76Articles
7Categories
2025-09-08Date
🐛
Critical Argo CD API Flaw Exposes Repository Credentials to Attackers
🐛
CISA Alerts on WhatsApp 0-Day Vulnerability Actively Exploited in Attacks
KEV
🐛
Apache Jackrabbit Vulnerability Exposes Systems to Remote Code Execution Attacks
🐛
PgAdmin Vulnerability Allows Attackers to Gain Unauthorized Account Access
⚠️
Wealthsimple Data Breach – User Information Leaked Online
⚠️
Hackers Say Thanks For Lousy Security In Large Fast Food Chain
⚠️
GPUGate Malware Leverages Legitimate Platforms to Deliver Advanced Payloads
⚠️
Hackers Exploit Fake Microsoft Teams Site to Spread Odyssey macOS Stealer
⚠️
Tenable Data Breach Confirmed -Customer Contact Details Compromised
⚠️
10 security leadership career-killers — and how to avoid them
⚠️
The importance of reviewing AI data centers’ policies
⚠️
How Microsoft Azure Storage Logs Help Investigate Security Breaches
⚠️
Ransomware, Agentic AI, and Supply Chain Risks: Insights from Black Hat 2025 - Theresa... - ESW #423
⚠️
⚡ Weekly Recap: Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More
⚠️
Is the CISO role broken?
⚠️
Hackers Exploit Amazon SES to Blast Over 50,000 Malicious Emails Daily
⚠️
GhostAction campaign steals 3325 secrets in GitHub supply chain attack
⚠️
Salesloft GitHub Account Compromised Months Before Salesforce Attack
⚠️
GitHub Workflows Attack Affects Hundreds of Repos, Thousands of Secrets
⚠️
PromptLock Only PoC, but AI-Powered Ransomware Is Real
⚠️
Salesloft: March GitHub repo breach led to Salesforce data theft attacks
⚠️
OT on the Frontlines: Threat Intelligence You Can’t Ignore - Dawn Cappelli - CSP #216
⚠️
Lovesac confirms data breach after ransomware attack claims
⚠️
Is Your Software Maintained… or Abandoned? 🛑
⚠️
100+ Dell Laptops Hacked in Seconds?! 💻🔓 #Cybersecurity
⚠️
Snake Oilers: Nebulock, Vali Cyber and Cape
📢
AI in Government
📢
Czech cyber agency flags Chinese espionage risks to critical infrastructure
📢
Czech cyber agency flags Chinese espionage risks to critical infrastructure
📢
IBM security advisory (AV25-569)
📢
Dell security advisory (AV25-570)
📢
Action1 vs. Microsoft WSUS: A Better Approach to Modern Patch Management
📢
CISA to Highlight Agency’s Top Priorities to Secure America at 16th Annual Billington CyberSecurity Summit
📢
Ubuntu security advisory (AV25-571)
📢
Red Hat security advisory (AV25-572)
📢
Microsoft Edge security advisory (AV25-573)
📢
[Control systems] CISA ICS security advisories (AV25–574)
📢
VMware security advisory (AV25-575)
🔥
New GhostAction Attack Compromises 327 GitHub Users and 817 Repositories
🔥
Lazarus APT Deploys ClickFix Technique to Exfiltrate Sensitive Intelligence Data
🔥
Australian Authorities Expose Ransomware Gangs and Their Hidden Careers
🔥
Fintech Firm Wealthsimple Says Supply Chain Attack Resulted in Data Breach
🔥
Kimsuky Hackers’ Playbook Uncovered in Exposed ‘Kim’ Data Dump
🔥
LunaLock Ransomware Attacking Artists to Steal and Encrypt Data
🔥
GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies
🔥
Salesloft says Drift customer data thefts linked to March GitHub account hack
🔥
VC giant Insight Partners notifies staff and limited partners after data breach
🔥
Hackers steal 3,325 secrets in GhostAction GitHub supply chain attack
🔥
18 Popular Code Packages Hacked, Rigged to Steal Crypto
🔥
Plex tells users to reset passwords after new data breach
🕵️
SANS AI Cybersecurity Summit 2025
🕵️
Cybersecurity M&A Roundup: 27 Deals Announced in August 2025
🕵️
macOS Under Attack: Atomic Stealer Hidden in Pirated Software
🕵️
U.S. Officials Investigating Cyber Threat Aimed at China Trade Talks
🕵️
ISC Stormcast For Monday, September 8th, 2025 https://isc.sans.edu/podcastdetail/9602, (Mon, Sep 8th)
🕵️
Web Application Firewall Bypassed via JS Injection with Parameter Pollution
🕵️
Over 6,700 Private Repositories Made Public in Nx Supply Chain Attack
🕵️
Hackerangriff treibt Wehrle-Werk in Insolvenz
🕵️
Chinese Spies Impersonated US Lawmaker to Deliver Malware to Trade Groups: Report
🕵️
Before You Secure It… Learn to Build It!
🕵️
SHARED INTEL Q&A: Is your antivirus catching fresh threats — or just echoing VirusTotal?
🕵️
Is This the End of Hope-and-Pray Programming? 🙏🚫
🕵️
🏗️ Security by Default: Inside Netflix’s Paved Road Strategy!
🕵️
Signed Copies of Rewiring Democracy
🕵️
Fixing Dependencies Like Never Before 🔥
🕵️
10% Patches That Stop 90% of Attacks 🛡️
🌐
GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms
🌐
Hackers hijack npm packages with 2 billion weekly downloads in supply chain attack
📡
You Didn’t Get Phished — You Onboarded the Attacker
📡
HTTP Request Signatures, (Mon, Sep 8th)
📡
Signal introduces free and paid backup plans for your chats
📡
Sports streaming piracy service with 123M yearly visits shut down
📡
Signal adds secure cloud backups to save and restore chats
📡
Former WhatsApp security boss sues Meta for “systemic cybersecurity failures”
📡
Surge in networks scans targeting Cisco ASA devices raise concerns
📡
Netskope follows Rubrik as a rare cybersecurity IPO, both backed Lightspeed