93Articles
8Categories
2025-07-18Date
🚨
Signal App Clone Vulnerability Actively Exploited for Password TheftA critical vulnerability in TeleMessageTM SGNL, an enterprise messaging platform modeled after Signal, is being actively exploited by threat actors to steal passwords and sensitive data from government agencies and enterprises. The flaw, tracked as CVE-2025-48927, was added to CI…
KEV
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation.  CVE-2025-25257 Fortinet FortiWeb SQL Injection Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber …
KEV
🚨
Threat actors scanning for apps incorporating vulnerable Spring Boot toolEnterprise admins who haven’t yet mitigated a two-month-old vulnerability in apps that incorporate the open source Spring Boot tool could be in trouble: Attempts to exploit the hole are still ongoing. Spring Boot is a tool helps developers use Java-based frameworks to create micr…
KEV
🐛
Lenovo Protection Driver Flaw Enables Privilege Escalation and Code Execution
🐛
Threat Actors Exploit Ivanti Connect Secure Flaws to Deploy Cobalt Strike Beacon
🐛
Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services
🐛
Grafana Flaws Allow User Redirection and Code Execution in Dashboards
🐛
Ubiquiti UniFi Vulnerability Lets Hackers Inject Malicious Commands
🐛
Cisco warns of another critical RCE flaw in ISE, urges immediate patching
🐛
Sophos Intercept X for Windows Flaws Enable Arbitrary Code Execution
🐛
Hackers scanning for TeleMessage Signal clone flaw exposing passwords
🐛
CVE-2025-49747 Azure Machine Learning Elevation of Privilege Vulnerability
🐛
CVE-2025-49746 Azure Machine Learning Elevation of Privilege Vulnerability
🐛
CVE-2025-47995 Azure Machine Learning Elevation of Privilege Vulnerability
🐛
CVE-2025-47158 Azure DevOps Server Elevation of Privilege Vulnerability
🐛
CVE-2025-53762 Microsoft Purview Elevation of Privilege Vulnerability
🐛
Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks
🐛
CrushFTP zero-day exploited in attacks to gain admin access on servers
🐛
New CrushFTP zero-day exploited in attacks to hijack servers
⚠️
News Alert: SquareX, Fortune 500 CISOs to debut bowser security guide at Black Hat USA 2025
⚠️
Office-Supportende: Makro-Desaster verhindern
⚠️
Hackers Abuse DNS Blind Spots to Stealthily Deliver Malware
⚠️
Microsoft Entra ID Flaw Enables Privilege Escalation to Global Admin
⚠️
BIND 9 Vulnerabilities Enable Cache Poisoning and Service Disruption
⚠️
8 trends transforming the MDR market today
⚠️
10 Best XDR (Extended Detection & Response) Solutions 2025
⚠️
‘Daemon Ex Plist’ Vulnerability Grants Root Access on macOS
⚠️
Clément Domingo: “We are not using AI correctly to defend ourselves”
⚠️
Critical Nvidia Toolkit Flaw Exposes AI Cloud Services to Hacking
⚠️
Threat Actors Exploit GitHub Accounts to Host Payloads, Tools, and Amadey Malware Plugins
⚠️
WAFFLED: New Technique Targets Web Application Firewall Weaknesses
⚠️
Hackers Exploit ClickFix Tactics to Spread NetSupport RAT, Latrodectus, and Lumma Stealer
⚠️
CitrixBleed 2: 100 Organizations Hacked, Thousands of Instances Still Vulnerable
⚠️
New Mobile Phone Forensics Tool
⚠️
Fortinet FortiWeb Flaw Exploited in the Wild After PoC Publication
KEV
⚠️
1.4 Million Affected by Data Breach at Virginia Radiology Practice
⚠️
Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices
⚠️
Building scalable secrets management in hybrid cloud environments: Lessons from enterprise adoption
⚠️
Google Sues BadBox 2.0 Botnet Operators Behind 10 Million+ Infected Devices
⚠️
CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign
⚠️
New QR Code Attacks Through PDFs Bypass Detection and Steal Credentials
⚠️
Spain: Chinese company Huawei must not be allowed access to wiretap data in 'normalisation of censorship and surveillance', rights group says
⚠️
Spain: Chinese company Huawei must not be allowed access to wiretap data in 'normalisation of censorship and surveillance', rights group says
⚠️
A surveillance vendor was caught exploiting a new SS7 attack to track people’s phone locations
⚠️
New Surge of Crypto-Jacking Hits Over 3,500 Websites
⚠️
UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns
⚠️
New Veeam-Themed Phishing Attack Uses Weaponized WAV File to Target Users
⚠️
Novel malware from Russia’s APT28 prompts LLMs to create malicious Windows commands
📢
CISA Publishes 13 ICS Security Advisories on Critical Flaws
📢
Advisory on North Korean information technology (IT) workers
📢
Nodejs security advisory (AV25-431)
📢
UK ties GRU to stealthy Microsoft 365 credential-stealing malware
📢
FTC Advisory: How to Protect Yourself Against Job Scams
🔥
Poor Passwords Tattle on AI Hiring Bot Maker Paradox.ai
🔥
Salt Typhoon breach: Chinese APT compromises U.S. Army National Guard network
🔥
Salt Typhoon breach: Chinese APT compromises U.S. Army National Guard network
🔥
Cybersecurity Today: DNS Malware, SonicWall Backdoor, Military Breach, and BigONE Crypto Hack
🔥
Settlement Reached in Investors’ Lawsuit Against Meta CEO Mark Zuckerberg and Other Company Leaders
🔥
Anne Arundel Dermatology Data Breach Impacts 1.9 Million People
🔥
Russian Vodka Maker Beluga Struck by Ransomware Attack
🔥
From Backup to Cyber Resilience: Why IT Leaders Must Rethink Backup in the Age of Ransomware
🔥
Russia’s war against Ukraine, China’s coercive actions toward Taiwan very likely 'primary drivers' of state-linked sabotage targeting submarine cable infrastructure, report says
🔥
Russia’s war against Ukraine, China’s coercive actions toward Taiwan very likely 'primary drivers' of state-linked sabotage targeting submarine cable infrastructure, report says
🔥
In Other News: Law Firm Hacked by China, Symantec Flaw, Meta AI Hack, FIDO Key Bypass
🔥
Vodafone von Hackerangriff auf Dienstleister betroffen
🔥
New Phobos ransomware decryptor lets victims recover files for free
🔥
Russian alcohol retailer WineLab closes stores after ransomware attack
🔥
Lumma Infostealer Steals Browser Data and Sells It as Logs on Underground Markets
🕵️
ISC Stormcast For Friday, July 18th, 2025 https://isc.sans.edu/podcastdetail/9532, (Fri, Jul 18th)
🕵️
Veeam Phishing via Wav File, (Fri, Jul 18th)
🕵️
Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet
🕵️
Microsoft Uncovers Scattered Spider Tactics, Techniques, and Procedures in Recent Attacks
🕵️
Fraud: A Growth Industry Powered by Gen-AI
🕵️
Microsoft Defender for Office 365 Gets Enhanced Threat Dashboard
🕵️
Email Protection Startup StrongestLayer Emerges From Stealth Mode
🕵️
US aims to ban Chinese technology in undersea telecommunications cables over security concerns
🕵️
US aims to ban Chinese technology in undersea telecommunications cables over security concerns
🕵️
Microsoft at Black Hat USA 2025: A unified approach to modern cyber defense
🕵️
Snake Keylogger Bypasses Windows Defender and Uses Scheduled Tasks to Steal Credentials
🕵️
Fancy Bear Hackers Target Governments and Military Entities with Advanced Tools
🕵️
Before Vegas: The “Red Hackers” Who Shaped China’s Cyber Ecosystem
🕵️
Chinese Threat Actors Operate 2,800 Malicious Domains to Distribute Windows Malware
🕵️
Friday Squid Blogging: The Giant Squid Nebula
🕵️
Existential Dread, MCP, Cloudflare, ESXI, QR Codes, Salt Typhoon, Aaran Leyland... - SWN #495
🕵️
Thousands of Spoofed News Sites Are Pushing Push Investment Fraud Scams
🕵️
The ASUS Dumpster Fire
🌐
Arch Linux pulls AUR packages that installed Chaos RAT malware
📡
HR guidelines phishing email | Kaspersky official blog
📡
OpenAI: GPT-5 is coming, "we'll see" if it creates a shockwave
📡
Loaf and order: Belgian police launch bread-based cybersecurity campaign
📡
Sophos announces UAE data center
📡
New ChatGPT o3-alpha model hints at coding upgrade
📡
Microsoft mistakenly tags Windows Firewall error log bug as fixed