91Articles
7Categories
2025-08-04Date
🐛
Der Kaufratgeber für Breach & Attack Simulation Tools
🐛
NestJS Vulnerability Allows Code Execution on Developer Machines
🐛
Critical HashiCorp Vulnerability Allows Attackers to Run Code on Host Machine
🐛
Critical Squid Flaw Allows Remote Code Execution by Attackers
🐛
Cybersecurity Today: Hamilton's Ransomware Crisis and Emerging AI and OAuth Threats
🐛
Vulnerabilities in Government-Linked Partner Software Allow Remote Code Attacks
🐛
Researchers Use 0-Day to Exploit Google kernelCTF and Debian 12
🐛
FUJIFILM Printer Flaw Allows Attackers to Trigger DoS Attacks
🐛
Surge in Threat Actor Exploitation Attempts Serves as Early Warning of Emerging Cyber Vulnerabilities
⚠️
AI-Powered Cursor IDE Exposes Users to Silent Remote Code Execution
⚠️
6 things keeping CISOs up at night
⚠️
CrowdStrike: A new era of cyberthreats from sophisticated threat actors is here
KEV
⚠️
MCP: securing the backbone of Agentic AI
⚠️
Interlock Ransomware Uses ClickFix Exploit to Execute Malicious Commands on Windows
⚠️
CISA releases Thorium, an open-source, scalable platform for malware analysis
⚠️
Ransomware gangs join attacks targeting Microsoft SharePoint servers
⚠️
Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Allegedly Leaked Online
⚠️
Ransomware attacks: The evolving extortion threat to US financial institutions
⚠️
⚡ Weekly Recap: VPN 0-Day, Encryption Backdoor, AI Malware, macOS Flaw, ATM Hack & More
⚠️
Man-in-the-Middle Attack Prevention Guide
⚠️
Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities
⚠️
Attackers exploit link-wrapping services to steal Microsoft 365 logins
⚠️
News alert: OpenSSL conference to convene experts on cryptograohy, compliance and open-source
⚠️
NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers
⚠️
Why Every Cyber Lab Needs Proxmox 💥
⚠️
The Future of Cybersecurity Is Predicting You 😳
⚠️
Zero Day Quest: Join the largest hacking event with up to $5 million in total bounty awards
⚠️
How Hackers Exploit Microsoft Teams in Social Engineering Attacks
⚠️
Fashion giant Chanel hit in wave of Salesforce data theft attacks
⚠️
Threat Actors Exploit AI to Scale Attacks and Target Autonomous Agents
⚠️
SOC Visibility Triad is Now A Quad — SOC Visibility Quad 2025
⚠️
Rubrik & Sophos Enhance Cyber Resilience for Microsoft 365
📢
How ‘Plague’ infiltrated Linux systems without leaving a trace
📢
US Announces $100 Million for State, Local and Tribal Cybersecurity
📢
FBI Issues Guidance on Thwarting North Korea’s Fraudulent IT Schemes
🔥
Weekly Enterprise Security News and Tips on Building Security From Day 1 - Guillaume Ross - ESW #418
🔥
Northwest Radiologists Data Breach Impacts 350,000 Washingtonians
🔥
ShadowSyndicate Infrastructure Used by Multiple Ransomware Groups Including Cl0p, LockBit and RansomHub
🔥
Biggest-Ever Bitcoin Hack Uncovered: $3.5B Stolen in Silent Breach
🔥
Average global data breach cost now $4.44 million - Help Net Security
🔥
SonicWall firewall devices hit in surge of Akira ransomware attacks
🔥
Pi-hole discloses data breach triggered by WordPress plugin flaw
🔥
New Plague Linux malware stealthily maintains SSH access
🔥
Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally
🔥
Ransomware gangs join attacks targeting Microsoft SharePoint servers
🔥
CNCERT Accuses U.S. Intelligence of Cyberattacks on Chinese Military-Industrial Targets
🔥
PXA Stealer Distributed via Telegram Harvests 200K Passwords and Credit Card Data
🔥
Ransomware Hits Phone Repair & Insurance Firm, Causing Millions in Damage
🕵️
Lazarus Group rises again, this time with fake FOSS
🕵️
ISC Stormcast For Monday, August 4th, 2025 https://isc.sans.edu/podcastdetail/9554, (Mon, Aug 4th)
🕵️
Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities
🕵️
Several Vulnerabilities Patched in AI Code Editor Cursor
🕵️
North Korea Hiding Malware Within JPEG Files to Attack Windows Systems Bypassing Detections
🕵️
First Sentencing in Scheme to Help North Koreans Infiltrate US Companies
🕵️
APT36 Targets Indian Infrastructure with Desktop Lures and Poseidon Backdoor
🕵️
Cybersecurity M&A Roundup: 44 Deals Announced in July 2025
🕵️
Search Engines are Indexing ChatGPT Conversations! - Here is our OSINT Research
🕵️
Threat actor uses AI to create a better crypto wallet drainer
🕵️
AI-powered Cursor IDE vulnerable to prompt-injection attacks
🕵️
Sean Cairncross Confirmed by Senate as National Cyber Director
🕵️
Hackers Leverage AI to Craft Malicious NPM Package That Drains Crypto Wallets
🕵️
AI Guardrails Under Fire: Cisco’s Jailbreak Demo Exposes AI Weak Points
🕵️
Mozilla Issues Warning on Phishing Campaign Targeting Add-on Developer Accounts
🕵️
North Korean spies posing as remote workers have infiltrated hundreds of companies, says CrowdStrike
🕵️
AI Thirst Traps Are Real… And They’re Writing Your News 😳
🕵️
Mentorship Monday - Discussions for career and learning!
🕵️
Meet the Browser That Thinks Each Tab is a Spy 😎
🕵️
OAuth-Apps für M365-Phishing missbraucht
🕵️
Microsoft Entra Suite delivers 131% ROI by unifying identity and network access
🕵️
If You Think Social Engineering Is Bad, It’s Going To Get Worse
🕵️
Nvidia Triton Vulnerabilities Pose Big Risk to AI Models
🕵️
New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft
🕵️
From Laptops to Laundromats: How DPRK IT Workers Infiltrated the Global Remote Economy - DomainTools Investigations | DTI
🕵️
Data Centers Are Breaking Workload Identity Systems 😳
🕵️
New Malware Attack Uses LNK Files to Deploy REMCOS Backdoor on Windows Systems
🕵️
30% of Code Is Already AI-Generated… So What Now?
🕵️
Modular Malware Suite Sold by Threat Actors Through Public Storefront Domains
🕵️
$4M Lost in Noise? The Cyber Alert Crisis 😱
🕵️
You Can't Fix Everything—Here's What To Fix First!
🕵️
Your Trusted Vendor Might Be the Problem 👀
🌐
PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads
🌐
CTM360 spots Malicious ‘ClickTok’ Campaign Targeting TikTok Shop users
🌐
CTM360 spots Malicious ‘FraudOnTok’ Campaign Targeting TikTok Shop users
📡
Mozilla warns of phishing attacks targeting add-on developers
📡
The Wild West of Shadow IT
📡
How users are losing money to deepfake ads on Instagram | Kaspersky official blog
📡
Perplexity accused of scraping websites that explicitly blocked AI scraping
📡
Microsoft: Outdated Office apps lose access to voice features in January
📡
New Feature: Daily Trends Report, (Mon, Aug 4th)
📡
Proton fixes Authenticator bug leaking TOTP secrets in logs
📡
Google says its AI-based bug hunter found 20 security vulnerabilities