126Articles
10Categories
2025-06-03Date
🚨
Vulnerability Report - May 2025submitted by cm0002 to cybersecurity 2 points | 0 comments Introduction This vulnerability report has been generated using data aggregated on Vulnerability-Lookup , with contributions from the platform’s community. It highlights the most frequently mentioned vulnerability for May…
KEV
🚨
CISA Adds Three Known Exploited Vulnerabilities to CatalogCISA has added three new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-21479 Qualcomm Multiple Chipsets Incorrect Authorization Vulnerability CVE-2025-21480 Qualcomm Multiple Chipsets Incorrect Authorizat…
KEV
🐛
New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch
KEV
🐛
New ModSecurity WAF Vulnerability Enables Attackers to Crash Systems
🐛
Splunk Enterprise XSS Flaw Enables Attackers to Execute Unauthorized JavaScript
🐛
Splunk Universal Forwarder for Windows Flaw Grants Non-Admin Users Full Content Access
🐛
New Linux Vulnerabilities
🐛
Cisco Wireless LAN Controllers under threat again after critical exploit details go public
🐛
CISA Alerts on ConnectWise ScreenConnect Authentication Vulnerability Actively Exploited
KEV
🐛
Critical 10-Year-Old Roundcube Webmail Bug Allows Authenticated Users Run Malicious Code
🐛
vBulletin Exploits (CVE-2025-48827, CVE-2025-48828), (Tue, Jun 3rd)
🐛
Google patches third zero-day flaw in Chrome this year
KEV
🐛
Chromium: CVE-2025-5068 Use after free in Blink
🐛
Chromium: CVE-2025-5419 Out of bounds read and write in V8
⚠️
New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch
KEV
⚠️
Was ist Federated Identity Management?
⚠️
Threat-Intelligence-Plattformen – ein Kaufratgeber
⚠️
ColoCrossing - 7,183 breached accounts
⚠️
„In der Security geht es vor allem um Resilienz“
⚠️
Critical HPE StoreOnce Flaws Allow Remote Code Execution by Attackers
⚠️
AI gives superpowers to BEC attackers
⚠️
159: Vastaamo
⚠️
SolarWinds Dameware Vulnerability Could Let Attackers Gain Elevated Privileges
⚠️
Threat Actors Target PerimeterX CAPTCHA to Automate Microsoft Account Creation
⚠️
Google Researchers Find New Chrome Zero-Day
⚠️
AIs, MCPs, and the Acutal Work that LLMs Are Generating - ASW #333
⚠️
53% of cyber department leaders eyeing the exit
⚠️
Malicious NPM Packages Exploit Ethereum Wallets with Obfuscated JavaScript
⚠️
Google patches new Chrome zero-day bug exploited in attacks
⚠️
The high cost of misconfigured DevOps: Global cryptojacking hits enterprises
⚠️
Threat Actors Exploit DevOps Web Server Misconfigurations to Deploy Malware
⚠️
Australia Enforces Ransomware Payment Reporting
⚠️
New Research Uncovers Strengths and Vulnerabilities in Cloud-Based LLM Guardrails
⚠️
Hackers Abuse AI Tool Misconfigurations to Execute Malicious AI-Generated Payloads
⚠️
New Safari XSS Vulnerability Exploits JavaScript Error Handling to Run Arbitrary Code
⚠️
Qualcomm fixes three Adreno GPU zero-days exploited in attacks
⚠️
Hackers Exploit AI Tools Misconfiguration To Run Malicious AI-generated Payloads
⚠️
One hacker, many names: Industry collaboration aims to fix cyber threat label chaos
⚠️
New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch
KEV
⚠️
Apple iOS Activation Flaw Enables Injection of Unauthenticated XML Payloads
⚠️
CISA warns of ConnectWise ScreenConnect bug exploited in attacks
⚠️
1,000 Instantel Industrial Monitoring Devices Possibly Exposed to Hacking
⚠️
Aembit Extends Workload IAM to Microsoft Ecosystem, Securing Hybrid Access for Non-Human Identities
⚠️
If You Touch Tech, You’re in Security 👨‍💻 #ITReality
⚠️
Scattered Spider: Three things the news doesn’t tell you
⚠️
Android Security Update Addresses High-Severity Privilege Escalation Flaws
⚠️
News alert: Aembit brings ‘Workload IAM’ to Microsoft stack, secures hybrid AI and app access
⚠️
Researchers Reveal Container-Based Attacks Through Host-Based Log Analysis
⚠️
New Linux PumaBot Targets IoT Devices with SSH Credential Brute-Force Attack
⚠️
Malicious RubyGems pose as Fastlane to steal Telegram API data
⚠️
CISA Releases Three Industrial Control Systems Advisories
⚠️
DollyWay is infecting WordPress sites | Kaspersky official blog
⚠️
New Unrestricted AI Tool Can Assist in Cybercrime
⚠️
Coinbase breach tied to bribed TaskUs support agents in India
⚠️
Phone chipmaker Qualcomm fixes three zero-days exploited by hackers
⚠️
Warning: Critical PHP Deserialization Vulnerability in Roundcube Webmail, Patch Immediately! | CCB Safeonweb
⚠️
One-third of top U.S. cyber force has left since Trump took office
⚠️
The Cyber Vendor You Trusted? It Might Be Game Over.
⚠️
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
📋
Hewlett Packard Enterprise warns of critical StoreOnce auth bypass
📢
Trump’s CISA budget lays out deep job cuts, program reductions
📢
Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues
📢
[Control systems] ABB security advisory (AV25-311)
📢
SolarWinds security advisory (AV25-312)
📢
Splunk security advisory (AV25-313)
📢
Google Chrome security advisory (AV25-314)
📢
Qualcomm security advisory – June 2025 monthly rollup (AV25-315)
🔥
Cartier discloses data breach amid fashion brand cyberattacks
🔥
Lyrix Ransomware Targets Windows Users with Advanced Evasion Techniques
🔥
Volkswagen data breach claim falls flat on proof​ | Cybernews
🔥
Cartier Data Breach: Luxury Retailer Warns Customers That Personal Data Was Exposed - SecurityWeek
🔥
Potato packer suffers data breach, hackers claim​ | Cybernews
🔥
MainStreet reports third-party breach of bank customer data • The Register
🔥
MainStreet Bank Data Breach Impacts Customer Payment Cards
🔥
Victoria’s Secret delays earnings release after security incident
🔥
Health giant Kettering still facing disruption weeks after ransomware attack
🔥
North Face Fashion Brand Alerts Customers to Credential Stuffing Attack
🔥
State-Sponsored Groups Intensify Attacks on Manufacturing Sector and OT Systems
🔥
Russian Hacker Black Owl Targets Critical Industries to Steal Financial Data
🔥
Indian grocery startup KiranaPro was hacked and its servers deleted, CEO confirms
🔥
The Worsening Landscape of Educational Cybersecurity
🔥
More Tools ≠ More Security
🔥
Australia Begins New Ransomware Payment Disclosure Rules
🕵️
ISC Stormcast For Tuesday, June 3rd, 2025 https://isc.sans.edu/podcastdetail/9476, (Tue, Jun 3rd)
🕵️
Falschinformationen im Netz werden nur selten erkannt
🕵️
Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion
🕵️
Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names
🕵️
Is public WiFi actually dangerous?
🕵️
Beware: Fake Booking.com Sites Spread AsyncRAT Malware to Infect Devices
🕵️
Google Online Security Blog: Sustaining Digital Certificate Security - Upcoming Changes to the Chrome Root Store
🕵️
Over 30 Vulnerabilities Patched in Android
🕵️
New Report: Governments Struggle to Regain Backdoor Access to Secure Communications
🕵️
eSentire | When Samsung's Magic Turns Tragic: A Tale of Unauthorized Mining
🕵️
Docker, HashiCorp, Gitea servers targeted in cryptojacking campaign | SC Media
🕵️
Scattered Spider: Understanding Help Desk Scams and How to Defend Your Organization
🕵️
The North Face warns customers of April credential stuffing attack
🕵️
Zero Networks Raises $55 Million for Microsegmentation Solution
🕵️
Beyond the Pond Phish: Unraveling Lazarus Group's Evolving Tactics | BitMEX Blog
🕵️
CyberheistNews Vol 15 #22 If I Had Only 20 Seconds To Teach People How To Avoid Scams
🕵️
Why Scamming Can’t Be Stopped—But It Can Be Managed
🕵️
Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones
🕵️
Top Russian Dark Web Market Tools Drive Surge in Credential Theft Attacks
🕵️
Android Trojan Crocodilus Now Active in 8 Countries, Targeting Banks and Crypto Wallets
🕵️
Cybersecurity Challenges in the Energy and Utilities Sector
🕵️
How Microsoft Defender for Endpoint is redefining endpoint security
🕵️
The UK Brings Cyberwarfare Out of the Closet
🕵️
Can You Beat These Cyber Pros in Malware Trivia? 🧑‍💻👾
🕵️
Why VPNs Might Be Your Weakest Link 😵‍💫 #technews
🕵️
MY TAKE: Are we ‘Super f**ked’ by agentic AI — or finally able to take charge of what comes next?
🕵️
Fake Docusign Pages Deliver Multi-Stage NetSupport RAT Malware
🕵️
The Most Overused Phrase in Cybersecurity
🕵️
90% Right is Enough When You’re Debugging at 3AM
🕵️
Bovril, Deranged, Crocodilus, Cartier, Jinx, Conti, Scattered Spider, Josh Marpet... - SWN #482
🌐
Android Trojan Crocodilus Now Active in 8 Countries, Targeting Banks and Crypto Wallets
🌐
Android malware Crocodilus adds fake contacts to spoof trusted callers
🌐
Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack
🎙️
The AI Fix #53: An AI uses blackmail to save itself, and threats make AIs work better
📡
Scattered Spider: Understanding Help Desk Scams and How to Defend Your Organization
📡
Mozilla launches new system to detect Firefox crypto drainer add-ons
📡
Why This Hacker Wants to Showcase His Biggest Mistake 🔥
📡
Microsoft adds quick machine recovery to Windows 11 settings
📡
He Cracked the Code… But It Took Him 2 Years to Start ⏳
📡
ChatGPT rolls out Memory upgrade for free users
📡
OpenAI is hopeful GPT-5 will compete a little more
📡
Delving Into the SparkRAT Remote Access Tool
📡
Delving Into the SparkRAT Remote Access Tool