112Articles
8Categories
2025-08-06Date
🚨
CISA Adds 3 D-Link Router Flaws to KEV Catalog After Active Exploitation ReportsThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three old security flaws impacting D-Link routers to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation in the wild. The high-severity vulnerabilities, which…
KEV
🚨
CISA Releases Malware Analysis Report Associated with Microsoft SharePoint VulnerabilitiesCISA published a Malware Analysis Report (MAR) with analysis and associated detection signatures on files related to Microsoft SharePoint vulnerabilities: CVE-2025-49704 [ CWE-94: Code Injection ], CVE-2025-49706 [ CWE-287: Improper Authentication ], CVE-2025-53770 [ CWE-502: Des…
KEV
🐛
MCPoison Attack Abuses Cursor IDE to Run Arbitrary System Commands
🐛
Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems
KEV
🐛
Akira affiliates abuse legitimate Windows drivers to evade detection in SonicWall attacks
🐛
MAR-251132.c1.v1 Exploitation of SharePoint Vulnerabilities
🐛
CVE-2025-53786 Microsoft Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability
🐛
ReVault flaws let attackers bypass Windows login or place malware implants on Dell laptops
🐛
Microsoft Releases Guidance on High-Severity Vulnerability (CVE-2025-53786) in Hybrid Exchange Deployments
⚠️
Wie Model Context Protocol gehackt wird
⚠️
CISA Alerts on Ongoing Exploits Targeting D-Link Device Vulnerabilities
KEV
⚠️
Millions of Dell PCs at Risk from Broadcom Vulnerability Enabling Remote Hijack
⚠️
How cybersecurity leaders are securing AI infrastructures
⚠️
Cybersecurity Threats and Trends: From North Korean Spies to AI-Driven Attacks
⚠️
Trend Micro Apex One Hit by Actively Exploited RCE Vulnerability
KEV
⚠️
CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures
⚠️
Adobe AEM Forms 0-Day Vulnerability Allows Attackers to Run Arbitrary Code
⚠️
Chinese Hackers Breach Exposes 115 Million U.S. Payment Cards
⚠️
Say Easy, Do Hard - AI Governance in the Supply Chain - Nick Mistry, Richard Bird - BSW #407
⚠️
Adobe Issues Out-of-Band Patches for AEM Forms Vulnerabilities With Public PoC
⚠️
Chinese Hackers Exploit SharePoint Flaws to Deploy Backdoors, Ransomware, and Loaders
⚠️
Trend Micro warns of Apex One zero-day exploited in attacks
KEV
⚠️
Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks
⚠️
Rockwell Arena Simulation Flaws Allow Remote Execution of Malicious Code
⚠️
Pandora Jewellery Hit by Cyberattack, Customer Data Compromised
⚠️
Google says hackers stole its customers’ data in a breach of its Salesforce database
⚠️
SpyCloud Enhances Investigations Solution with AI-Powered Insights – Revolutionizing Insider Threat and Cybercrime Analysis
⚠️
Pandora confirms data breach amid ongoing Salesforce data theft attacks
⚠️
Fake Antivirus App Delivers LunaSpy Malware to Android Devices
⚠️
WhatsApp Adds Security Feature to Help Users Spot and Avoid Malicious Messages
⚠️
Google suffers data breach in ongoing Salesforce data theft attacks
⚠️
MFA matters… But it isn’t enough on its own
⚠️
ReVault! When your SoC turns against you…
⚠️
Trend Micro Patches Apex One Vulnerabilities Exploited in Wild
KEV
⚠️
UAC-0099 Hackers Weaponize HTA Files to Deploy MATCHBOIL Loader Malware
⚠️
Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks
⚠️
New Ghost Calls tactic abuses Zoom and Microsoft Teams for C2 operations
⚠️
Google Discloses Salesforce Hack
⚠️
Google suffers data breach in ongoing Salesforce data theft attacks
⚠️
Adobe issues emergency fixes for AEM Forms zero-days after PoCs released
⚠️
Black Hat Fireside Chat: Inside the ‘Mind of a Hacker’ — A10’s plan for unified threat detection
⚠️
ClickOnce Just Got Weaponized...
⚠️
Threat Actors Exploit Smart Contracts to Drain Over $900K from Crypto Wallets
⚠️
Akira and Lynx Ransomware Target MSPs Using Stolen Credentials and Exploited Vulnerabilities
⚠️
Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities
⚠️
Why Hackers Don’t Need Viruses Anymore
⚠️
Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation
⚠️
CISA Issues Alert on Vulnerability affecting Microsoft Exchange
⚠️
SparkRAT: Exploiting Architectural Weaknesses in Open-Source Offensive Tools
⚠️
SparkRAT: Exploiting Architectural Weaknesses in Open-Source Offensive Tools
⚠️
Risky Business #801 -- AI models can hack well now and it's weirding us out
📢
The Semiconductor Industry and Regulatory Compliance
📢
Threat Actors Weaponizing RMM Tools to Gain System Control and Exfiltrate Data
📢
AI Slashes Workloads for vCISOs by 68% as SMBs Demand More – New Report Reveals
📢
Adobe security advisory (AV25-485)
📢
Who Got Arrested in the Raid on the XSS Crime Forum?
📢
HPE security advisory (AV25-486)
📢
Sophisticated DevilsTongue Spyware Tracks Windows Users Worldwide
📢
Trend Micro security advisory (AV25-487)
📢
Cisco security advisory (AV25-488)
📢
Splunk security advisory (AV25-489)
📢
Wait...Cybersecurity Makes You Money? 💰
🔥
PBS confirms data breach after employee info leaked on Discord servers
🔥
Cisco User Data Stolen in Vishing Attack
🔥
Over 1 Million Impacted by DaVita Data Breach
🔥
Rapid Breach: Social Engineering to Remote Access in 300 Seconds | NCC Group
🔥
Beyond Traditional Defenses: Why French Cyber Resilience Needs to Improve
🔥
How to Build Security BEFORE the First Line of Code
🔥
Ukraine claims to have hacked secrets from Russia’s newest nuclear submarine
🔥
Why Hardcoded Tokens Are a Cybersecurity Nightmare!
🔥
Ransomware plunges insurance company into bankruptcy
🔥
Social Engineering Attacks Surged in the First Half of 2025
🔥
Akira ransomware abuses CPU tuning tool to disable Microsoft Defender
🕵️
ISC Stormcast For Wednesday, August 6th, 2025 https://isc.sans.edu/podcastdetail/9558, (Wed, Aug 6th)
🕵️
10 Best IT Asset Management Tools in 2025
🕵️
Microsoft unveils Project Ire, a prototype AI system that can reverse engineer and identify malicious software autonomously, without human assistance
🕵️
Black Hat USA 2025 – Summary of Vendor Announcements (Part 2)
🕵️
Threat Actors Poison Bing Search Results to Distribute Bumblebee Malware via ‘ManageEngine OpManager’ Queries
🕵️
Flaws Expose 100 Dell Laptop Models to Implants, Windows Login Bypass
🕵️
ReVault flaws let hackers bypass Windows login on Dell laptops
🕵️
Cybersecurity Services, Solutions & Products. Global Provider | Group-IB
🕵️
Portkey Fortifies Its AI Gateway with the Prisma AIRS Platform
🕵️
Smart Contract Scams | Ethereum Drainers Pose as Trading Bots to Steal Crypto | SentinelOne
🕵️
Ox Security Launches AI Agent That Auto-Generates Code to Fix Vulnerabilities
🕵️
What are You Working on Wednesday
🕵️
Microsoft Paid Out $17 Million in Bug Bounties in Past Year
🕵️
CAPTCHAgeddon: Fake CAPTCHA Used in New ClickFix Attack to Deploy Malware Payload
🕵️
Kimsuky APT Uses LNK Files to Deploy Reflective Malware and Evade Windows Defender
🕵️
Threat Actors Use GenAI to Launch Phishing Attacks Mimicking Government Websites
🕵️
WhatsApp Takes Down 6.8 Million Accounts Linked to Criminal Scam Centers, Meta Says
🕵️
PLoB: A Behavioral Fingerprinting Framework to Hunt for Malicious Logins
🕵️
Do You Trust AI to Write Secure Code? 😳
🕵️
Sharing practical guidance: Launching Microsoft Secure Future Initiative (SFI) patterns and practices
🕵️
AI Tools Are Just SOAR 2.0?! 😳
🕵️
Gov+
🕵️
Mustang Panda Targets Windows Users with ToneShell Malware Disguised as Google Chrome
🕵️
How AI Is Changing Your Role – Forever.
🕵️
Lazarus Hackers Use Fake Camera/Microphone Alerts to Deploy PyLangGhost RAT
🕵️
This AI Clicks EVERYTHING… Including Malicious Links 😬
🌐
LunaSpy hides as a spyware antivirus on Android | Kaspersky official blog
🌐
Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools
📡
AI Is Transforming Cybersecurity Adversarial Testing - Pentera Founder’s Vision
📡
Microsoft pays record $17 million in bounties over the last 12 months
📡
Do sextortion scams still work in 2025?, (Wed, Aug 6th)
📡
WhatsApp adds new security feature to protect against scams
📡
Hospital fined after patient data found in street food wrappers
📡
Final call: TechCrunch Disrupt 2025 ticket savings end tonight
📡
National Bank of Canada online systems down due to 'technical issue'
📡
Shared secret: EDR killer in the kill chain
📡
Citizen Lab director warns cyber industry about US authoritarian descent
📡
Hacker extradited to US for stealing $3.3 million from taxpayers
📡
A rival Tea app for men is leaking its users’ personal data and driver’s licenses