80Articles
8Categories
2025-08-14Date
🚨
CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities CatalogThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting N-able N-central to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.  N-able N-central is a Remote Monitoring and Manage…
KEV
🐛
CISA Alerts on N-able N-Central Deserialization and Injection Flaw Under Active Exploitation
KEV
🐛
Critical WordPress Plugin Vulnerability Puts 70,000+ Sites at Risk of Remote Code Execution
🐛
EncryptHub Turns Brave Support Into a Dropper; MMC Flaw Completes the Run
🐛
Microsoft fixes "BadSuccessor" Kerberos vulnerability (CVE-2025-53779) - Help Net Security
🐛
Microsoft IIS Web Deploy Vulnerability Allows Remote Code Execution
🐛
CISA Warns of Attacks Exploiting N-able Vulnerabilities
🐛
Flaws in a pair of Grafana plugins could hand over DevOps control
🐛
Fortinet patches critical flaw with public exploit in FortiSIEM
⚠️
Xerox FreeFlow Core Vulnerability Allows Remote Code Execution — PoC Now Public
⚠️
Proxyware Campaign Piggybacks on Popular YouTube Video Download Services
⚠️
7 reasons the SOC is in crisis — and 5 steps to fix it
⚠️
CISA warns of N-able N-central flaws exploited in zero-day attacks
⚠️
Attackers Need Just One Vulnerability to Own Your Rooted Android
⚠️
Simple Steps for Attack Surface Reduction
⚠️
Windows Out-of-Box-Experience Flaw Enables Full Administrative Command Prompt Access
⚠️
‘AI Induced Destruction’ – How AI Misuse is Creating New Attack Vectors
⚠️
‘MadeYouReset’ HTTP2 Vulnerability Enables Massive DDoS Attacks
⚠️
New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits
⚠️
Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws
⚠️
Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild
⚠️
Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution
⚠️
When Theft Replaces Encryption: Blue Report 2025 on Ransomware & Infostealers
⚠️
New HTTP/2 'MadeYouReset' Vulnerability Enables Large-Scale DoS Attacks
⚠️
Hackers Exploit Microsoft Flaw to Breach Canadian House of Commons to Gain Unauthorized Access
⚠️
CISA Releases Thirty-Two Industrial Control Systems Advisories
⚠️
Over $300 million in cybercrime crypto seized in anti-fraud effort
⚠️
Hackberry PIs and Other Hacker Things - PSW #887
⚠️
For $40, you can buy stolen police and government email accounts
⚠️
FIDO undermined
⚠️
Multiple Vulnerabilities in Fortinet Products Could Allow for Remote Code Execution
📋
Microsoft fixes Windows Server bug causing cluster, VM issues
📢
CISA Publishes Operational Technology Guide for Critical Infrastructure Stakeholders
📢
Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS
📢
SolarWinds security advisory (AV25-512)
📢
[Control systems] ABB security advisory (AV25-513)
📢
Drupal security advisory (AV25-514)
📢
Palo Alto Networks security advisory (AV25-515)
📢
ServiceNow security advisory (AV25-516)
📢
Threat Actors Leverage CrossC2 to Extend Cobalt Strike to Linux and macOS
📢
N-able security advisory (AV25-517)
🔥
FIDO ausgehebelt
🔥
Crypto24 Ransomware Group Blends Legitimate Tools with Custom Malware for Stealth Attacks
🔥
Splunk Publishes Defender’s Guide to Spot ESXi Ransomware Early
🔥
LLM Coding Integrity Breach
🔥
Pennsylvania attorney general's email, site down after cyberattack
🔥
Canada’s House of Commons investigating data breach after cyberattack
🔥
Qilin Ransomware Dominates July with Over 70 Claimed Victims
🔥
Hackers Just Used Steam to Drop This Stealer 😬
🔥
Crypto24 ransomware hits large orgs with custom EDR evasion tool
🔥
Ransomware Actors Combine Legitimate Tools with Custom Malware to Evade Detection
🔥
Why “MVP” Can Mean “Most Vulnerable Product”
🔥
LLMs: Productivity Boost or Security Threat? ⚔️
🕵️
AI and Faster Attack Analysis [Guest Diary], (Wed, Aug 13th)
🕵️
ISC Stormcast For Thursday, August 14th, 2025 https://isc.sans.edu/podcastdetail/9570, (Thu, Aug 14th)
🕵️
Passkey Login Bypassed via WebAuthn Process Manipulation
🕵️
FireWood Malware Targets Linux Systems for Command Execution and Data Theft
🕵️
Palo Alto Networks Leads the Way with Quantum and Multicloud Security
🕵️
Securing the Quantum Age
🕵️
Major HTTP flaw puts 24 million websites at risk​ | Cybernews
🕵️
Data leak could cut electricity to Mexico | Cybernews
🕵️
Cybersecurity Warning: QR Codes Are a Gamble!
🕵️
Malvertising campaign leads to PS1Bot, a multi-stage malware framework
🕵️
Booking.com phishing campaign uses sneaky 'ん' character to trick you
🕵️
Why Would You Send Heroin to Grandma’s House?!
🕵️
Pro-Russian hackers blamed for water dam sabotage in Norway
🕵️
Threat Actors Use Advanced Tactics to Personalize Phishing for Malware Delivery
🕵️
Google Mandates License or Certification for Crypto App Developers
🕵️
New NFC-Based PhantomCard Malware Targets Android Banking Users
🕵️
When Banks Go Digital… Who’s in Control? 😨
🕵️
Psychological Safety: The Missing Link in Security
🕵️
PS1Bot: Multi-Stage Malware Framework Targeting Windows Systems
🕵️
Norway spy chief blames Russian hackers for hijacking dam
🕵️
Builder vs. Breaker: My Cybersecurity Reality Check
🕵️
Inside the World’s Biggest Click Farm Operation
📡
Microsoft fixes Windows 11 24H2 updates failing with 0x80240069 error
📡
Google Requires Crypto App Licenses in 15 Regions as FBI Warns of $9.9M Scam Losses
📡
How AI can help plan your vacation | Kaspersky official blog
📡
Leak: OpenAI's browser will use ChatGPT Agent to control the browser
📡
Have You Turned Off Your Virtual Oven?