105Articles
9Categories
2025-05-20Date
🚨
CISA Adds Actively Exploited Ivanti EPMM Zero-Day to KEV CatalogCybersecurity and Infrastructure Security Agency (CISA) has added two critical zero-day vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM) to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The flaws CVE-2025-442…
KEV
🚨
CISA Includes MDaemon Email Server XSS Flaw in KEV CatalogCybersecurity and Infrastructure Security Agency (CISA) has added a cross-site scripting (XSS) vulnerability affecting MDaemon Email Server to its Known Exploited Vulnerabilities (KEV) Catalog on May 19, 2025. This critical addition, identified as CVE-2024-11182, highlights a sec…
KEV
🐛
Ethical hackers exploited zero-day vulnerabilities against popular OS, browsers, VMs and AI frameworks
🐛
Windows 11 Privilege Escalation Vulnerability Let Attackers Gain Admin Access in Under 300 Milliseconds
🐛
Qilin Exploits SAP Zero-Day Vulnerability Weeks Ahead of Public Disclosure
KEV
🐛
Security Flaw in WordPress Plugin Puts 22,000 Websites at Risk of Cyber Attacks
⚠️
Critical pfSense Firewall Flaws Enable Attackers to Inject Malicious Code
⚠️
Malicious PyPI Packages Exploit Instagram and TikTok APIs to Validate User Accounts
⚠️
4 ways to safeguard CISO communications from legal liabilities
⚠️
Malicious npm Package in Koishi Chatbots Steals Sensitive Data in Real Time
⚠️
O2 VoLTE Flaw Allows Tracking of Customers’ Locations Through Phone Calls
⚠️
Appsec News & Interviews from RSAC on Identity and AI - Charlotte Wylie, Rami Saas - ASW #331
⚠️
O2 Service Vulnerability Exposed User Location
⚠️
Critical Multer Vulnerability Puts Millions of Node.js Apps at Risk
⚠️
WordPress Plugin Flaw Puts 22,000 Websites at Risk of Cyber Attacks
⚠️
Critical VMware Cloud Foundation Vulnerability Exposes Sensitive Data
⚠️
Skitnet malware: The new ransomware favorite
⚠️
Vulnerability Exploitation Probability Metric Proposed by NIST, CISA Researchers
KEV
⚠️
You’ve already been targeted: Why patch management is mission-critical
⚠️
AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation
⚠️
NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch
⚠️
Hackers Abuse TikTok and Instagram APIs to Verify Stolen Account Credentials
⚠️
8 KI-Sicherheitsrisiken, die Unternehmen übersehen
⚠️
RedisRaider Campaign Targets Linux Servers by Exploiting Misconfigured Redis Instances
⚠️
The AI Fix #51: Divorce by coffee grounds, and why AI robots need your brain
⚠️
Your Speaker Could Hack You – Thanks to AirPlay 💀
⚠️
More_Eggs Malware Uses Job Application Emails to Distribute Malicious Payloads
⚠️
Accenture Files Leak – New Research Reveals Projects Controlling Billions of User Data
⚠️
Hazy Hawk gang exploits DNS misconfigs to hijack trusted domains
⚠️
CISA Releases Thirteen Industrial Control Systems Advisories
⚠️
Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery
⚠️
NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch
⚠️
SK Telecom says malware breach lasted 3 years, impacted 27 million numbers
⚠️
EU High Level Group (established by EU commission) recommends forcing all devices in the EU to be sold with ”integrated Law Enforcement access” and sanctioning non-EU approved messaging services
⚠️
VanHelsing ransomware builder leaked on hacking forum
⚠️
Premium WordPress 'Motors' theme vulnerable to admin takeover attacks
⚠️
What Do You Want Me to DEPRIORITIZE? (CISO Reality Check)
⚠️
Microsoft’s Upgrade Plan: Waste More, Upgrade Faster
⚠️
PowerSchool hacker pleads guilty to student data extortion scheme
⚠️
Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations
📋
Microsoft Issues Urgent Patch to Resolve BitLocker Recovery Problem
📢
Madhu Gottumukkala Officially Announced as CISA Deputy Director
📢
South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware
📢
Red Hat security advisory (AV25-280)
📢
Ubuntu security advisory (AV25-279)
📢
IBM security advisory (AV25-281)
📢
Dell security advisory (AV25-282)
📢
[Control systems] CISA ICS security advisories (AV25–283)
📢
AWS, Honeywell, Marriott… What Do They Want from World Governments?
📢
Atlassian security advisory (AV25-284)
📢
Mozilla security advisory (AV25-285)
📢
VMware security advisory (AV25-286)
🔥
DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage's archive server
🔥
The Crowded Battle: Key Insights from the 2025 State of Pentesting Report
🔥
Threat Actors Deploy Bumblebee Malware via Poisoned Bing SEO Results
🔥
Event Preview: 2025 Threat Detection & Incident Response (Virtual) Summit
🔥
Cyberattack on Serviceaide Compromises Data of 480,000 Catholic Health Patients
🔥
DDoSecrets Adds 410GB of TeleMessage Breach Data to Index
🔥
Interlock ransomware evolving under the radar
🔥
100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads
🔥
LockBit Leak Shows Affiliates Use Pressure Tactics, Rarely Get Paid
🔥
A familiar playbook with a twist: 3AM ransomware actors dropped virtual machine with vishing and Quick Assist
🔥
New Nitrogen Ransomware Targets Financial Firms in the US, UK and Canada
🔥
SK Telecom says malware breach lasted 3 years, impacted 27 million numbers
🔥
Mobile carrier Cellcom confirms cyberattack behind extended outages
🕵️
ISC Stormcast For Tuesday, May 20th, 2025 https://isc.sans.edu/podcastdetail/9458, (Tue, May 20th)
🕵️
Microsoft 365 Users Targeted by Tycoon2FA Linked Phishing Attack to Steal Credentials
🕵️
Tor Browser 14.5.2 Released: Bug Fixes and Enhanced Features
🕵️
W3LL Phishing Kit Launches Active Campaign to Steal Outlook Login Credentials
🕵️
Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization
🕵️
CloudSEK Raises $19 Million for Threat Intelligence Platform
🕵️
DPRK IT Workers Impersonate Polish and US Nationals to Secure Full-Stack Developer Positions
🕵️
All things infostealers. Week 20, 2025 – Kinda Blog by CryptoLek
🕵️
DoorDash Hack
🕵️
O2 UK patches bug leaking mobile user location from call metadata
🕵️
Windows 10 emergency updates fix BitLocker recovery issues
🕵️
TrustCloud Raises $15 Million for Security Assurance Platform
🕵️
Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse
🕵️
Hackers Use Weaponized RAR Archives to Deliver Pure Malware in Targeted Attacks
🕵️
CyberheistNews Vol 15 #20 How to Protect Your Business from Scattered Spider's Latest Attack Methods
🕵️
Regeneron to Buy 23andMe for $256M Amid Growing Data Privacy Concerns
🕵️
Kimsuky APT Group Deploys PowerShell Payloads to Deliver XWorm RAT
🕵️
Why That Security Trend Spike Is Actually Fake (Sorta)
🕵️
RVTools hit in supply chain attack to deliver Bumblebee malware
🕵️
RVTools hit in supply chain attack to deliver Bumblebee malware
🕵️
Service desks are under attack: What can you do about it?
🕵️
The Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Website
🕵️
The Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Website
🕵️
The Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Website
🕵️
RSAC 2025: Welcome to the Age of AI Surrender
🕵️
AI Shame Is Real… Even in Cybersecurity
🕵️
WSL, Defendnot, Clippy, Crawlomatic, Take It Down, Pwn2Own, Aaran Leyland, and More.. - SWN #478
🌐
Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse
🌐
RVTools hit in supply chain attack to deliver Bumblebee malware
🌐
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS
🌐
Trojanized RVTools push Bumblebee malware in SEO poisoning campaign
📡
Sophos Partners with Capsule on New Cyber Insurance Program
📡
SEC Twitter hack: Man imprisoned for role in attack that caused Bitcoin’s price to soar.
📡
Service desks are under attack: What can you do about it?
📡
Researchers Scanning the Internet, (Tue, May 20th)
📡
CISO vs. CFO: Who Actually Runs the Business?
📡
AI, Data Scraping & Cybersecurity: The War Has Begun ⚔️
📡
The people in Elon Musk’s DOGE universe
📡
Phishing through Google Ads: attacks on SEO and marketing
📡
SAFECOM and National Council of Statewide Interoperability Coordinators (NCSWIC) develop Artificial Intelligence in Emergency Communications Centers Infographic