94Articles
7Categories
2025-06-04Date
⚠️
HPE Issues Security Patch for StoreOnce Bug Allowing Remote Authentication Bypass
⚠️
Emergency Patches, Ransomware Exposes, and Rising QR Code Scams
⚠️
DollyWay World Domination Attack Compromises 20,000+ Sites
⚠️
Custom Active Directory Extensions Create Stealthy Backdoors for Corporate Attacks
⚠️
Hackers Exploit Ruby Gems to Steal Telegram Tokens and Messages
⚠️
Microsoft Defender for Endpoint Prevents Cyberattack,Secures 180,000 Devices
⚠️
6 ways CISOs can leverage data and AI to better secure the enterprise
⚠️
Threat Actors Abuse ‘Prove You Are Human’ System to Distribute Malware
⚠️
Threat Actor Bribes Overseas Support Agents to Steal Coinbase Customer Data
⚠️
Cybersecurity’s ‘rare earth’ skills: Scarce, high-value, and critical for future defense
⚠️
Webinar Today: Redefining Vulnerability Management With Exposure Validation
⚠️
Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks
⚠️
35,000 Internet-Connected Solar Power Systems Vulnerable to Cyberattacks
⚠️
CISA warns of ConnectWise ScreenConnect bug exploited in attacks
⚠️
Windows Authentication Coercion Attacks Present Major Risks to Enterprise Networks
⚠️
Vendor email compromise: The silent $300M threat CISOs can’t ignore
⚠️
Your SaaS Data Isn't Safe: Why Traditional DLP Solutions Fail in the Browser Era
⚠️
Google Warns of Vishing, Extortion Campaign Targeting Salesforce Customers
⚠️
Google: Hackers target Salesforce accounts in data extortion attacks
⚠️
Kerberos AS-REP roasting attacks: What you need to know
⚠️
Hacker targets other hackers and gamers with backdoored GitHub code
⚠️
Hackers use Vishing to breach Salesforce customers and swipe data
⚠️
Chaos RAT Malware Targets Windows and Linux via Fake Network Tool Downloads
⚠️
Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App
⚠️
DCRat Targets Latin American Users to Steal Banking Credentials
⚠️
News alert: $198K in Grants Awarded to Boost Cybersecurity Workforce in Massachusetts
⚠️
FBI warns of NFT airdrop scams targeting Hedera Hashgraph wallets
⚠️
Threat Actors Exploit Malware Loaders to Circumvent Android 13+ Accessibility Safeguards
⚠️
CrowdStrike’s former CTO on cyber rivalries and how automation can undermine security for early-stage startups
⚠️
BidenCash carding market domains seized in international operation
⚠️
Exploiting Clickfix: AMOS macOS Stealer Evades Security to Deploy Malicious Code
⚠️
Cisco warns of ISE and CCP flaws with public exploit code
⚠️
Updated Guidance on Play Ransomware
⚠️
Multiple Vulnerabilities in HPE StoreOnce Software Could Allow for Remote Code Execution
📋
IBM QRadar Vulnerabilities Expose Sensitive Configuration Files to Attackers
📋
Google addresses 34 high-severity vulnerabilities in June’s Android security update | CyberScoop
📢
Dobrindt will aufrüsten gegen Cyberkriminelle
📢
HPE security advisory (AV25-316)
📢
Microsoft Edge security advisory (AV25-317)
📢
Ukraine claims it hacked Tupolev, Russia’s strategic warplane maker
📢
Cisco security advisory (AV25-318)
📢
FBI: Play ransomware breached 900 victims, including critical orgs
🔥
Victoria’s Secret Says It Will Postpone Earnings Report After Recent Security Breach
🔥
EPA breach claims lack teeth, researchers say​ | Cybernews
🔥
Coinbase breach tied to bribed TaskUs support agents in India
🔥
The Rising Tide: Understanding the Surge in Cyber Attacks in India
🔥
Media giant Lee Enterprises says data breach affects 39,000 people
🔥
New Eleven11bot Hacks 86,000 IP Cameras for Large-Scale DDoS Attack
🔥
Data breach at newspaper giant Lee Enterprises affects 40,000 people
🔥
SCATTERED SPIDER Hackers Target IT Support Teams & Bypass Multi-Factor Authentication
🔥
The Pregnancy That Hacked Biometrics 😨
🔥
Ransomware gang claims responsibility for Kettering Health hack
🔥
Hacker arrested for breaching 5,000 hosting accounts to mine crypto
🔥
Media giant Lee Enterprises says data breach affects 39,000 people
🕵️
ISC Stormcast For Wednesday, June 4th, 2025 https://isc.sans.edu/podcastdetail/9478, (Wed, Jun 4th)
🕵️
Trustifi Raises $25 Million for AI-Powered Email Security
🕵️
Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack
🕵️
ThreatBook Selected In The First-ever Gartner® Magic Quadrant™ For Network Detection And Response (NDR)
🕵️
35,000 Solar Power Systems Exposed to Internet
🕵️
Regain Control of Business Risks, Your Leadership Habits, and Being Present - Alla Val... - BSW #398
🕵️
Thousands Hit by The North Face Credential Stuffing Attack
🕵️
New Crocodilus Malware Grants Full Control Over Android Devices
🕵️
New Malware Attack Uses Malicious Chrome & Edge Extensions to Steal Sensitive Data
🕵️
Wireshark Certified Analyst – Wireshark Released Official Certification for Security Professionals
🕵️
ThreatSpike Raises $14 Million in Series A Funding
🕵️
The Ramifications of Ukraine’s Drone Attack
🕵️
Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift
🕵️
APT37 Hackers Fake Academic Forum Invites to Deliver Malicious LNK Files via Dropbox Platform
🕵️
Compyl Raises $12 Million for GRC Platform
🕵️
Over 8M records with US patients' data leaked | Cybernews
🕵️
1,000 Instantel Industrial Monitoring Devices Possibly Exposed to Hacking - SecurityWeek
🕵️
Twitter launches 'XChat' encrypted DMs with big caveats • The Register
🕵️
Meta and Yandex are de-anonymizing Android users’ web browsing identifiers - Ars Technica
🕵️
XSSing TypeErrors in Safari - The Spanner
🕵️
Going Into the Deep End: Social Engineering and the AI Flood
🕵️
Malicious ‘Sleeper Agent’ Browser Extensions Infected 1.5 Million Users Globally
🕵️
Aembit Recognized on the 2025 Rising in Cyber List of Top Cybersecurity Startups
🕵️
The “Stiff Arm” Keeping CISOs Out of the Boardroom
🕵️
Tnok – Next Generation Port Security
🕵️
Lumma Infostealer Developers Persist in Their Malicious Activities
🕵️
What are You Working on Wednesday
🕵️
Enterprise Wealth Is Changing Hands. Are We Secure? 🧠 #shorts
🕵️
CyberRiskTV Live Coverage from Identiverse 2025 - Day 2
🕵️
Linux Doesn’t Care About Your Feelings 💀
🕵️
"Users Are the Weakest Link" — True or Just Convenient?
🕵️
Hacker targets other hackers and gamers with backdoored GitHub code
🌐
The strange tale of ischhfd83: When cybercriminals eat their own
🌐
Risky Business #794 -- Psychic Panda outgunned by Fluffy Lizard and UNC56728242
📡
Phishing e-mail that hides malicious link from Outlook users, (Wed, Jun 4th)
📡
Scammers are promising compensation from a bank | Kaspersky official blog
📡
Think Your Company is Secure? Think Again… 😬
📡
A Sexy SOC Won’t Save You! Here’s Why… 🚨
📡
Microsoft unveils free EU cybersecurity program for governments
📡
Driving Success on the Track or in the Boardroom