101Articles
7Categories
2025-08-05Date
🚨
CISA Adds Three Known Exploited Vulnerabilities to CatalogCISA has added three new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2020-25078 D-Link DCS-2530L and DCS-2670L Devices Unspecified Vulnerability CVE-2020-25079 D-Link DCS-2530L and DCS-2670L Command Injectio…
KEV
🐛
Claude AI Flaws Let Attackers Execute Unauthorized Commands Using the Model Itself
🐛
Stealing Machine Keys for fun and profit (or riding the SharePoint wave), (Tue, Aug 5th)
🐛
Critical Flaw in ADOdb SQLite3 Driver Allows Arbitrary SQL Execution
🐛
Nvidia patches critical Triton server bugs that threaten AI model security
🐛
Hackers Target SharePoint Flaw to Access IIS Machine Keys
🐛
Google’s August Patch Fixes Two Qualcomm Vulnerabilities Exploited in the Wild
KEV
🐛
Cursor AI Code Editor Vulnerability Enables RCE via Malicious MCP File Swaps Post Approval
⚠️
So verändert KI Ihre GRC-Strategie
⚠️
LegalPwn Attack Tricks AI Tools Like ChatGPT and Gemini into Running Malicious Code
⚠️
SonicWall Investigating Potential SSL VPN Zero-Day After 20+ Targeted Attacks Reported
⚠️
WAF Protections Bypassed via JS Injection and Parameter Pollution for XSS Attacks
⚠️
Top cybersecurity M&A deals for 2025
⚠️
162: Hieu
⚠️
5 hard truths of a career in cybersecurity — and how to navigate them
⚠️
Ransomware goes cloud native to target your backup infrastructure
KEV
⚠️
Streamlit Vulnerability Exposes Users to Cloud Account Takeover Attacks
⚠️
SonicWall Hunts for Zero-Day Amid Surge in Firewall Exploitation
⚠️
15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign
⚠️
Microsoft Offers $5 Million at Zero Day Quest Hacking Contest
⚠️
Uniting software development and application security - Jonathan Schneider, Will Vande... - ASW #342
⚠️
Microsoft increases Zero Day Quest prize pool to $5 million
⚠️
Android’s August 2025 Update Patches Exploited Qualcomm Vulnerability
⚠️
Raspberry Robin Malware Targets Windows Systems via New CLFS Driver Exploit
⚠️
Android gets patches for Qualcomm flaws exploited in attacks
⚠️
MediaTek Chip Vulnerabilities Allow Attackers to Gain Elevated Access
⚠️
SonicWall urges admins to disable SSLVPN amid rising attacks
⚠️
Misconfigurations Are Not Vulnerabilities: The Costly Confusion Behind Security Risks
⚠️
Threat Actors Exploit Open-Source Vulnerabilities to Spread Malicious Code
⚠️
The age of infostealers is here. Is your financial service secure?
⚠️
North Korean Hackers Exploit NPM Packages to Steal Cryptocurrency and Sensitive Data
⚠️
Cisco discloses data breach impacting Cisco.com user accounts
⚠️
Nvidia Patches Critical RCE Vulnerability Chain
⚠️
SonicWall Alerts on Surge of Attacks Against Gen 7 Firewalls Over Past 72 Hours
⚠️
Critical Vulnerability in NestJS Devtools: Localhost RCE via Sandbox Escape
⚠️
Cisco Says User Data Stolen in CRM Hack
⚠️
Cloudflare Accuses Perplexity AI of Bypassing Firewalls with User-Agent Spoofing
⚠️
Cisco Discloses Data Breach Exposed User Profiles from Cisco.com
⚠️
SonicWall urges customers to disable SSLVPN amid reports of ransomware attacks
⚠️
The Heat Wasn't Just Outside: Cyber Attacks Spiked in Summer 2025
⚠️
Hacker used a voice phishing attack to steal Cisco customers’ personal information
⚠️
The Real Reason Microsoft Is Abandoning Your Hardware! 💣 #hackingnews
⚠️
Surge in Cyber Attacks Targeting AI Infrastructure as Critical Vulnerabilities Emerge
⚠️
The AI Fix #62: AI robots can now pass CAPTCHAs, and punch you in the face
⚠️
Microsoft Launches Zero-Day Quest Hacking Contest with Rewards Up to $5 Million
⚠️
CISA bringt Open-Source-Plattform für digitale Forensik
⚠️
ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections
⚠️
Over 10,000 Malicious TikTok Shop Domains Target Users with Malware and Credential Theft
⚠️
CISA Releases Two Industrial Control Systems Advisories
⚠️
U.S. Treasury Warns Crypto ATMs Are Aiding Criminal Activity
⚠️
Microsoft Bounty Program year in review: $17 million in rewards
⚠️
Adobe issues emergency fixes for AEM Forms zero-days after PoCs released
⚠️
Warning: New Phishing Campaign Targets Instagram Users
⚠️
Potential SSL VPN Zero-Day vulnerability impacting Gen 7 SonicWall Firewalls
⚠️
Pandora confirms data breach amid ongoing Salesforce data theft attacks
⚠️
SparkRAT: Exploiting Architectural Weaknesses in Open-Source Offensive Tools
⚠️
ESET Threat Report H1 2025: ClickFix, infostealer disruptions, and ransomware deathmatch
📢
HPE security advisory (AV25-477)
📢
IBM security advisory (AV25-478)
📢
Dell security advisory (AV25-479)
📢
Ubuntu security advisory (AV25-480)
📢
[Control systems] CISA ICS security advisories (AV25-481)
📢
Android security advisory – August 2025 monthly rollup (AV25-482)
📢
Red Hat security advisory (AV25-483)
📢
Google Chrome security advisory (AV25-484)
📢
Comp AI Raises $2.6M to Streamline and Disrupt the SOC 2 Market
📢
Risk Management Said “Hold My Beer” 🍺
🔥
How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents
🔥
Ransomware groups shift to quadruple extortion to maximize pressure - Help Net Security
🔥
Elevate your protection with expanded Microsoft Defender Experts coverage
🔥
Kimsuky APT Uses LNK Files to Deploy Reflective Malware and Evade Windows Defender
🔥
ClickTok: The SparkKitty Drop on TikTok Shops
🔥
Welcoming Guardio to Have I Been Pwned's Partner Program
🔥
PBS confirms data breach after employee info leaked on Discord servers
🕵️
ISC Stormcast For Tuesday, August 5th, 2025 https://isc.sans.edu/podcastdetail/9556, (Tue, Aug 5th)
🕵️
Chollima APT Group Targets Job Seekers and Organizations with JavaScript-Based Malware
🕵️
Connect and corrupt: C++ coroutines prone to code-reuse attack despite control flow integrity
🕵️
New Android Malware Poses as SBI Card and Axis Bank Apps to Steal Financial Data
🕵️
Surveilling Your Children with AirTags
🕵️
Vibe Coding: When Everyone’s a Developer, Who Secures the Code?
🕵️
Approov Raises $6.7 Million for Mobile App Security
🕵️
Black Hat USA 2025 – Summary of Vendor Announcements (Part 1)
🕵️
TSMC-Mitarbeiter unter Spionageverdacht festgenommen
🕵️
APT36 Targets Indian Government: Credential Theft Campaign Uncovered
🕵️
Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives
🕵️
LegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Code
🕵️
CyberheistNews Vol 15 #31 [Heads Up] Malicious M365 Connectors Put 300M Accounts at Risk
🕵️
SHARED INTEL Q&A: From alert to fix — Gomboc brings trusted AI to Infrastructure-as-Code
🕵️
“Genie in a Bottle” or Google’s AI Assistant?
🕵️
Microsoft’s Project Ire Autonomously Reverse Engineers Software to Find Malware
🕵️
Would You Survive a Cyber Defense Gauntlet? 😰
🕵️
How Georgia Department of Transportation Is Building Cyber Resilience
🕵️
From Dresses to Cybersecurity: Her Unexpected Journey
🕵️
ClickFix Social Engineering is Becoming More Popular
🕵️
Wait… GitHub Is Authorizing Cloud Actions?
🕵️
LLMs in Cybersecurity: Smart or Dangerous?
🕵️
SOC: Cost center or profit machine?
🕵️
Security Risk Advisors Launches SCALR AI for Fast-Track Agentive AI Enablement
🕵️
MFA Bypass, SonicWall, BIOS Shade, Sex Toys, FBI Warning, Claude v GPT-5, Josh Marpet - SWN #500
🕵️
Service Plan or Cease & Desist? VMware’s 2025 Update
📡
Phishing attack on PyPi and AMO developers | Kaspersky official blog