77Articles
9Categories
2025-07-09Date
๐Ÿ›
FortiWeb SQL Injection Vulnerability Allows Attackers to Execute Malicious SQL Commands
๐Ÿ›
Citrix Windows Virtual Delivery Agent Vulnerability Lets Attackers Escalate to SYSTEM Privileges
๐Ÿ›
Windows BitLocker Vulnerability Lets Attackers Bypass Security Protections
๐Ÿ›
Microsoft Fixes Wormable Remote Code Execution Flaw in Windows and Server
๐Ÿ›
Exploit details released for Citrix Bleed 2 flaw affecting NetScaler
KEV
โš ๏ธ
Microsoft Patch Tuesday, July 2025 Edition
KEV
โš ๏ธ
Zoom for Windows Flaw Allows Attackers to Trigger DoS Attacks
โš ๏ธ
AI Threats, Enterprise Security, and Google's Confusing Gemini Release: Cybersecurity Today
โš ๏ธ
Splunk SOAR Addresses Vulnerabilities in Third-Party Packages โ€“ Update Now
โš ๏ธ
Microsoft Patches 130 Vulnerabilities, Including Critical Flaws in SPNEGO and SQL Server
โš ๏ธ
Trump seeks unprecedented $1.23 billion cut to federal cyber budget
โš ๏ธ
Unpatched Ruckus Vulnerabilities Allow Wireless Environment Hacking
โš ๏ธ
IBM Power11 challenges x86 and GPU giants with security-first server strategy
โš ๏ธ
Microsoft 365 PDF Export Feature Vulnerable to LFI โ€“ Sensitive Data at Risk
โš ๏ธ
Hackers Exploit IIS Machine Keys to Breach Organizations
โš ๏ธ
Trend Micro flags BERT: A rapidly growing ransomware threat
โš ๏ธ
Verified, featured, and malicious: RedDirection campaign reveals browser marketplace failures
โš ๏ธ
Nippon Steel Subsidiary Blames Data Breach on Zero-Day Attack
โš ๏ธ
TapTrap Android Exploit Allows Malicious Apps to Bypass Permissions
โš ๏ธ
The MFA You Trust Is Lying to You โ€“ and Here's How Attackers Exploit It
โš ๏ธ
New ServiceNow flaw lets attackers enumerate restricted data
โš ๏ธ
Supply Chain Attack Unleashed via Compromised VS Code Extension
โš ๏ธ
Ruckus Networks leaves severe flaws unpatched in management devices
โš ๏ธ
Gold Melody IAB Exploits Exposed ASP.NET Machine Keys for Unauthorized Access to Targets
โš ๏ธ
Welcoming Push Security to Have I Been Pwned's Partner Program
โš ๏ธ
Smashing Security podcast #425: Call of Duty: From pew-pew to pwned
โš ๏ธ
Multiple Vulnerabilities in Mozilla Thunderbird Could Allow for Arbitrary Code Execution
๐Ÿ“‹
Splunk Enterprise Addresses Vulnerabilities in Bundled Third-Party Packages โ€“ Update Now
๐Ÿ“‹
Ivanti, Fortinet, Splunk Release Security Updates
๐Ÿ“‹
ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact
๐Ÿ“‹
Microsoft confirms Windows Server Update Services (WSUS) sync is broken
๐Ÿ“ข
Yet Another Strava Privacy Leak
๐Ÿ“ข
DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware
๐Ÿ“ข
HPE security advisory (AV25-409)
๐Ÿ“ข
ServiceNow security advisory (AV25-410)
๐Ÿ“ข
GitLab security advisory (AV25-412)
๐Ÿ“ข
Citrix security advisory (AV25-411)
๐Ÿ“ข
Jenkins security advisory (AV25-413)
๐Ÿ“ข
Palo Alto Networks security advisory (AV25-414)
๐Ÿ”ฅ
Canadian Electric Utility Says Power Meters Disrupted by Cyberattack
๐Ÿ”ฅ
Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks
๐Ÿ”ฅ
Psychological Contract Breach and the Power of Security Culture - Research Insights
๐Ÿ”ฅ
Heim & Haus: Cyberangriff auf groรŸen Hersteller von Bauelementen
๐Ÿ”ฅ
Ingram Micro starts restoring systems after ransomware attack
๐Ÿ”ฅ
AiLock ransomware: What you need to know
๐Ÿ”ฅ
Bitcoin Depot breach exposes data of nearly 27,000 crypto users
๐Ÿ”ฅ
Qantas confirms data breach impacts 5.7 million customers
๐Ÿ•ต๏ธ
ISC Stormcast For Wednesday, July 9th, 2025 https://isc.sans.edu/podcastdetail/9518, (Wed, Jul 9th)
๐Ÿ•ต๏ธ
Alleged Chinese State Hacker Wanted by US Arrested in Italy
๐Ÿ•ต๏ธ
Act now: Secure Boot certificates expire in June 2026 - Windows IT Pro Blog
๐Ÿ•ต๏ธ
Building Trust in the Digital Age
๐Ÿ•ต๏ธ
SolarWinds Settlement, Upgrade Your Leadership Instincts to Build Your Legacy - BSW #403
๐Ÿ•ต๏ธ
Anatsa Android Banking Malware Targets Users in the U.S. and Canada via Google Play
๐Ÿ•ต๏ธ
XwormRAT Hackers Leverage Code Injection for Sophisticated Malware Deployment
๐Ÿ•ต๏ธ
Google Launches Advanced Protection for Vulnerable Users via Chrome on Android
๐Ÿ•ต๏ธ
Samsung Announces Security Improvements for Galaxy Smartphones
๐Ÿ•ต๏ธ
U.S. Sanctions North Korean Andariel Hacker Behind Fraudulent IT Worker Scheme
๐Ÿ•ต๏ธ
FUNNULL Uses Amazon and Microsoft Cloud to Hide Malicious Infrastructure
๐Ÿ•ต๏ธ
SparkKitty Malware Steals Photos from iOS and Android Devices
๐Ÿ•ต๏ธ
What are You Working on Wednesday
๐Ÿ•ต๏ธ
Treasury sanctions North Korean over IT worker malware scheme
๐Ÿ•ต๏ธ
Reflectiz Joins the Datadog Marketplace
๐Ÿ•ต๏ธ
Microsoft expands Zero Trust workshop to cover network, SecOps, and more
๐Ÿ•ต๏ธ
News alert: Reflectiz expands Datadogโ€™s security scope to cover client-side web vulnerabilities
๐Ÿ•ต๏ธ
MY TAKE: Microsoft gave rise to the โ€˜knowledge workerโ€™โ€”and now itโ€™s rendering them obsolete
๐ŸŒ
How To Automate Ticket Creation, Device Identification and Threat Triage With Tines
๐ŸŒ
Cyber threat bulletin: Iranian cyber threat to Canada from Israel-Iran conflict
๐ŸŽ™๏ธ
How CISOs are training the next generation of cyber leaders
๐Ÿ“ก
How to protect your cell phone number from SIM swap attacks
๐Ÿ“ก
Is a Gemini AI update about to kill privacy on your Android device? | Kaspersky official blog
๐Ÿ“ก
Get your exhibit table at TechCrunch Disrupt 2025
๐Ÿ“ก
Setting up Your Own Certificate Authority for Development: Why and How., (Wed, Jul 9th)
๐Ÿ“ก
Jack Dorsey says his โ€˜secureโ€™ new Bitchat app has not been tested for security
๐Ÿ“ก
Google reveals details on Androidโ€™s Advanced Protection for Chrome
๐Ÿ“ก
Browser extensions turn nearly 1 million browsers into website-scraping bots
๐Ÿ“ก
As Texas floods, so does the internet โ€“ with dangerous lies
๐Ÿ“ก
Microsoft Authenticator on iOS moves backups fully to iCloud