70Articles
7Categories
2025-09-05Date
🐛
Recent SAP S/4HANA Vulnerability Exploited in Attacks
KEV
🐛
CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitation
🐛
SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild
KEV
🐛
Chromium: CVE-2025-9867 Inappropriate implementation in Downloads
🐛
Chromium: CVE-2025-9866 Inappropriate implementation in Extensions
🐛
Chromium: CVE-2025-9865 Inappropriate implementation in Toolbar
🐛
Chromium: CVE-2025-9864 Use after free in V8
🐛
CVE-2025-53791 Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
🐛
Critical SAP S/4HANA Vulnerability Actively Exploited, Allowing Full System Takeover
KEV
🐛
New Exploit Bypasses Code Integrity to Backdoor Signal, 1Password, Slack, and More
🐛
Hacker nutzen gravierende Schwachstelle bei SAP S/4HANA aus
🐛
Alert: Exploit available to threat actors for SAP S/4HANA critical vulnerability
KEV
⚠️
Reminder of this week's schedule and preview of Weekend Edition.
⚠️
Microsoft now enforces MFA on Azure Portal sign-ins for all tenants
⚠️
Financial services firm Wealthsimple discloses data breach
⚠️
Max severity Argo CD API flaw leaks repository credentials
⚠️
Don’t let outdated IGA hold back your security, compliance, and growth
⚠️
Critical SAP S/4HANA vulnerability now exploited in attacks
⚠️
Academics Build AI-Powered Android Vulnerability Discovery and Validation Tool
⚠️
More Cybersecurity Firms Hit by Salesforce-Salesloft Drift Breach
⚠️
Azure mandatory multifactor authentication: Phase 2 starting in October 2025
⚠️
Microsoft Tapped China Engineers for SharePoint Support
⚠️
Cybersecurity Landscape 2025 Amid Record Vulnerabilities, Infrastructure Breakdown, and Growing Digital Risks
⚠️
Threat Actors Exploit ScreenConnect Installers for Initial Access
⚠️
10 Best Attack Surface Management (ASM) Companies in 2025
⚠️
CISA Warns: TP-Link Vulnerabilities Under Active Exploitation
KEV
⚠️
You should be aware of these latest social engineering trends
KEV
⚠️
Sendmarc appoints Rob Bowker as North American Region Lead
⚠️
Lack of board access: The No. 1 factor for CISO dissatisfaction
⚠️
Authentifizierungslösungen: 10 Passwordless-Optionen für Unternehmen
⚠️
Zero-day vulnerability discovered in TP-Link routers
📢
My Latest Book: Rewiring Democracy
📢
Advanced Educational Competition – Ask Your Employees To Submit Their Best Phishing
📢
AI Trolley Problems, Rhode Island Drivers, and Kohlbergian Post Conventionalism - SWN #509
🔥
In Other News: Scammers Abuse Grok, US Manufacturing Attacks, Gmail Security Claims Debunked
🔥
SafePay Ransomware Hits 73 Organizations in Just One Month
🔥
Germany charges hacker with Rosneft cyberattack in latest wake-up call for critical infrastructure
🔥
Massiver Anstieg bei Hackerangriffen auf deutschen Bildungssektor
🔥
Chess.com confirms data breach
🕵️
GPT-4o-mini Falls for Psychological Manipulation
🕵️
How to Close the AI Governance Gap in Software Development
🕵️
FireCompass Raises $20 Million for Offensive Security Platform
🕵️
North Korean Hackers Targeted Hundreds in Fake Job Interview Attacks
🕵️
TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations
🕵️
From YARA Offsets to Virtual Addresses, (Fri, Sep 5th)
🕵️
ISC Stormcast For Friday, September 5th, 2025 https://isc.sans.edu/podcastdetail/9600, (Fri, Sep 5th)
🕵️
Smishing Campaign Targets California Taxpayers With Phony Refund Offers
🕵️
Warning: New Spear Phishing Campaign Targets Executives
🕵️
Over 143,000 Malware Files Target Android and iOS Users in Q2 2025
🕵️
TAG-150 Hackers Escalate Attacks with Proprietary Malware Families
🕵️
Why Security Champions Are the Secret Weapon 🛡️
🕵️
Fake Nudes, AI & The Dark Web… What Can We Do? 🤯
🕵️
AI Dependencies: The Cyber Time Bomb You Ignore ⏱️
🕵️
From Syntax to Security: Inside a Compiler 🔍 #Programming
🕵️
Secrets of Security Engineers Who Think Like Product Managers
🕵️
From Deep Blue to Today: Why AI Still Confuses Experts
🕵️
AI Projects in College… But Zero Security Classes?! 🚨
🕵️
ImaginaryCTF 2025 | September 5-7, 12 PM PDT | a cybersecurity CTF competition with a variety of challenges for all skill levels
🕵️
Frostbyte10 bugs put thousands of refrigerators at major grocery chains at risk
🕵️
VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages
🕵️
Sextortion with a twist: Spyware takes webcam pics of users watching porn
🕵️
China-aligned crew poisons Windows servers to manipulate Google results
🌐
Automation Is Redefining Pentest Delivery
🌐
VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages
🌐
Under lock and key: Safeguarding business data with encryption
📡
EU fines Google $3.5 billion for anti-competitive ad practices
📡
Microsoft gives US students a free year of Microsoft 365 Personal
📡
X is now offering me end-to-end encrypted chat — you probably shouldn’t trust it yet
📡
Parents warned that robot toys spied on children’s location without consent
📡
How to reduce the digital footprint of kids and teens | Kaspersky official blog