74Articles
8Categories
2025-07-14Date
🚨
CitrixBleed 2 Flaw Poses Unacceptable Risk: CISACISA considers the recently disclosed CitrixBleed 2 vulnerability an unacceptable risk and has added it to the KEV catalog. The post CitrixBleed 2 Flaw Poses Unacceptable Risk: CISA appeared first on SecurityWeek .
KEV
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation.  CVE-2025-47812 Wing FTP Server Improper Neutralization of Null Byte or NUL Character Vulnerability These types of vulnerabilities are freque…
KEV
🐛
ServiceNow-Leck ermöglicht Datendiebstahl
⚠️
Security vulnerability on U.S. trains that let anyone activate the brakes on the rear car, was known for 13 years — operators refused to fix the issue until now
⚠️
WinRAR 0‑Day Exploit Listed for $80K on Dark Web Forum
⚠️
eSIM Vulnerability in Kigen's eUICC Cards Exposes Billions of IoT Devices to Malicious Attacks
⚠️
Grok-4 Jailbroken Using Echo Chamber and Crescendo Exploit Combo
⚠️
Urgent Cyber Threats: Citrix Exploit, Fortinet RCE, and AI Vulnerabilities
⚠️
KongTuke Campaign Deploys Modified Interlock RAT Using FileFix Method Against Windows Environments
⚠️
Putting AI-assisted ‘vibe hacking’ to the test
⚠️
Threats Actors Use Sophisticated Hacking Tools to Destroy Organizations Critical Infrastructure
⚠️
8 tough trade-offs every CISO must navigate
⚠️
RenderShock 0-Click Exploit Executes Payloads Silently via Background Process
⚠️
Hackers Weaponize Compiled HTML Help to Deliver Malicious Payload
⚠️
New Forensic Method Reveals Hidden Traces of RDP Exploits by Hackers
⚠️
New Grok-4 AI breached within 48 hours using ‘whispered’ jailbreaks
⚠️
Business Logic Vulnerability in Dell’s Payment API — Reported via Bugcrowd | by Yeswehack | May, 2025 | InfoSec Write-ups
⚠️
Gigabyte UEFI Firmware Vulnerability Allows Code Execution in SMM Privileged Mode
⚠️
⚡ Weekly Recap: Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More
⚠️
The 10 most common IT security mistakes
⚠️
Security vulnerability on U.S. trains that let anyone activate the brakes on the rear car was known for 13 years — operators refused to fix the issue until now
⚠️
Train Hack Gets Proper Attention After 20 Years: Researcher
⚠️
Monzy Merza, How Much AI is Too Much, and the Weekly News - Monzy Merza - ESW #415
⚠️
Episource is notifying millions of people that their health data was stolen
⚠️
UK launches vulnerability research program for external experts
📢
Cyberschutz-Verpflichtung für Firmen ab 2026
📢
IBM security advisory (AV25-417)
📢
Ubuntu security advisory (AV25-419)
📢
Dell security advisory (AV25-418)
📢
[Control systems] CISA ICS security advisories (AV25–420)
📢
Red Hat security advisory (AV25-421)
📢
VMware security advisory (AV25-422)
📢
Trump administration to spend $1 billion on ‘offensive’ hacking operations
🔥
Louis Vuitton Suffers Data Breach—Customer Information Stolen
🔥
Elmo has been hacked, claims Trump is in Epstein files, calls for Jews to be exterminated
🔥
Louis Vuitton Data Breach Hits Customers in Several Countries
🔥
Dark Web Profile: Arkana Ransomware - SOCRadar® Cyber Intelligence Inc.
🔥
Ransomware Delivered Through GitHub: A PowerShell-Powered Attack
🔥
Alabama city hack exposed financial data, citizens​ | Cybernews
🔥
New Interlock RAT Variant Distributed via FileFix Attacks
🔥
Elmo’s X account hacked to publish racist and antisemetic posts
🔥
Global Louis Vuitton data breach impacts UK, South Korea, and Turkey
🔥
Interlock Ransomware Unleashes New RAT in Widespread Campaign - Infosecurity Magazine
🔥
Interlock ransomware adopts FileFix method to deliver malware
🔥
The Unusual Suspect: Git Repos
🔥
New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries
🕵️
Thirteen Romanians Arrested for Phishing the UK’s Tax Service
🕵️
ISC Stormcast For Monday, July 14th, 2025 https://isc.sans.edu/podcastdetail/9524, (Mon, Jul 14th)
🕵️
Nvidia warns of Rowhammer attacks on GPUs
🕵️
Hacker sollen 170 Cyberangriffe in Deutschland verübt haben
🕵️
Hackers Inject Malware Into Gravity Forms WordPress Plugin
🕵️
Weaponized Games: Threat Actors Target Gen Z Gamers Through Popular Titles
🕵️
Flaws in Gigabyte Firmware Allow Security Bypass, Backdoor Deployment
🕵️
Microsoft Explains How to Find and Stop Processes Blocking Files in Windows
🕵️
Google Gemini Tricked Into Showing Phishing Message Hidden in Email
🕵️
Cyber-Insurance Premiums Drop, but Coverage Is Key
🕵️
Windows 10 KB5062554 update breaks emoji panel search feature
🕵️
Google Gemini flaw hijacks email summaries for phishing
🕵️
Flaws in Gigabyte Firmware Allow Security Bypass, Backdoor Deployment - SecurityWeek
🕵️
Google Gemini-Lücke ermöglicht versteckte Phishing-Angriffe
🕵️
From Diagram to Cloud: Rethinking Cloud Security in an Age of Uncertainty - Yogita Par... - CSP #214
🕵️
Improving IT efficiency with Microsoft Security Copilot in Microsoft Intune and Microsoft Entra
🕵️
Malicious VSCode extension in Cursor IDE led to $500K crypto theft
🕵️
Report from the Cambridge Cybercrime Conference
🕵️
Filch Stealer: A new infostealer leveraging old techniques
🕵️
Filch Stealer: A new infostealer leveraging old techniques
🕵️
Indian Police Raid Tech Support Scam Call Center
🌐
Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot
🌐
Malicious VSCode extension in Cursor IDE led to $500K crypto theft
📡
CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center
📡
SophosAI at Black Hat USA ’25: Anomaly detection betrayed us, so we gave it a new job
📡
Defendnot: fake antivirus software to disable Microsoft Defender
📡
The votes are in: TechCrunch Disrupt 2025 Audience Choice winners revealed for roundtables and breakouts
📡
DShield Honeypot Log Volume Increase, (Mon, Jul 14th)