108Articles
10Categories
2025-07-30Date
🚨
CISA Adds PaperCut NG/MF CSRF Vulnerability to KEV Catalog Amid Active Exploitationsubmitted by cm0002 to cybersecurity 1 points | 0 comments https://thehackernews.com/2025/07/cisa-adds-papercut-ngmf-csrf.html
KEV
🚨
32% of exploited vulnerabilities are now zero-days or 1-daysPatching windows for organizations keep shortening, as threat actors exploit important vulnerabilities increasingly faster. According to recent report from VulnCheck , a third of flaws leveraged by attackers this year have been zero-days or 1-days. With so little advance warning,…
KEV
🐛
Apple Patches Safari Vulnerability Flagged as Exploited Against Chrome
🐛
BeyondTrust Privilege Management Flaw Lets Hackers Escalate System Access
🐛
Apple Patches Safari Vulnerability Also Exploited as Zero-Day in Google Chrome
🐛
WordPress Theme Security Vulnerability Enables to Execute Arbitrary Code Remotely
⚠️
Enterprise LLMs Vulnerable to Prompt-Based Attacks Leading to Data Breaches
⚠️
How CISOs can scale down without compromising security
⚠️
Prepping for the quantum threat requires a phased approach to crypto agility
⚠️
Free Decryptor Released for AI-Powered FunkSec Ransomware
⚠️
Hackers Exploit SAP Vulnerability to Breach Linux Systems and Deploy Auto-Color Malware
⚠️
Hackers Target SAP NetWeaver to Deploy New Auto-Color Linux Malware
⚠️
Severe Vulnerability in AI Vibe Lets Attackers Access Private User Applications
⚠️
Tonic Security Launches With $7 Million in Seed Funding
⚠️
Measuring the Attack/Defense Balance
⚠️
Flaw in Vibe Coding Platform Base44 Exposed Private Enterprise Applications
⚠️
Critical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload Exploits
⚠️
Microsoft SharePoint Server 0-Day Exploit Targets African Treasury, Companies, and University
⚠️
Apple Patches Multiple Vulnerabilities, Including Safari Vulnerability Abused in Chrome 0-Day Attacks
⚠️
LLM Honeypots Can Deceive Threat Actors into Exposing Binaries and Known Exploits
⚠️
Game changer: How AI simplifies implementation of Zero Trust security objectives
⚠️
Minnesota activates National Guard as cyberattack on Saint Paul disrupts public services
⚠️
Apple patches security flaw exploited in Chrome zero-day attacks
⚠️
Qilin Ransomware Uses TPwSav.sys Driver to Bypass EDR Security Measures
⚠️
Eviction Strategies Tool Released
⚠️
When Vulnerabilities Linger Too Long... 💣
⚠️
Hackers actively exploit critical RCE in WordPress Alone theme
⚠️
Law Enforcement vs Hackers: The Culture Clash!
⚠️
ShinyHunters behind Salesforce data theft attacks at Qantas, Allianz Life, and LVMH
⚠️
This ASUS Feature Lets Hackers Take Over Your PC 🔥
⚠️
Securing Firebase: Lessons Re-Learned from the Tea Breach, (Wed, Jul 30th)
⚠️
CISA Releases Open-Source Eviction Strategies Tool for Cyber Incident Response
⚠️
Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
⚠️
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
📋
Chrome Vulnerabilities Allow Attackers to Hijack Memory and Run Malicious Code
📋
New Lenovo UEFI firmware updates fix Secure Boot bypass flaws
📢
MCP‑Sicherheit: Das Rückgrat von Agentic AI sichern
📢
CISA and FBI Release Tactics, Techniques, and Procedures of the Scattered Spider Hacker Group
📢
Google Chrome security advisory (AV25-465)
📢
Dobrindt prüft Einsatz von US-Software Palantir
📢
SonicWall security advisory (AV25-466)
📢
Palo Alto Networks security advisory (AV25-467)
📢
Palo Alto kauft CyberArk
📢
Controls ≠ Context: Stop Copy-Pasting Cyber Rules!
📢
HPE security advisory (AV25-468)
📢
Drupal security advisory (AV25-469)
📢
Senate Committee Advances Trump Nominee to Lead CISA
📢
Splunk security advisory (AV25-470)
📢
Node-SAML security advisory (AV25-471)
🔥
Tea App Takes Messaging System Offline After Second Security Issue Reported
🔥
Orange Hit by Cyberattack, Internal Systems Hacked
🔥
Cybersecurity Today: Major Data Leaks, Airline Disruptions, Malware in Games, and AI Bypasses Captchas
🔥
New Gunra Ransomware Linux Variant Launches 100 Encryption Threads with Partial Encryption Feature
🔥
Minnesota Activates National Guard in Response to Cyberattack
🔥
Cost of Data Breach in US Rises to $10.22 Million, Says Latest IBM Report
🔥
Palo Alto Networks eyes $20B CyberArk deal as identity security takes center stage
🔥
Ransomware upstart Gunra goes cross-platform with encryption upgrades
🔥
Telecom Giant Orange Hit by Cyberattack
🔥
APT Hackers Target Maritime and Shipping Industry for Ransomware Attacks
🔥
Erneuter Hackerangriff bei Orange
🔥
Palo Alto Networks to buy CyberArk for $25B as identity security takes center stage
🔥
Hackers Deploy Cobalt Strike Beacon Using GitHub and Social Media
🔥
FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant
🔥
Safepay ransomware threatens to leak 3.5TB of Ingram Micro data
🔥
Hackers stole Social Security numbers during Allianz Life cyberattack
🔥
Cloudflare Just Witnessed a DDoS MONSTER 🧠
🔥
Crypto Wallets Are Being Hacked by Your Own Screenshots 💀
🔥
Risky Business #800 — The SharePoint bug may have leaked from Microsoft MAPP
🕵️
ISC Stormcast For Wednesday, July 30th, 2025 https://isc.sans.edu/podcastdetail/9548, (Wed, Jul 30th)
🕵️
New Microsoft Guidance Targets Defense Against Indirect Prompt Injection
🕵️
Axonius Acquires Medical Device Security Firm Cynerio in $100 Million Deal
🕵️
ChatGPT Agent Defeats Cloudflare’s ‘I Am Not a Robot’ Security Check
🕵️
Aligning Security Objectives, Ditch the Ego, Lead for Real and Succeed - BSW #406
🕵️
Google Launches DBSC Open Beta in Chrome and Enhances Patch Transparency via Project Zero
🕵️
Social Engineering on the Rise — New Unit 42 Report
🕵️
New JSCEAL Attack Aims to Steal Credentials and Wallets from Crypto App Users
🕵️
Cobalt Strike Beacon delivered via GitHub and social media
🕵️
Chinese Firms Linked to Silk Typhoon Filed 15+ Patents for Cyber Espionage Tools
🕵️
Cyata Emerges From Stealth With $8.5 Million in Funding
🕵️
Dropbox Passwords Service Ending: Export Your Vault Before Oct 28, 2025
🕵️
Lazarus Group Enhances Malware with New OtterCookie Payload Delivery Technique
🕵️
Scattered Spider Activity Drops Following Arrests, but Others Adopting Group’s Tactics
🕵️
Palo Alto Networks to Acquire CyberArk for $25 Billion
🕵️
Legion Emerges From Stealth With $38 Million in Funding
🕵️
Researchers Reveal North Korean Threat Actors’ Tactics for Uncovering Illicit Access
🕵️
Progress Bar: Hacking 100% 🔓
🕵️
BlinkOps Raises $50 Million for Agentic Security Automation Platform
🕵️
New Spear Phishing Attack Distributes VIP Keylogger Through Email Attachment
🕵️
Palo Alto to scoop up CyberArk for $25 billion to tackle AI-era threats
🕵️
Threat Actors Use LNK Files to Deploy RedLoader Malware on Windows Systems
🕵️
If You Knew This, You’d Use a Password Manager TODAY
🕵️
Handling malicious requests with fail2ban
🕵️
Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps
🕵️
Hackers target Python devs in phishing attacks using fake PyPI site
🕵️
More Vendors, More Chaos: Is Supply Chain Security Broken?
🕵️
Scammers Unleash Flood of Slick Online Gaming Sites
🕵️
[CASE STUDY] Retail Organization Sees 50-Fold Increase in Phishing Reporting with KnowBe4's Phish Alert Button and Training
🕵️
SHARED INTEL Q&A: Inside the access mess no one sees — and the identity risk no one owns
🌐
Scammers Unleash Flood of Slick Online Gaming Sites
🎙️
Smashing Security podcast #428: Red flags, leaked chats, and a final farewell
📡
Scattered Spider Hacker Arrests Halt Attacks, But Copycat Threats Sustain Security Pressure
📡
Product Walkthrough: A Look Inside Pillar's AI Security Platform
📡
AI Cuts vCISO Workload by 68% as Demand Skyrockets, New Report Finds
📡
Passkey support in business applications | Kaspersky official blog
📡
Skechers is making kids’ shoes with a hidden AirTag compartment
📡
Hackers plant 4G Raspberry Pi on bank network in failed ATM heist
📡
Germ brings end-to-end encrypted messages to Bluesky
📡
Palo Alto Networks agrees to buy CyberArk for $25 billion