110Articles
10Categories
2025-05-14Date
🚨
CISA adds the notorious TeleMessage flaw to KEV listCISA has added a medium-severity vulnerability discovered in TeleMessage TM SGNL, the messaging application that was used by the former national security advisor Mike Waltz, to its Known Exploited Vulnerabilities (KEV) Catalog. The modified version of the more famous Signal app, …
KEV
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2025-32756 Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability These types of vulnerabilities are frequent attack vectors for malic…
KEV
🐛
Patch Tuesday for May: Five zero day vulnerabilities CISOs should focus on
KEV
🐛
Fortinet Patches CVE-2025-32756 Zero-Day RCE Flaw Exploited in FortiVoice Systems
🐛
Ivanti Patches EPMM Vulnerabilities Exploited for Remote Code Execution in Limited Attacks
🐛
Critical 0-Day in Windows DWM Enables Privilege Escalation
KEV
🐛
New Windows RDP Vulnerability Enables Network-Based Attacks
🐛
New Microsoft Scripting Engine Vulnerability Exposes Systems to Remote Code Attacks
🐛
Windows Ancillary for WinSock 0-Day Vulnerability Actively Exploited to Gain Admin Access
KEV
🐛
Critical Samsung MagicINFO 9 Server Flaw Allows Arbitrary File Writes
🐛
Windows CLFS Zero-Day Vulnerability Actively Exploited in the Wild
KEV
🐛
Chinese Hackers Exploit SAP NetWeaver Zero-Day Vulnerability to Target Critical Infrastructure
🐛
Microsoft Alerts on AD CS Flaw Enabling Remote Denial-of-Service Attacks
🐛
Neue EU-Schwachstellen-Datenbank geht an den Start
🐛
Microsoft Defender Vulnerability Allows Unauthorized Privilege Gain
🐛
Critical Vulnerability in Windows Remote Desktop Gateway Allows Denial-of-Service Attacks
🐛
Critical Microsoft Outlook Flaw Enables Remote Execution of Arbitrary Code
🐛
China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures in UK, U.S., and Saudi Arabia
🐛
China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures in UK, U.S., and Saudi Arabia
🐛
New Adobe Photoshop Vulnerability Enables Arbitrary Code Execution
🐛
Severe Adobe Illustrator Flaw Allows Remote Code Execution
🐛
News alert: INE Security highlights monthly CVE Labs aimed at sharpening real-world defense
🐛
Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit
KEV
🐛
Ivanti patches two EPMM flaws exploited in the wild
KEV
⚠️
Spain to vet power plants’ cybersecurity for ‘great blackout’ cause
⚠️
Mark's and Spencer Data Breach, Vulnerable Routers, Fortinet Exploits, and New Ransomware Threats
⚠️
Critical Microsoft Office Vulnerabilities Enable Malicious Code Execution
⚠️
Ivanti Patches Two EPMM Zero-Days Exploited to Hack Customers
⚠️
Microsoft Fixes 78 Flaws, 5 Zero-Days Exploited; CVSS 10 Bug Impacts Azure DevOps Server
⚠️
CISO Communication and Hiring, as they Combat Threat and Penetration Testing Trends - ... - BSW #395
⚠️
Fortinet Patches Zero-Day Exploited Against FortiVoice Appliances
KEV
⚠️
Weaponized PyPI Package Targets Developers to Steal Source Code
⚠️
Researchers discover new security vulnerability in Intel processors
⚠️
Learning How to Hack: Why Offensive Security Training Benefits Your Entire Security Team
⚠️
EU Cybersecurity Agency ENISA Launches European Vulnerability Database
⚠️
SAP patches second zero-day flaw exploited in recent attacks
⚠️
Patch Tuesday, May 2025 Edition
⚠️
Microsoft Defender Vulnerability Allows Attackers to Elevate Privileges
⚠️
Threat Actors Exploit AI and LLM Tools for Offensive Cyber Operations
⚠️
Nation-State Actors Target Healthcare Institutions to Sabotage IT and OT Systems
⚠️
Fashion giant Dior discloses cyberattack, warns of data breach
⚠️
Katz Stealer Malware Hits 78+ Chromium and Gecko-Based Browsers
⚠️
Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks
⚠️
Researchers Unveil New Mechanism to Track Compartmentalized Cyber Threats
⚠️
Steel giant Nucor Corporation facing disruptions after cyberattack
⚠️
Focused Phishing: Attack Targets Victims With Trusted Sites and Live Validation
⚠️
Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware
⚠️
Microsoft primes 71 fixes for May Patch Tuesday
KEV
⚠️
Australian Human Rights Commission leaks docs to search engines
⚠️
Ransomware gangs join ongoing SAP NetWeaver attacks
⚠️
BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan
⚠️
This One Word Is Wasting Millions in Cybersecurity
⚠️
Cyber CEO Arrested… Or Was He? 👀 #ITDrama
⚠️
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
⚠️
Risky Business #791 -- Woof! Copilot for Sharepoint coughs up creds and keys
📋
ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact
📋
Microsoft fixes Linux boot issues on dual-boot Windows systems
📢
Microsoft security advisory – May 2025 monthly rollup (AV25-269)
📢
Intel security advisory (AV25-268)
📢
Ivanti security advisory (AV25-267)
📢
Fortinet security advisory (AV25-266)
📢
Kosovar Administrator of Cybercrime Marketplace Extradited to US
📢
Ivanti security advisory (AV25-270)
📢
Adobe security advisory (AV25–271)
📢
[Control systems] Siemens security advisory (AV25-272)
📢
Palo Alto Networks security advisory (AV25-273)
📢
Google Chrome security advisory (AV25-274)
📢
Juniper Networks security advisory (AV25-275)
📢
Jenkins security advisory (AV25-276)
📢
[Control systems] Schneider Electric security advisory (AV25-277)
📢
Google Chrome to block admin-level browser launches for better security
🔥
Marks & Spencer räumt Cyberangriff ein
🔥
Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns
🔥
Twilio denies breach following leak of alleged Steam 2FA codes
🔥
Australian Human Rights Commission Data Breach Exposes Sensitive Documents Submitted via Website
🔥
Healthcare Cyberattacks in 2024 Expose 276 Million Patient Records Compromised
🔥
Why Critical Infrastructure Might Be Next in the Cyber War
🔥
Ransomware gangs join ongoing SAP NetWeaver attacks
🕵️
ISC Stormcast For Wednesday, May 14th, 2025 https://isc.sans.edu/podcastdetail/9450, (Wed, May 14th)
🕵️
Earth Ammit Hackers Deploy New Tools to Target Military Drones
🕵️
Researchers Unveil New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse
🕵️
As US vuln-tracking falters, EU enters with its own security bug database
🕵️
Vulnerabilities Patched by Juniper, VMware and Zoom
🕵️
Google’s Advanced Protection Now on Android
🕵️
Vulnerabilities Patched by Juniper, VMware and Zoom
🕵️
Horabot Malware Targets 6 Latin American Nations Using Invoice-Themed Phishing Emails
🕵️
Unit 42 Develops Agentic AI Attack Framework
🕵️
Hackers Weaponize KeePass Password Manager to Deliver Malware & Steal Passwords
🕵️
89 million Steam account details just got leaked, so now's a good time to change your password
🕵️
New HTTPBot Botnet Rapidly Expands to Target Windows Machines
🕵️
Is AI Use in the Workplace Out of Control?
🕵️
TA406 Hackers Target Government Entities to Steal Login Credentials
🕵️
Google Threat Intelligence Releases Actionable Threat Hunting Technique for Malicious .desktop Files
🕵️
How to Use the WRONG Remote Desktop (Microsoft Style) 🧠💥
🕵️
Insight: Rogue communication devices found in Chinese solar power inverters
🕵️
Upcoming Speaking Engagements
🕵️
Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering
🕵️
Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance Spyware
🕵️
Caught Being a Nerd in Public? This Happens…
🌐
Horabot Malware Targets 6 Latin American Nations Using Invoice-Themed Phishing Emails
🌐
Hackers behind UK retail attacks now targeting US companies
🎙️
Smashing Security podcast #417: Hello, Pervert! – Sextortion scams and Discord disasters
📡
Another day, another phishing campaign abusing google.com open redirects, (Wed, May 14th)
📡
How to implement zero trust: first steps and success factors
📡
Kosovo extradites BlackDB admin to face US cybercrime charges
📡
CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users
📡
They Say Data Is Like Oil… But They’re WRONG! 🚨
📡
A Cyber Expert’s Warning: If You Can’t Predict It, You Can’t Secure It!
📡
Sophos Firewall v21.5: DNS protection
📡
White House scraps plan to block data brokers from selling Americans’ sensitive data