83Articles
7Categories
2025-07-17Date
🐛
Cisco Warns of Critical ISE Flaw Allowing Unauthenticated Attackers to Execute Root Code
🐛
Cisco Unified Intelligence Center Flaw Lets Remote Attackers Upload Arbitrary Files
🐛
Hackers Actively Exploited CitrixBleed 2 Flaw Ahead of PoC Disclosure
KEV
🐛
Oracle-Lücke birgt Gefahr für RCE-Attacken
🐛
Urgent: Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild
🐛
Hackers Exploit Apache HTTP Server Flaw to Deploy Linuxsys Cryptocurrency Miner
🐛
Max severity Cisco ISE bug allows pre-auth command execution, patch now
🐛
Ransomware actors target patched SonicWall SMA devices with rootkit
🐛
Citrix Bleed 2 exploited weeks before PoCs as Citrix denied attacks
KEV
⚠️
Microsoft Honors Top Contributors to MSRC’s Security Research Program
⚠️
FortiWeb Systems Compromised via Webshells After Public PoC Release
⚠️
Europol Takes Down NoName057(16)’s Global Network of Over 100 Servers
⚠️
How AI is changing the GRC strategy
⚠️
0-Day RCE Flaw in SonicWall SMA Devices Exploited to Launch OVERSTEP Ransomware
⚠️
Weaponizing SVG: How Threat Actors Embed Malicious JavaScript in Vector Files
⚠️
Cisco Patches Another Critical ISE Vulnerability
⚠️
Critical SharePoint RCE Vulnerability Exploited via Malicious XML in Web Part
⚠️
PyPI Blocks Inbox.ru Domains After 1,500+ Fake Package Uploads
⚠️
VMware Flaws That Earned Hackers $340,000 at Pwn2Own Patched
⚠️
Hackers Use DNS Queries to Evade Defenses and Exfiltrate Data
⚠️
Security Vulnerabilities in ICEBlock
⚠️
1-Click Oracle Cloud Code Editor RCE Flaw Allows Malicious File Upload to Shell
⚠️
NVIDIA Container Toolkit Vulnerability Allows Privileged Code Execution by Attackers
⚠️
Mobile Forensics Tool Used by Chinese Law Enforcement Dissected
⚠️
CTEM vs ASM vs Vulnerability Management: What Security Leaders Need to Know in 2025
⚠️
UK’s Co-op Retailer Hit by Cyberattack, 6.5 Million Members’ Data Exposed
⚠️
China-linked hackers target Taiwan chip firms in a coordinated espionage campaign
⚠️
New Fortinet FortiWeb hacks likely linked to public RCE exploits
⚠️
Empirical Security Raises $12 Million for AI-Driven Vulnerability Management
⚠️
Smashing Security podcast #426: Choo Choo Choose to ignore the vulnerability
⚠️
Malware in DNS - DomainTools Investigations | DTI
⚠️
Massistant: Chinese Mobile Forensic Tool Accesses SMS, Images, Audio, and GPS Data
⚠️
Microsoft Teams Exploited to Deliver Matanbuchus Ransomware Payload
⚠️
“Maverick” — Scorched Earth SIEM Migration FTW!
⚠️
‘All US forces must now assume their networks are compromised’ after Salt Typhoon breach
⚠️
CISA Releases Three Industrial Control Systems Advisories
⚠️
The Invisible Risks of Insecure Chinese Surveillance Cameras
⚠️
The Invisible Risks of Insecure Chinese Surveillance Cameras
⚠️
Hackers On A Train - PSW #883
⚠️
VMware fixes four ESXi zero-day bugs exploited at Pwn2Own Berlin
📢
Cambodia Makes 1,000 Arrests in Latest Crackdown on Cybercrime
📢
Ermittlern gelingt Schlag gegen prorussische Hacker
📢
HPE security advisory (AV25-429)
📢
Microsoft Edge security advisory (AV25-430)
📢
Chinese hackers breached National Guard to steal network configurations
🔥
Cloudflare Confirms BGP Hijack Behind 1.1.1.1 DNS Disruption
🔥
Hiding Payloads in Linux Extended File Attributes, (Thu, Jul 17th)
🔥
Louis Vuitton says regional data breaches tied to same cyberattack
🔥
Compumedics Ransomware Attack Led to Data Breach Impacting 318,000 - SecurityWeek
🔥
Armenian Man Extradited to US Over Ryuk Ransomware Attacks
🔥
Teams Call to Ransomware: Matanbuchus 3.0 MaaS Levels Up
🔥
H2Miner Targets Linux, Windows, and Containers to Illicitly Mine Monero
🔥
North Korean hackers blamed for record spike in crypto thefts in 2025
🔥
Ukrainian Hackers Claim Cyberattack on Major Russian Drone Supplier
🔥
Hacker steals $27 million in BigONE exchange crypto breach
🔥
LameHug malware uses AI LLM to craft Windows data-theft commands in real-time
🕵️
ISC Stormcast For Thursday, July 17th, 2025 https://isc.sans.edu/podcastdetail/9530, (Thu, Jul 17th)
🕵️
Oracle Patches 200 Vulnerabilities With July 2025 CPU
🕵️
Chinese Hackers Target Taiwan's Semiconductor Sector with Cobalt Strike, Custom Backdoors
🕵️
Threat Actors Deploy 28+ Malicious Packages to Spread Protestware Scripts
🕵️
Iranian Threat Actors Use AI-Generated Emails to Target Cybersecurity Researchers and Academics
🕵️
GhostContainer backdoor for Exchange servers
🕵️
GhostContainer backdoor for Exchange servers
🕵️
Trial Opens Against Meta CEO Mark Zuckerberg and Other Leaders Over Facebook Privacy Violations
🕵️
UNG0002 Actors Weaponize LNK Files via ClickFix Fake CAPTCHA Pages
🕵️
CyberArk: Rise in Machine Identities Poses New Risks
🕵️
Researchers Reveal How Hacktivist Groups Gain Attention and Choose Their Targets
🕵️
Co-op boss says sorry to 6.5m people who had data stolen in hack
🕵️
Ukrainian Hackers Wipe 47TB of Data from Top Russian Military Drone Supplier
🕵️
Over 4 Million Exposed Devices Used in Two New DoS Attack Campaigns
🕵️
The Attack On Browser-Based AI Agents Is Coming
🕵️
SquareX Collaborates With Top Fortune 500 CISOs To Launch The Browser Security Field Manual At Black Hat
🕵️
Chinese State-Sponsored Hackers Target Semiconductor Industry with Weaponized Cobalt Strike
🕵️
VLAI Hugging Face Set
🕵️
Transparency on Microsoft Defender for Office 365 email security effectiveness
🕵️
Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters
🕵️
Watch out, another max-severity Cisco bug on the loose
🌐
Google sues to disrupt BadBox 2.0 botnet infecting 10 million devices
🌐
Microsoft Teams voice calls abused to push Matanbuchus malware
🌐
Securing Tomorrow: An Interview with Trend Micro VP of Product Management Michael Habibi
📡
What is Wi-Fi sensing, and how does it detect human motion in the home? | Kaspersky official blog
📡
Europol Disrupts NoName057(16) Hacktivist Group Linked to DDoS Attacks Against Ukraine
📡
Hackers are trying to steal passwords and sensitive data from users of Signal clone