90Articles
8Categories
2025-07-15Date
🐛
CISA Issues Alert on Actively Exploited Wing FTP Server Vulnerability
KEV
🐛
Critical RCE Vulnerability Found in Symantec Endpoint Management Platform
🐛
ImageMagick Vulnerability Enables RCE via Malicious File Name Patterns
🐛
PoC Released for High-Severity Git CLI Vulnerability Allowing Arbitrary File Writes
🐛
LaRecipe Tool with 2.3M Downloads Found Vulnerable to Full Server Takeover
🐛
Kafbat UI Vulnerabilities Allow Arbitrary Code Execution via JMX Services
⚠️
161: mg
⚠️
How defenders use the dark web
⚠️
AI poisoning and the CISO’s crisis of trust
⚠️
Ransomware Group Claims Attack on Belk
⚠️
Government Organizations Targeted via AWS Lambda URL Endpoint Exploits
⚠️
North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign
⚠️
Preventing Zero-Click AI Threats: Insights from EchoLeak
⚠️
Apache Tomcat Coyote Flaw Allows Attackers to Launch DoS Attacks
⚠️
Getting Started with Security Basics on the Way to Finding a Specialization - ASW #339
⚠️
North Korean Hackers Exploit Zoom Invites in Attacks on Crypto Companies
⚠️
14 Hackers Arrested in Massive Tax Fraud Scheme, Authorities Confirm
⚠️
AsyncRAT's Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe
⚠️
North Korean Hackers Exploit 67 Malicious npm Packages to Spread XORIndex Malware
⚠️
UK launches vulnerability research program for external experts
⚠️
How phishers are weaponizing SVG images in zero-click, evasive campaigns
⚠️
Grok 4 mit Jailbreak-Angriff geknackt
⚠️
CISA Releases Six Industrial Control Systems Advisories
⚠️
Police disrupt “Diskstation” ransomware gang attacking NAS devices
⚠️
ControlPlane Local Privilege Escalation Vulnerability on macOS
⚠️
Congratulations to the MSRC 2025 Most Valuable Security Researchers!
⚠️
Risky Biz Soap Box: Prowler, the open cloud security platform
📢
DOGE Denizen Marko Elez Leaked API Key for xAI
📢
CISA Flags Remote Linking Protocol Flaws Allowing Attackers to Hijack Train Brake Systems
📢
NCC Advises Immediate Windows 11 Upgrade to Strengthen Cyberattack Defenses
📢
Federal IT Contractor to Pay $14.75M for False Cybersecurity Services Claims
📢
Zyxel security advisory (AV25-423)
📢
VMware security advisory (AV25-424)
📢
AI meltdowns, Gigabyte, NCSC, Rowhammer, Gravity Form, Grok, AsyncRat, Josh Marpet... - SWN #494
🔥
MaReads - 74,453 breached accounts
🔥
Sesame Workshop Regains Control of Elmo’s Hacked X Account After Racist Posts
🔥
Ransomware Threat Grows as Attackers Move Into VMware and Linux
🔥
Securing Agentic AI: How to Protect the Invisible Identity Access
🔥
Hacktivists Launch Attacks on ICS Systems to Exfiltrate Sensitive Information
🔥
Interlock ransomware adopts FileFix method to deliver malware
🔥
Data Breach at Debt Settlement Firm Impacts 160,000 People
🔥
GLOBAL GROUP RaaS Adds AI-Powered Negotiation Feature for Ransom Demands
🔥
Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools
🔥
Ransomware Attack on Albemarle County Exposes Residents’ Personal Information
🔥
Ukrainian hackers claim to have destroyed servers of Russian drone maker
🕵️
ISC Stormcast For Tuesday, July 15th, 2025 https://isc.sans.edu/podcastdetail/9526, (Tue, Jul 15th)
🕵️
Red Bull-Themed Phishing Attacks Target Job Seekers’ Credentials
🕵️
MITRE Unveils AADAPT Framework to Tackle Cryptocurrency Threats
🕵️
CBI Uncovers Noida Tech Support Scam Targeting Victims in UK and Australia
🕵️
Zip Security Raises $13.5 Million in Series A Funding
🕵️
Cybercriminals Clone CNN, BBC, and CNBC Sites to Lure Victims into Investment Fraud
🕵️
Keylogger Data Stored in an ADS, (Tue, Jul 15th)
🕵️
British Citizen Sentenced for Islamophobic WiFi Hack at UK Train Stations
🕵️
MITRE Launches AADAPT Framework to Counter Real-World Attacks on Digital Asset Systems
🕵️
State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments
🕵️
New AsyncRAT Forks Discovered Featuring Screamer Tool and USB Malware Spreader
🕵️
BaitTrap Reveals Global Web of 17,000+ Fraud-Promoting Fake News Sites
🕵️
Chasing Ghosts Over RDP: Lateral Movement in Tiny Bitmaps | by Mat Cyb3rF0x Fuchs | Jul, 2025 | Medium
🕵️
AsyncRAT evolves as ESET tracks its most popular malware forks - Help Net Security
🕵️
New Grok AI model surprises experts by checking Elon Musk’s views before answering - Ars Technica
🕵️
DDoS Attacks Blocked by Cloudflare in 2025 Already Surpass 2024 Total
🕵️
North Korea-linked actors spread XORIndex malware via 67 malicious npm packages
🕵️
MITRE Launches AADAPT Framework to Counter Real-World Attacks on Digital Asset Systems
🕵️
OpenAI's ChatGPT-powered browser is codenamed 'Aura'
🕵️
Octalyn Stealer Harvests VPN Configs, Passwords, and Cookies in Organized Folder Structure
🕵️
Iranian Threat Actors Target U.S. Critical Infrastructure, Including Water Systems
🕵️
DShield Honeypot Scanning Hits Record High with Over 1 Million Logs in a Single Day
🕵️
Threat Actors Use SVG Smuggling for Browser-Native Redirection
🕵️
A Leader in the 2025 Gartner Magic Quadrant for EPP — 3 Years Running
🕵️
Virtual Event Preview: Cloud & Data Security Summit 2025 – Tackling Exposed Attack Surfaces in the Cloud
🕵️
Microsoft Explains How Security Copilot in Intune and Entra Supports Security and IT Teams
🕵️
The Only Vendor Named a SASE Leader for the Third Time
🕵️
CyberheistNews Vol 15 #28 [The $1B Question] Is Your Security Team Ready for AI Prompt Attacks?
🕵️
North Korean XORIndex malware hidden in 67 malicious npm packages
🌐
Android malware Konfety uses malformed APKs to evade detection
🌐
What you need to know about CVSS to protect your IT assets
🎙️
The AI Fix #59: Grok thinks it’s Mecha Hitler, and AIs can think strategically
📡
OpenAI's ChatGPT-powered browser is codenamed 'Aura'
📡
DOGE staffer with access to Americans’ personal data leaked private xAI API key
📡
Securing Core Cloud Identity Infrastructure: Addressing Advanced Threats through Public-Private Collaboration
📡
SIM scammer’s sentence increased to 12 years, after failing to pay back victim $20 million
📡
Quelle surprise! Twitter faces criminal probe in France
📡
Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors
📡
Sweet 16: Sophos named a Leader (again) in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms
📡
Windows KB5064489 emergency update fixes Azure VM launch issues
📡
Abacus dark web drug market goes offline in suspected exit scam
📡
Meta fixes bug that could leak users’ AI prompts and generated content
📡
OpenAI's image model gets built-in style feature on ChatGPT
📡
US Army soldier pleads guilty to hacking telcos and extortion
📡
Unmasking AsyncRAT: Navigating the labyrinth of forks