94Articles
8Categories
2025-06-30Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation.    CVE-2025-6543 Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability These types of vulnerabilities are frequent attack vecto…
KEV
🐛
Synology ABM Vulnerability Leaks Microsoft 365 Sensitive Information
🐛
Beyond CVE: The hunt for other sources of vulnerability intel
KEV
🐛
IBM WebSphere Application Server Vulnerability Allows Remote Code Execution
🐛
Gefährliche Lücke in Brother Druckern
🐛
Patch now: Citrix Bleed 2 vulnerability actively exploited in the wild
KEV
🐛
Hackers Leverage Critical Langflow Flaw to Deploy Flodrix Botnet and Seize System Control
🐛
CISA and Partners Urge Critical Infrastructure to Stay Vigilant in the Current Geopolitical Environment
⚠️
Die besten XDR-Tools
⚠️
Hackers Exploit Bluetooth Flaws to Eavesdrop via Headphones and Earbuds
⚠️
Criminal Organizations Exploit UTS, Airlines Hit by Cyber Attacks, and Supreme Court Upholds Porn ID Law
⚠️
RDP Under Siege: How RansomHub Uses Mimikatz and IP Scanners to Breach Networks
⚠️
New Report Reveals Exploited Vulnerabilities as Leading Cause of Ransomware Attacks on Organizations
⚠️
Cybercriminals take malicious AI to the next level
⚠️
Microsoft hints at revoking access to the Windows kernel — eventually
⚠️
Critical D-Link Router Flaws Allow Remote Code Execution by Attackers
⚠️
RIFT: Open-Source Rust Malware Analyzer Released by Microsoft
⚠️
Leveraging Credentials As Unique Identifiers: A Pragmatic Approach To NHI Inventories
⚠️
⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more
⚠️
Over 1,200 Citrix servers unpatched against critical auth bypass flaw
KEV
⚠️
Scattered Spider shifts focus to airlines with strikes on Hawaiian and WestJet
⚠️
CitrixBleed 2 Vulnerability Exploited - Infosecurity Magazine
⚠️
Siloking von Ransomware-Attacke betroffen
⚠️
The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - ESW #413
⚠️
Scattered Spider nimmt Luftfahrtbranche ins Visier
⚠️
Europol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five Suspects
⚠️
News alert: SquareX research finds browser AI agents are proving riskier than human employees
⚠️
Actively exploited vulnerability gives extraordinary control over server fleets
KEV
⚠️
DragonForce Ransomware Equips Affiliates with Modular Toolkit for Crafting Custom Payloads
⚠️
Threat Actors Exploit Facebook Ads to Distribute Malware and Steal Wallet Passwords
⚠️
Three steps to boost Amazon S3 data security
📋
Microsoft warns of Windows update delays due to wrong timestamp
📢
Canada Orders Chinese Vendor Hikvision to Cease Local Surveillance Activities
📢
Casie Antalis Named Executive Director of CISA
📢
CISA warns of flaws in Mitsubishi Electronics ICS hardware | SC Media
📢
Germany Urges Apple and Google to Ban Chinese AI App DeepSeek Over Privacy Concerns
📢
Joint Statement from CISA, FBI, DC3 and NSA on Potential Targeted Cyber Activity Against U.S. Critical Infrastructure by Iran
📢
Your KnowBe4 Compliance Plus Fresh Content Updates from June 2025
📢
U.S. Agencies Warn of Rising Iranian Cyberattacks on Defense, OT Networks, and Critical Infrastructure
📢
Ubuntu security advisory (AV25-382)
📢
[Control systems] CISA ICS security advisories (AV25-381)
📢
Dell security advisory (AV25-384)
📢
IBM security advisory (AV25-383)
📢
What Your Cyber Insurance Isn’t Telling You 😳
🔥
Qilin Ransomware Attack on National Health Service in June 2024 Causes Patient Death in the UK
🔥
Qilin Ransomware Attack on National Health Service in June 2024 Causes Patient Death in the UK
🔥
Ahold Delhaize Data Breach Impacts 2.2 Million People
🔥
Hawaiian Airlines Hacked as Aviation Sector Warned of Scattered Spider Attacks
🔥
Ahold Delhaize Data Breach Exposes Personal Information of 2.2 Million Shoppers
🔥
Glasgow City Warns of Parking Fine Scam Amid Ongoing Cybersecurity Incident
🔥
Retail giant Ahold Delhaize says data breach affects 2.2 million people
🔥
Hackers Breach Norwegian Dam, Triggering Full Valve Opening
🔥
Switzerland says government data stolen in ransomware attack
🔥
How much an ICS incident costs | Kaspersky official blog
🔥
Mexican drug cartel hacker spied on FBI official’s phone to track and kill informants, report says
🔥
Massive Botnet Found in ASUS Routers 🔥
🔥
🏥 Hospitals, Airports, Banks—One Mistake Could Be Fatal
🔥
U.S. warns of Iranian cyber threats on critical infrastructure
🕵️
ISC Stormcast For Monday, June 30th, 2025 https://isc.sans.edu/podcastdetail/9510, (Mon, Jun 30th)
🕵️
Zig Strike: New Offensive Toolkit Generates Payloads to Evade AV, EDR, and XDR
🕵️
Threat Actors Impersonate WPS Office and DeepSeek to Spread Sainbox RAT
🕵️
Patrick Ware Named Executive Director of US Cyber Command
🕵️
Scattered Spider Targets Tech Companies with Phishing Frameworks like Evilginx and Social Engineering Tactics
🕵️
Canada Gives Hikvision the Boot on National Security Grounds
🕵️
How Cybersecurity Fears Affect Confidence in Voting Systems
🕵️
Airoha Chip Vulnerabilities Expose Headphones to Takeover
🕵️
Hacker Conversations: Rachel Tobac and the Art of Social Engineering
🕵️
Bsides Seattle 2025
🕵️
Feds Warn Patients, Healthcare Entities of Phishing Scams
🕵️
Scattered Spider hackers shift focus to aviation, transportation firms
🕵️
OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors
🕵️
Bluetooth flaws could let hackers spy through your microphone
🕵️
From “What’s Your Color?” to “Tell Me Your Passion” 🔥
🕵️
NASA Needs Agency-Wide Cybersecurity Risk Assessment: GAO
🕵️
Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks
🕵️
Why Identity Isn’t Just About Permissions Anymore 👀
🕵️
A WiFi Camera You Can’t Even See…
🕵️
Stumbled on to StormShield - opinions?
🕵️
Hikvision Canada ordered to cease operations over security risks
🕵️
US government takes down major North Korean ‘remote IT workers’ operation
🕵️
This is What Happens When Cyber Guys Get Weird…
🕵️
Cato Networks Raises $359 Million to Expand SASE Business
🕵️
Hackers Deliver Remcos Malware Via .pif Files and UAC Bypass in Windows
🕵️
You Follow Agile… But What About This Rule?
🕵️
Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations
🕵️
S3 Storage Hack Every CISO Should Know
📡
Using AI to identify cybercrime masterminds
📡
FBI: Cybercriminals steal health data posing as fraud investigators
📡
Europol helps disrupt $540 million crypto investment fraud ring
📡
Hikvision Canada ordered to cease operations over security risks
📡
Microsoft Defender for Office 365 now blocks email bombing attacks
📡
Senator Chides FBI for Weak Advice on Mobile Security
📡
Germany asks Google, Apple remove DeepSeek AI from app stores
📡
TEST