98Articles
8Categories
2025-05-22Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation.  CVE-2025-4632 Samsung MagicINFO 9 Server Path Traversal Vulnerability  These types of vulnerabilities are frequent attack vectors for malicio…
KEV
🚨
Advisory Update on Cyber Threat Activity Targeting Commvault’s SaaS Cloud Application (Metallic)Commvault is monitoring cyber threat activity targeting their applications hosted in their Microsoft Azure cloud environment. Threat actors may have accessed client secrets for Commvault’s (Metallic) Microsoft 365 (M365) backup software-as-a-service (SaaS) solution, hosted i…
KEV
🐛
Grafana Zero-Day Vulnerability Allows Attackers to Redirect Users to Malicious Sites
🐛
Attackers Exploit BIND DNS Server Vulnerability to Crash Servers Using Malicious Packets
🐛
Samlify bug lets attackers bypass single sign-on
🐛
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks
🐛
Cisco Unified Intelligence Center Vulnerability Allows Privilege Escalation
🐛
Linux Kernel Zero-Day SMB Vulnerability Discovered via ChatGPT
🐛
Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks
🐛
Cityworks Zero-Day Vulnerability Used by UAT-638 Hackers to Infect IIS Servers with Shell Malware
🐛
CVE-2025-47181 Microsoft Edge (Chromium-based) Update Elevation of Privilege Vulnerability
⚠️
Schluss mit schlechter Software
⚠️
New Process Injection Technique Evades EDR by Injecting Malicious Code into Windows Processes
⚠️
Cisco Patches High-Severity DoS, Privilege Escalation Vulnerabilities
⚠️
Hackers Exploit PyBitmessage Library to Evade Antivirus and Network Security Detection
⚠️
Several GitLab Vulnerabilities Enable Attackers to Launch DoS Attacks
⚠️
Cisco Identity Services RADIUS Vulnerability Allows Attackers to Trigger Denial of Service Condition
⚠️
Hackers Targets Coinbase Users Targeted in Advanced Social Engineering Hack
⚠️
Top 12 US cities for cybersecurity job and salary growth
⚠️
Unpatched critical bugs in Versa Concerto lead to auth bypass, RCE
⚠️
FBI and Europol Disrupt Lumma Stealer Malware Network Linked to 10 Million Infections
⚠️
Versa Concerto 0-Day Flaw Enables Remote Code Execution by Bypassing Authentication
⚠️
Prompt injection flaws in GitLab Duo highlights risks in AI assistants
⚠️
Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host
⚠️
Feds and Microsoft crush Lumma Stealer that stole millions of passwords
⚠️
Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise
⚠️
New NIST Security Metric Aims to Pinpoint Exploited Vulnerabilities
⚠️
Chinese hackers breach US local governments using Cityworks zero-day
⚠️
Unpatched Windows Server Flaw Threatens Active Directory Users
⚠️
Ivanti EPMM flaw exploited by Chinese hackers to breach govt agencies
⚠️
Microsoft Expert Reveals the Hidden Dangers of Bad Code on Your PC’s Performance
⚠️
Cisco Webex Meetings Vulnerability Enables HTTP Response Manipulation
⚠️
We Fix Vulnerabilities Faster Than the Government Does Taxes 💀
⚠️
Cybercriminals Using Trusted Google Domains to Spread Malicious Code
⚠️
Police arrests 270 dark web vendors, buyers in global crackdown
⚠️
Vidar and StealC Malware Delivered Through Viral TikTok Videos by Hackers
⚠️
CISA Releases Two Industrial Control Systems Advisories
⚠️
Akamai, Microsoft Disagree on Severity of Unpatched ‘BadSuccessor’ Flaw
⚠️
They Caught Us in Hours! How Cyber Defenses Are Evolving 🚨
⚠️
Critical Vulnerability in Netwrix Password Manager Enables Authenticated Remote Code Execution
⚠️
Russian Hackers Exploit Oracle Cloud Infrastructure to Target Scaleway Object Storage
⚠️
Microsoft says Lumma password stealer malware found on 394,000 Windows PCs
⚠️
Phishing Campaign Targets International Students in the US
⚠️
News alert: INE Security, Abadnet Institute partner to deliver cybersecurity training in Saudi Arabia
⚠️
News Alert: Halo Security reaches SOC 2 milestone, validating its security controls and practices
⚠️
Danabot: Analyzing a fallen empire
⚠️
Fédération Francaise de Rugby - 281,977 breached accounts
📢
AI Governance – So gestalten Sie die KI-Revolution sicher
📢
Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program
📢
New Best Practices Guide for Securing AI Data Released
📢
HPE security advisory (AV25-289)
📢
Cybersecurity and AI: Integrating and Building on Existing NIST Guidelines
📢
Halo Security Achieves SOC 2 Type 1 Compliance, Validating Security Controls for Its Attack Surface Management Platform
📢
[Control systems] ABB security advisory (AV25-290)
🔥
Marks & Spencer Expects Ransomware Attack to Cost $400 Million
🔥
Marlboro-Chesterfield Pathology Data Breach Impacts 235,000 People
🔥
FTC finalizes order requiring GoDaddy to secure hosting services
🔥
Russian hackers breach orgs to track aid routes to Ukraine
🔥
Hacker who breached communications app used by Trump aide stole data from across US government
🔥
Gujarat Teen Arrested for Orchestrating Over 50 Cyberattacks in ‘Operation Sindoor’
🔥
The Ransomware Threat: Still Alive and Kicking
🔥
US indicts leader of Qakbot botnet linked to ransomware attacks
🔥
Flippy, Deepfakes & AI: The New Cyber Nightmare?
🔥
Malware Laced Printer Drivers - PSW #875
🕵️
ISC Stormcast For Thursday, May 22nd, 2025 https://isc.sans.edu/podcastdetail/9462, (Thu, May 22nd)
🕵️
“Microsoft has simply given us no other option,” Signal says as it blocks Windows Recall
🕵️
GitLab, Atlassian Patch High-Severity Vulnerabilities
🕵️
ThreatBook Recognized as a Notable Vendor in Global Network Analysis and Visibility (NAV) Report
🕵️
Russische Cyber-Kampagne in Nato-Staaten aufgedeckt
🕵️
Signal’s new Windows update prevents the system from capturing screenshots of chats
🕵️
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS
🕵️
Taming the Hacker Storm: Why Millions in Cybersecurity Spending Isn’t Enough
🕵️
SHARED INTEL Q&A: Visibility, not volume — reframing detection for the AI-enabled SOC
🕵️
The Voter Experience
🕵️
Security Theater or Real Defense? The KPIs That Tell the Truth
🕵️
Is This the End of Traditional Firewalls?
🕵️
Pandas Galore: Chinese Hackers Boost Attacks in Latin America
🕵️
Malicious VS Code Extensions Target Windows Solidity Developers to Steal Login Credentials
🕵️
Lumma Stealer Infrastructure Behind Global Attacks on Millions of Users Dismantled
🕵️
Hackers Deploy Weaponized npm Packages to Target React and Node.js JavaScript Frameworks
🕵️
Researchers Warn of ‘Smiao Network’ Cyber Threat Against Taiwan’s Federal Staff
🕵️
Chinese hackers are persistent players in cyber espionage landscape, with a special emphasis on European governmental and industrial entities, report says
🕵️
Chinese hackers are persistent players in cyber espionage landscape, with a special emphasis on European governmental and industrial entities, report says
🕵️
CefSharp Enumeration Tool Identifies Critical Security Issues in .NET Desktop Applications
🕵️
Does Using ChatGPT Hurt the Planet? 🌍
🕵️
Is It a Skills Gap or a Headcount Lie?
🕵️
This AI Drama in Class is Getting Out of Hand 😬
🕵️
Oops: DanaBot Malware Devs Infected Their Own PCs
🌐
Hackers use fake Ledger apps to steal Mac users’ seed phrases
📡
DOJ charges 12 more in $263 million crypto fraud takedown where money was hidden in squishmallow stuffed animals
📡
Signal now blocks Microsoft Recall screenshots on Windows 11
📡
Identity Security Has an Automation Problem—And It's Bigger Than You Think
📡
Security considerations for voice-activated digital assistants - ITSAP.70.013
📡
A Kaspersky checklist for a safe vacation | Kaspersky official blog
📡
Why WireGuard Might NOT Be the Best VPN Choice! 🤔
📡
Resilient Secure Backup Connectivity for SMB/Home Users, (Thu, May 22nd)
📡
Claude 4 benchmarks show improvements, but context is still 200K
📡
Lumma Stealer: Down for the count