83Articles
8Categories
2025-05-12Date
🚨
Update to How CISA Shares Cyber-Related Alerts and NotificationsStarting May 12 , CISA is changing how we announce cybersecurity updates and the release of new guidance. These announcements will only be shared through CISA social media platforms, email, and RSS feeds and will no longer be listed on our Cybersecurity Alerts & Advisories we…
KEV
🐛
PoC Code Published for Linux nftables Security Vulnerability
🐛
Mitel SIP Phone Flaws Allow Attackers to Inject Malicious Commands
🐛
VMware Tools Vulnerability Allows Attackers to Modify Files and Launch Malicious Operations
🐛
Marbled Dust leverages zero-day in Output Messenger for regional espionage
🐛
Russian GRU Targeting Western Logistics Entities and Technology Companies
⚠️
New Exploit Method Extracts Microsoft Entra Tokens Through Beacon
⚠️
The rise of vCISO as a viable cybersecurity career path
⚠️
Audi warnt vor Gebrauchtwagenbetrügern
⚠️
Hackers Abuse Copilot AI in SharePoint to Steal Passwords and Sensitive Data
⚠️
Defendnot: A Tool That Disables Windows Defender by Registering as Antivirus
⚠️
73% of CISOs admit security incidents due to unknown or unmanaged assets
KEV
⚠️
Cybercriminals Hide Undetectable Ransomware Inside JPG Images
⚠️
Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access
⚠️
US Announces Botnet Takedown, Charges Against Russian Administrators
⚠️
Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities
⚠️
One-Click RCE in ASUS’s Preinstalled Driver Software
⚠️
Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner
⚠️
Asus DriverHub Vulnerabilities Expose Users to Remote Code Execution Attacks
⚠️
437,000 Impacted by Ascension Health Data Breach
⚠️
⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams
⚠️
Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection
⚠️
20-Year-Old Proxy Botnet Network Dismantled After Exploiting 1,000 Unpatched Devices Each Week
⚠️
Open Source Linux Firewall IPFire 2.29 – Core Update 194 Released: What’s New!
⚠️
ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files
⚠️
Output Messenger flaw exploited as zero-day in espionage attacks
⚠️
APT37 Hackers Use Weaponized LNK Files and Dropbox for Command-and-Control Operations
⚠️
New Noodlophile Malware Spreads Through Fake AI Video Generation Platforms
⚠️
Can You Hack Christmas Without Breaking the Law?
⚠️
ASUS DriverHub flaw let malicious sites run commands with admin rights
📢
Microsoft Teams to Safeguard Meetings by Blocking Screen Snaps
📢
Red Hat security advisory (AV25-259)
📢
Ubuntu security advisory (AV25-258)
📢
[Control systems] CISA ICS security advisories (AV25–260)
📢
Dell security advisory (AV25-261)
📢
IBM security advisory (AV25-262)
📢
The Silent Influence of US Tech Policies on Canadian Security 🔐
📢
VMware security advisory (AV25-263)
🔥
Cyber Threats Target HR, AI Tools, and Critical Infrastructure: A Comprehensive Update
🔥
Secrets and their role in infrastructure security - Jawahar Sivasankaran, Chas Clawson... - ESW #406
🔥
Popular Scraping Tool’s NPM Package Compromised in Supply Chain Attack
🔥
US Deportation Airline GlobalX Confirms Hack
🔥
Malicious npm Packages Use Telegram to Exfiltrate BullX Credentials
🔥
437,000 Impacted by Ascension Health Data Breach
🔥
The ransomware landscape in 2025 | Kaspersky official blog
🔥
Security Firm Andy Frain Says 100,000 People Impacted by Ransomware Attack
🔥
“PupkinStealer” – .NET Malware Steals Browser Data and Exfiltrates via Telegram
🔥
Threat Actors Leverage DDoS Attacks as Smokescreens for Data Theft
🔥
Moldova arrests suspect linked to DoppelPaymer ransomware attacks
🔥
Unending ransomware attacks are a symptom, not the illness
🔥
Cybercriminals Use Telegram Bots to Exfiltrate Data In Phishing Kit Campaign
🕵️
ISC Stormcast For Monday, May 12th, 2025 https://isc.sans.edu/podcastdetail/9446, (Mon, May 12th)
🕵️
Fake AI Tools Used to Spread Noodlophile Malware, Targeting 62,000+ via Facebook Lures
🕵️
Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data
🕵️
Cybercriminal services target end-of-life routers, FBI warns
🕵️
iClicker site hack targeted students with malware via fake CAPTCHA
🕵️
German Authorities Take Down Crypto Swapping Service eXch
🕵️
7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. - Dutch Operation
🕵️
Florida Backdoor Bill Fails
🕵️
Hackers Abuse Copilot AI in SharePoint to Steal Passwords and Sensitive Data
🕵️
Defendnot — A New Tool That Disables Windows Defender by Posing as an Antivirus Solution
🕵️
Google Agrees to $1.3 Billion Settlement in Texas Privacy Lawsuits
🕵️
It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stupid 2013 Router Vulnerabilities, (Mon, May 12th)
🕵️
Microsoft introduces huge security risk in OneDrive
🕵️
Mapping the Modern Attack Surface: Fintech’s Evolving Risk Frontier - Erika Dean - CSP #212
🕵️
Kimsuky Hacker Group Deploys New Phishing Techniques and Malware Campaigns
🕵️
Mentorship Monday - Discussions for career and learning!
🕵️
Apple Patches Major Security Flaws in iOS, macOS Platforms
🕵️
Lumma Stealer Upgraded with PowerShell Tools and Advanced Evasion Techniques
🕵️
Red Flag Job Apps: Cybersecurity Edition 🚩
🎙️
How can we counter online disinformation? | Unlocked 403 cybersecurity podcast (S2E2)
📡
The Persistence Problem: Why Exposed Credentials Remain Unfixed—and How to Change That
📡
This Training Trick Boosted Our Phishing Scores Fast
📡
Majority of Browser Extensions Pose Critical Security Risk, A New Report Reveals
📡
Google to pay $1.375 billion to settle Texas data privacy violations
📡
Crypto = 1800s Banking With Better Wi-Fi?
📡
Banks Don’t Just Protect Money—Here’s What They Really Value!
📡
Hackers now testing ClickFix attacks against Linux targets
📡
“Are You Growing Weed?” No Bro, I’m Just a Hacker 😅
📡
This Is How Cyber Pros Actually Use ChatGPT...
📡
Windows 11 upgrade block lifted after Safe Exam Browser fix
📡
AWS, GCP, Azure – Are You REALLY Protected? 🤔
📡
Apple Updates Everything: May 2025 Edition, (Mon, May 12th)