54Articles
7Categories
2025-05-26Date
🚨
CISA flags Commvault zero-day as part of wider SaaS attack campaignThe US Cybersecurity and Infrastructure Security Agency (CISA) has warned about threat actors abusing Commvault’s SaaS cloud application, Metallic, to access its clients’ critical application secrets. According to a CISA advisory, threat actors may have accessed client secrets fr…
KEV
🐛
Severe WSO2 SOAP Flaw Allows Unauthorized Password Resets for Any Use
🐛
Apache Tomcat RCE Vulnerability Exposed with PoC Released
🐛
Bitwarden Flaw Allows Upload of Malicious PDFs, Posing Security Risk
🐛
D-Link Routers Exposed by Hard-Coded Telnet Credential
🐛
Oracle TNS Flaw Exposes System Memory to Unauthorized Access
🐛
CVE Rebooted: Dumpster Fire or Fresh Start? 😬🔥
⚠️
Sieben gängige Wege, ein Smartphone zu hacken
⚠️
Unraveling Cyber Threats: Ransomware, Kidnapping, and Record-Breaking DDoS Attacks
⚠️
The 7 unwritten rules of leading through crisis
⚠️
Privilege Escalation Flaws Found in Tenable Network Monitor
⚠️
TA-ShadowCricket: Sophisticated Hacker Group Targeting Government and Enterprise Networks
⚠️
Reality check on SOC AI; Enterprise News; runZero and Imprivata RSAC interviews - HD M... - ESW #408
⚠️
Linux 6.15 Launches with Major Performance and Hardware Upgrades
⚠️
Open MPIC project defends against BGP attacks on certificate validation
⚠️
ChatGPT-03 Exploited to Override Critical Shutdown Protocols
⚠️
Severe vBulletin Flaw Allows Remote Code Execution by Attackers
⚠️
NIST proposes new metric to gauge exploited vulnerabilities - Help Net Security
⚠️
CISO's Guide To Web Privacy Validation And Why It's Important
⚠️
Breaking RSA encryption just got 20x easier for quantum computers
⚠️
SharpSuccessor PoC Released to Weaponize Windows Server 2025 BadSuccessor Flaw
⚠️
How scammers exploit genuine Microsoft business notifications
⚠️
Remote Prompt Injection in GitLab Duo Leads to Source Code Theft
⚠️
How a Simple Security Gap Could Threaten Entire Nations
⚠️
Fake DigiYatra Apps Target Indian Users to Steal Financial Data
⚠️
Meteobridge Web Interface Vulnerability Let Attackers Inject Commands Remotely
⚠️
Intercept and Monitor TLS Traffic with mitmproxy Using Podman - Infosec.Pub
📢
Dell security advisory (AV25-292)
📢
IBM security advisory (AV25-293
📢
Ubuntu security advisory (AV25-294)
📢
[Control systems] CISA ICS security advisories (AV25–295)
📢
Threat Actors Deploy Database Client Tools on Targeted Systems to Exfiltrate Sensitive Data
📢
Red Hat security advisory (AV25-296)
🔥
Nova Scotia Power Confirms Ransomware Attack, 280k Notified of Data Breach
🔥
BSI warnt vor Cyberattacken auf Energieversorgung
🔥
⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs
🔥
Kundendaten von Adidas gestohlen
🔥
Nova Scotia Power Suffers Ransomware Attack; 280,000 Customers’ Data Compromised
🔥
Suspected InfoStealer Malware Data Breach Exposed 184 Million Logins and Passwords
🔥
60 Malicious npm Packages Exfiltrate Hostnames, IP Addresses, and DNS Server Details
🔥
Hackers Reportedly Selling Over 500 Stolen Crypto Databases on Dark-Web Forums
🔥
SVG Steganography, (Mon, May 26th)
🕵️
Over 40 Malicious Chrome Extensions Impersonate Popular Brands to Steal Sensitive Data
🕵️
FBI Warns of Silent Ransom Group Targeting Law Firms via Scam Calls
🕵️
Multiple French govt institutions’ emails, passwords exposed, hackers claim
🕵️
ChatGPT Deep Research Now Integrates with Dropbox and OneDrive to Retrieve Data
🕵️
FBI Issues on Silent Ransom Group Using Fake IT Support Calls to Target Victims
🕵️
Katz Stealer Targets Chrome, Edge, Brave, and Firefox to Steal Login Credentials
🕵️
Choosing Cybersecurity Is Like Choosing the Harp… Heavy, Loud & Unforgettable
📡
OpenAI plans to ship an interesting ChatGPT product by 2026
📡
Google claims users find ads in AI search 'helpful'
📡
Vote for the sessions you want to see at TechCrunch Disrupt 2025
📡
Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto
📡
Why Blindly Scaling Can Destroy Your Business – She Explains!