113Articles
8Categories
2025-05-15Date
🚨
U.S. CISA adds a Fortinet flaw to its Known Exploited Vulnerabilities catalogsubmitted by kid to cybersecurity 1 points | 0 comments https://securityaffairs.com/177862/hacking/u-s-cisa-adds-a-fortinet-flaw-to-its-known-exploited-vulnerabilities-catalog.html
KEV
🚨
U.S. CISA adds Microsoft Windows flaws to its Known Exploited Vulnerabilities catalogsubmitted by kid to cybersecurity 1 points | 0 comments https://securityaffairs.com/177856/security/u-s-cisa-adds-microsoft-windows-flaws-to-its-known-exploited-vulnerabilities-catalog.html
KEV
🚨
CISA Adds Three Known Exploited Vulnerabilities to CatalogCISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation.  CVE-2024-12987 DrayTek Vigor Routers OS Command Injection Vulnerability CVE-2025-4664 Google Chromium Loader Insufficient Policy Enforcement V…
KEV
🐛
Web Scanning SonicWall for CVE-2021-20016 - Update, (Wed, May 14th)
🐛
Google Chrome Zero-Day Vulnerability (CVE-2025-4664) Actively Exploited in The Wild
KEV
🐛
New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy
🐛
Critical BitLocker Flaw Exploited in Minutes: Bitpixie Vulnerability Proof of Concept Unveiled
🐛
Stealth RAT uses a PowerShell loader for fileless attacks
🐛
Alternatives to Microsoft Outlook webmail come under attack in Europe
🐛
Node.js Vulnerability Enables Attackers to Crash Processes and Disrupt Services
🐛
CISA Alerts on Active Exploitation of Zero-Day Vulnerability in Multiple Fortinet Products
🐛
Google patches Chrome vulnerability used for account takeover and MFA bypass
🐛
CVE-2025-47161 Microsoft Defender for Endpoint Elevation of Privilege Vulnerability
🐛
Chromium: CVE-2025-4609 Incorrect handle provided in unspecified circumstances in Mojo
🐛
Chromium: CVE-2025-4664 Insufficient policy enforcement in Loader
⚠️
Die acht wichtigsten Sicherheitsmetriken
⚠️
Google fixes high severity Chrome flaw with public exploit
⚠️
Chrome 136 Update Patches Vulnerability With ‘Exploit in the Wild’
⚠️
How phones get hacked: 7 common attack methods explained
⚠️
‘Aggressive, creative’ hackers behind UK breaches now eyeing US retailers
⚠️
Ransomware Groups, Chinese APTs Exploit Recent SAP NetWeaver Flaws
⚠️
5 BCDR Essentials for Effective Ransomware Defense
⚠️
Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers
⚠️
Data on sale: Trump administration withdraws data broker oversight proposal
⚠️
Pen Testing for Compliance Only? It's Time to Change Your Approach
⚠️
Cybersecurity incident forces largest US steelmaker to take some operations offline
⚠️
Chihuahua Stealer Exploits Google Drive Document to Harvest Browser Login Credentials
⚠️
Production at Steelmaker Nucor Disrupted by Cyberattack
⚠️
Google fixes high severity Chrome flaw with public exploit
⚠️
Windows Defender Application Control Bypassed Through Browser Exploit Techniques
⚠️
Coinbase data breach exposes customer info and government IDs
⚠️
Russian Hackers Exploit XSS Vulnerabilities to Inject Malicious Code into Email Servers
⚠️
Enisa Launched New European Vulnerability Database to Strengthen Cybersecurity
⚠️
GUESST ESSAY: Cybercrime for hire: small businesses are the new bullseye of the Dark Web
⚠️
Nucor Steel Manufacturer Halts Production After Cyberattack
⚠️
Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
⚠️
Windows 11 and Red Hat Linux hacked on first day of Pwn2Own
⚠️
Intruder vs. Acunetix vs. Attaxion: Comparing Vulnerability Management Solutions
⚠️
Hackers Exploit Google Services to Send Malicious Law Enforcement Requests
⚠️
Threat Actors Exploit Open Source Packages to Deploy Malware in Supply Chain Attacks
⚠️
Record-Breaking $27 Billion Black Market ‘Haowang Guarantee’ Deals Conducted Behind Closed Doors
⚠️
CISA Releases Twenty-Two Industrial Control Systems Advisories
⚠️
CISA Alerts on Five Active Zero-Day Windows Vulnerabilities Being Exploited
KEV
⚠️
Multiple Vulnerabilities in Ivanti Endpoint Manager Mobile Could Allow for Remote Code Execution
⚠️
Coinbase Data Breach – Customers Personal Info, Government‑ID & Transaction Data Exposed
⚠️
Government webmail hacked via XSS bugs in global spy campaign
⚠️
RSA 2025: AI’s Promise vs. Security’s Past — A Reality Check”
⚠️
Ransomware in your CPU - PSW #874
⚠️
After helping Russia on the ground North Korea targets Ukraine with cyberespionage
⚠️
Andrei Tarasov: Inside the Journey of a Russian Hacker on the FBI’s Most Wanted List
⚠️
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
📋
Xerox Launches April 2025 Security Patch for FreeFlow Print Server v2
📢
AI-Generated Law
📢
Interlock Ransomware Targeting Defense Contractors and Supply Chain Networks
📢
Breachforums Boss to Pay $700k in Healthcare Breach
🔥
Australian Human Rights Commission Discloses Data Breach
🔥
Canadian Electric Utility Lists Customer Information Stolen by Hackers
🔥
Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper
🔥
Coinbase says customers’ personal information stolen in data breach
🔥
Ransomware Enters ‘Post-Trust Ecosystem,’ NCA Cyber Expert Says
🔥
Customer Data Compromised in Dior Cyber Attack
🔥
This Is Why You NEVER Pay Cybercriminals
🔥
Hackers Steal Customers Banking Details in Nova Scotia Cyber Attack
🔥
Nova Scotia Power confirms hackers stole customer data in cyberattack
🔥
Coinbase data breach exposes customer info and government IDs
🔥
Are Your AirPlay Devices Safe? Probably Not…
🔥
Disney’s Most Bizarre Hack—From Inside Their Own Team
🕵️
ISC Stormcast For Thursday, May 15th, 2025 https://isc.sans.edu/podcastdetail/9452, (Thu, May 15th)
🕵️
Hacker nehmen Rüstungslieferanten der Ukraine ins Visier
🕵️
The most effective phishing QR code is a new drug and alcohol policy supposedly from HR
🕵️
Chinese Hackers Hit Drone Sector in Supply Chain Attacks
🕵️
Beyond the kill chain: What cybercriminals do with their money (Part 5)
🕵️
Beyond the kill chain: What cybercriminals do with their money (Part 4)
🕵️
Beyond the kill chain: What cybercriminals do with their money (Part 3)
🕵️
Beyond the kill chain: What cybercriminals do with their money (Part 2)
🕵️
Beyond the kill chain: What cybercriminals do with their money (Part 1)
🕵️
Proofpoint to Acquire Hornetsecurity in Reported $1 Billion Deal
🕵️
Google says hackers behind UK retail cyber campaign now also targeting US
🕵️
DarkCloud Stealer Employs AutoIt to Evade Detection and Steal Login Credentials
🕵️
TransferLoader Malware Enables Attackers to Execute Arbitrary Commands on Infected Systems
🕵️
Weaponized Google Calendar Invites Deliver Malicious Payload Using a Single Character
🕵️
U.S. Officials Probe Rogue Communication Devices in Solar Power Inverters
🕵️
HTTPBot Botnet Aggressively Spreads to Launch Attacks on Windows Systems
🕵️
AI transforms cybercrime: researchers warn about the rise of AI agent hackers
🕵️
Russia-linked hackers target webmail servers in Ukraine-related espionage operation - Help Net Security
🕵️
Xanthorox Emerging BlackHat AI Tool Empowering Hackers in Phishing and Malware Campaigns
🕵️
Global cybersecurity readiness remains critically low - Help Net Security
🕵️
Microsoft Outlook Down – Millions of Business & Personal Users Worldwide Impacted
🕵️
New .NET Multi-Stage Loader Targets Windows Systems to Deploy Malicious Payloads
🕵️
Coinbase Rejects $20M Ransom After Rogue Contractors Bribed to Leak Customer Data
🕵️
The New Windows App Replaces RDP – But It’s a Mess
🕵️
Inside Turla’s Uroboros Infrastructure and Tactics Revealed
🕵️
​​How the Microsoft Secure Future Initiative brings Zero Trust to life
🕵️
Technical Analysis of TransferLoader
🕵️
Businesses Handled Risk BEFORE the Internet 🤯#cybershorts
🕵️
AI-Written Cyber Articles? Here's How You Spot Them 🚩
🕵️
Welcoming the Malaysian Government to Have I Been Pwned
🕵️
Operation RoundPress
📡
Microsoft Copilot+ Recall: who should disable it, and how | Kaspersky official blog
📡
Sophos MDR: New analyst response actions for Microsoft 365
📡
Malicious npm package using steganography downloaded by hundreds
📡
Malicious NPM package uses Unicode steganography to evade detection
📡
New Tor Oniux tool anonymizes any Linux app's network traffic
📡
Even Updated Software is Full of Vulnerabilities! 🤯
📡
Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
📡
How Flooding Your SIM With Alerts Is Draining Your Budget
📡
Is AI Too Biased to Analyze Bias?
📡
Billions in Crime, One Platform: The Facebook Problem
📡
FBI: US officials targeted in voice deepfake attacks since April
📡
Windows 10 KB5058379 update triggering BitLocker Recovery after install
📡
ChatGPT will soon record, transcribe, and summarize your meetings
📡
Leak confirms OpenAI's ChatGPT will integrate MCP
📡
Sednit abuses XSS flaws to hit gov't entities, defense companies