90Articles
10Categories
2025-08-25Date
🚨
CISA Adds Three Known Exploited Vulnerabilities to CatalogCISA has added three new vulnerabilities to its  Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2024-8069 Citrix Session Recording Deserialization of Untrusted Data Vulnerability CVE-2024-8068 Citrix Session Recording Improper P…
KEV
🚨
Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage SystemExecutive summary People’s Republic of China (PRC) state-sponsored cyber threat actors are targeting networks globally, including, but not limited to, telecommunications, government, transportation, lodging, and military infrastructure networks. While these actors focus on large …
KEV
🐛
PoC Exploit and Technical Analysis Published for Apple 0-Day RCE Vulnerability
🐛
Critical Tableau Server Flaws Allows Malicious File Uploads
🐛
BCP-04 Draft Preparation - Work-group session 25/08/2025 - Luxembourg
🐛
Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3
⚠️
6 wichtige Punkte für Ihren Incident Response Plan
⚠️
Microsoft Copilot Agent Policy Flaw Lets Any User Access AI Agents
⚠️
NIST Releases Lightweight Cryptography Standard for IoT Security
⚠️
Happy Birthday Linux! 34 Years of Open-Source Power
⚠️
From CVE To Cyber Attack In Minutes With AI: Cybersecurity Today
⚠️
BSI-Doppelstrategie für digitale Souveränität
⚠️
How AI is reshaping cybersecurity operations
⚠️
83% of CISOs say staff shortage is major issue for defense
⚠️
Weekly Update 466
⚠️
Hackers Exploit SendGrid to Steal User Login Credentials in Latest Attack
⚠️
Rowhammer attack can backdoor AI models with one devastating bit flip
⚠️
Oktane Preview with Harish Peri, Invisible Prompt Attacks, and the weekly news! - Hari... - ESW #421
⚠️
Threat Actors Exploit Windows Scheduled Tasks for Stealthy Persistence Without Additional Tools
⚠️
Chip Programming Firm Data I/O Hit by Ransomware
⚠️
Multiple vtenext Flaws Allow Attackers to Bypass Authentication and Run Remote Code
⚠️
Meet the unsung silent hero of cyber resilience you’ve been ignoring
⚠️
0-Click Zendesk Flaw Lets Hackers Hijack Accounts and View All Tickets
⚠️
⚡ Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More
⚠️
Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot
⚠️
Vulnerability-Lookup 2.15.0 released
⚠️
Critical Docker Desktop flaw lets attackers hijack Windows hosts
⚠️
What Is a Hybrid Mesh Firewall and Why It Matters
⚠️
Big Banks Can’t Even Hire Enough AppSec Experts 💻🔒
⚠️
Need help with AI safety? Stay ahead of risks with these tools and frameworks
⚠️
Munich Reinsurance unites global security teams to boost resilience, cut costs
⚠️
2025 CSO Hall of Fame: Meg Anderson on AI, strategic security investments, and life after InfoSec
⚠️
Hackers Disrupt Iranian Ships via Maritime Communication Terminals Exploiting MySQL Database
⚠️
New Stealthy Malware Hijacking Cisco, TP-Link, and Other Routers for Remote Control
⚠️
Farmers Insurance data breach impacts 1.1M people after Salesforce attack
⚠️
ThreatActors Leverage Google Classroom to Target 13,500 Organizations
📋
Microsoft Confirms August 2025 Patch Slows Down Windows 11 24H2 and Windows 10
📢
CISA Requests Public Feedback on Updated SBOM Guidance
📢
Ubuntu security advisory (AV25-536)
📢
Dell security advisory (AV25-538)
📢
CISA ICS security advisories (AV25-537)
📢
Red Hat security advisory (AV25-540)
📢
IBM security advisory (AV25-539)
🔥
Farmers Insurance Data Breach Impacts Over 1 Million People
🔥
New macOS Installer Boasts Lightning-Fast Data Theft, Marketed on Dark Web
🔥
Aspire Rural Health System Data Breach Impacts Nearly 140,000
🔥
Hackers Use AI-Generated Summaries to Deliver Ransomware Payloads
🔥
Fake Google Play Store Websites Deliver Potent RAT to Steal Sensitive Data
🔥
Auchan retailer data breach impacts hundreds of thousands of customers
🔥
Autonomous SOC: Too Risky or the Future? 🤔
KEV
🔥
postMessaged and Compromised
🔥
Yemen Cyber Army hacker jailed after stealing millions of people’s data
🕵️
ISC Stormcast For Monday, August 25th, 2025 https://isc.sans.edu/podcastdetail/9584, (Mon, Aug 25th)
🕵️
ghrc.io Appears to be Malicious
🕵️
Hackers Steal Windows Secrets and Credentials Undetected by EDR Detection
🕵️
Arch Linux Project Responding to Week-Long DDoS Attack
🕵️
BSI-E-Mail-Checker soll vor Hackern schützen
🕵️
SASE Company Netskope Files for IPO
🕵️
Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing
🕵️
Chinese Hacker Sentenced for Kill Switch Attack on Ohio Firm’s Global Network
🕵️
Unmasking KorPlug Malware: TTPs, Control Flow, and Exposed IOCs
🕵️
Hackers Abuse Python eval/exec Calls to Run Malicious Code
🕵️
Poor Password Choices
🕵️
Anatsa Android Banking Trojan Now Targeting 830 Financial Apps
🕵️
Arch Linux Services Hit by Week-Long DDoS Attack
🕵️
Kimsuky APT Exposed: GPKI Certificates, Rootkits, and Cobalt Strike Assets Uncovered
🕵️
New Android Spyware Masquerading as Antivirus Targets Business Executives
🕵️
Attaxion Releases Agentless Traffic Monitoring for Immediate Risk Prioritization
🕵️
Pakistani Hackers Back at Targeting Indian Government Entities
🕵️
Legacy Protocols Still Run Our Critical Systems 😱
🕵️
Chinese APT Leverages Proxy and VPN Services to Obfuscate Infrastructure
🕵️
Only 7 Days Left for Early Bird Registration to the OpenSSL Conference 2025
🕵️
From Crashes to Protection: The Test Suite Hack 💡
🕵️
Proxyware Malware Poses as YouTube Video Download Site, Delivering Malicious JavaScript
🕵️
News alert: Attaxion launches agentless traffic monitoring to flag threats and prioritize risk
🕵️
OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail
🕵️
The Harsh Truth: Your Code Baby Is Ugly (But Secure!)
🕵️
LLMs = The New Cyber Villains? 👀
🕵️
Beware! Google Ads Promote Fake Tesla Websites Soliciting Fraudulent Deposits
🕵️
UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats
🕵️
News alert: Global security leaders to convene at OpenSSL 2025 — final week for early-bird rates
🌐
Defending against malware persistence techniques with Wazuh
🌐
Malicious Android apps with 19M installs removed from Google Play
🌐
A new security flaw in TheTruthSpy phone spyware is putting victims at risk
🌐
Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads
🎙️
Wide World of Cyber: Microsoft's China Entanglement
📡
Reading Location Position Value in Microsoft Word Documents, (Mon, Aug 25th)
📡
Why SIEM Rules Fail and How to Fix Them: Insights from 160 Million Attack Simulations
📡
New AI attack hides data-theft prompts in downscaled images
📡
Surge in coordinated scans targets Microsoft RDP auth servers