95Articles
7Categories
2025-05-29Date
🐛
Massive Botnet Targets ASUS Routers by Injecting Malicious SSH Keys
🐛
DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints
🐛
Critical Argo CD Flaw Exposes Kubernetes Clusters to Full Resource Manipulation
🐛
Windows 11 File Explorer Vulnerability Enables NTLM Hash Theft
🐛
Apache InLong JDBC Vulnerability Enables Deserialization of Untrusted Data
🐛
Chromium: CVE-2025-5066 Inappropriate implementation in Messages
🐛
Chromium: CVE-2025-5067 Inappropriate implementation in Tab Strip
🐛
Chromium: CVE-2025-5283 Use after free in libvpx
🐛
Chromium: CVE-2025-5281 Inappropriate implementation in BFCache
🐛
Chromium: CVE-2025-5065 Inappropriate implementation in FileSystemAccess API
🐛
Chromium: CVE-2025-5064 Inappropriate implementation in Background Fetch API
🐛
Chromium: CVE-2025-5280 Out of bounds write in V8
🐛
Chromium: CVE-2025-5063 Use after free in Compositing
⚠️
Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin
⚠️
6 rising malware trends every security pro should know
⚠️
APT Hackers Turn Google Calendar Into Command Hub Using TOUGHPROGRESS Malware, Google Alerts
⚠️
Critical OneDrive Flaw Lets Malicious Websites Access All Your Files
⚠️
Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations
⚠️
Woodpecker: Red Teaming Tool Targets AI, Kubernetes, and API Vulnerabilities
⚠️
New ChoiceJacking Exploit Targets Android and iOS via Infected Charging Ports
⚠️
Critical Dell PowerStore T Vulnerability Allows Full System Compromise
⚠️
UTG-Q-015 Hackers Launch Massive Brute-Force Attacks on Government Web Servers
⚠️
Microsoft Entra’s billing roles pose privilege escalation risks in Azure
⚠️
Hackers Exploit Cloudflare Tunnels to Launch Stealthy Cyberattacks
⚠️
New PumaBot Hijacks IoT Devices via SSH Brute-Force for Persistent Access
⚠️
Fullscreen BitM Attack Discovered by SquareX Exploits Browser Fullscreen APIs to Steal Credentials in Safari
⚠️
Even $5M a year can’t keep top CISOs happy
⚠️
Who's Watching the Vendors? Spoiler: No One.
⚠️
Cybercriminals exploit AI hype to spread ransomware, malware
⚠️
GreyNoise Flags 9,000 ASUS Routers Backdoored Via Patched Vulnerability
⚠️
Do you actually audit open source projects you download?
⚠️
This Grandma’s Webcam Just Became a Security Nightmare
⚠️
Hackers Exploit Cloudflare Tunnels to Launch Stealthy Cyberattacks
⚠️
Threat Actors Exploit Top Domain Zones for Cyber Attacks
⚠️
CISA Releases Five Industrial Control Systems Advisories
⚠️
Threat Actors Exploit Nifty[.]com Infrastructure in Sophisticated Phishing Attack
⚠️
Scammers Exploit Uncertainty Surrounding US Tariffs
⚠️
Capital One Customers Targeted By Credential Harvesting Phishing Campaign
⚠️
Ping. Inject. Own. Classic IoT Fail Explained
⚠️
It's A Trap! - PSW #876
⚠️
Poisoned models in fake Alibaba SDKs show challenges of securing AI supply chains
⚠️
Warning: Threat actors now abusing Google Apps Script in phishing attacks
📋
Microsoft: Windows 11 might fail to start after installing KB5058405
📢
CISA Releases Dedicated SIEM & SOAR Guide for Cybersecurity Professionals
📢
You Call That Age Verification? 😂 #cybersecurityfail
🔥
Risk assessment vital when choosing an AI model, say experts
🔥
Data broker LexisNexis discloses data breach affecting 364,000 people
🔥
Victoria’s Secret Website Taken Offline After Cybersecurity Breach
🔥
Adidas Data Breach Linked to Third-Party Vendor
🔥
Victoria’s Secret takes down website after security incident
🔥
Victoria’s Secret Website Taken Offline After Cyberattack
🔥
364,000 Impacted by Data Breach at LexisNexis Risk Solutions - SecurityWeek
🔥
RE/MAX allegedly hit by hacker attack​ | Cybernews
🔥
New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers
🔥
Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools
🔥
Interlock Ransomware Uses NodeSnake RAT for Persistent Access to Corporate Networks
🔥
ConnectWise breached in cyberattack linked to nation-state hackers
🔥
When Code Becomes the Enemy 🧠💻
🕵️
Alternate Data Streams ? Adversary Defense Evasion and Detection [Guest Diary], (Wed, May 28th)
🕵️
Thousands of Asus routers are being hit with stealthy, persistent backdoors
🕵️
ISC Stormcast For Thursday, May 29th, 2025 https://isc.sans.edu/podcastdetail/9470, (Thu, May 29th)
🕵️
GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers
🕵️
Malicious WordPress Plugin Disguised as Java Update Infects Site Visitors
🕵️
Beyond GenAI: Why Agentic AI Was the Real Conversation at RSA 2025
🕵️
New Spear-Phishing Campaign Targets Financial Executives with NetBird Malware
🕵️
RSAC Fireside Chat: Cyber risk mitigation turns personal–defending the CEO as an attack vector
🕵️
New Research Reveals Key TCP SYN Patterns for Detecting Malicious Activity
🕵️
Webinar Today: Why Context is a Secret Weapon in Application Security Posture Management
🕵️
Surveillance Via Smart Toothbrush
🕵️
Improving National Security Through Secure AI
🕵️
Sem título
🕵️
Data leak exposes 1.6M Etsy customer emails​ | Cybernews
🕵️
New Microsoft Entra Connect Update Replaces Legacy Login Methods
🕵️
Dark Partner Hackers Leverage Fake AI, VPN, and Crypto Sites to Target macOS and Windows Users
🕵️
Criminal IP Set to Make Its Debut at Infosecurity Europe 2025
🕵️
APT41 malware abuses Google Calendar for stealthy C2 communication
🕵️
Apple Safari exposes users to fullscreen browser-in-the-middle attacks
🕵️
Chinese Hacking Group ‘Earth Lamia’ Targets Multiple Industries
🕵️
Unbound Raises $4 Million to Secure Gen-AI Adoption
🕵️
Threat actors abuse Google Apps Script in evasive phishing attacks
🕵️
How to deploy AI safely
🕵️
PureHVNC RAT Uses Fake Job Offers and PowerShell to Evade Security Defenses
🕵️
Defending against evolving identity attack techniques
🕵️
Antivirus ≠ EDR. Stop Mixing Them Up.
🕵️
The Shiny Object Syndrome Is Killing Cybersecurity
🕵️
Friday Squid Blogging: NGC 1068 Is the “Squid Galaxy”
📡
Attackers are mapping your attack surface—are you?
📡
A decade in, bootstrapped Thinkst Canary reaches $20M in ARR without VC funding
📡
57 suspicious Chrome extensions with millions of installs | Kaspersky official blog
📡
US sanctions firm linked to cyber scams behind $200 million in losses
📡
Overworked and Under Attack – Cybersecurity’s Alert Fatigue
📡
US government sanctions tech company involved in cyber scams
📡
Why Taking Breaks Makes You BETTER at Cybersecurity!
📡
Mozilla releases Firefox 139.0.1 update to fix artifacts on Nvidia GPUs
📡
Microsoft Authenticator now warns to export passwords before July cutoff