109Articles
9Categories
2025-06-25Date
🚨
CISA Adds Three Known Exploited Vulnerabilities to CatalogCISA has added three new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2024-54085 AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability CVE-2024-0769 D-Link DIR-859 Router Path Traversal Vulnerabilit…
KEV
🐛
NVIDIA Megatron LM Flaw Allows Attackers to Inject Malicious Code
🐛
TeamViewer for Windows Vulnerability Lets Hackers Delete Files with SYSTEM Rights
🐛
CentOS Web Panel Vulnerability Allows Remote Code Execution – PoC Released
🐛
Critical Kibana Flaws Enable Heap Corruption and Remote Code Execution
🐛
Kubernetes NodeRestriction Flaw Lets Nodes Bypass Resource Authorization
🐛
Realtek Bluetooth Flaw Allows Attackers to Launch DoS Attacks During Pairing
🐛
SAP GUI flaws expose sensitive data via weak or no encryption
🐛
Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure
🐛
Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC
KEV
🐛
WinRAR patches bug letting malware launch from extracted archives
🐛
Citrix warns of NetScaler vulnerability exploited in DoS attacks
KEV
⚠️
Akamai proposes tool to defang cryptomining botnets
⚠️
New FileFix Exploit Uses Windows File Explorer to Run Malicious Commands
⚠️
CISA Releases New ICS Advisories Highlighting Ongoing Threats and Exploits
⚠️
LLMs hype versus reality: What CISOs should focus on
⚠️
Schutz vor Cybercrime: Verbraucher werden nachlässiger
⚠️
Thriving Through Volatility: Insights for CISOs - Jeff Pollard & RSAC Interviews - BSW #401
⚠️
SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks
⚠️
APT Attackers Leverage Microsoft ClickOnce to Run Malware as Trusted Applications
⚠️
Code Execution Vulnerability Patched in GitHub Enterprise Server
⚠️
Akamai Reveals New Strategies for Defenders to Combat Cryptominer Attacks
⚠️
Threat Actors Manipulate Search Results, Exploit ChatGPT and Luma AI Popularity to Deliver Malicious Payloads
⚠️
Firefox 140 Launches with Critical Code Execution Bug Fix – Update Now
⚠️
Thousands of SaaS Apps Could Still Be Susceptible to nOAuth
⚠️
Ransomware: So viel Lösegeld zahlen Unternehmen
⚠️
This Smart Contract LOOKED Safe… Until It Wasn’t! 🚨
⚠️
Have Fun Teaching - 27,126 breached accounts
⚠️
Threat Actors Distribute Compromised SonicWall SSL VPN NetExtender to Steal Sensitive Data
⚠️
Iranian Educated Manticore Targets Leading Tech Academics
⚠️
New 'CitrixBleed 2' NetScaler flaw let hackers hijack sessions
⚠️
nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery
⚠️
RedirectionGuard: Mitigating unsafe junction traversal in Windows
⚠️
Misconfigured MCP servers expose AI agent systems to compromise
⚠️
Multiple Brother Device Vulnerabilities Allow Attackers to Execute Arbitrary HTTP Requests
⚠️
You Ever Try Parsing Logs With Zero Docs? Welcome to Hell 🔥
⚠️
Multiple Vulnerabilities in Cisco ISE and ISE-PIC Could Allow for Remote Code Execution
⚠️
Risky Business #797 -- Stuxnet vs Massive Ordnance Penetrators
📋
Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options
📋
Chrome Releases Security Patch for 11 Code Execution Vulnerabilities
📋
Microsoft offers free Windows 10 security updates, but only for consumers
📋
Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options
📋
Microsoft Offers Free Windows 10 Extended Security Update Options as EOS Nears
📢
CISA Publishes Guide to Address Memory Safety Vulnerabilities in Modern Software Development
📢
Google Chrome security advisory (AV25-369)
📢
GitLab security advisory (AV25-370)
📢
Splunk security advisory (AV25-371)
📢
Trend Micro security advisory (AV25-373)
📢
TeamViewer security advisory (AV25-372)
📢
Citrix security advisory (AV25-374)
📢
VMware security advisory (AV25-375)
📢
Cisco security advisory (AV25-376)
🔥
Cybersecurity Today: Balancing Trust, Risks, and Innovations
🔥
Mainline Health, Select Medical Each Disclose Data Breaches Impacting 100,000 People
🔥
Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games
🔥
You may qualify for AT&T's $177 million data breach settlement - how to file a claim today
🔥
BreachForums hacking forum operators reportedly arrested in France
🔥
Robinsons Malls - 195,597 breached accounts
🔥
INTERPOL Cautions of Significant Increase in Cyber Attacks on Western and Eastern Africa
🔥
Hackers Can Bypass Biometrics. Here’s How 😳
🔥
Beware of Weaponized Wedding Invite Scams Delivering SpyMax RAT to Android Devices
🔥
Europol Warns of Social Engineering Attacks
🔥
Smashing Security podcast #423: Operation Endgame, deepfakes, and dead slugs
🔥
Hackers breach Norwegian dam
🕵️
ISC Stormcast For Wednesday, June 25th, 2025 https://isc.sans.edu/podcastdetail/9504, (Wed, Jun 25th)
🕵️
Russian APT Hits Ukrainian Government With New Malware via Signal
🕵️
Anthropic won't fix a bug in its SQLite MCP server
🕵️
North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages
🕵️
Google Plans to Remove Chrome’s Tab Scrolling Feature
🕵️
Chrome 138, Firefox 140 Patch Multiple Vulnerabilities
🕵️
NetNerve: AI-Powered Tool for Deep PCAP Threat Detection
🕵️
Why Sincerity Is a Strategic Asset in Cybersecurity
🕵️
What LLMs Know About Their Users
🕵️
New Vulnerabilities Expose Millions of Brother Printers to Hacking
🕵️
SonicWall Warns of Trojanized NetExtender Stealing User Information
🕵️
Leak of data belonging to 7.4 million Paraguayans traced back to infostealers | The Record from Recorded Future News
🕵️
Malware Campaign Uses Rogue WordPress Plugin to Skim Credit Cards - Infosecurity Magazine
🕵️
Critical Meshtastic Flaw Allows Attackers to Decrypt Private Messages
🕵️
Hackers Abuse ConnectWise to Hide Malware
🕵️
SonicWall warns of trojanized NetExtender stealing VPN logins
🕵️
In the Wild: Malware Prototype with Embedded Prompt Injection
🕵️
In the Wild: Malware Prototype with Embedded Prompt Injection
🕵️
Windows 11 Configuration Bug Freezes Update Scanning Process
🕵️
North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages
🕵️
Introducing FileFix – A New Alternative to ClickFix Attacks
🕵️
Hacktivist Groups Target U.S. Companies and Military Domains in Retaliation for Iran Attacks
🕵️
We’ve Been Teaching Cybersecurity All Wrong 😬
🕵️
The $0 Python Stack That Automated 110 Cyber Tools! 🔥
🕵️
MITRE ATT&CK Overwhelms Even Smart Analysts 😵
🕵️
What are You Working on Wednesday
🕵️
Microsoft Named a Leader in the 2025 IDC CNAPP MarketScape: Key Takeaways for Security Buyers
🕵️
Chart Your SASE Transformation with Prisma SD-WAN
🕵️
This Is the New “Fuzzing” – But for AI Security 😳
🕵️
North Korean Hackers Pose as Recruiters, Target Developers with 35 New Malicious npm Packages
🕵️
New wave of ‘fake interviews’ use 35 npm packages to spread malware
🕵️
New Malware Discovered Using Prompt Injection to Manipulate AI Models in the Wild
🕵️
Can AI Really Handle 14,000 Tabs?
🕵️
Hackers turn ScreenConnect into malware using Authenticode stuffing
🕵️
Forget Leadership—Start Being HUMAN.
🌐
Hackers abuse Microsoft ClickOnce and AWS services for stealthy attacks
📡
New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public
📡
Cybercrime is surging across Africa
📡
Beware the Hidden Risk in Your Entra Environment
📡
Ring cameras and doorbells now use AI to provide specific descriptions of motion activity
📡
Kaspersky's FAQ on using and managing passkeys | Kaspersky official blog
📡
Google releases Gemini CLI with free Gemini 2.5 Pro
📡
British hacker 'IntelBroker' charged with $25M in cybercrime damages
📡
The State of Post-Quantum Crypto (PQC) on the Web
📡
Apple Wallet just went full Bono (but with Brad Pitt this time)