94Articles
7Categories
2025-06-09Date
🚨
CISA Adds Two Known Exploited Vulnerabilities to CatalogCISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation.  CVE-2025-32433 Erlang Erlang/OTP SSH Server Missing Authentication for Critical Function Vulnerability  CVE-2024-42009 RoundCube Webm…
KEV
🐛
Jenkins Gatling Plugin Flaw Allows CSP Bypass, Exposing Systems to Attack
🐛
Mirai Botnets Exploiting Wazuh Security Platform Vulnerability
🐛
Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks
🐛
Over 84,000 Roundcube instances vulnerable to actively exploited flaw
KEV
⚠️
Cybersecurity Today: Massive Smart TV Botnets and Major US Cyber Policy Overhaul
⚠️
Critical Salesforce Vulnerability Exposes Global Users to SOQL Injection Attacks
⚠️
Weekly Update 455
⚠️
The enterprise security news, more secure by removing credentials, & RSAC interviews -... - ESW #410
⚠️
Cloud assets have 115 vulnerabilities on average — some several years old
⚠️
CISOs reposition their roles for business leadership
⚠️
Unmasking the silent saboteur you didn’t know was running the show
⚠️
⚡ Weekly Recap: Chrome 0-Day, Data Wipers, Misused Tools and Zero-Click iPhone Attacks
⚠️
Chrome extension privacy promises undone by hardcoded secrets, leaky HTTP
⚠️
Kettering Health Confirms Interlock Ransomware Breach and Data Theft
⚠️
Kaspersky study looks at how cybercriminals use games, TV shows, and anime to target Gen Z | Kaspersky official blog
⚠️
Grocery wholesale giant United Natural Foods hit by cyberattack
⚠️
Hackers Deploy FormBook Malware via Weaponized Excel Files to Target Windows Systems
⚠️
Over 1,000 Employees Departed CISA Since Trump Administration Began
⚠️
OpenAI Shuts Down ChatGPT Accounts Linked to Russian, Iranian & Chinese Cyber
⚠️
Designing Blue Team playbooks with Wazuh for proactive cyber defense
⚠️
APT41 Hackers Leverage Google Calendar for Malware C2 in Attacks on Government Entities
⚠️
Meta Bypassed Privacy Protections to Track Android Users
⚠️
Google Warns of Surge in Cyberattacks Targeting US Users to Steal Login Credentials
⚠️
Skitnet Malware Actively Adopted by Ransomware Gangs to Enhance Operational Efficiency
⚠️
New AI tool targets critical hole in thousands of open source apps
⚠️
Designing Blue Team playbooks with Wazuh for proactive incident response
⚠️
Empowering Developers: Fostering a Culture of Security in AppSec - Danielle Ruderman - CSP #213
⚠️
OctoSQL & Vulnerability Data, (Sun, Jun 8th)
⚠️
New Salesforce SOQL Injection 0-Day Vulnerability Exposes Millions of Deployments
⚠️
Jenkins Gatling Plugin Vulnerability Let Attackers Bypass Content-Security-Policy Protection
⚠️
Warning: Crooks Are Using Vishing Attacks to Compromise Salesforce Instances
⚠️
Google patched bug leaking phone numbers tied to accounts
⚠️
Trump takes aim at Biden’s cyber executive order but leaves it largely untouched
📢
Trump Cybersecurity Executive Order Targets Digital Identity, Sanctions Policies
📢
Multiple QNAP Flaws Allow Remote Attackers to Hijack User Accounts
📢
Ubuntu security advisory (AV25-323)
📢
IBM security advisory (AV25-324)
📢
Dell security advisory (AV25-325)
📢
[Control systems] CISA ICS security advisories (AV25–326)
🔥
Beware for Developers: 16 React Native Packages with Millions of Downloads Compromised Overnight
🔥
New DuplexSpy RAT Gives Attackers Full Control Over Windows Machines
🔥
Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise
🔥
EU Prepares for Transnational Cyberattacks - BankInfoSecurity
🔥
Tax resolution firm Optima Tax Relief hit by ransomware, data leaked
🔥
Shared Intel Q&A: Can risk-informed patching finally align OT security with real-world threats?
🔥
Major US grocery distributor warns of disruption after cyberattack
🔥
Sensata Technologies says personal data stolen by ransomware gang
🔥
What Happens When a Cyber Attack Hits an Ambulance? 🚨
🔥
New Report Reveals Chinese Hackers Attempted to Breach SentinelOne Servers
🔥
Grocery wholesale giant United Natural Foods hit by cyberattack
🔥
Paragon says it canceled contracts with Italy over government’s refusal to investigate spyware attack on journalist
🔥
SentinelOne shares new details on China-linked breach attempt
🔥
US infrastructure could crumble under cyberattack, ex-NSA advisor warns
🕵️
ISC Stormcast For Monday, June 9th, 2025 https://isc.sans.edu/podcastdetail/9484, (Mon, Jun 9th)
🕵️
Old AT&T data leak repackaged to link SSNs, DOBs to 49M phone numbers
🕵️
Kimsuky Strikes Again – Coordinated Attacks Target Facebook, Email, and Telegram
🕵️
Kali GPT-Revolutionizing Penetration Testing with AI on Kali Linux
🕵️
OpenAI Bans ChatGPT Accounts Used by Russian, Iranian and Chinese Hacker Groups
🕵️
HelloTDS Malware Spread via FakeCaptcha Infrastructure Infects Millions of Devices
🕵️
Malicious npm Utility Packages Enable Attackers to Wipe Production Systems
🕵️
Australian Naval Operations Accidentally Jam New Zealand’s Internet and Radio
🕵️
Nigerian Involved in Hacking US Tax Preparation Firms Sentenced to Prison
🕵️
US Seeks Forfeiture of $7.74M in Cryptocurrency Tied to North Korean IT Workers
🕵️
New Way to Track Covertly Android Users
🕵️
Librarian Ghouls carry out attacks with data theft and crypto miner deployment
🕵️
iMessage Zero-Click Attacks Suspected in Targeting of High-Value EU, US Individuals
🕵️
Malware found in NPM packages with 1 million weekly downloads
🕵️
Over 20 Malicious Apps on Google Play Target Users for Seed Phrases
🕵️
Chinese Hackers Infiltrated U.S. Telecom Networks a Year Earlier Than Previously Known
🕵️
Operation DRAGONCLONE: Chinese Telecom Targeted by VELETRIX & VShell Malware
🕵️
Seraphic Security UnveilsBrowserTotal™ – Free AI-PoweredBrowser Security Assessment For Enterprises
🕵️
Malicious NPM Packages Disguised as Express Utilities Allow Attackers to Wipe Systems
🕵️
React Native Aria Packages Backdoored in Supply Chain Attack
🕵️
New Blitz Malware Targets Windows Servers to Deploy Monero Miner
🕵️
Guardz Banks $56M Series B for All-in-One SMB Security
🕵️
U.S. Targets $7.7M in Crypto Tied to North Korean IT Worker Scam
🕵️
Bitter Malware Employs Custom-Built Tools to Evade Detection in Advanced Attacks
🕵️
Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group
🕵️
No One Checked the Firmware!? Seriously?
🕵️
New DuplexSpy RAT Gives Attackers Full Control Over Windows Machines
🕵️
Mentorship Monday - Discussions for career and learning!
🕵️
BadBox 2.0 botnet infects millions of IoT devices worldwide, FBI warns
🕵️
Chinese Espionage Crews Circle SentinelOne in Year-Long Reconnaissance Campaign
🕵️
Chinese Hackers and User Lapses Turn Smartphones Into a ‘Mobile Security Crisis’
🕵️
Spear-Phishing Campaign Targets Financial Executives
🕵️
News alert: Seraphic launches BrowserTotal™ — a free AI-powered tool to stress test browser security
🕵️
Securing AI Agent Innovation with Prisma AIRS MCP Server
🕵️
Is Lynis (audit tool) worth using in 2025?
📡
Google fixes bug that could reveal users’ private phone numbers
📡
Adrian Sanabria’s Honest Reaction to MITRE Ingenuity Evaluations 😲
📡
Linux Foundation unveils decentralized WordPress plugin manager
📡
Stolen Ticketmaster data from Snowflake attacks briefly for sale again
📡
Keeping Pace and Embracing Emerging Technologies