110Articles
8Categories
2025-08-07Date
๐Ÿ›
Researchers uncover RCE attack chains in popular enterprise credential vaults
๐Ÿ›
New Microsoft Exchange Server Vulnerability Allows Unauthorized Admin Privilege Escalation
๐Ÿ›
Akamai Ghost Platform Flaw Allows Hidden Second Request Injection
๐Ÿ›
HashiCorp Vault & CyberArk Conjur kompromittiert
๐Ÿ›
Organizations Warned of Vulnerability in Microsoft Exchange Hybrid Deployment
๐Ÿ›
Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups
๐Ÿ›
SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day
๐Ÿ›
CISA Warns of โ€˜ToolShellโ€™ Exploitation Chain Targeting SharePoint Servers; IOCs and Detections Released
๐Ÿ›
CISA Issues ED 25-02: Mitigate Microsoft Exchange Vulnerability
๐Ÿ›
Hybrid Exchange environment vulnerability needs fast action
๐Ÿ›
CISA orders fed agencies to patch new Exchange flaw by Monday
๐Ÿ›
Chromium: CVE-2025-8582 Insufficient validation of untrusted input in DOM
๐Ÿ›
Chromium: CVE-2025-8581 Inappropriate implementation in Extensions
๐Ÿ›
Chromium: CVE-2025-8580 Inappropriate implementation in Filesystems
๐Ÿ›
Chromium: CVE-2025-8578 Use after free in Cast
๐Ÿ›
Chromium: CVE-2025-8576 Use after free in Extensions
๐Ÿ›
Chromium: CVE-2025-8583 Inappropriate implementation in Permissions
๐Ÿ›
Chromium: CVE-2025-8579 Inappropriate implementation in Gemini Live in Chrome
๐Ÿ›
Chromium: CVE-2025-8577 Inappropriate implementation in Picture In Picture
๐Ÿ›
CVE-2025-53792 Azure Portal Elevation of Privilege Vulnerability
๐Ÿ›
CVE-2025-53767 Azure OpenAI Elevation of Privilege Vulnerability
๐Ÿ›
CVE-2025-53774 Microsoft 365 Copilot BizChat Information Disclosure Vulnerability
๐Ÿ›
CVE-2025-53787 Microsoft 365 Copilot BizChat Information Disclosure Vulnerability
โš ๏ธ
Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft
โš ๏ธ
Durch Datenlecks verursachte Kosten sind gefallen
โš ๏ธ
IT-Security-Jobs โ€“ 5 bittere Wahrheiten
โš ๏ธ
Beef up AI security with zero trust principles
โš ๏ธ
Googleโ€™s Salesforce Environment Compromised โ€“ User Information Exfiltrated
โš ๏ธ
Hackers Exploit Social Engineering to Gain Remote Access in Just 5 Minutes
โš ๏ธ
WhatsApp Removes 6.8 Million Accounts Over Malicious Activity Concerns
โš ๏ธ
HTTP/1.1 Vulnerability Could Let Attackers Hijack Millions of Sites
โš ๏ธ
6 ways hackers hide their tracks
โš ๏ธ
Microsoft warns of high-severity flaw in hybrid Exchange deployments
โš ๏ธ
HeartCrypt-Packed โ€˜AVKillerโ€™ Tool Actively Deployed in Ransomware Attacks to Disable EDR
โš ๏ธ
New Active Directory Attack Method Bypasses Authentication to Steal Data
โš ๏ธ
Air France and KLM disclose data breaches impacting customers
โš ๏ธ
โ€˜Ghost Callsโ€™ Attack Exploits Web Conferencing as Hidden Command-and-Control Channel
โš ๏ธ
Cracking the Vault: how we found zero-day flaws in authentication, identity, and authorization in HashiCorp Vault
โš ๏ธ
โ€˜We too were breached,โ€™ says Google, months after revealing Salesforce attacks
โš ๏ธ
Air France, KLM Say Hackers Accessed Customer Data
โš ๏ธ
Project Ire: Microsoftโ€™s autonomous AI agent that can reverse engineer malware
โš ๏ธ
Hackers Exploit Legitimate Drivers to Disable Antivirus and Weaken System Defenses
โš ๏ธ
Gemini AI Exploited via Google Invite Prompt Injection to Steal Sensitive User Data
โš ๏ธ
6,500 Axis Servers Expose Remoting Protocol, 4,000 in U.S. Vulnerable to Exploits
โš ๏ธ
Weaponizing Microsoft 365 Direct Send to Bypass Email Security Defenses
โš ๏ธ
Google suffers data breach in ongoing Salesforce data theft attacks
โš ๏ธ
Weaponized npm Packages Target WhatsApp Developers with Remote Kill Switch
โš ๏ธ
SonicWall finds no SSLVPN zero-day, links ransomware attacks to 2024 flaw
โš ๏ธ
CISA Releases Ten Industrial Control Systems Advisories
โš ๏ธ
SonicWall Says Recent Attacks Donโ€™t Involve Zero-Day Vulnerability
โš ๏ธ
Hackers Exploit SVG Files with Embedded JavaScript to Deploy Malware on Windows Systems
โš ๏ธ
CISA issues emergency directive requiring federal agencies to update systems to prevent Microsoft Exchange vulnerability
โš ๏ธ
HashiCorp Vault 0-Day Flaws Enable Remote Code Execution Attacks
โš ๏ธ
FBI Report: Attackers Are Sending Physical Packages with Malicious QR Codes
๐Ÿ“ข
Windows tips for reducing the ransomware threat
๐Ÿ“ข
Microsoft Exchange security advisory (AV25-490)
๐Ÿ“ข
Black Hat USA 2025: Policy compliance and the myth of the silver bullet
๐Ÿ”ฅ
Akira ransomware abuses CPU tuning tool to disable Microsoft Defender
๐Ÿ”ฅ
SocGholish Uses Parrot and Keitaro TDS to Spread Malware via Fake Updates
๐Ÿ”ฅ
Data breach at French telecom giant Bouygues affects millions of customers
๐Ÿ”ฅ
KLM Confirms Customer Data Breach Linked to Third-Party System
๐Ÿ”ฅ
Ukraine claims to have hacked secrets from Russia's newest nuclear submarine
๐Ÿ”ฅ
Makop Ransomware Identified in Attacks in South Korea - ASEC
๐Ÿ”ฅ
If Frameworks Are So Secure... Why Do We Still Get Hacked?
๐Ÿ”ฅ
Bouygues Telecom confirms data breach impacting 6.4 million customers
๐Ÿ”ฅ
New EDR killer tool used by eight different ransomware groups
๐Ÿ”ฅ
Splunk Unveils PLoB Tool to Detect Compromised Credential Usage
๐Ÿ”ฅ
SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others
๐Ÿ”ฅ
10 Best Red Teaming Companies for Advanced Attack Simulation in 2025
๐Ÿ”ฅ
Devices Are Attacking - PSW #886
KEV
๐Ÿ”ฅ
The Shocking Truth About Double Ransom Attacks
๐Ÿ”ฅ
Tapjacking: How A Simple Click Can Destroy Your Data!
๐Ÿ•ต๏ธ
Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams
๐Ÿ•ต๏ธ
Mass Internet Scanning from ASN 43350 [Guest Diary], (Thu, Aug 7th)
๐Ÿ•ต๏ธ
ISC Stormcast For Thursday, August 7th, 2025 https://isc.sans.edu/podcastdetail/9560, (Thu, Aug 7th)
๐Ÿ•ต๏ธ
News alert: SpyCloudโ€™s AI-powered platform mimics veteran analysts, speeds threat detection
๐Ÿ•ต๏ธ
Nvidia Denies Presence of Backdoors, Kill Switches, or Spyware in Its Chips
๐Ÿ•ต๏ธ
New HTTP Request Smuggling Attacks Impacted CDNs, Major Orgs, Millions of Websites
๐Ÿ•ต๏ธ
China Accuses Nvidia of Putting Backdoors into Their Chips
๐Ÿ•ต๏ธ
AccuKnox partners with SecuVerse.ai to deliver Zero Trust CNAPP Security for National Gaming Infrastructure
๐Ÿ•ต๏ธ
MY TAKE: The GenAI security crisis few can see โ€” but these startups are quietly mapping the gaps
๐Ÿ•ต๏ธ
IRGC-Linked Hackers Target Financial, Government, and Media Organizations
๐Ÿ•ต๏ธ
Anatomy of a Vishing Scam
๐Ÿ•ต๏ธ
Black Hat USA 2025 โ€“ Summary of Vendor Announcements (Part 3)
๐Ÿ•ต๏ธ
Why GitHub Actions Are a Cybersecurity Game-Changer
๐Ÿ•ต๏ธ
GenAI Used to Impersonate Brazilโ€™s Govt Websites | ThreatLabz
๐Ÿ•ต๏ธ
Shared secret: EDR killer in the kill chain โ€“ Sophos News
๐Ÿ•ต๏ธ
ScarCruft Hacker Group Launches New Rust-Based Malware Attack Leveraging PubNub
๐Ÿ•ต๏ธ
Hacker Extradited to U.S. for $2.5 Million Tax Fraud Scheme
๐Ÿ•ต๏ธ
Announcing public preview: Phishing triage agent in Microsoft Defender
๐Ÿ•ต๏ธ
This is Why Tech Makes Money But Solves Nothing
๐Ÿ•ต๏ธ
Risk Velocity EXPLAINED in 15 Seconds! โšก
๐Ÿ•ต๏ธ
Fake News at Lightspeed!
๐Ÿ•ต๏ธ
How Machine Learning Detects Living off the Land (LotL) Attacks
๐Ÿ•ต๏ธ
Is Cybercrime the Next Big Investment? ๐Ÿ˜ณ
๐Ÿ•ต๏ธ
Who's Still Making Money in Crypto? ๐Ÿค”
๐Ÿ•ต๏ธ
HTTP/1.1 Must Die: What This Means for AppSec Leadership
๐ŸŒ
Webinar: How to Stop Python Supply Chain Attacksโ€”and the Expert Tools You Need
๐ŸŒ
UEBA rules in Kaspersky SIEM | Kaspersky official blog
๐ŸŒ
Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes
๐ŸŽ™๏ธ
Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow?
๐Ÿ“ก
Microsoft accidentally confirms GPT-5, GPT-5-Mini, GPT-5-Nano ahead of launch
๐Ÿ“ก
Massive IPTV piracy service with 28,000 channels taken offline
๐Ÿ“ก
Anthropic targets DevSecOps with Claude Code update as AI rivals gear up
๐Ÿ“ก
Cryptomixer founders pled guilty to laundering money for cybercriminals
๐Ÿ“ก
The AI-Powered Security Shift: What 2025 Is Teaching Us About Cloud Defense
๐Ÿ“ก
Wave of 150 crypto-draining extensions hits Firefox add-on store
๐Ÿ“ก
ChatGPT's GPT-5 models released: everything you need to know
๐Ÿ“ก
Sophos AI at Black Hat USA โ€™25: Anomaly detection betrayed us, so we gave it a new job
๐Ÿ“ก
Fake WhatsApp developer libraries hide destructive data-wiping code