108Articles
9Categories
2025-06-24Date
🐛
China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom
🐛
Notepad++ Vulnerability Allows Full System Takeover — PoC Released
🐛
Aviatrix Cloud Controller Flaw Enables Remote Code Execution via Authentication Bypass
🐛
WinRAR Vulnerability Exploited with Malicious Archives to Execute Code
🐛
Xiaomi Interoperability App Flaw Allows Unauthorized Access to User Devices
🐛
OPPO Clone Phone Vulnerability Leaks Sensitive Data via Weak WiFi Hotspot
🐛
Critical Convoy Flaw Allows Remote Code Execution on Servers
🐛
Critical Citrix NetScaler bug fixed, upgrade ASAP! (CVE-2025-5777) - Help Net Security
🐛
Zimbra Classic Web Client Vulnerability Allows Arbitrary JavaScript Execution
🐛
Threat Actors Exploit ConnectWise Configuration to Create Signed Malware
🐛
Multiple vulnerabilities in Sitecore CMS | Kaspersky official blog
⚠️
8 effektive Multicloud-Security-Tipps
⚠️
⚡ Weekly Recap: Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More
⚠️
New Echo Chamber Attack Breaks AI Models Using Indirect Prompts
⚠️
Iranian cyber threats overhyped, but CISOs can’t afford to let down their guard
⚠️
The CISO’s 5-step guide to securing AI operations
⚠️
Advanced Malware Campaign Targets WordPress and WooCommerce Sites with Hidden Skimmers
⚠️
How Fuzzing Barcodes Raises the Bar for Secure Code - Artur Cygan - ASW #336
⚠️
The Guardian and Cambridge University's Department of Computer Science unveil new secure technology to protect sources
⚠️
Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network
⚠️
Google Cloud Donates A2A Protocol to Linux Foundation for Smarter, Secure Communication
⚠️
China: Draft cybersecurity amendment doubles down on digital repression - ARTICLE 19
⚠️
China: Draft cybersecurity amendment doubles down on digital repression - ARTICLE 19
⚠️
New ‘Echo Chamber’ attack can trick GPT, Gemini into breaking safety rules
⚠️
Critical Key Derivation Flaws in pbkdf2 Affect Millions of JavaScript Projects, PoC Available
⚠️
PoC Released for Notepad++ Flaw Enables Privilege Escalation to NT AUTHORITY\SYSTEM
⚠️
Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network
⚠️
Why a Classic MCP Server Vulnerability Can Undermine Your Entire AI Agent
⚠️
US House reportedly bans WhatsApp from staffers’ devices over security concerns
⚠️
Web3’s Weakest Link: The Access Control Nightmare!
⚠️
Over 2,000 Devices Compromised by Weaponized Social Security Statement Phishing Attacks
⚠️
Why Cybersecurity Training Might Be Hurting Your Team 🧠
⚠️
Anton’s Security Blog Quarterly Q2 2025
KEV
⚠️
He Ran SATAN in 1995… And It Broke Everything 👀
⚠️
CISA Releases Eight Industrial Control Systems Advisories
⚠️
Bank of America, Netflix, and Microsoft Hacked to Inject Fake Phone Numbers
⚠️
New Guidance Released for Reducing Memory-Related Vulnerabilities
⚠️
The AI Fix #56: ChatGPT traps man in a cult of one, and AI is actually stupid
⚠️
LLMs Are Teaching Developers BAD Habits 😤
📋
Windows 10 users can get extended security updates using Microsoft points
📢
U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues
📢
NCSC Warns of SHOE RACK Malware Targeting Fortinet Firewalls via DOH & SSH Protocols
📢
HPE security advisory (AV25-366)
📢
Mozilla security advisory (AV25-367)
📢
GitHub security advisory (AV25-368)
📢
Siemens Notifies Customers of Microsoft Defender Antivirus Issue
🔥
China-linked LapDogs campaign drops backdoor with fake certs, targeting mainly Small Office/Home Office (SOHO) devices
🔥
China-linked LapDogs campaign drops backdoor with fake certs, targeting mainly Small Office/Home Office (SOHO) devices
🔥
Apple, Netflix, Microsoft Sites ‘Hacked’ for Tech Support Scams
🔥
APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine
🔥
DHS Warns of Pro-Iranian Hacktivists Targeting U.S. Networks
🔥
Data of more than 740,000 stolen in ransomware attack on Michigan hospital network | The Record from Recorded Future News
🔥
Steel giant Nucor confirms hackers stole data in recent breach
🔥
Canada says Salt Typhoon hacked telecom firm via Cisco flaw
🔥
Russian court releases several REvil ransomware gang members | CyberScoop
🔥
Aflac-Datenleck: Versicherungsbranche im Visier von Hackern
🔥
The State of Ransomware 2025
🔥
Gonjeshke Darande Hackers Pose as Activists to Infiltrate Iranian Crypto Exchange
🔥
Aflac, one of the USA’s largest insurers, is the latest to fall “under siege” to hackers
🔥
This One Framework Could Cut Your Response Time in Half" 🛡️🔥 #InfoSecQuickie
🔥
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Y... - ESW #411
🕵️
Typhoon-like gang slinging TLS certificate 'signed' by LAPD
🕵️
ISC Stormcast For Tuesday, June 24th, 2025 https://isc.sans.edu/podcastdetail/9502, (Tue, Jun 24th)
🕵️
Honeypot or just vv irresponsible database?
🕵️
OWASP Launches AI Testing Guide to Uncover Vulnerabilities in AI Systems
🕵️
LapDogs Hackers Compromise 1,000 SOHO Devices Using Custom Backdoor for Stealthy Attacks
🕵️
Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play
🕵️
North Korean Hackers Use Malicious Zoom Apps to Execute System-Takeover Attacks
🕵️
Chinese APT Hacking Routers to Build Espionage Infrastructure
🕵️
Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives
🕵️
Prometei Botnet Activity Spikes
🕵️
Here’s a Subliminal Channel You Haven’t Considered Before
🕵️
US Warns of Heightened Risk of Iranian Cyber-Attacks After Military St - Infosecurity Magazine
🕵️
Critical Authentication Bypass Flaw Patched in Teleport - SecurityWeek
🕵️
Cobalt Strike Operators Leverage PowerShell Loaders Across Chinese, Russian, and Global Infrastructure
🕵️
APT28 hackers use Signal chats to launch new malware attacks on Ukraine
🕵️
The Biggest Chinese Data Leak "Ever"
🕵️
Prometei Botnet Activity Spikes - SecurityWeek
🕵️
CyberheistNews Vol 15 #25 Microsoft & KnowBe4 Collab: Strengthen Email Security Through Strategic Integration
🕵️
Echo Chamber Jailbreak Tricks LLMs Like OpenAI and Google into Generating Harmful Content
🕵️
Siemens Notifies Customers of Microsoft Defender Antivirus Issue
🕵️
EagleSpy v5 RAT Promoted by Hacker for Stealthy Android Access
🕵️
Weaponized DMV-Themed Phishing Scam Targets U.S. Citizens to Steal Personal and Financial Data
🕵️
Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers
🕵️
New DRAT V2 Update Enhances C2 Protocol with Shell Command Execution Capabilities
🕵️
New FileFix attack weaponizes Windows File Explorer for stealthy commands
🕵️
Microsoft is named a Leader in The Forrester Wave™: Security Analytics Platforms, 2025​​
🕵️
Cybersecurity Metrics That Actually Get You Paid 💰
🕵️
Where Top Security Teams Put Their Budget (And Why)
🕵️
SonicWall warns of trojanized NetExtender stealing VPN logins
🕵️
The Rise of Malware: Salt Typhoon and Spark Kitty - SWN #488
🕵️
Cloud Security, Coffee, and Chaos: A True IT Horror Story
🕵️
LLMs in Courtrooms: Cybersecurity’s New Problem?
🕵️
Don't panic, but it's only a matter of time before critical 'CitrixBleed 2' is under attack
🌐
Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue
🌐
How Today’s Pentest Models Compare and Why Continuous Wins
🌐
Quick Password Brute Forcing Evolution Statistics, (Tue, Jun 24th)
🎙️
Between Buzz and Reality: The CTEM Conversation We All Need
📡
US bans WhatsApp from House of Representatives staff devices
📡
US House bans WhatsApp on staff devices over security concerns
📡
FileFix attack weaponizes Windows File Explorer for stealthy commands
📡
Trezor’s support platform abused in crypto theft phishing attacks
📡
Microsoft fixes known issue that breaks Windows 11 updates
📡
Windows 10 KB5061087 update released with 13 changes and fixes
📡
Roadmap for the migration to post-quantum cryptography for the Government of Canada (ITSM.40.001)
📡
Google Cloud donates A2A AI protocol to the Linux Foundation
📡
Claude catches up to ChatGPT with built-in memory support
📡
Google rolls out text-to-image model Imagen 4 for free