Kaspersky official blog