99Articles
9Categories
2025-07-02Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation.  CVE-2025-6554 Google Chromium V8 Type Confusion Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber…
KEV
🐛
Anthropic MCP Inspector Vulnerability Lets Hackers Run Arbitrary Code Remotely
🐛
Over 600K WordPress Sites at Risk Due to Critical Plugin Vulnerability
🐛
Nessus Vulnerabilities on Windows Enables Arbitrary System File Overwrites
🐛
CISA Issues Alert on TeleMessage TM SGNL Flaws Actively Exploited
KEV
🐛
Critical RCE flaw in Anthropic’s MCP inspector exposes developer machines to remote attacks
🐛
YONO SBI Banking App Vulnerability Exposes Users to Man-in-the-Middle Attack
🐛
Auf der Suche nach Alternativen zum CVE-Programm
KEV
🐛
CVE-2025-49713 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
⚠️
Vercel's v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale
⚠️
How cybersecurity leaders can defend against the spur of AI-driven NHI
⚠️
FileFix Attack Exploits Windows Browser Loophole to Evade Mark-of-the-Web Security
⚠️
Chinese Houken Group Exploits Ivanti CSA Zero-Days to Install Linux Rootkits
⚠️
CISA Warns of Two Exploited TeleMessage Vulnerabilities
KEV
⚠️
Why every company needs a travel security program
⚠️
Forminator WordPress Plugin Vulnerability Exposes 400,000 Websites to Takeover
⚠️
Scattered Spider shifts focus to airlines as strikes hit Hawaiian, WestJet — and now Qantas
⚠️
Ubuntu Disables Spectre/Meltdown Protections
⚠️
Securing the next wave of workload identities in the cloud
⚠️
Hackers Target Linux SSH Servers to Deploy TinyProxy and Sing-Box Proxy Tools
⚠️
Second espionage-linked cyberattack hits ICC, exposing persistent threats to global justice systems
⚠️
Esse Health Data Breach Exposes Personal and Medical Information of 263,000 Patients
⚠️
Critical Vulnerability in Microsens Devices Exposes Systems to Hackers
⚠️
Chrome Zero-Day, 'FoxyWallet' Firefox Attacks Threaten Browsers
⚠️
Cybercriminals Use Malicious PDFs to Impersonate Microsoft, DocuSign, and Dropbox in Targeted Phishing Attacks
⚠️
Cl0p data exfiltration tool found vulnerable to RCE attacks • The Register
⚠️
Citrix warns of login issues after NetScaler auth bypass patch
⚠️
Sixfold surge of ClickFix attacks threatens corporate defenses
⚠️
Cisco warns that Unified CM has hardcoded root SSH credentials
⚠️
Forced to Use Edge? Blame Big Daddy Microsoft!
⚠️
North Korean crypto thieves deploy custom Mac backdoor
⚠️
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
📢
Microsoft Intune Update Wipes Custom Security Baseline Tweaks – Admins Alerted
📢
Google Chrome security advisory (AV25-385)
📢
Microsoft Edge security advisory (AV25-386)
📢
Citrix security advisory (AV25-387)
📢
Cisco security advisory (AV25-388)
🔥
U.S. Treasury Sanctions Bulletproof Hosting Firm Fueling Ransomware Campaigns
🔥
Cyberangriff auf australische Fluggesellschaft Qantas
🔥
Qantas Data Breach Impacts Up to 6 Million Customers
🔥
Cyberattack Targets International Criminal Court
🔥
Australian Airline Qantas Hacked – Attackers Gained Access to Customers Personal Data
🔥
Weekly Update 458
🔥
U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware
🔥
International Criminal Court Hacked via Sophisticated Cyber Campaign
🔥
Kelly Benefits Data Breach Impacts 550,000 People
🔥
That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat
🔥
Ransomware Reshaped How Cyber Insurers Perform Security Assessments
🔥
US Calls Reported Threats by Pro-Iran Hackers to Release Trump-Tied Material a ‘Smear Campaign’
🔥
Like Ransoming a Bike: Organizational Muscle Memory Drives the Most Effective Response
🔥
Kelly Benefits says 2024 data breach impacts 550,000 customers
🔥
Qantas data breach to impact 6 million airline customers
🔥
Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
🔥
Why “Default Allow” Is A Cybersecurity Disaster Waiting To Happen
🔥
Drug cartel hacked FBI official’s phone to track and kill informants, report says - Ars Technica
🔥
Swiss government warns attackers have stolen sensitive data, after ransomware attack at Radix
🔥
DOJ investigates ex-ransomware negotiator over extortion kickbacks
🔥
This Malware Creates a Fake Contact—And You’ll Pick Up the Call!
🔥
Agentic AI Is Cool… Until It Gets You Hacked
🔥
Welcoming Truyu to Have I Been Pwned's Partner Program
🕵️
Pro-Iran hacktivists borrow from Russia's cyber playbook
🕵️
The Value of Zero Trust - Rob Allen - BSW #402
🕵️
Bots Now Account for 30% of Global Web Traffic, Surpassing Human Activity in Some Regions
🕵️
DCRat Targets Windows Systems for Remote Control, Keylogging, Screen Capture, and Data Theft
🕵️
Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
🕵️
Office 365 Introduces New Mail Bombing Detection to Shield Users
🕵️
Microsoft Ends Authenticator App’s Password Management Support From 2025
🕵️
Cybersecurity M&A Roundup: 41 Deals Announced in June 2025
🕵️
IDE Extensions Like VSCode Allow Attackers to Bypass Trust Checks and Deliver Malware to Developer Systems
🕵️
New macOS Malware Uses Process Injection and Remote Access to Steal Keychain Credentials
🕵️
Cyber Insurance Is NOT a Strategy 🚫
🕵️
Nessus Vulnerabilities on Windows Enables Arbitrary System File Overwrites
🕵️
Crypto Operation Using Fake Investment Platforms Dismantled in Spain
🕵️
fwd:cloudsec NA 2025
🕵️
Analysis of Attacks Targeting Linux SSH Servers for Proxy Installation - ASEC
🕵️
Cybersecurity in 2025 Feels Like Pure Chaos
🕵️
Dozens of fake wallet add-ons flood Firefox store to drain crypto
🕵️
Vim Users Watching Microsoft Like… 😤 #hackerlife
🕵️
Gamaredon Unleashes Six New Malware Tools for Stealth, Persistence, and Lateral Movement
🕵️
Chinese Student Charged in Mass Smishing Campaign to Steal Victims’ Personal Information
🕵️
Cybersecurity’s New Problem: AI FOMO from the Top
🕵️
North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign
🕵️
Cyber Hoarders Anonymous: Confessions from the SOC 🔐
🕵️
NimDoor crypto-theft macOS malware revives itself when killed
🕵️
Navigating Heightened Cyber Risks from Iranian Threats
🕵️
If ELSA is AI for Health... What’s Next for National Security?
🕵️
Gamaredon in 2024: Cranking out spearphishing campaigns against Ukraine with an evolved toolset
🌐
Smashing Security podcast #424: Surveillance, spyware, and self-driving snafus
🎙️
Risky Business #798 -- Mexican cartel surveilled the FBI to identify, kill witnesses
📡
Qantas hack results in theft of 6 million passengers’ personal data
📡
Grok 4 spotted ahead of launch with special coding features
📡
Microsoft: DNS issue blocks delivery of Exchange Online OTP codes
📡
Dozens of fake wallet add-ons flood Firefox store to drain crypto
📡
Microsoft fixes ‘Print to PDF’ feature broken by Windows update
📡
Forminator plugin flaw exposes WordPress sites to takeover attacks
📡
Spain arrests hackers who targeted politicians and journalists
📡
SAFECOM Releases the Emergency Communications System Lifecycle Planning Guide Suite Refresh
📡
Test – ZZZ1
📡
India’s Max Financial says hacker accessed customer data from its insurance unit