66Articles
7Categories
2025-08-18Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation.  CVE-2025-54948 Trend Micro Apex One OS Command Injection Vulnerability These types of vulnerabilities are frequent attack vectors for malici…
KEV
🐛
Rockwell ControlLogix Ethernet Vulnerability Exposes Systems to Remote Code Execution
🐛
Critical PostgreSQL Flaws Allow Code Injection During Restoration
🐛
UK’s Colt hit by cyberattack, support systems offline amid ransom threat
KEV
🐛
Hundreds of N-able N-central Instances Affected by Exploited Vulnerabilities
🐛
Linux Kernel Netfilter Flaw Enables Privilege Escalation
🐛
Technical Details of SAP 0-Day Exploitation Script for RCE Revealed
🐛
Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware
🐛
Threat Actors Exploit Microsoft Help Index File to Deploy PipeMagic Malware
⚠️
Breaking Cybersecurity News: Canada's House of Commons Breached and Windows 10 Support Ending Soon
⚠️
Hundreds of TeslaMate Servers Expose Real-Time Vehicle Data
⚠️
Agentic AI promises a cybersecurity revolution — with asterisks
⚠️
HR giant Workday discloses data breach amid Salesforce attacks
⚠️
Scammers Target Back-to-School Deals, Diverting Shoppers to Fraud Sites
⚠️
Workday Data Breach Exposes HR Records via Third-Party CRM Hack
⚠️
25% of security leaders replaced after ransomware attack
⚠️
Rethinking risk based vulnerability management, Black Hat expo insights, and the news ... - ESW #420
⚠️
North Korean Hackers’ Secret Linux Malware Surfaces Online
⚠️
Workday Data Breach Bears Signs of Widespread Salesforce Hack
⚠️
Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks
⚠️
DoJ Seizes $2.8M in Crypto from Zeppelin Ransomware Group
⚠️
Bragg Confirms Cyberattack, Internal IT Systems Breached
⚠️
⚡ Weekly Recap: NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More
⚠️
A Practical Guide to the European Union’s Cybersecurity Funding for SMEs
⚠️
Threat Actors Exploit Telegram as the Communication Channel to Exfiltrate Stolen Data
⚠️
FBI: This Common Security Habit Is Now Dangerous
⚠️
Over 800 N-able servers left unpatched against critical flaws
KEV
⚠️
ERMAC Android malware source code leak exposes banking trojan infrastructure
⚠️
CVEs = Unplanned Work? Here’s How to Make Every Fix Count ⚡
⚠️
Allianz Life - 1,115,061 breached accounts
⚠️
Dissecting PipeMagic: Inside the architecture of a modular backdoor framework
📢
Wazuh for Regulatory Compliance
📢
Dell security advisory (AV25-522)
📢
[Control systems] CISA ICS security advisories (AV25-523)
📢
Ubuntu security advisory (AV25-524)
📢
Microsoft Edge security advisory (AV25-526)
📢
Red Hat security advisory (AV25-527)
📢
IBM security advisory (AV25-525)
📢
Blue Locker Ransomware Launches Targeted Attacks on the Oil and Gas Sector in Pakistan
🔥
US Seizes $2.8 Million From Zeppelin Ransomware Operator
🔥
New Ghost-Tapping Attacks Target Apple Pay and Google Pay Users’ Linked Cards
🔥
HR giant Workday says hackers stole personal data in recent breach
🔥
Why Psychological Safety Is Your Best Defense Against Cyberattacks
🔥
Keeping an Eye on MFA-Bombing Attacks, (Mon, Aug 18th)
🔥
UK sentences “serial hacker” of 3,000 sites to 20 months in prison
🔥
Allianz Life data breach affects 1.1 million customers
🕵️
ISC Stormcast For Monday, August 18th, 2025 https://isc.sans.edu/podcastdetail/9574, (Mon, Aug 18th)
🕵️
The AI-Powered Trojan Horse Returns: How LLMs Revive Classic Cyber Threats
🕵️
Web Hosting Firms in Taiwan Attacked by Chinese APT for Access to High-Value Targets
🕵️
CRITICAL INSIGHT Q&A: The high-stakes push to safeguard ‘FirstNet’ broadband spectrum
🕵️
Eavesdropping on Phone Conversations Through Vibrations
🕵️
SHARED INTEL Q&A: Rethinking Zero Trust to close the widening gap on file-borne threats
🕵️
Unternehmen zu lax bei KI-Sicherheit
🕵️
Celebrating KnowBe4's 6th Consecutive TrustRadius Tech Cares Award
🕵️
Google's 'AI Overview' Pointed Him to a Customer Service Number. It Was a Scam - Slashdot
🕵️
Novel 5G Attack Bypasses Need for Malicious Base Station
🕵️
How to Survive the 2025 Cybersecurity Budget Freeze
🕵️
Weaponized Python Package “termncolor” Uses Windows Run Key for Persistence
🕵️
Inside the Mind of a Non-Compliant Scraper
🕵️
Threat Actors Use Pirated Games to Bypass Microsoft Defender SmartScreen and Adblockers
🕵️
XenoRAT malware campaign hits multiple embassies in South Korea
📡
A parent’s guide to keeping a child blogger safe | Kaspersky official blog
📡
Microsoft: Recent Windows updates may fail to install via WUSA
📡
Mozilla warns Germany could soon declare ad blockers illegal
📡
Nebraska man gets 1 year in prison for $3.5M cryptojacking scheme
📡
Investors beware: AI-powered financial scams swamp social media