80Articles
9Categories
2025-08-21Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation.  CVE-2025-43300 Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability These types of vulnerabilities are frequent attack vectors for…
KEV
🐛
Apple Patches CVE-2025-43300 Zero-Day in iOS, iPadOS, and macOS Exploited in Targeted Attacks
🐛
Critical Flaw in Apache Tika PDF Parser Exposes Sensitive Data to Attackers
🐛
QUIC-LEAK Vulnerability Allows Attackers to Drain Server Memory and Cause DoS
🐛
Russian APT Exploiting 7-Year-Old Cisco Vulnerability: FBI
🐛
Russian hackers exploit old Cisco flaw to target global enterprise networks
🐛
Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks
🐛
Critical N-central RMM flaws actively exploited in the wild
KEV
🐛
Chromium: CVE-2025-9132 Out of bounds write in V8
🐛
CVE-2025-53763 Azure Databricks Elevation of Privilege Vulnerability
🐛
CVE-2025-53795 Microsoft PC Manager Elevation of Privilege Vulnerability
🐛
CVE-2025-55230 Windows MBT Transport Driver Elevation of Privilege Vulnerability
🐛
CVE-2025-55229 Windows Certificate Spoofing Vulnerability
🐛
CVE-2025-55231 Windows Storage-based Management Service Remote Code Execution Vulnerability
🐛
Threat Actors Exploiting Victims’ Machines for Bandwidth Monetization
⚠️
PromptFix Exploit Forces AI Browsers to Execute Hidden Malicious Commands
⚠️
Europol Says Qilin Ransomware Reward Fake
⚠️
Apple Confirms Critical 0-Day Under Active Attack – Immediate Update Urged
KEV
⚠️
Orange Belgium discloses data breach impacting 850,000 customers
⚠️
Enterprise passwords becoming even easier to steal and abuse
KEV
⚠️
CISA Issues Four ICS Advisories on Vulnerabilities and Exploits
⚠️
Apple Patches Zero-Day Exploited in Targeted Attacks
⚠️
MITM6 + NTLM Relay Attack Enables Full Domain Compromise
⚠️
New Campaign Uses Active Directory Federation Services to Steal M365 Credentials
⚠️
Weak Passwords and Compromised Accounts: Key Findings from the Blue Report 2025
⚠️
Jim Sanborn Is Auctioning Off the Solution to Part Four of the Kryptos Sculpture
⚠️
Commvault Backup Suite Flaws Allow Attackers to Breach On-Premises Systems
⚠️
Microsoft restricts Chinese firms’ access to vulnerability warnings after hacking concerns
⚠️
Hackers can slip ghost commands into the Amazon Q Developer VS Code Extension
⚠️
A phishing scam targeting Ledger users | Kaspersky official blog
⚠️
FBI warns of Russian hackers exploiting 7-year-old Cisco flaw
⚠️
Hackers Using New QuirkyLoader Malware to Spread Agent Tesla, AsyncRAT and Snake Keylogger
⚠️
Russian Hackers Exploit 7-Year-Old Cisco Flaw to Steal Industrial System Configs
⚠️
High-Severity Mozilla Flaws Allow Remote Code Execution
⚠️
FBI Warns Russian State Hackers Targeting Critical Infrastructure Networking Devices
⚠️
Why Certified VMware Pros Are Driving the Future of IT
⚠️
Paper Werewolf Exploits WinRAR Zero-Day Vulnerability to Deliver Malware
⚠️
CISA Releases Three Industrial Control Systems Advisories
⚠️
Threat Actors Abuse Internet Archive to Host Stealthy JScript Loader
⚠️
Think before you Click(Fix): Analyzing the ClickFix social engineering technique
⚠️
Warlock Ransomware Exploits SharePoint Flaws for Initial Access and Credential Theft
⚠️
The Hidden Danger of Letting AI Write Your Code 🤖💻
⚠️
Hackers Weaponize QR Codes With Malicious Links to Steal Sensitive Data
⚠️
What We’ve Learned from LockBit and Black Basta Leaks (and News) - Ian Gray - PSW #888
📋
Microsoft asks customers for feedback on SSD failure issues
📢
Operator of ‘Rapper Bot’ DDoS Botnet Faces Charges
📢
Microsoft 365 Adds New Feature for Admins to Manage Link Creation Policies
📢
CISA’s Cybersecurity Secret Weapon for OT Systems 🛡️
📢
Europol confirms $50,000 Qilin ransomware reward is fake
🔥
Cyberattacke auf Berlins Justizsenatorin Badenberg
🔥
Orange Belgium Data Breach Impacts 850,000 Customers
🔥
The AWS Audit Checklist Nobody Talks About
🔥
Telecom Firm Colt Confirms Data Breach as Ransomware Group Auctions Files
🔥
Threat Actors Weaponize PDF Editor Trojan to Convert Devices into Proxies
🔥
Colt confirms customer data stolen as Warlock ransomware auctions files
🔥
Warning: Social Engineering is a Growing Threat to the Industrial Sector
🕵️
ISC Stormcast For Thursday, August 21st, 2025 https://isc.sans.edu/podcastdetail/9580, (Thu, Aug 21st)
🕵️
UNC5518 Group Hacks Legitimate Sites with Fake Captcha to Deliver Malware
🕵️
Lenovo-Chatbot-Lücke wirft Schlaglicht auf KI-Sicherheitsrisiken
🕵️
New SHAMOS Malware Targets macOS Through Fake Help Sites to Steal Login Credentials
🕵️
Password Managers Vulnerable to Data Theft via Clickjacking
🕵️
Hackers who exposed North Korean government hacker explain why they did it
🕵️
Scattered Spider Hacker Sentenced to Prison
🕵️
Kali Vagrant Rebuilt Released with Pre-Configured Command-Line VMs
🕵️
The Attacker’s Playbook: A Technical Analysis of Quishing and Encrypted SVG Payloads Used in HR Impersonation Phishing Attacks
🕵️
MuddyWater APT Targets CFOs via OpenSSH; Enables RDP and Scheduled Tasks
🕵️
Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages
🕵️
Traditional vs Agile Threat Modeling: What Really Works? ⚡
🕵️
Fuzzing Tools: Hidden Gem in Your Security Toolbox 🛠️
🕵️
AI Website Generators Repurposed by Adversaries for Malware Campaigns
🕵️
Google Says 30% of Dev Code Is AI-Written… Should You Worry?
🕵️
Why Most Companies Choose the WRONG SOC 😬 #Cybersecurity
KEV
🕵️
New Homoglyph Phishing Campaign Impersonates Booking.com
🕵️
Phishing Attacks Target Brokerage Accounts to Manipulate Stock Prices
🌐
Dev gets 4 years for creating kill switch on ex-employer's systems
📡
SIM-Swapper, Scattered Spider Hacker Gets 10 Years
📡
Don't Forget The "-n" Command Line Switch, (Thu, Aug 21st)
📡
Scattered Spider hacker gets sentenced to 10 years in prison
📡
Scattered Spider Hacker Gets 10 Years, $13M Restitution for SIM Swapping Crypto Theft
📡
"What happens online stays online" and other cyberbullying myths, debunked