74Articles
9Categories
2025-08-22Date
🐛
14 Million-Download SHA JavaScript Library Exposes Users to Hash Manipulation Attacks
🐛
Windows Docker Desktop Vulnerability Allows Full Host Compromise
🐛
AI Systems Capable of Generating Working Exploits for CVEs in Just 10–15 Minutes
🐛
Oracle-CSO mit überraschendem Abgang
🐛
CISA Warns of Actively Exploited 0-Day Vulnerability in Apple iOS, iPadOS, and macOS
KEV
⚠️
The Triple Threats CISOs cannot ignore: A Perfect Storm of Digital Frontlines, Dark AI and Quantum Leaps
⚠️
ChatGPT-5 Downgrade Attack Allows Hackers to Evade AI Defenses With Minimal Prompts
⚠️
New HTTP Smuggling Technique Allows Hackers to Inject Malicious Requests
⚠️
Cybersecurity Today: Massive Data Exposures, Microsoft Failures, and PayPal Breach Claims
⚠️
Ensuring security in a borderless world: The 30th anniversary of Schengen system
⚠️
Colt Confirms Ransomware Attack Resulted in Customer Data Theft
⚠️
Azure Default API Connection Flaw Enables Full Cross-Tenant Compromise
⚠️
AWS Trusted Advisor Tricked Into Showing Unprotected S3 Buckets as Secure
⚠️
CPAP Medical Data Breach Impacts 90,000 People
⚠️
Massive anti-cybercrime operation leads to over 1,200 arrests in Africa
⚠️
Rogue Go Module Doubles as Fast SSH Brute-Forcer, Sends Stolen Passwords via Telegram
⚠️
Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage
⚠️
Featured Chrome extension FreeVPN.One caught capturing and transmitting user data
⚠️
Chinese Silk Typhoon Hackers Exploited Commvault Zero-Day
⚠️
ClickFix Exploit Emerges: Microsoft Flags Cross-Platform Attacks Targeting Windows and macOS
⚠️
Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection
⚠️
CISA Requests Public Comment for Updated Guidance on Software Bill of Materials
⚠️
Help TDS Hacks Legitimate Websites, Using PHP Templates to Display Fake Microsoft Security Alerts
⚠️
Disgruntled developer gets four-year sentence for revenge attack on employer’s network
⚠️
Hackers Hijack VPS Servers to Breach Software-as-a-Service Accounts
⚠️
API Security Took Years… AI Took Just Months 🤯
⚠️
Murky Panda hackers exploit cloud trust to hack downstream customers
📋
Microsoft: August Windows updates cause severe streaming issues
📢
NIST Releases New Control Overlays to Manage Cybersecurity Risks in AI Systems
📢
Microsoft Edge security advisory (AV25-535)
📢
CISA Issues Draft Software Bill of Materials Guide for Public Comment
🔥
DaVita says ransomware gang stole data of nearly 2.7 million people
🔥
Developer Who Hacked Former Employer’s Systems Sentenced to Prison
🔥
Colt Confirms Customer Data Stolen in Ransomware Attack
🔥
Cyberangriff auf Versicherungsmakler BüchnerBarella
🔥
In Other News: McDonald’s Hack, 1,200 Arrested in Africa, DaVita Breach Grows to 2.7M
🔥
BQTLOCK Ransomware-as-a-Service Emerges, Boasting Sophisticated Evasion Tactics
🔥
Lumma Operators Deploy Cutting-Edge Evasion Tools to Maintain Stealth and Persistence
🔥
Europol says Telegram post about 50,000 Qilin ransomware award is fake
🔥
Blue Locker ransomware hits critical infrastructure – is your organisation ready?
🕵️
ISC Stormcast For Friday, August 22nd, 2025 https://isc.sans.edu/podcastdetail/9582, (Fri, Aug 22nd)
🕵️
MITRE Updates List of Most Common Hardware Weaknesses
🕵️
Hundreds Targeted in New Atomic macOS Stealer Campaign
🕵️
Stealth Threat Unpacked: Weaponized RAR Files Deliver VShell Backdoor on Linux Systems
🕵️
Malicious PDFs in Play: UAC-0057 Leveraging Invitations to Trigger Shell Script Attacks
🕵️
Hackers Target Phones of Military-Linked Individuals in South Asia Using New Spy Tools
🕵️
AI Agents Need Data Integrity
🕵️
Hackers access data of 850,000 Orange Belgium customers
🕵️
Hackers access data of 850,000 Orange Belgium customers
🕵️
Microsoft to Restrict Use of OnMicrosoft Domains for Email Sending
🕵️
Anatsa Malware Escalates: Android Under Siege as Hackers Harvest Credentials and Track Keystrokes
🕵️
Usability: The Most Ignored Side of Security 🤯
🕵️
The Hidden Trap in Every Banking App…
🕵️
Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
🕵️
This Simple Trick Shows If Your Fuzzing Time Was Wasted ⏳ #InfoSec
🕵️
Can AI Really Do Code Review for You? 🤔 #Tech
🕵️
APT36 hackers abuse Linux .desktop files to install malware
🕵️
I’m Spending the Year at the Munk School
🕵️
Agentic AI vs SOAR: What’s the Real Difference?
🕵️
People, Process, Tech: The REAL SOC Formula
KEV
🕵️
Threat Actors Are Increasingly Abusing Generative AI Tools for Phishing
🕵️
The Technical Sophistication Behind the "Free" Gift Scam: Evading Detection
🕵️
The Hidden Cost of "Free" Gifts: How Survey Scams Are Evolving to Steal Financial Data
🕵️
Friday Squid Blogging: Bobtail Squid
🕵️
Humans extinct: 2040, Okta, Elastic, Bad Bots, Berserk Bear, Siemens, Aaran Leyland.. - SWN #505
🌐
Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware
🌐
Automation Is Redefining Pentest Delivery
🌐
Services and tools catalogue for critical infrastructure
🌐
Fake Mac fixes trick users into installing new Shamos infostealer
📰
Leadership, Innovation, and the Future of AI: Lessons from Trend Micro CEO & Co-Founder Eva Chen
📡
INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown
📡
Developer gets prison time for sabotaging former employer’s network with a ‘kill switch’
📡
Messaging apps that work without an internet connection or cell service | Kaspersky official blog
📡
The Joint SAFECOM-NCSWIC Project 25 (P25) User Needs Working Group (UNWG) releases the UNWG Video Series