62Articles
8Categories
2025-07-04Date
🐛
Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros
🐛
Critical HIKVISION applyCT Flaw Allows Remote Code Execution
🐛
Next.js Vulnerability Allows Attackers to Trigger DoS via Cache Poisoning
🐛
Kritische Schwachstelle in Cisco Unified CM entdeckt
🐛
Apache APISIX Vulnerability Enables Cross-Issuer Access Under Misconfigurations
⚠️
New Chinese Fake Marketplace e-Commerce Phishing Campaign Spoofs Thousands of Websites of Popular Retail Brands, Abuses Online Payment Services, Security Firm Finds
⚠️
New Chinese Fake Marketplace e-Commerce Phishing Campaign Spoofs Thousands of Websites of Popular Retail Brands, Abuses Online Payment Services, Security Firm Finds
⚠️
Researchers Defeat Content Security Policy Protections via HTML Injection
⚠️
Cybersecurity in the supply chain: strategies for managing fourth-party risks
⚠️
Multiple PHP Vulnerabilities Enables SQLi and DoS Attacks – Update Now
⚠️
Massive Android Ad Fraud ‘IconAds’ Uses Google Play to Target and Exploit Users
⚠️
Hackers Exploit Java Debug Wire Protocol Servers to Deploy Cryptomining Payloads
⚠️
Researchers Discover New Method to Identify Azure Arc in Enterprise Environments and Maintain Persistence
⚠️
Writable File in Lenovo Path Lets Attackers Evade AppLocker Restrictions
⚠️
Scattered Spider Enhances Tactics to Exploit Legitimate Tools for Evasion and Persistence
⚠️
Verified, but vulnerable: Malicious extensions exploit IDE trust badges
⚠️
NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors
⚠️
AI and Cybersecurity: A Deep Dive into Enterprise Applications and Digital Sovereignty with Krish Banerjee
📋
Grafana releases critical security update for Image Renderer plugin
📢
Dobrindt will mehr in Cybersicherheit investieren
📢
Malicious SEO Plugins on WordPress Can Lead to Site Takeover
📢
Why Cybersecurity Experts Need Quantum Skills Now!
🔥
Catwatchful Android Spyware Leaks Credentials of 62,000+ Users
🔥
In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
🔥
SquareX Reveals That Employees Are No Longer The Weakest Link, Browser AI Agents Are
🔥
Hunters International ransomware group shuts down – but will it regroup under a new guise?
🔥
IdeaLab confirms data stolen in ransomware attack last year
🔥
Ingram Micro suffers global outage as internal systems inaccessible
🔥
Hacker leaks Telefónica data allegedly stolen in a new breach
🔥
Technical difficulties or cyber attack? Ingram Micro’s website goes down just in time for the holiday weekend
🔥
Hacker leaks Telefónica data allegedly stolen in a new breach
🔥
Hunters International Ransomware Is Not Shutting Down, It’s Rebranding - Infosecurity Magazine
🔥
North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran - SWN #491
🕵️
New “123 | Stealer” Malware Rented on Dark Web for $120/Month
🕵️
Cybercriminals Use Fake Cloudflare Verification Screens to Deceive Users into Running Malware
🕵️
Hackers Abuse Legitimate Inno Setup Installer to Deliver Malware
🕵️
Instagram Now Rotating TLS Certificates Daily with 1-Week Validity
🕵️
North Korean Hackers Target Crypto Firms with Novel macOS Malware - Infosecurity Magazine
🕵️
Linux Users Urged to Patch Critical Sudo CVE - Infosecurity Magazine
🕵️
Recruiting software maker exposes nearly 26M resumes | Cybernews
🕵️
New Fake Marketplace From China Mimics Top Retail Brands for Fraud
🕵️
hackArcana
🕵️
New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
🕵️
Okta observes v0 AI tool used to build phishing sites | Okta
🕵️
Hackers use Fake Cloudflare Verification Screen to Trick Users into Executing Malware
🕵️
When ThreatLocker Meets the Dance Floor 💃 #CyberConfessions
🕵️
BSidesSLC 2025
🕵️
Security Teams Are Drowning in Startup Hype
🕵️
Is ChatGPT Creating a Lazy Generation? #AIeducation
🕵️
Ukraine’s Cyber Survival Isn’t Strategy… It’s Instinct 🚨 #CyberWar
🕵️
Bringing ChatGPT to Court: Genius or Disaster? ⚖️🤯
🕵️
Dark, Stormy... and Totally WRONG!
🕵️
Vixen Panda? 4chan? This Is Getting Crazy!
🕵️
Friday Squid Blogging: How Squid Skin Distorts Light
🕵️
Accident Waiting To Happen: 40 Plants, 0 Security
🎙️
How to get into cybersecurity | Unlocked 403 cybersecurity podcast (S2E3)
📡
Google Ordered to Pay $314M for Misusing Android Users' Cellular Data Without Permission
📡
Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
📡
Catwatchful stalkerware app spills secrets of 62,000 users – including its own admin
📡
ChatGPT Deep Research tests new connectors for more context
📡
Google's AI video maker Veo 3 is now available via $20 Gemini
📡
Task scams: Why you should never pay to get paid