94Articles
8Categories
2025-06-26Date
🚨
CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, FortinetThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added three security flaws, each impacting AMI MegaRAC, D-Link DIR-859 router, and Fortinet FortiOS, to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The l…
KEV
🚨
AMI MegaRAC authentication bypass flaw is being exploitated, CISA warnsA critical authentication bypass by spoofing vulnerability in AMI MegaRAC SPx server management firmware is now being actively exploited by attackers, creating urgent pressure for enterprises still waiting for complete vendor patches across their infrastructure. The US Cybersecur…
KEV
🐛
IBM i Vulnerability Allows Attackers to Escalate Privileges
🐛
CISA Issues Alert on Active Exploitation of D-Link Path Traversal Flaw
KEV
🐛
HPE OneView for VMware vCenter Vulnerability Allows Elevated Access
🐛
SAP-Schwachstellen gefährden Windows-Nutzerdaten
🐛
Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access
🐛
Vulnerabilities impacting Citrix NetScaler ADC and NetScaler Gateway - CVE-2025-5349, CVE-2025-5777 and CVE-2025-6543
🐛
IBM WebSphere Application Server Flaw Enables Arbitrary Code Execution
🐛
CVE-2025-47182 Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
🐛
Chromium: CVE-2025-6555 Use after free in Animation
🐛
CVE-2025-47964 Microsoft Edge (Chromium-based) Spoofing Vulnerability
🐛
Chromium: CVE-2025-6556 Insufficient policy enforcement in Loader
🐛
Chromium: CVE-2025-6557 Insufficient data validation in DevTools
🐛
CVE-2025-47963 Microsoft Edge (Chromium-based) Spoofing Vulnerability
⚠️
The top red teamer in the US is an AI bot
⚠️
Authorities Arrest Five Operators Behind Infamous BreachForums Cybercrime Hub
⚠️
MOVEit Transfer Systems Hit by Wave of Attacks Using Over 100 Unique IPs
⚠️
Critical Citrix NetScaler Flaw Exploited as Zero-Day
⚠️
How to make your multicloud security more effective
⚠️
Cyber Criminals Exploit Open-Source Tools to Compromise Financial Institutions Across Africa
⚠️
Researchers Demonstrate Windows Registry Manipulation via C++ Program
⚠️
CISA: AMI MegaRAC bug enabling server hijacks exploited in attacks
⚠️
Critical Cisco ISE Vulnerabilities Allow Remote Code Execution
⚠️
Cybercriminals Use TeamFiltration Pentesting Framework to Breach Microsoft Teams, OneDrive, Outlook, and More
⚠️
CrowdStrike is cutting jobs in favor of AI. Here’s why you shouldn’t.
KEV
⚠️
CISA Warns AMI BMC Vulnerability Exploited in the Wild
KEV
⚠️
Chinese Hackers Deploy Pubload Malware Using Tibetan Community Lures and Weaponized Filenames
⚠️
Cybercriminals Exploit LLM Models to Enhance Hacking Activities
⚠️
Cisco ISE Vulnerability Allows Remote Attackers to Execute Malicious Commands
⚠️
3 key takeaways from the Scattered Spider attacks on insurance firms
⚠️
How We Built the OWASP Top 10 for Smart Contracts! 🔥
⚠️
nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery
⚠️
New FileFix Method Emerges as a Threat Following 517% Rise in ClickFix Attacks
⚠️
Androxgh0st Continues Exploitation: Operators Compromise a US University For Hosting C2 Logger | CloudSEK
⚠️
Cisco warns of max severity RCE flaws in Identity Services Engine
⚠️
Threat Actors Exploit ChatGPT, Cisco AnyConnect, Google Meet, and Teams in Attacks on SMBs
⚠️
US indicts one for role in BreachForums, France arrests four others
⚠️
Start Here. Not There. Rethink Your Cyber Game.
⚠️
CISA Releases Two Industrial Control Systems Advisories
⚠️
This Is What Hackers Look Like in YOUR Network 🪂
⚠️
nOAuth Exploit Enables Full Account Takeover of Entra Cross-Tenant SaaS Applications
⚠️
Here’s What AI Can’t Do in Security 🔐
⚠️
Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks
⚠️
What Happens When Log Files Vanish Forever?
⚠️
Is Vuln Management Dead? - HD Moore - PSW #880
⚠️
What If AI Turned Against You in Cyber Defense?
⚠️
Taking the shine off BreachForums
📢
CISA Issues Alert on ControlID iDSecure Flaws Enabling Bypass Authentication
📢
Energienetze: Neue Regeln sollen Sicherheitslücke schließen
📢
Bonfy.AI Raises $9.5 Million for Adaptive Content Security Platform
📢
Microsoft Teams Adds Feature for Admins to Control 365 Certified Apps with Custom Rules
📢
VMware security advisory (AV25-377)
📢
Brother printer bug in 689 models exposes default admin passwords
🔥
Central Kentucky Radiology Data Breach Impacts 167,000
🔥
Man Who Hacked Organizations to Advertise Security Services Pleads Guilty
🔥
Glasgow City Council impacted by ‘cyber incident’ | The Record from Recorded Future News
🔥
Cybersecurity's Dirty Little Secret: Humans 🫣
🔥
Ex-student charged over hacking university for cheap parking, data breaches
🔥
US, French authorities confirm arrest of BreachForums hackers
🔥
Homeland Security warns of Iran-backed cyberattacks targeting US networks
🕵️
ISC Stormcast For Thursday, June 26th, 2025 https://isc.sans.edu/podcastdetail/9506, (Thu, Jun 26th)
🕵️
British Man Suspected of Being the Hacker IntelBroker Arrested, Charged
🕵️
Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks
🕵️
US University Targeted by Androxgh0st Botnet Operators for C2 Logger Hosting
🕵️
Iranian Spear-Phishing Attack Impersonates Google, Outlook, and Yahoo Domains
🕵️
White House Bans WhatsApp
🕵️
Authorities Charge 25-Year-Old British National Linked to IntelBroker Hacks
🕵️
WhatsApp to Introduce AI-Powered Message Summaries for Faster Catch-Up
🕵️
Hardwear.io USA 2025
🕵️
Hack Glasgow 2025
🕵️
Charming Kitten APT Tries Spying on Israeli Cyber Experts
🕵️
Cisco warns of critical flaws in Identity Services Engine rated 10.0 | SC Media
🕵️
Surge in MOVEit Transfer Scanning Activity Could Signal Emerging Threat Activity
🕵️
Bipartisan Bill Aims to Block Chinese AI From Federal Agencies
🕵️
Building security that lasts: Microsoft’s journey towards durability at scale ​​
🕵️
Researchers Weaponize and Obfuscate .NET Assemblies Using MacroPack
🕵️
What Is Human Risk Management?
🕵️
Global Reach — The New Scale of Chinese Cyberthreats
🕵️
Iranian APT35 Hackers Targeting High-Profile Cybersecurity Experts and Professors in Israel
🕵️
Hack a Phone, Steal a Fingerprint? It’s Easier Than You Think!
🕵️
Warning: Scammers are Targeting WhatsApp Users
🕵️
How to Hack Your Boss's Brain (Psychologically Speaking)
🌐
ESET Threat Report H1 2025
📡
WhatsApp Adds AI-Powered Message Summaries for Faster Chat Previews
📡
Microsoft confirms Family Safety blocks Google Chrome from launching
📡
Microsoft fixes Outlook bug causing crashes when opening emails
📡
The Hidden Risks of SaaS: Why Built-In Protections Aren't Enough for Modern Data Resilience
📡
Microsoft 365 'Direct Send' abused to send phishing as internal users
📡
Man pleads guilty to hacking networks to pitch security services
📡
How to survive digitalization | Kaspersky official blog
📡
FTC approves $126 million in Fortnite refunds over ‘dark patterns’
📡
The State of Post-Quantum Cryptography (PQC) on the Web
📡
The State of Post-Quantum Cryptography (PQC) on the Web