99Articles
8Categories
2025-05-27Date
🐛
Arm Mali GPU Vulnerability Enables Bypass of MTE and Arbitrary Kernel Code Execution
🐛
Siemens SiPass Flaw Allows Remote Attackers to Cause DoS Conditions
🐛
GIMP Image Editor Vulnerability Allows Remote Attackers to Execute Arbitrary Code
🐛
Mozilla Quickly Fixes Firefox Vulnerabilities from Pwn2Own 2025 with Urgent Patches
🐛
Hackers Exploit Craft CMS Vulnerability to Inject Cryptocurrency Miner Malware
⚠️
Diese Social-Engineering-Trends sollten Sie kennen
KEV
⚠️
How CISOs can defend against Scattered Spider ransomware attacks
⚠️
How Google Meet Pages Are Exploited to Deliver PowerShell Malware
⚠️
Critical GitHub MCP Server Vulnerability Allows Unauthorized Access to Private Repositories
⚠️
Hackers Exploit HTTP/2 Flaw to Launch Arbitrary Cross-Site Scripting Attacks
⚠️
Adidas warns of data breach after customer service provider hack
⚠️
Earth Lamia Develops Custom Arsenal to Target Multiple Industries
⚠️
Red Hat and AMD Team Up to Boost AI Processing Power and Performance
⚠️
AI in AppSec: Agentic Tools, Vibe Coding Risks & Securing Non-Human Identities - Mo Ab... - ASW #332
⚠️
DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers
⚠️
Multiple Vulnerabilities in Hardy Barth EV Station Allow Unauthenticated Network Access
⚠️
Adidas Customer Information Compromised Through Third-Party Vendor
⚠️
Chinese-Owned VPNs
⚠️
Hackers drop 60 npm bombs in less than two weeks to recon dev machines
⚠️
Wer landet im Netz der Cyber-Spinne?
⚠️
Quantencomputer knacken RSA-Verschlüsselungen noch schneller
⚠️
New Guidance for SIEM and SOAR Implementation
⚠️
WordPress TI WooCommerce Wishlist Plugin Flaw Puts Over 100,000 Websites at Risk of Cyberattack
⚠️
Not Every CVE Deserves a Fire Drill: Focus on What’s Exploitable
⚠️
Government Calls on Organizations to Adopt SIEM and SOAR Solutions
⚠️
DragonForce Ransomware Hackers Exploiting SimpleHelp Vulnerabilities
⚠️
NIST Introduces New Metric to Measure Likelihood of Vulnerability Exploits
⚠️
CISA Releases One Industrial Control Systems Advisory
⚠️
They Got Hacked... Without Leaving GitHub 😱
⚠️
Code security in the AI era: Balancing speed and safety under new EU regulations
⚠️
GitHub MCP Server Vulnerability Let Attackers Access Private Repositories
⚠️
Cybercriminals Clone Antivirus Site to Spread Venom RAT and Steal Crypto Wallets
⚠️
Threat Actors Are Using AI-Generated Audio to Impersonate U.S. Officials
⚠️
DragonForce ransomware abuses MSP’s SimpleHelp RMM to encrypt customers
⚠️
New Russian APT group Void Blizzard targets NATO-based orgs after infiltrating Dutch police
⚠️
DragonForce ransomware abuses SimpleHelp in MSP supply chain attack
⚠️
CyberRiskTV Live Coverage from Identiverse 2025 - Day 3
📢
Mozilla security advisory (AV25-297)
📢
Citrix security advisory (AV25-298)
📢
CISA loses nearly all top officials as purge continues
📢
Google Chrome security advisory (AV25-299)
🔥
Weekly Update 453
🔥
Free - 13,926,173 breached accounts
🔥
Researchers Uncover macOS ‘AppleProcessHub’ Stealer: TTPs and C2 Server Details Revealed
🔥
Russian Void Blizzard cyberspies linked to Dutch police breach
🔥
Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages
🔥
Iranian Cybergroup Toufan Targets Organizations to Steal Login Credentials
🔥
Velvet Chollima APTHackers Target Government Officials Using Weaponized PDFs
🔥
MATLAB dev confirms ransomware attack behind service outage
🔥
Dutch Intelligence Agencies Say Russian Hackers Stole Police Data in Cyberattack
🔥
Hackers Use Fake OneNote Login to Capture Office365 and Outlook Credentials
🔥
Iranian Man Pleads Guilty to Role in Baltimore Ransomware Attack
🔥
Adidas warns of data breach after customer service provider hack
🔥
Coca-Cola, Bottling Partner Named in Separate Ransomware and Data Breach Claims
🔥
Iranian pleads guilty to RobbinHood ransomware attacks, faces 30 years
🔥
Major AT&T leak exposed 31M records, hackers claim
🔥
Adidas customers’ personal information at risk after data breach
🕵️
ISC Stormcast For Tuesday, May 27th, 2025 https://isc.sans.edu/podcastdetail/9466, (Tue, May 27th)
🕵️
Russia-Linked Hackers Target Tajikistan Government with Weaponized Word Documents
🕵️
New Android Malware GhostSpy Grants Attackers Full Control Over Infected Devices
🕵️
Law Firms Warned of Silent Ransom Group Attacks
🕵️
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
🕵️
Silver RAT Malware Employs New Anti-Virus Bypass Techniques to Execute Malicious Activities
🕵️
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
🕵️
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
🕵️
Windows 11 Notepad Introduces AI-Powered Writing with Copilot Integration
🕵️
Inside the $111 Billion Cloud Security Market: Acquisition, Expansion, and Where to Aim Next
🕵️
APT36 and Sidecopy Hackers Target India’s Critical Infrastructure with Malware Attacks
🕵️
Microsoft Alerts on Void Blizzard Hackers Targeting Telecommunications and IT Sectors
🕵️
Ongoing Campaign Uses 60 NPM Packages to Steal Data
🕵️
Russian Government Hackers Caught Buying Passwords from Cybercriminals
🕵️
Threat Actors Use Fake DocuSign Notifications to Steal Corporate Data
🕵️
Why the Data Center Boom Might Kill Itself 💀
🕵️
New Attack Bypasses HTTP/2 Security for Arbitrary Cross-Site Scripting
🕵️
Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto
🕵️
The future of AI agents—and why OAuth must evolve
🕵️
Where’s Clippy Now? Microsoft Just Dropped a Bomb at Build 2025
🕵️
Malicious Machine Learning Model Attack Discovered on PyPI
🕵️
Windows Server emergency update fixes Hyper-V VM freezes, restart issues
🕵️
New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency
🕵️
BIOS under attack: hackers increasingly focus on boot threats
🕵️
If I Had Only 20 Seconds To Teach People How To Avoid Scams
🕵️
The Lost Art of Writing Things Down
🕵️
AP Tests, Hyper-V, Notepad, Google, Nova Scotia, NHI, Bond, Josh Marpet, and more... - SWN #480
🕵️
Zscaler to Acquire MDR Specialist Red Canary
🕵️
CyberRiskTV Live Coverage from Identiverse 2025 - Day 2
🕵️
CyberRiskTV Live Coverage from Identiverse 2025 - Day 1
🌐
New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency
🎙️
The AI Fix #52: AI adopts its own social norms, and AI DJ creates diversity scandal
📡
Hackers Are Calling Your Office: FBI Alerts Law Firms to Luna Moth’s Stealth Phishing Campaign
📡
Windows Server emergency update fixes Hyper-V VM freezes, restart issues
📡
Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers
📡
The ChoiceJacking attack: stealing smartphone photos and data while charging via USB | Kaspersky official blog
📡
AI Agents and the Non‑Human Identity Crisis: How to Deploy AI More Securely at Scale
📡
Trend Micro Leading the Fight to Secure AI
📡
A 2% Risk That Could CRASH a Multi-Billion Dollar Empire!
📡
Securing Your SSH authorized_keys File, (Tue, May 27th)
📡
Executive summary and joint guidance on security information and event management and security orchestration, automation and response
📡
Word to the wise: Beware of fake Docusign emails