94Articles
8Categories
2025-05-19Date
🚨
CISA Adds Six Known Exploited Vulnerabilities to CatalogCISA has added six new vulnerabilities to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation.  CVE-2025-4427 Ivanti Endpoint Manager Mobile (EPMM) Authentication Bypass Vulnerability CVE-2025-4428 Ivanti Endpoint Manager Mobile (EPMM) Code…
KEV
🐛
GNU C(glibc) Vulnerability Let Attackers Execute Arbitrary Code on Millions of Linux Systems
🐛
Critical Firefox 0-Day Flaws Allow Remote Code Execution
🐛
Confluence Servers Under Attack: Hackers Leverage Vulnerability for RDP Access and Remote Code Execution
🐛
Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards
🐛
Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild
⚠️
Passwortfreie Authentifizierung: So gelingt der Umstieg auf PKI
⚠️
Exploiting dMSA for Advanced Active Directory Persistence
⚠️
Operation RoundPress: Cyber security firm ESET uncovers Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities to spy on Ukraine
⚠️
Operation RoundPress: Cyber security firm ESET uncovers Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities to spy on Ukraine
⚠️
8 security risks overlooked in the rush to implement AI
KEV
⚠️
Hackers Earn Over $1 Million at Pwn2Own Berlin 2025
⚠️
Pwn2Own Day 3: Zero-Day Exploits Windows 11, VMware ESXi, and Firefox
⚠️
Hackers Exploit RVTools to Deploy Bumblebee Malware on Windows Systems
⚠️
AirBorne: attacks on devices via Apple AirPlay | Kaspersky official blog
⚠️
⚡ Weekly Recap: Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and More
⚠️
A spoof antivirus makes Windows Defender disable security scans
⚠️
VMware Hacked As $150,000 Zero-Day Exploit Dropped
⚠️
Mozilla fixes Firefox zero-days exploited at hacking contest
⚠️
Hackers earn $1,078,750 for 28 zero-days at Pwn2Own Berlin
⚠️
The State of Cybersecurity Readiness for the Next Big Emergency - Bri Frost, David Avi... - ESW #407
⚠️
Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access
⚠️
MY TAKE: Semantics aside, “agentic AI” is already reshaping how we work, think, envision what’s next
⚠️
Microsoft open-sources Windows Subsystem for Linux at Build 2025
⚠️
Microsoft extends Zero Trust to secure the agentic workforce
⚠️
Ransomware gangs increasingly use Skitnet post-exploitation malware
⚠️
Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers
⚠️
Russian APT Exploiting Mail Servers Against Government, Defense Organizations
⚠️
Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards
⚠️
Hackers Exploit AutoIT Scripts to Deploy Malware Targeting Windows Systems
⚠️
Cache Timing Techniques Used to Bypass Windows 11 KASLR and Reveal Kernel Base
⚠️
The Future of Science is... Artificial?
⚠️
No Resources Left? Time for Strategic Refusal!
📋
CISA to Stop Publishing Cybersecurity Alerts and Advisories on Webpages
📋
Windows 10 emergency updates fix BitLocker recovery issues
📢
Health Care Data Breach Costs BreachForums Admin $700,000 Fine
📢
Botnet Dismantled in International Operation, Russian and Kazakhstani Administrators Indicted
📢
CISA Welcomes Madhu Gottumukkala as the New Deputy Director
📢
Japan passed a law allowing preemptive offensive cyber actions
🔥
200,000 Harbin Clinic Patients Impacted by NRS Data Breach
🔥
UK Legal Aid Agency Finds Data Breach Following Cyberattack
🔥
Pharma giant Regeneron to buy 23andMe and its customers’ data for $256M
🔥
UK Legal Aid Agency confirms applicant data stolen in data breach
🔥
Google Reveals Hackers Targeting US Following UK Retailer Attacks
🔥
$4.8M or a Few Laptops? Why Companies Still Gamble
🔥
Cocospy stalkerware apps go offline after data breach
🔥
Hacker Arrested for Taking Over SEC Social Media to Spread False Bitcoin News
🔥
Ransomware gang INC claims recent attack on South African Airways - Comparitech
🔥
RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer
🔥
New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year
🔥
Arla Foods confirms cyberattack disrupts production, causes delays
🔥
BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
🔥
Have I Been Pwned 2.0 is Now Live!
🔥
Fake KeePass password manager leads to ESXi ransomware attack
🕵️
ISC Stormcast For Monday, May 19th, 2025 https://isc.sans.edu/podcastdetail/9456, (Mon, May 19th)
🕵️
RAT Dropped By Two Layers of AutoIT Code, (Mon, May 19th)
🕵️
Russian hackers are interested in chaos and money, says NATO cyber defense director
🕵️
Russian hackers are interested in chaos and money, says NATO cyber defense director
🕵️
Prison Sentence for Man Involved in SEC X Account Hack
🕵️
New ModiLoader Malware Campaign Targets Windows PCs, Harvesting User Credentials
🕵️
Spiking Neural Networks: Brain-Inspired Chips That Could Keep Your Data Safe
🕵️
The NSA’s “Fifty Years of Mathematical Cryptanalysis (1937–1987)”
🕵️
480,000 Catholic Health Patients Impacted by Serviceaide Data Leak
🕵️
How Scattered Spider TTPs are evolving in 2025
🕵️
The AI Fix nominated for top podcast award. Vote now!
🕵️
Mentorship Monday - Discussions for career and learning!
🕵️
Detecting malicious Unicode
🕵️
USN-7292-1: Dropbear vulnerabilities | Ubuntu security notices | Ubuntu
🕵️
Massives Datenleck in Cloud-Speichern
🕵️
New 'Defendnot' tool tricks Windows into disabling Microsoft Defender
🕵️
You're Securing Code, Not People… And That’s the Problem.
🕵️
Massive data leak: 200 billion files exposed in cloud buckets
🕵️
Skitnet Malware Employs Stealth Techniques to Execute Payload and Maintain Persistence Techniques
🕵️
Investigating Cobalt Strike Beacons Using Shodan: A Researcher’s Guide
🕵️
Volkswagen Car Hack Exposes Owner’s Personal Data and Service Records
🕵️
Printer Company Procolored Served Infected Software for Months
🕵️
Top 5 Advances in Unsupervised Learning for Cybersecurity
🕵️
How Much Do CEOs Really Know About Cyber Risk?
🕵️
Shadow AI Is The New Shadow IT… And It’s Worse
🕵️
New Hannibal Stealer Uses Stealth and Obfuscation to Evade Detection
🕵️
Chinese APT Hackers Target Organizations Using Korplug Loaders and Malicious USB Drives
🕵️
New Phishing Attack Poses as Zoom Meeting Invites to Steal Login Credentials
🕵️
Beware of Coinbase Scams
🕵️
Warning: Phishing Kits Can Auto-Generate Tailored Login Pages
🕵️
The who, where, and how of APT attacks in Q4 2024–Q1 2025
🕵️
ESET APT Activity Report Q4 2024–Q1 2025
🕵️
Fake CAPTCHA Attacks Deploy Infostealers and RATs in a Multistage Payload Chain
📡
Why CTEM is the Winning Bet for CISOs in 2025
📡
Microsoft confirms new "Advanced" Settings for Windows 11
📡
How Data Science Can Fix Your CMDB Accuracy!
📡
Microsoft unveils Windows AI Foundry for AI-powered PC apps
📡
The Dev Security Dilemma: Speed vs. Safety 🚀🔒
📡
O2 UK patches bug leaking mobile user location from call metadata
📡
OpenAI plans to combine multiple models into GPT-5