88Articles
9Categories
2025-07-07Date
🚨
CISA Adds Four Known Exploited Vulnerabilities to CatalogCISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2014-3931 Multi-Router Looking Glass (MRLG) Buffer Overflow Vulnerability CVE-2016-10033 PHPMailer Command Injection Vulnerability CVE-2019…
KEV
🐛
CitrixBleed 2 Vulnerability PoC Published – Experts Warn of Mass Exploitation Risk
🐛
PoC Released for Linux Privilege Escalation Flaw in udisksd and libblockdev
🐛
ScriptCase Vulnerabilities Allow Remote Code Execution and Full Server Compromise
🐛
Vulnerability Report - June 2025
KEV
🐛
Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild
KEV
🐛
Public exploits released for CitrixBleed 2 NetScaler flaw, patch now
⚠️
Skills gaps send CISOs in search of managed security providers
⚠️
Has CISO become the least desirable role in business?
⚠️
Linux Boot Vulnerability Lets Attackers Bypass Secure Boot Protections
⚠️
RingReaper: New Linux EDR Evasion Tool Exploits io_uring Kernel Feature
⚠️
Qwizzserial Android Malware Masquerades as Legit Apps to Steal Banking Data and Intercept 2FA SMS
⚠️
Threat Actors Use AV/EDR Evasion Framework in the Wild to Deploy Malware Payloads
⚠️
Comodo Internet Security 2025 Flaws Allow Remote Code Execution With SYSTEM Privileges
⚠️
Ingram Micro confirms ransomware attack after days of downtime
⚠️
⚡ Weekly Recap: Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More
⚠️
Threat Actors Turn Job Offers into Scams, Causing Over $264 Million in Losses in 2024
⚠️
NightEagle hackers exploit Microsoft Exchange flaw to spy on China’s strategic sectors
⚠️
Exposed JDWP Exploited in the Wild | Wiz Blog
KEV
⚠️
Strengthening cyber resilience: Introducing Internal Attack Surface Management (IASM) for Sophos Managed Risk
⚠️
Nine Years and Counting: NICE RAMPS Communities Keep Expanding Opportunities in Cybersecurity Work and Learning
⚠️
NightEagle APT Unleashes Custom Malware and Zero-Days to Infiltrate Industrial Systems
⚠️
Identity, AI & Access: Highlights from Identiverse 2025 - ESW #414
⚠️
How to protect your online store from fraud attacks
⚠️
VenusTech and Salt Typhoon Breach Sheds Light on China’s Covert Cyber Mercenary Networks
⚠️
AiLock Ransomware Emerges with Hybrid Encryption Tactics: ChaCha20 Meets NTRUEncrypt
⚠️
Chaos RAT: Genius Admin Tool or Dangerous Malware?
⚠️
BladedFeline Exploits Whisper and PrimeCache to Breach IIS and Microsoft Exchange Servers
⚠️
Version 1.1 Was Safe… But 1.5 Could Be Malware 🧨
⚠️
SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools
⚠️
Abusing Trust: Threat Actors Leverage Signed Drivers for Stealthy Windows Kernel Exploits
⚠️
Non-Human Accounts: The Silent Cybersecurity Risk
⚠️
New Slopsquatting Attack Exploits Coding Agent Workflows to Deliver Malware
📋
Windows Update Revamped with Smarter Interface for Security Notifications
📢
Manufacturing Security: Why Default Passwords Must Go
📢
Ubuntu security advisory (AV25-395)
📢
Qualcomm security advisory – July 2025 monthly rollup (AV25-397)
📢
IBM security advisory (AV25-396)
📢
Red Hat security advisory (AV25-398)
📢
NSB Warns of Cybersecurity Risks Linked to Popular Chinese Apps Like Rednote, Weibo, TikTok, WeChat, and Baidu Cloud
📢
Dell security advisory (AV25-399)
📢
[Control systems] CISA ICS security advisories (AV25-400)
📢
Splunk security advisory (AV25-401)
🔥
4 Wege aus der Security-Akronymhölle
🔥
Ingram Micro Ransomware Attack and the Rise of Linux SSH Server Compromises
🔥
Ransomware-Attacke auf Ingram Micro
🔥
BERT Ransomware Group Targets Asia and Europe on Multiple Platforms
🔥
XWorm RAT Deploys New Stagers and Loaders to Bypass Defenses
🔥
No evidence of stolen data in Glasgow cyber attack
🔥
Ingram Micro outage caused by SafePay ransomware attack
🔥
Data breach reveals Catwatchful 'stalkerware' is spying on thousands of phones | TechCrunch
🔥
Ingram Micro Scrambling to Restore Systems After Ransomware Attack
🔥
Ingram Micro Confirms Ransomware Incident Impacting Internal Infrastructure
🔥
Ingram Micro says ongoing outage caused by ransomware attack
🔥
BERT Ransomware Group Targets Asia and Europe on Multiple Platforms | Trend Micro (US)
🔥
Inside the ZIP Trap: How APT36 Targets BOSS Linux to Exfiltrate Critical Data
🔥
Hunters International Shuts Down, Offers Free Decryptors as It Morphs Into World Leaks
🔥
Employee arrested after Brazil’s central bank service provider hacked for US $140 million
🔥
Qantas is being extorted in recent data-theft cyberattack
🔥
Atomic macOS infostealer adds backdoor for persistent attacks
🔥
Alleged Chinese hacker tied to Silk Typhoon arrested for cyberespionage
🕵️
ISC Stormcast For Monday, July 7th, 2025 https://isc.sans.edu/podcastdetail/9514, (Mon, Jul 7th)
🕵️
AWS CDK announced that its turning on telemetry by default
🕵️
TAG-140 Deploys DRAT V2 RAT, Targeting Indian Government, Defense, and Rail Sectors
🕵️
Massive spike in use of .es domains for phishing abuse
🕵️
Microsoft to Remove PowerShell 2.0 from Windows 11 Due to Security Risks
🕵️
Hiding Prompt Injections in Academic Papers
🕵️
New Phishing Attack Impersonates DWP to Steal Credit Card Information from Users
🕵️
Hackers target vibe coders with malicious tools | Cybernews
🕵️
Cyber crooks jump on .es domain for credential phishing trip • The Register
🕵️
EU Launches Plan to Implement Quantum-Secure Infrastructure - Infosecurity Magazine
🕵️
Eight Malicious Firefox Extensions Expose Users to Credential Theft and Surveillance
🕵️
Over 1,000 Fake Domains Imitating Amazon Prime Day Created to Target Online Shoppers
🕵️
Batavia Spyware Targets Employees via Weaponized Word Documents Delivering Malware Payloads
🕵️
Mentorship Monday - Discussions for career and learning!
🕵️
How the Batavia spyware targeting Russian organizations works
🕵️
How the Batavia spyware targeting Russian organizations works
🕵️
Learn how to build an AI-powered, unified SOC in new Microsoft e-book
🕵️
Parrot Security OS 6.4 Released – What’s New!
🕵️
Malware Attacks on Android Devices Surge in Q2, Driven by Banking Trojans and Spyware
🕵️
Bluetooth flaws could let hackers spy through your microphone
🕵️
Bluetooth flaws could let hackers spy through your microphone
🌐
What's My (File)Name?, (Mon, Jul 7th)
🌐
Hackers abuse leaked Shellter red team tool to deploy infostealers
🌐
'Batavia' Windows spyware campaign targets dozens of Russian orgs
📡
Employee gets $920 for credentials used in $140 million bank heist
📡
Unless users take action, Android will let Gemini access third-party apps
📡
Congratulations to the top MSRC 2025 Q2 security researchers!