97Articles
8Categories
2025-08-26Date
🚨
CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and GitThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws impacting Citrix Session Recording and Git to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The list of vulnerabilities is as follo…
KEV
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-7775 Citrix NetScaler Memory Overflow Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and…
KEV
🐛
PhpSpreadsheet Library Vulnerability Lets Attackers Inject Malicious HTML Input
🐛
CISA Alerts on Git Arbitrary File Write Flaw Actively Exploited
KEV
🐛
PoC Exploit Published for Chrome 0-Day Already Under Active Attack
🐛
Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775
KEV
🐛
Critical Docker Desktop flaw allows container escape
🐛
Citrix fixes critical NetScaler RCE flaw exploited in zero-day attacks
KEV
⚠️
Warum das SOC in der Krise steckt – und wie Sie das ändern
⚠️
CISA Issues Alert on Citrix Flaws Actively Exploited by Hackers
KEV
⚠️
Behind the Coinbase breach: Bribery emerges as enterprise threat
⚠️
Shadow AI is surging — getting AI adoption right is your best defense
⚠️
Organizations Warned of Exploited Git Vulnerability
⚠️
Translating Security Regulations into Secure Projects - Emily Fox, Roman Zhukov - ASW #345
⚠️
HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands
⚠️
Users of WhatsApp Desktop on Windows Face Code Execution Risk Via Python
⚠️
Docker Desktop Vulnerability Leads to Host Compromise
⚠️
Cyberattack on state systems bring Nevada’s official websites & phone lines down; officials rely on social media to issue updates
⚠️
ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners
⚠️
Rache am Arbeitgeber bringt Entwickler vier Jahre in den Knast
⚠️
Weaponized PuTTY Delivered via Malicious Bing Ads Targets Kerberos and Active Directory Services
⚠️
CISA warns of actively exploited Git code execution flaw
KEV
⚠️
CISA Releases Three Industrial Control Systems Advisories
⚠️
The AI Fix #65: Excel Copilot will wreck your data, and can AI fix social media?
⚠️
Random Inputs = Remote Code Execution?! 😱
⚠️
New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station
⚠️
Salesloft breached to steal OAuth tokens for Salesforce data-theft attacks
⚠️
ESET Research: The first AI-powered(LLM) ransomware has been discovered- PromptLock.
⚠️
Google to verify all Android devs to block malware on Google Play
⚠️
New ZipLine Campaign Targets Critical Manufacturing Firms with In-Memory MixShell Malware
⚠️
Attackers steal data from Salesforce instances via compromised AI live chat tool
⚠️
Multiple Vulnerabilities in Microsoft Products Could Allow for Remote Code Execution
⚠️
Multiple Vulnerabilities in Commvault Backup & Recovery Could Allow for Remote Code Execution
⚠️
A Vulnerability in Git Could Allow for Remote Code Execution
⚠️
Google to verify all Android devs to protect users from malware
⚠️
Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
⚠️
A Vulnerability in Apple Products Could Allow for Arbitrary Code Execution
📢
Maryland Transportation Systems Disrupted Following Cyberattack
📢
HPE security advisory (AV25-541)
📢
Microsoft Launches Tool to Migrate VMware VMs From vCenter to Hyper-V
📢
NIS2 und der Mittelstand: Zwischen Pflicht und Praxis
📢
Beyond GDPR security training: Turning regulation into opportunity
📢
Citrix security advisory (AV25-543)
📢
TeamViewer security advisory (AV25-542)
📢
HPE security advisory (AV25-544)
📢
DOGE uploaded live copy of Social Security database to ‘vulnerable’ cloud server, says whistleblower
📢
CISA Unveils Tool to Boost Procurement of Software Supply Chain Security
📢
Google Chrome security advisory (AV25-545)
🔥
Palo Alto Networks Named a Leader in WW Incident Response Services
🔥
French Retailer Auchan Hit by Cyberattack, Customer Data Compromised
🔥
Das kostet ein Data Breach 2025
🔥
Hundreds of Thousands Affected by Auchan Data Breach
🔥
Healthcare Services Group Data Breach Impacts 624,000
🔥
Nissan confirms design studio data breach claimed by Qilin ransomware
🔥
Big-Tech-Zulieferer meldet Ransomware-Attacke
🔥
Denial of Service on Energy Systems… Scary Truth 😱 #cybersecurity
🔥
New Hook Android Banking Malware Emerges with Advanced Features and 107 Remote Commands
🔥
Nevada closes state offices as cyberattack disrupts IT systems
🔥
Velociraptor incident response tool abused for remote access
🔥
First known AI-powered ransomware uncovered by ESET Research
🕵️
ISC Stormcast For Tuesday, August 26th, 2025 https://isc.sans.edu/podcastdetail/9586, (Tue, Aug 26th)
🕵️
Hackers Scan Over 1,000 IPs to Target Microsoft Remote Desktop Web Access
🕵️
FTC Calls on Tech Firms to Resist Foreign Anti-Encryption Demands
🕵️
X/Twitter Found to Be Most Aggressive Social Media App in Tracking User Location Data
🕵️
AI Systems Vulnerable to Prompt Injection via Image Scaling Attack
🕵️
Chinese UNC6384 Hackers Use Valid Code-Signing Certificates to Evade Detection
🕵️
Why SIEM Rules Fail and How to Fix Them: Insights from 160 Million Attack Simulations
🕵️
Encryption Backdoor in Military/Police Radios
🕵️
Threat Actors Update Android Droppers to Remain Effective with Even Simple Malware
🕵️
Beware! Fake Google Play Store Sites Used to Spread Android Malware
🕵️
Chinese Hackers Hijack Web Traffic to Spy on Foreign Diplomats
🕵️
Malware-ridden apps made it into Google's Play Store, scored 19 million downloads
🕵️
DSLRoot, Proxies, and the Threat of ‘Legal Botnets’
🕵️
OneFlip Attack Backdoors AI Systems by Flipping a Single Bit in Neural Networks
🕵️
Beyond the Prompt: Building Trustworthy Agent Systems
🕵️
AppSec Involvement: Too Early or Too Late Can Cost Millions 💸
🕵️
CyberheistNews Vol 15 #34 [Watch Out] That Urgent Payroll Update Alert? It's a Phishing Attack
🕵️
Google Introduces Enhanced Developer Verification for Play Store App Distribution
🕵️
Securing and governing the rise of autonomous agents​​
🕵️
This Golang Security Feature Breaks AI Models 💥
🕵️
Securden Unified PAM Flaw Allows Attackers to Bypass Authentication
🕵️
When AI Outcodes Humans… Who Secures It? 🤔
🕵️
China-Based Threat Actor Mustang Panda’s TTPs Leaked
🕵️
Threat Actors Leverage AI Agents to Conduct Social Engineering Attacks
🕵️
APT36 Targets Indian BOSS Linux Using Weaponized .desktop Shortcut Files
🕵️
Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet... - SWN #506
🕵️
Silk Typhoon hackers hijack network captive portals in diplomat attacks
🌐
MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers
📡
Google to Verify All Android Developers in 4 Countries to Block Malicious Apps
📡
Alleged mastermind behind K-Pop celebrity stock heist extradited to South Korea
📡
Security researcher maps hundreds of TeslaMate servers spilling Tesla vehicle data
📡
How to remove your information from personal data brokers' databases | Kaspersky official blog
📡
Joint guidance on managing cryptographic keys and secrets
📡
Getting a Better Handle on International Domain Names and Punycode, (Tue, Aug 26th)
📡
Email security best practices (ITSM.60.002)
📡
Quick guide to email configuration (ITSAP.60.003)
📡
Trend Vision One Integrates Microsoft Defender for Endpoint