85Articles
7Categories
2025-06-27Date
🐛
Cisco warns of critical API vulnerabilities in ISE and ISE-PIC
KEV
🐛
Pre-Auth Flaw in MongoDB Server Allows Attackers to Cause DoS
🐛
Mitsubishi Electric AC Flaw Lets Hackers Remotely Control Systems
🐛
Authoritarian states increasingly leveraging non-state cyber capabilities to expand their operational reach, challenging conventional distinctions between state and non-state activity | Study
🐛
Authoritarian states increasingly leveraging non-state cyber capabilities to expand their operational reach, challenging conventional distinctions between state and non-state activity | Study
🐛
Evidence Suggests Exploitation of CitrixBleed 2 Vulnerability
KEV
🐛
Hunt Electronic DVR Vulnerability Leaves Admin Credentials Unprotected
🐛
Critical Citrix Bleed 2 flaw now likely exploited in attacks
🐛
Citrix Bleed 2 flaw now believed to be exploited in attacks
🐛
Some Brother printers have a remote code execution vulnerability, and they can’t fix it
⚠️
Don’t trust that email: It could be from a hacker using your printer to scam you
⚠️
Open VSX Marketplace Flaw Enables Millions of Developers at Risk of Supply Chain Attacks
⚠️
University Student Charged for Alleged Hacking and Data Theft
⚠️
6 key trends redefining the XDR market
⚠️
Max Severity Flaws, Massive Exploits, and AI Security: A Cybersecurity Briefing
⚠️
Vulnerability Exposed All Open VSX Repositories to Takeover
⚠️
MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted
⚠️
APT-C-36 Hackers Launching Cyberattacks on Government Entities, Financial Sectors, and Critical Systems
⚠️
Multiple Vulnerabilities in Citrix Products Could Allow For Disclosure Of Sensitive Data
⚠️
ClickFix Attacks Soar by 500%: Hackers Intensify Use of This Manipulative Technique to Deceive Users
⚠️
Business Case for Agentic AI SOC Analysts
⚠️
Chinese Group Silver Fox Uses Fake Websites to Deliver Sainbox RAT and Hidden Rootkit
⚠️
The rise of the compliance super soldier: A new human-AI paradigm in GRC
⚠️
Hawaiian Airlines Targeted in Cyberattack, Systems Compromised
⚠️
Microsoft-Lücke ermöglicht E-Mail-Versand ohne Authentifizierung
⚠️
STRATEGIC REEL: APIs are the new perimeter — and business logic attacks are slipping through
⚠️
Unveiling RIFT: Enhancing Rust malware analysis through pattern matching
⚠️
Exploitation of Microsoft 365 Direct Send to Deliver Phishing Emails as Internal Users
⚠️
Is Vuln Management Dead? - HD Moore - PSW #880
⚠️
Threat Actors Leverage Windows Task Scheduler to Embed Malware and Maintain Persistence
📢
Microsoft Edge security advisory (AV25-378)
📢
VMware security advisory (AV25-379)
📢
MongoDB security advisory (AV25-380)
📢
Security Advisory: Airoha-based Bluetooth Headphones and Earbuds
🔥
Kansas City Man Pleads Guilty After Hacking to Promote His Cybersecurity Services
🔥
Hawaiian Airlines discloses cyberattack, flights not affected
🔥
Whole Foods supplier UNFI restores core systems after cyberattack
🔥
Retail giant Ahold Delhaize says data breach affects 2.2 million people
🔥
The Age of Integrity
🔥
Supply Chain Incident Imperils Glasgow Council Services and Data - Infosecurity Magazine
🔥
Hawaiian Airlines suffers massive IT outage, ransomware attack suspected | Cybernews
🔥
Leeds United And Reflectiz Partner To Share Insights On Proactive Web Security After Cyber Attack
🔥
SafePay ransomware: What you need to know
🔥
In Other News: Norway Dam Hacked, $177M Data Breach Settlement, UNFI Attack Update
🔥
Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign
🔥
Threat Intel Is Useless Unless You Do THIS 🔍
🔥
US Tech Executives Cite Cyberattacks as Their Top Concern
🔥
One Password… Shared for DECADES! 🧠
🕵️
ISC Stormcast For Friday, June 27th, 2025 https://isc.sans.edu/podcastdetail/9508, (Fri, Jun 27th)
🕵️
Off-Topic Friday
🕵️
OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors
🕵️
Microsoft 365 Direct Send Abused for Phishing
🕵️
Windows Says Goodbye to Blue Screen of Death, Introduces Black Screen
🕵️
Chinese Hackers Target Chinese Users With RAT, Rootkit
🕵️
RevEng.ai Raises $4.15 Million to Secure Software Supply Chain
🕵️
ODYSSEY STEALER : THE REBRAND OF POSEIDON STEALER - CYFIRMA
🕵️
Microsoft to Preview New Windows Endpoint Security Platform After CrowdStrike Outage
🕵️
Let’s Encrypt Launches 6-Day Certificates for IP-Based SSL Encryption
🕵️
Patient Death Linked to NHS Cyber-Attack - Infosecurity Magazine
🕵️
Just a moment...
🕵️
Microsoft 365 'Direct Send' abused to send phishing as internal users
🕵️
Hackers abuse Microsoft ClickOnce and AWS services for stealthy attacks
🕵️
Microsoft Teams to Auto-Detect Work Location Using Company Wi-Fi
🕵️
Your KnowBe4 Fresh Content Updates from June 2025
🕵️
PUBLOAD and Pubshell Malware Used in Mustang Panda's Tibet-Specific Attack
🕵️
Why Ethereum Hates Rust (And Solana Loves It!)
🕵️
New Cyber Workflows = New People, New Problems
🕵️
Windows’ Infamous ‘Blue Screen of Death’ Will Soon Turn Black
🕵️
This Cybersecurity Ritual is WILDER Than DEF CON
🕵️
Humans or Machines? Identity in the Age of AI
🕵️
Criminals Posing as Legitimate Health Insurers and Fraud Investigators to Commit Health Care Fraud
🕵️
From Cyber Threats to Seafood Regrets in Ibiza
🕵️
mommy Access Broker
🕵️
Threat Actors Use Clickfix Tactics to Deploy Malicious AppleScripts for Stealing Login Credentials
🕵️
Riverside.fm = 100% Adult?! AI Said So 💥
🕵️
Cybersecurity Just Got Sci-Fi… And I’m Going.
🕵️
Friday Squid Blogging: What to Do When You Find a Squid “Egg Mop”
🕵️
Broadcom, Direct Send, N0auth, UNFI, Cisco, Oneclik, Russ Beauchemin, and more... - SWN #489
🌐
Scattered Spider hackers shift focus to aviation, transportation firms
📡
Windows 11 KB5060829 update released with 38 new changes, fixes
📡
Russia’s throttling of Cloudflare makes sites inaccessible
📡
Passkey FAQ for power users | Kaspersky official blog
📡
Prolific cybercrime gang now targeting airlines and the transportation sector
📡
Why Trend Micro Continues to be Named a CNAPP Leader
📡
How to Build an Effective Security Awareness Program