91Articles
10Categories
2025-10-01Date
🚨
CISOs advised to rethink vulnerability management as exploits sharply riseEnterprise attack surfaces continue to expand rapidly, with more than 20,000 new vulnerabilities disclosed in the first half of 2025, straining already hard-pressed security teams. Nearly 35% (6,992) of these vulnerabilities have publicly available exploit code, according to the …
KEV
🐛
Threat actors could retrieve valid usernames from VMware by exploiting vulnerabilities
🐛
48+ Cisco Firewalls Hit by Actively Exploited 0-Day Vulnerability
KEV
🐛
Cisco IOS/IOS XE SNMP Vulnerabilities Exploited in Ongoing Attacks, Warns CISA
KEV
🐛
Red Hat OpenShift AI Vulnerability Lets Attackers Seize Infrastructure Control
🐛
OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps
🐛
Microsoft plots new path for Sentinel, adding agentic AI features
🐛
Chinese APT group Phantom Taurus targets gov and telecom organizations
⚠️
$50 Battering RAM Attack Breaks Intel and AMD Cloud Security Protections
⚠️
Don’t drink or drive, say cyberattackers
⚠️
Wie CISOs schlechte Produkte enttarnen
⚠️
CISA 2015 cyber threat info-sharing law lapses amid government shutdown
⚠️
Top 10 Best Autonomous Endpoint Management Software In 2025
⚠️
Government shutdown deepens US cyber risk, exposing networks to threat actors
⚠️
Battering RAM Exploit Bypasses Modern Protections in Intel, AMD Cloud Processors
⚠️
Google Publishes Security Hardening Guide to Counter UNC6040 Threats
⚠️
Future Forward: CIO 2025 Outlook - Cybersecurity, AI, and Economic Uncertainty? - Aman... - BSW #415
⚠️
Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability
⚠️
Hackers Abuse EV Certificates to Sign Completely Undetectable DMG Malware
⚠️
Use of Generative AI in Scams
⚠️
2025 Cybersecurity Reality Check: Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising
⚠️
Hackers Exploit Milesight Routers to Send Phishing SMS to European Users
⚠️
New FlipSwitch Hooking Method Overcomes Linux Kernel Defenses
⚠️
Smishing Campaigns Exploit Cellular Routers to Target Belgium - Infosecurity Magazine
⚠️
Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover
⚠️
Chinese State-Sponsored Hackers Exploiting Network Edge Devices to Harvest Sensitive Data
⚠️
Ukraine Warns of Weaponized XLL Files Delivering CABINETRAT Malware via Zip Archives
⚠️
Get Your Game On! 3 Ways to Use the 2025 Cyberawareness Month Resource Kit
⚠️
Top 10 Best Vulnerability Management Software in 2025
⚠️
CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems
KEV
⚠️
WestJet data breach exposes travel details of 1.2 million customers
⚠️
Cybersecurity Awareness Month: Security starts with you
⚠️
Microsoft to force install Microsoft 365 companion apps in October
⚠️
Your favourite phone apps might be leaking your company’s secrets
⚠️
Smashing Security podcast #437: Salesforce’s trusted domain of doom
⚠️
Risky Business #809 -- Hackers try to pay a journalist for access to the BBC
📋
Multiple NVIDIA Flaws Allow Attackers to Escalate Privileges on Systems
📢
Chinese hacking group ‘Phantom Taurus’ targets governments
📢
Chinese hacking group ‘Phantom Taurus’ targets governments
📢
Cyber-Bedrohungslage in der EU verschärft sich
📢
NIST Publishes Guide for Protecting ICS Against USB-Borne Threats
📢
Introducing Sophos Advisory Services
📢
How To Simplify CISA's Zero Trust Roadmap with Modern Microsegmentation
📢
Sudo security advisory (AV25-631)
🔥
Ukraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPs
🔥
New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones
🔥
New DNS Malware ‘Detour Dog’ Uses TXT Records to Deliver Strela Stealer
🔥
The Case for Multidomain Visibility
🔥
WestJet Confirms Data Breach Exposing Customer Personal Information
🔥
Data breach at Canadian airline WestJet affects 1.2M passengers
🔥
Allianz Life says July data breach impacts 1.5 million people
🔥
Google Drive for desktop gets AI-powered ransomware detection
🔥
Data breach at dealership software provider impacts 766k clients
🕵️
ISC Stormcast For Wednesday, October 1st, 2025 https://isc.sans.edu/podcastdetail/9636, (Wed, Oct 1st)
🕵️
MatrixPDF Campaign Evades Gmail Filters to Deliver Malicious Payloads
🕵️
Google Gemini Vulnerabilities Let Hackers Steal Saved Data and Live Location
🕵️
Beijing-backed burglars master .NET to target government web servers
🕵️
Microsoft Sentinel Launches AI-Driven Agentic SIEM Platform for Enterprise Security
🕵️
Battering RAM Attack Breaks Intel and AMD Security Tech With $50 Device
🕵️
Spotlight report: Securing the cloud
🕵️
Industry groups worry about cyber info sharing as key US law is set to expire | Reuters
🕵️
Cybersecurity Awareness Month 2025:Prioritizing Identity to Safeguard Critical Infrastructure
🕵️
SVG Security Analysis Toolkit to Detect Malicious Scripts Hidden in SVG files
🕵️
Descope Raises $35 Million in Seed Round Extension
🕵️
New Malware-as-a-Service Olymp Loader Promises Defender-Bypass With Automatic Certificate Signing
🕵️
'Trifecta' of Gemini Flaws Turn AI Into Attack Vehicle
🕵️
Canadian Airline WestJet Says Hackers Stole Customer Data
🕵️
Chinese APT ‘Phantom Taurus’ Targeting Organizations With Net-Star Malware
🕵️
Top 100 World’s Best Cybersecurity Companies in 2025
🕵️
Malicious PyPI Package Mimics as SOCKS5 Proxy Tool Attacking Windows Platforms
🕵️
Senior Travel Scams Used by Threat Actors to Distribute Datzbro Malware
🕵️
Going DEEP: A Simple Framework for a Complex Problem
🕵️
OpenSSL Vulnerabilities Allow Private Key Recovery, Code Execution, DoS Attacks
🕵️
Building Trust in AI: KnowBe4's Journey Toward ISO 42001 Certification
🕵️
What are You Working on Wednesday
🕵️
'Delightful' Red Hat OpenShift AI bug allows full takeover
🕵️
US gov shutdown leaves IT projects hanging, security defenders a skeleton crew
🌐
New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer
🌐
Android malware uses VNC to give attackers hands-on access
🌐
Adobe Analytics bug leaked customer tracking data to other tenants
🎙️
50,000 Cisco Firewalls Exposed
📡
How Leading Security Teams Blend AI + Human Workflows (Free Webinar)
📡
Microsoft: Media Creation Tool broken on Windows 11 Arm64 PCs
📡
Final 3 days to score extra discounts on community passes to TechCrunch Disrupt 2025
📡
UK government tries again to access encrypted Apple customer data: report
📡
F-Droid project threatened by Google's new dev registration rules
📡
New bug in classic Outlook can only be fixed via Microsoft support
📡
Anker offered to pay Eufy camera owners to share videos for training its AI
📡
Emails claim Oracle data theft in new Clop-linked extortion campaign
📡
Clop extortion emails claim theft of Oracle E-Business Suite data
📡
Cybersecurity Awareness Month 2025: Knowledge is power