92Articles
7Categories
2025-07-31Date
🐛
CrushFTP Hit by Critical 0-Day RCE Vulnerability – Full Technical Details and PoC Published
🐛
Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install
🐛
Critical SUSE Manager Vulnerability Allows Remote Command Execution as Root
🐛
Ransomware up 179%, credential theft up 800%: 2025’s cyber onslaught intensifies
🐛
Chromium: CVE-2025-8292 Use after free in Media Stream
⚠️
Ransomware gang tells Ingram Micro, ‘Pay up by August 1’
⚠️
Tangled in the web: Scattered Spider’s tactics changing to snare more victims
⚠️
Mind the overconfidence gap: CISOs and staff don’t see eye to eye on security posture
⚠️
North Korean APT Hackers Compromise CI/CD Pipelines to Steal Sensitive Data
⚠️
Researchers Exploit 0-Day Flaws in Retired Netgear Router and BitDefender Box
⚠️
Google Project Zero Tackles Upstream Patch Gap With New Policy
⚠️
Cheating on Quantum Computing Benchmarks
⚠️
‘EDR-on-EDR Violence’: Hackers turn security tools against each other
⚠️
Bangalore Techie Arrested for Alleged Role in $44 Million Cryptocurrency Theft
⚠️
Browser Extensions Pose Serious Threat to Gen-AI Tools Handling Sensitive Data
⚠️
Critical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload Exploits
⚠️
ShinyHunters behind Salesforce data theft attacks at Qantas, Allianz Life, and LVMH
⚠️
Lenovo IdeaCentre and Yoga BIOS Flaws Allow Attackers to Run Arbitrary Code
⚠️
Who’s Really Behind the Mask? Combatting Identity Fraud
⚠️
Open Source CISA Tool Helps Defenders With Hacker Containment, Eviction
⚠️
New DoubleTrouble Banking Malware Targets Users Through Phishing Sites to Steal Credentials
⚠️
Silver Fox Hackers Exploit Weaponized Google Translate Tools to Deliver Windows Malware
⚠️
Thorium Platform Public Availability
⚠️
CISA open-sources Thorium platform for malware, forensic analysis
⚠️
Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials
⚠️
CISA Releases Two Industrial Control Systems Advisories
⚠️
CISA and USCG Issue Joint Advisory to Strengthen Cyber Hygiene in Critical Infrastructure
⚠️
Why Your EDR Could Be Your Greatest Cyber Risk
⚠️
Google Cloud Security Threat Horizons Report #12 Is Out!
⚠️
Hacking Washing Machines - PSW #885
⚠️
Attackers wrap phishing links through URL scanning services to bypass detection
⚠️
Pi-hole - 29,926 breached accounts
📢
GenAI als Security-Gamechanger?
📢
Singapore’s Strategic Approach to State-Linked APT Cyber Threats
📢
GitHub security advisory AV25-472
📢
Reflections from the First Cyber AI Profile Workshop
📢
CISA Announces Release of Thorium for Malware Analysis
📢
Apple security advisory (AV25-473)
📢
Why This CISO HATES the Word ‘Compliance’ 😠
📢
SUSE Linux security advisory (AV25-474)
📢
Scattered Spider Related Domain Names, (Thu, Jul 31st)
🔥
Hackers Allegedly Breach Nokia’s Internal Network
🔥
UNC2891 Hackers Breach ATMs Using Raspberry Pi Devices for Network Access
🔥
Chinese Silk Typhoon Hackers File Over 10 Patents for Advanced Intrusive Hacking Tools
🔥
UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud
🔥
LAMEHUG: First AI-Powered Malware Targets Organizations via Compromised Official Email Accounts
🔥
Hackers stole Social Security numbers during Allianz Life cyberattack | TechCrunch
🔥
AI-Driven Trends in Endpoint Security: What the 2025 Gartner® Magic Quadrant™ Reveals
🔥
Cyberkriminelle setzen Ingram Micro Ultimatum
🔥
SafePay ransomware threatens to leak 3.5TB of Ingram Micro data
🔥
Inc Ransomware Claims 1.2TB Data Breach at Dollar Tree
🔥
Ransomware Gangs Leverage TrickBot Malware to Steal US $724 Million in Cryptocurrency
🔥
Anubis Ransomware Targets Android and Windows Users to Encrypt Files and Steal Credentials
🔥
Threat Actors Use Malicious RMM Tools for Stealthy Initial Access to Organizations
🔥
Your Backups Are Useless If THIS Happens 🤐 #ITrisk
🔥
Dark Web Just Got an Upgrade 😳 16 Billion Leaked Credentials
🕵️
ISC Stormcast For Thursday, July 31st, 2025 https://isc.sans.edu/podcastdetail/9550, (Thu, Jul 31st)
🕵️
Palo Alto Networks Announces $25 Billion Acquisition of CyberArk
🕵️
NOVABLIGHT Masquerades as Educational Tool to Steal Login Credentials and Compromise Crypto Wallets
🕵️
Honeywell Experion PKS Flaws Allow Manipulation of Industrial Processes
🕵️
Report Links Chinese Companies to Tools Used by State-Sponsored Hackers
🕵️
Hacker Arrested for Data Theft Targeting Spanish Bank Customers
🕵️
API Security Firm Wallarm Raises $55 Million
🕵️
N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto
🕵️
Malicious Connectors Potentially Impact Hundreds of Millions of Microsoft 365 Users
🕵️
Reach Security Raises $10 Million for Exposure Management Solution
🕵️
This Simple Step Could Save You HOURS on Endpoint Tasks
🕵️
Chinese Researchers Suggest Lasers and Sabotage to Counter Musk’s Starlink Satellites
🕵️
Noma Security Raises $100 Million for AI Security Platform
🕵️
Not Enough Good People Run for Office… Here's Proof
🕵️
Microsoft: Russian hackers use ISP access to hack embassies in AiTM attacks
🕵️
Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats
🕵️
Can You Join a Cybersecurity Team with Just Passion?
🕵️
Modernize your identity defense with Microsoft Identity Threat Detection and Response
🕵️
Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies
🕵️
Unit 42 Launches Attribution Framework to Classify Threat Actors by Behavior and Activity
🕵️
This 1-Minute Exercise Could Save Your Job 😱 #TechShorts
🕵️
Why Cyber Competitions Run on Cloud (And You Should Too) ☁️
🌐
Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs
🌐
Inside a Real Clickfix Attack: How This Social Engineering Hack Unfolds
📡
Zoomers at work: how scammers target this demographic | Kaspersky official blog
📡
Google is experimenting with machine-learning powered age estimation tech in the U.S.
📡
Sophos Endpoint: Consistently AAA rated – Q2 2025 SE Labs Endpoint Protection Report
📡
Spikes in malicious activity precede new CVEs in 80% of cases
📡
Proton launches free standalone cross-platform Authenticator app
📡
Sophos named a Leader in the 2025 Frost Radar™ for Managed Detection and Response
📡
.NET Bounty Program now offers up to $40,000 in awards
📡
Microsoft now pays up to $40,000 for some .NET vulnerabilities
📡
Microsoft to disable Excel workbook links to blocked file types
📡
Kali Linux can now run in Apple containers on macOS systems
📡
This month in security with Tony Anscombe – July 2025 edition
📡
.NET Bounty Program now offers up to $40,000 in awards