100Articles
9Categories
2025-06-02Date
🚨
CISA Urged to Enrich KEV Catalog with More Contextual Data - Infosecurity Magazinesubmitted by kid to cybersecurity 1 points | 0 comments https://www.infosecurity-magazine.com/news/cisa-urged-enrich-kev-catalog/
KEV
🚨
CISA Adds Five Known Exploited Vulnerabilities to CatalogCISA added five new vulnerabilities to its  Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2021-32030 ASUS Routers Improper Authentication Vulnerability CVE-2023-39780  ASUS RT-AX55 Routers OS Command Injection Vulnerabilit…
KEV
🐛
New Linux Security Bugs Could Expose Password Hashes Across Millions of Devices
🐛
Active Exploits Detected Targeting Critical vBulletin Vulnerability
🐛
Technical Details Published for Critical Cisco IOS XE Vulnerability
🐛
Critical Denodo Scheduler Flaw Allows Remote Code Execution by Attackers
🐛
vBulletin Vulnerability Exploited in the Wild
KEV
🐛
Realtek Bluetooth Driver Flaw Allows Attackers to Delete Any File on Windows Systems
🐛
IBM DataStage Bug Exposes Database Credentials in Plain Tex
🐛
Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU
🐛
Preinstalled Android Apps Found Leaking PINs and Executing Malicious Commands
🐛
Preinstalled Apps on Ulefone, Krüger&Matz Phones Let Any App Reset Device, Steal PIN
⚠️
Zero-Knowledge-Protokoll: Was Sie über zk-SNARK wissen sollten
⚠️
Cybersecurity Incidents: Eddie Steeler Malware, ConnectWise Breach, and Nova Scotia Power Data Theft
⚠️
Severe Vulnerabilities in Consilium CS5000 Fire Panels Allow Remote System Takeover
⚠️
In Other News: PoC for Fortinet Bug, AI Model Subverts Shutdown, RAT Source Code Leaked
⚠️
Critical Roundcube Flaw Allows Remote Code Execution by Attackers
⚠️
New Study Reveals Vulnerable Code Pattern Putting GitHub Projects at Risk of Path Traversal Attacks
⚠️
Counter Antivirus Service AVCheck Shut Down by Law Enforcement
⚠️
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - ESW #409
⚠️
6 hard truths security pros must learn to live with
⚠️
Over 50,000 Azure AD Users’ Access Tokens Exposed via Unauthenticated API Endpoint
⚠️
Qualcomm fixes three Adreno GPU zero-days exploited in attacks
KEV
⚠️
The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats
⚠️
New PyPI Supply Chain Attacks Target Python and NPM Users on Windows and Linux
⚠️
Hackers Weaponize Free SSH Client PuTTY to Deliver Malware on Windows
⚠️
Exploit details for max severity Cisco IOS XE flaw now public
⚠️
FBI cracks down on crypting crew in a global counter-antivirus service disruption
⚠️
⚡ Weekly Recap: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More
⚠️
HuluCaptcha: Fake Captcha Kit Tricks Users into Executing Code via Windows Run Command
⚠️
French Users Targeted by Major Phishing Campaign
⚠️
Qualcomm Flags Exploitation of Adreno GPU Flaws, Urges OEMs to Patch Urgently
⚠️
Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub
⚠️
Hackers Just Went Nuclear: Malware in Microcode ⚠️
⚠️
How Hackers Turn Open Source Into Open Season 🧵 #cybersecurity
⚠️
Cartier Data Breach: Luxury Retailer Warns Customers that Personal Data Was Exposed
📋
Microsoft ships emergency patch to fix Windows 11 installation issues
📋
Critical MediaTek Flaws Allow Hackers to Gain Elevated Access with No User Input
📢
Simple SSH Backdoor, (Mon, Jun 2nd)
📢
Haozi’s Plug-and-Play Phishing Attack Steals Over $280,000 From Users
📢
Is “Secure by Design” Just an Illusion?
📢
Your KnowBe4 Compliance Plus Fresh Content Updates from May 2025
📢
Red Hat security advisory (AV25-304)
📢
Ubuntu security advisory (AV25-305)
📢
Vanta bug exposed customers’ data to other customers
📢
IBM security advisory (AV25-307)
📢
Dell security advisory (AV25-306)
📢
[Control systems] CISA ICS security advisories (AV25–308)
📢
Google Chrome to distrust Chunghwa Telecom, Netlock certificates in August
📢
Roundcube security advisory (AV25-309)
📢
HPE security advisory (AV25-310)
🔥
Australia Requires Ransomware Victims to Declare Payments
🔥
Just a moment...
🔥
Weekly Update 454
🔥
Germany doxxes Conti ransomware and TrickBot ring leader
🔥
Ransomware-Bande erpresst Volkswagen
🔥
Beyond Credentials: When Every Data Point Becomes a Weapon
🔥
BKA enthüllt Identität von Trickbot-Anführer
🔥
Podcast: Darknet Diaries – MalwareTech
🔥
Cartier discloses data breach amid fashion brand cyberattacks
🕵️
MITRE Releases Roadmap for Transition to Post-Quantum Cryptography
🕵️
Simple SSH Backdoor
🕵️
Simple SSH Backdoor
🕵️
US Government Is Investigating Messages Impersonating Trump’s Chief of Staff, Susie Wiles
🕵️
SHARED INTEL Q&A: When every IoT Device and AI assistant has an identity — who’s in control?
🕵️
Alleged Conti, TrickBot Gang Leader Unmasked
🕵️
CISO Roles Take on Strategic Security Leadership Roles Beyond Cybersecurity as Organizations
🕵️
Chrome to Distrust Chunghwa Telecom and Netlock Certificates
🕵️
ISC Stormcast For Monday, June 2nd, 2025 https://isc.sans.edu/podcastdetail/9474, (Mon, Jun 2nd)
🕵️
Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions
🕵️
Tycoon2FA Infra Used by Dadsec Hacker Group to Steal Office365 Credentials
🕵️
Pure Crypter Employs Multiple Evasion Techniques To Bypass Windows 11 24H2 Security Features
🕵️
Mentorship Monday - Discussions for career and learning!
🕵️
Microsoft ships emergency patch to fix Windows 11 startup failures
🕵️
Critical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems Worldwide
🕵️
Backdoors in Python and NPM Packages Target Windows and Linux
🕵️
New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers
🕵️
Download the ‘New Thinking about Cloud Computing’ Enterprise Spotlight
🕵️
Cryptojackers Caught Mining Monero via Exposed DevOps Infrastructure
🕵️
Announcing a new strategic collaboration to bring clarity to threat actor naming
🕵️
Microsoft Said THIS Is Best Practice—Experts Disagree!
🕵️
Discover how automatic attack disruption protects critical assets while ensuring business continuity
🕵️
Stealth Syscall Technique Allows Hackers to Evade Event Tracing and EDR Detection
🕵️
Threat Actors Leverage ClickFix Technique to Deploy EddieStealer Malware
🕵️
Microsoft Wants You to MIX Personal Files with Work?! 😳
🕵️
Product Without Purpose? That’s Not Security, That’s Noise.
🕵️
The Silent AI Meltdown Happening Right Now
🌐
‘Russian Market’ emerges as a go-to shop for stolen credentials
🌐
NSO Group asks judge for new trial, calling $167 million in damages ‘outrageous’
📡
Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions
📡
Kaspersky research: what interests kids in 2025 | Kaspersky official blog
📡
An industry first: Sophos Firewall and NDR Essentials
📡
Sophos Firewall v21.5 is now available
📡
The Never-Ending Data Treadmill — A Cybersecurity Nightmare
📡
Sophos Named a 2025 Gartner® Peer Insights™ Customers’ Choice for both Endpoint Protection Platforms and Extended Detection and Response
📡
Why AI Alone Will NEVER Be Enough for Cybersecurity…
📡
Microsoft and CrowdStrike partner to link hacking group names
📡
SentinelOne: Last week’s 7-hour outage caused by software flaw
📡
The North Face warns customers of April credential stuffing attack
📡
Don’t let dormant accounts become a doorway for cybercriminals