98Articles
9Categories
2025-10-28Date
🚨
CISA Adds Two Known Exploited Vulnerabilities to CatalogCISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-6204 Dassault Systèmes DELMIA Apriso Code Injection Vulnerability CVE-2025-6205 Dassault Systèmes DELMIA Apriso Missing Authorization V…
KEV
🐛
Gamaredon Phishing Campaign Exploits WinRAR Vulnerability to Target Government Agencies
🐛
Critical QNAP .NET Flaw Lets Attackers Bypass Security Protections
🐛
Chrome Zero-Day Exploited to Deliver Italian Memento Labs' LeetAgent Spyware
⚠️
OpenAI Atlas Browser Vulnerability Lets Attackers Execute Malicious Scripts in ChatGPT
⚠️
Apache Tomcat Flaws Allow Remote Code Execution on Vulnerable Servers
⚠️
Beware of Free Video Game Cheats that Deliver Infostealer Malwares
⚠️
CISA Alerts on Critical Veeder-Root Flaws Allowing Attackers to Execute System Commands
⚠️
Do CISOs need to rethink service provider risk?
⚠️
70% of CISOs say internal conflicts more damaging than cyberattacks
⚠️
Sweden’s Power Grid Operator Admits Data Breach Linked to Everest Ransomware Gang
⚠️
New GhostGrab Android Malware Silently Steals Banking Login Details and Intercept SMS for OTPs
⚠️
Quantum Computing Isn’t A Threat To Blockchains - Yet - Sandy Carielli, Martha Bennett - ASW #354
⚠️
Step aside, SOC. It’s time to ROC
⚠️
Zero-Click Exploit Targets MCP and Linked AI Agents to Stealthily Steal Data
⚠️
Social Engineering People’s Credit Card Details
⚠️
Cybercriminals Trade 183 Million Stolen Credentials on Telegram, Dark Forums
⚠️
Volvo’s recent security breach: 5 tips to speed incident response while preserving forensic integrity
⚠️
Atlas browser exploit lets attackers hijack ChatGPT memory
⚠️
Anivia Stealer Peddled on Dark Web with UAC Bypass
⚠️
Copilot diagrams could leak corporate emails via indirect prompt injection
⚠️
IPFire 2.29 Released with Enhanced Intrusion Prevention System Reporting
⚠️
Chrome Zero-Day Exploitation Linked to Hacking Team Spyware - SecurityWeek
⚠️
New Atroposia malware comes with a local vulnerability scanner
⚠️
Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack
⚠️
The Agentic AI Platform for the Agentic Workforce of the Future
⚠️
How evolving regulations are redefining CISO responsibility
⚠️
Apache Tomcat Security Vulnerabilities Expose Servers to Remote Code Execution Attacks
⚠️
QNAP NetBak PC Agent Affected by Recent ASP.NET Core Vulnerability
⚠️
Making A Virtual Machine Look Like Real Hardware To Malware
⚠️
CISA Releases Three Industrial Control Systems Advisories
⚠️
New Android Trojan 'Herodotus' Outsmarts Anti-Fraud Systems by Typing Like a Human
⚠️
CISA warns of two more actively exploited Dassault vulnerabilities
KEV
⚠️
I'm a cyber major, but what should I minor in?
⚠️
HTTPS by default
⚠️
Advertising giant Dentsu reports data breach at subsidiary Merkle
📢
Unterstützung für Dobrindts Pläne zu aktiver Cyberabwehr
📢
Active Directory at Risk Due to Domain-Join Account Misconfigurations
📢
Apache Tomcat security advisory (AV25-702)
📢
Veeam security advisory (AV25-703)
📢
CyDeploy wants to create a replica of a company’s system to help it test updates before pushing them out — catch it at Disrupt 2025
📢
Mozilla security advisory (AV25-704)
📢
Windows 11 KB5067036 update rolls out Administrator Protection feature
🔥
Cybersicherheit ist größte Herausforderung für die Finanzbranche
🔥
Industrial Giants Schneider Electric and Emerson Named as Victims of Oracle Hack
🔥
Multi-Protocol Cascading Round-Robin Cipher
🔥
Iran’s MOIS-linked Ravin Academy hit by data breach • The Register
🔥
Why Early Threat Detection Is a Must for Long-Term Business Growth
🔥
Multi-Protocol Cascading Round-Robin Cipher
🔥
Google disputes false claims of massive Gmail data breach
🔥
HSBC USA data breach exposes client transactions, hackers claim | Cybernews
🔥
Ransomware profits drop as victims stop paying hackers
🔥
Qilin ransomware abuses WSL to run Linux encryptors in Windows
🕵️
ISC Stormcast For Tuesday, October 28th, 2025 https://isc.sans.edu/podcastdetail/9674, (Tue, Oct 28th)
🕵️
SideWinder Adopts New ClickOnce-Based Attack Chain Targeting South Asian Diplomats
🕵️
Water Saci Hackers Use WhatsApp to Deploy Persistent SORVEPOTEL Malware
🕵️
BlueNoroff Shifts Tactics: Targets C-Suite and Managers with New Infiltration Methods
🕵️
Hackers Target Swedish Power Grid Operator
🕵️
FileFix + Cache Smuggling: A New Evasion Combo
🕵️
MuddyWater’s Phoenix Backdoor Infects More Than 100 Government Organizations
🕵️
Europol Warns of Rising Threat From Caller ID Spoofing Attacks - Infosecurity Magazine
🕵️
OpenAI Atlas Browser tripped up by malformed URLs • The Register
🕵️
Sublime Security Raises $150 Million for Email Security Platform
🕵️
New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding
🕵️
CyberheistNews Vol 15 #43 [Heads Up] Block Attackers Who Abuse Grok to Spread Phishing Links
🕵️
Herodotus: New Android Malware Mimics Human Behavior to Bypass Biometric Security
🕵️
Brida Introduces New Release Offering Complete Support for Latest Frida Integration
🕵️
BSidesPDX 2025
🕵️
SAINTCON 25
🕵️
TurboMirai-Class ‘Aisuru’ Botnet Blamed for 20+ Tbps DDoS Attacks
🕵️
AI-Driven, Quantum-Ready Network Security
🕵️
Prisma AIRS 2.0 Is Powering the Next Wave of Secure AI Innovation
🕵️
CyberRiskTV Live Coverage from InfoSec World 2025 - Day 2
🕵️
'Herodotus' Android Trojan Mimics Human Sluggishness
🕵️
SimSpace Raises $39 Million for Cyber Range Platform
🕵️
Meet Atroposia: The Stealthy Feature-Packed RAT
🕵️
GhostCall and GhostHire — two campaigns by BlueNoroff
🕵️
Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains
🕵️
Stragglers From Myanmar Scam Center Raided by Army Cross Into Thailand as Buildings are Blown Up
🕵️
Secure the AI Factory with Palo Alto Networks & NVIDIA
🕵️
TEE.fail: Breaking Trusted Execution Environments via DDR5 Memory Bus Interposition
🕵️
Is It Or Is It Not an HP Scam?
🕵️
Lockpick chaos, CoPhish, Atlas, Turing, ForumTroll, PKD, Kilgore Trout, Aaran Leyland - SWN #524
🕵️
MY TAKE: Have you noticed how your phone’s AI assistant is starting to remap what you trust?
🕵️
Recruitment red flags: Can you spot a spy posing as a job seeker?
🌐
New Herodotus Android malware fakes human typing to avoid detection
🎙️
The AI Fix #74: AGI, LLM brain rot, and how to scam an AI browser
📡
A phishing with invisible characters in the subject line, (Tue, Oct 28th)
📡
Is Your Google Workspace as Secure as You Think it is?
📡
BiDi Swap: The bidirectional text trick that makes fake URLs look real
📡
TEE.Fail attack breaks confidential computing on Intel, AMD, NVIDIA CPUs
📡
Google Chrome to warn users before opening insecure HTTP sites
📡
Microsoft: Copilot now lets you build apps, automate workflows
📡
Microsoft sued for allegedly tricking millions into Copilot M365 subscriptions
📡
Protecting specified information in non-Government of Canada systems and organizations (ITSP.10.171)
📡
Python rejects $1.5M grant from U.S. govt. fearing ethical compromise
📡
AI Security: NVIDIA BlueField Now with Vision One™
📡
Keeping the Internet fast and secure: introducing Merkle Tree Certificates