183 Articles
9 Categories
2025-06-10 Date
ALL 183
CISA KEV 5
COMMON VULNERABILITIES AND EXPOSURES 75
VULNERABILITY DISCLOSURE 38
SECURITY BULLETINS 2
SECURITY ADVISORIES 10
INCIDENT REPORTING 13
THREAT INTELLIGENCE 27
CYBER THREAT LANDSCAPE 2
INFOSEC NEWS 11
π¨ CISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two critical security flaws impacting Erlang/Open Telecom Platform (OTP) SSH and Roundcube to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabβ¦ KEV THEHACKERNEWS.COM — 10 Jun 2025
π¨ CISA Issues Alert on Erlang/OTP SSH Server RCE Vulnerability Under Active Exploitation The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding a critical vulnerability in Erlang/OTP SSH server implementations that allows attackers to execute arbitrary commands without authentication. The vulnerability, designated as CVE-20β¦ KEV GBHACKERS.COM — 10 Jun 2025
π¨ CISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalog submitted by kid to cybersecurity 1 points | 0 comments https://thehackernews.com/2025/06/cisa-adds-erlang-ssh-and-roundcube.html KEV SH.ITJUST.WORKS — 10 Jun 2025
π¨ CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-24016 Wazuh Server Deserialization of Untrusted Data Vulnerability CVE-2025-33053 Web Distributed Authoring and Versioning (WebDAβ¦ KEV CISA.GOV — Tue, 10 Jun 25 1
π¨ Mirai botnet weaponizes PoC to exploit Wazuh open-source XDR flaw Researchers warn that several botnets built on the Mirai malware codebase are targeting outdated Wazuh XDR and SIEM management servers. For the past several months, the botnets have been exploiting a critical remote code execution vulnerability in Wazuh that was patched in Februaβ¦ KEV CSOONLINE.COM — 10 Jun 2025
π GBHACKERS.COM — 10 Jun 2025
π GBHACKERS.COM — 10 Jun 2025
π GBHACKERS.COM — 10 Jun 2025
π GBHACKERS.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
π KEV GBHACKERS.COM — 10 Jun 2025
π BLEEPINGCOMPUTER.COM — 10 Jun 2025
π INFOSEC.PUB — 10 Jun 2025
π SH.ITJUST.WORKS — 10 Jun 2025
π MSRC.MICROSOFT.COM — 10 Jun 2025
β οΈ INFOSEC.PUB — 10 Jun 2025
β οΈ GBHACKERS.COM — 10 Jun 2025
β οΈ GBHACKERS.COM — 10 Jun 2025
β οΈ GBHACKERS.COM — 10 Jun 2025
β οΈ YOUTUBE.COM — 2025-06-10
β οΈ SECURITYWEEK.COM — 10 Jun 2025
β οΈ GBHACKERS.COM — 10 Jun 2025
β οΈ GBHACKERS.COM — 10 Jun 2025
β οΈ CSOONLINE.COM — 10 Jun 2025
β οΈ CSOONLINE.COM — 10 Jun 2025
β οΈ THEHACKERNEWS.COM — 10 Jun 2025
β οΈ GBHACKERS.COM — 10 Jun 2025
β οΈ SECURITYWEEK.COM — 10 Jun 2025
β οΈ CSOONLINE.COM — 10 Jun 2025
β οΈ SECURITYWEEK.COM — 10 Jun 2025
β οΈ SH.ITJUST.WORKS — 10 Jun 2025
β οΈ SH.ITJUST.WORKS — 10 Jun 2025
β οΈ GBHACKERS.COM — 10 Jun 2025
β οΈ GBHACKERS.COM — 10 Jun 2025
β οΈ GBHACKERS.COM — 10 Jun 2025
β οΈ SECURITYWEEK.COM — 10 Jun 2025
β οΈ GBHACKERS.COM — 10 Jun 2025
β οΈ GBHACKERS.COM — 10 Jun 2025
β οΈ CSOONLINE.COM — 10 Jun 2025
β οΈ YOUTUBE.COM — 2025-06-10
β οΈ CISA.GOV — Tue, 10 Jun 25 1
β οΈ KEV BLEEPINGCOMPUTER.COM — 10 Jun 2025
β οΈ GBHACKERS.COM — 10 Jun 2025
β οΈ SH.ITJUST.WORKS — 10 Jun 2025
β οΈ SECURITYWEEK.COM — 10 Jun 2025
β οΈ SECURITYWEEK.COM — 10 Jun 2025
β οΈ THEHACKERNEWS.COM — 10 Jun 2025
β οΈ KEV GBHACKERS.COM — 10 Jun 2025
β οΈ ISC.SANS.EDU — 10 Jun 2025
β οΈ BLEEPINGCOMPUTER.COM — 10 Jun 2025
β οΈ CISECURITY.ORG — 10 Jun 2025
β οΈ CISECURITY.ORG — 10 Jun 2025
β οΈ CISECURITY.ORG — 10 Jun 2025
π BLEEPINGCOMPUTER.COM — 10 Jun 2025
π THEHACKERNEWS.COM — 10 Jun 2025
π’ CYBER.GC.CA — 2025-06-10
π’ CYBER.GC.CA — 2025-06-10
π’ CYBER.GC.CA — 2025-06-10
π’ CYBER.GC.CA — 2025-06-10
π’ CYBER.GC.CA — 2025-06-10
π’ CYBER.GC.CA — 2025-06-10
π’ CYBER.GC.CA — 2025-06-10
π’ CYBER.GC.CA — 2025-06-10
π’ CYBER.GC.CA — 2025-06-10
π’ CYBER.GC.CA — 2025-06-10
π₯ INFOSEC.PUB — 10 Jun 2025
π₯ SECURITYWEEK.COM — 10 Jun 2025
π₯ HAVEIBEENPWNED.COM — 10 Jun 2025
π₯ THEHACKERNEWS.COM — 10 Jun 2025
π₯ SECURITYWEEK.COM — 10 Jun 2025
π₯ SH.ITJUST.WORKS — 10 Jun 2025
π₯ SH.ITJUST.WORKS — 10 Jun 2025
π₯ SOPHOS.COM — 10 Jun 2025
π₯ TECHCRUNCH.COM — 10 Jun 2025
π₯ BLEEPINGCOMPUTER.COM — 10 Jun 2025
π₯ BLEEPINGCOMPUTER.COM — 10 Jun 2025
π₯ INFOSEC.PUB — 10 Jun 2025
π₯ TECHCRUNCH.COM — 10 Jun 2025
π΅οΈ ISC.SANS.EDU — 10 Jun 2025
π΅οΈ INFOSEC.PUB — 10 Jun 2025
π΅οΈ SH.ITJUST.WORKS — 10 Jun 2025
π΅οΈ SECURITYWEEK.COM — 10 Jun 2025
π΅οΈ GBHACKERS.COM — 10 Jun 2025
π΅οΈ SH.ITJUST.WORKS — 10 Jun 2025
π΅οΈ SH.ITJUST.WORKS — 10 Jun 2025
π΅οΈ SH.ITJUST.WORKS — 10 Jun 2025
π΅οΈ SH.ITJUST.WORKS — 10 Jun 2025
π΅οΈ SH.ITJUST.WORKS — 10 Jun 2025
π΅οΈ SH.ITJUST.WORKS — 10 Jun 2025
π΅οΈ SECURITYWEEK.COM — 10 Jun 2025
π΅οΈ KNOWBE4.COM — 10 Jun 2025
π΅οΈ GRAHAMCLULEY.COM — 10 Jun 2025
π΅οΈ KNOWBE4.COM — 10 Jun 2025
π΅οΈ INFOSEC.PUB — 10 Jun 2025
π΅οΈ GBHACKERS.COM — 10 Jun 2025
π΅οΈ GBHACKERS.COM — 10 Jun 2025
π΅οΈ THEHACKERNEWS.COM — 10 Jun 2025
π΅οΈ SH.ITJUST.WORKS — 10 Jun 2025
π΅οΈ SH.ITJUST.WORKS — 10 Jun 2025
π΅οΈ SH.ITJUST.WORKS — 10 Jun 2025
π΅οΈ GBHACKERS.COM — 10 Jun 2025
π΅οΈ GBHACKERS.COM — 10 Jun 2025
π΅οΈ SH.ITJUST.WORKS — 10 Jun 2025
π΅οΈ INFOSEC.PUB — 10 Jun 2025
π΅οΈ YOUTUBE.COM — 2025-06-10
π THEHACKERNEWS.COM — 10 Jun 2025
π BLEEPINGCOMPUTER.COM — 10 Jun 2025
π‘ BLEEPINGCOMPUTER.COM — 10 Jun 2025
π‘ THEHACKERNEWS.COM — 10 Jun 2025
π‘ BLEEPINGCOMPUTER.COM — 10 Jun 2025
π‘ BLEEPINGCOMPUTER.COM — 10 Jun 2025
π‘ YOUTUBE.COM — 2025-06-10
π‘ QUARKSLAB.COM — 2025-06-10
π‘ BLEEPINGCOMPUTER.COM — 10 Jun 2025
π‘ BLEEPINGCOMPUTER.COM — 10 Jun 2025
π‘ BLEEPINGCOMPUTER.COM — 10 Jun 2025
π‘ BLEEPINGCOMPUTER.COM — 10 Jun 2025
π‘ GRAHAMCLULEY.COM — 10 Jun 2025