104Articles
9Categories
2025-06-12Date
🚨
Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software ProviderSummary The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this advisory in response to ransomware actors leveraging unpatched instances of a vulnerability in SimpleHelp Remote Monitoring and Management (RMM) to compromise customers of a utility billing soft…
KEV
🚨
CISA Releases Cybersecurity Advisory on SimpleHelp RMM VulnerabilityToday, CISA released Cybersecurity Advisory: Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider . This advisory is in response to ransomware actors targeting customers of a utility billing software provi…
KEV
🐛
0-Click Vulnerability in Microsoft 365 Copilot Exposes Sensitive Data via Teams
🐛
Windows SMB Client Zero-Day Vulnerability Exploited via Reflective Kerberos Relay Attack
🐛
‘EchoLeak’ AI Attack Enabled Theft of Sensitive Data via Microsoft 365 Copilot
🐛
Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
🐛
Trend Micro Apex One Zero-Day Vulnerability Enables Attackers to Inject Malicious Code
🐛
Command Injection Flaw in Palo Alto PAN-OS Allows Root-Level Code Execution
🐛
Graphite Caught: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted
🐛
Graphite Caught: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted
🐛
Privilege Escalation in PAN-OS Web Interface Allows Admin Users to Perform Root Actions
🐛
First-ever zero-click attack targets Microsoft 365 Copilot
🐛
Unpatched holes could allow takeover of GitLab accounts
🐛
OpenPGP.js Vulnerability Allows Attackers to Bypass Message Signature Verification
⚠️
Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool
⚠️
Nytheon AI Tool Gaining Traction on Hacking Forums for Malicious Activities
⚠️
Smaller organizations nearing cybersecurity breaking point
⚠️
Russian hybrid warfare: Ukraine's success offers lessons for Europe
⚠️
Russian hybrid warfare: Ukraine's success offers lessons for Europe
⚠️
Palo Alto Networks Patches Privilege Escalation Vulnerabilities
⚠️
ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks
⚠️
New Campaign Targets Entra ID User Accounts Using Pentesting Tool for Account Takeover
⚠️
Fog ransomware attack uses unusual mix of legitimate and open-source tools
⚠️
The ZTNA Blind Spot: Why Unmanaged Devices Threaten Your Hybrid Workforce
⚠️
Cybercriminals Advertise Advanced MaaS Botnet with Blockchain C2 on Hacking Forums
⚠️
FIN6 exploits HR workflows to breach corporate defenses
⚠️
Weekly Update 456
⚠️
Phishing sites posing as DeepSeek downloads drop a proxy backdoor
⚠️
OWASP Nettacker: Open-source scanner for recon and vulnerability assessment - Help Net Security
⚠️
Stealth Falcon APT Exploits Microsoft RCE Zero-Day
⚠️
Urgent Firefox Alert: Critical Memory Corruption Flaws (CVSS 9.8) Allow Remote Code Execution
⚠️
The Impact of Artificial Intelligence on the Cybersecurity Workforce
⚠️
CSO Awards 2025 showcase world-class security strategies
⚠️
How a 2015 Cyberattack Led to Hacking the Pentagon
⚠️
The Citizen Lab: Graphite Caught: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted
⚠️
The Easiest Way to Upgrade Enterprise Linux! 🔥
⚠️
CISA Releases Ten Industrial Control Systems Advisories
⚠️
From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery
⚠️
From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery
⚠️
OneLogin AD Connector Vulnerabilities Expose Authentication Credentials
⚠️
Apple fixes new iPhone zero-day bug used in Paragon spyware hacks
⚠️
See How We’re Fortifying Cloud and AI at AWS re:Inforce 2025
⚠️
Threat Actors Exploit DeepSeek-R1 Popularity to Target Windows Device Users
⚠️
Trend Micro fixes critical vulnerabilities in multiple products
⚠️
Cybercriminals Exploiting Expired Discord Invite Links to Deploy Multi-Stage Malware
⚠️
UEFI Vulnerabilities Galore - PSW #878
⚠️
Malware attack disguises itself as DeepSeek installer
📋
GitLab patches high severity account takeover, missing auth issues
📋
Microsoft Resolves Windows Server 2025 Restart Bug Disrupting Active Directory Connectivity
📋
Multiple GitLab Vulnerabilities Expose Users to Complete Account Takeover Risks
📢
CISA Issues Comprehensive Guide to Safeguard Network Edge Devices
📢
NIST touts 19 ways to build "off the shelf" Zero Trust Architecture in new guidance | Cybernews
📢
[Control systems] Siemens security advisory (AV25-341)
📢
GitLab security advisory (AV25-342)
📢
Sweden says it is under cyber attack
🔥
With Retail Cyberattacks on the Rise, Customers Find Orders Blocked and Shelves Empty
🔥
Empty shelves after US’s largest natural and organic food distributor suffers cyber attack
🔥
Unternehmen wiegen sich in falscher Sicherheit
🔥
Surge in Cyberattacks Targeting Journalists: Cloudflare
🔥
Researchers confirm two journalists were hacked with Paragon spyware
🔥
New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches
🔥
Erie Insurance confirms cyberattack behind business disruptions
🔥
137,000 SoftBank Customers Affected by Data Leak from Third-Party Vendor
🔥
Cyber resilience begins before the crisis
🕵️
Nominations now open for the CSO30 ASEAN Awards 2025
🕵️
ISC Stormcast For Thursday, June 12th, 2025 https://isc.sans.edu/podcastdetail/9490, (Thu, Jun 12th)
🕵️
20,000 malicious IPs and domains taken down in INTERPOL infostealer crackdown
🕵️
20,000 malicious IPs and domains taken down in INTERPOL infostealer crackdown
🕵️
Interpol Targets Infostealers: 20,000 IPs Taken Down, 32 Arrested, 216,000 Victims Notified
🕵️
Hackers Launch Coordinated Attack on Apache Tomcat Manager from 400 Unique IPs
🕵️
SHARED INTEL Q&A: A sharper lens on rising API logic abuse — and a framework to fight back
🕵️
New Campaign Targets Entra ID User Accounts Using Pentesting Tool for Account Takeover
🕵️
Hirundo Raises $8 Million to Eliminate AI’s Bad Behavior
🕵️
SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords
🕵️
Global analysis of Adversary-in-the-Middle phishing threats - Sekoia.io Blog
🕵️
GitLab patches high severity account takeover, missing auth issues
🕵️
Deepfakes and the AI Battle Between Generation and Detection
🕵️
Automated Tools to Assist with DShield Honeypot Investigations [Guest Diary], (Wed, Jun 11th)
🕵️
How to Recognize Fraudulent North Korean Job Applicants
🕵️
How a Fake Cybersecurity Firm Became a Real Threat
🕵️
2025 CSO Hall of Fame honorees
🕵️
Paragon ‘Graphite’ Spyware Linked to Zero-Click Hacks on Newest iPhones
🕵️
Airlines Secretly Selling Passenger Data to the Government
🕵️
Threat Actors Using Bat Files to Deploy Quasar RAT
🕵️
New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
🕵️
Major infostealer network taken down in Interpol raid
🕵️
AitM Phishing Attacks on Microsoft 365 and Google Aimed at Stealing Login Credentials
🕵️
Windows Defender Bypass Using PowerShell and Registry Edits in CyberEYE RAT
🕵️
WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
🕵️
Goodbye Developers? Hello AI Agents…
🕵️
Inside a Dark Adtech Empire Fed by Fake CAPTCHAs
🕵️
How She Trains Developers to Outsmart Hackers ⚔️
🕵️
Internet cut affects Google Cloud and impacts services worldwide
🕵️
Don’t Click “Unsubscribe” links blindly It May Leads to Loss of Credentials
🌐
Graphite spyware used in Apple iOS zero-click attacks on journalists
📡
Windows 11 24H2 emergency update fixes Easy Anti-Cheat BSOD issue
📡
Non-Human Identities: How to Address the Expanding Security Risk
📡
AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
📡
Microsoft Edge now offers secure password deployment for businesses
📡
New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
📡
Password-spraying attacks target 80,000 Microsoft Entra ID accounts
📡
Google Cloud and Cloudflare hit by widespread service outages
📡
F5 Labs Top CWEs & OWASP Top Ten Analysis
📡
F5 Labs Top CWEs & OWASP Top Ten Analysis