72Articles
7Categories
2025-11-03Date
๐Ÿ›
Critical UniFi OS Flaw Enables Remote Code Execution
๐Ÿ›
Hackers Actively Scanning TCP Ports 8530/8531 for WSUS CVE-2025-59287
๐Ÿ›
XWiki SolrSearch Exploit Attempts (CVE-2025-24893) with link to Chicago Gangs/Rappers, (Mon, Nov 3rd)
๐Ÿ›
OpenAIs Aardvark soll Fehler im Code erkennen und beheben
โš ๏ธ
China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
โš ๏ธ
Alarm Bells in Ivy League School
โš ๏ธ
EDR-Redir V2 Evades Detection on Windows 11 by Faking Program Files
โš ๏ธ
What does aligning security to the business really mean?
โš ๏ธ
US Appeals Court lowers burden of proof for data breach lawsuits
โš ๏ธ
New BOF Tool Bypasses Microsoft Teams Cookie Encryption to Steal User Chats
โš ๏ธ
Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - ESW #431
โš ๏ธ
Anthropic Claude โ€“ Unternehmensdaten gefรคhrdet
โš ๏ธ
New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea
โš ๏ธ
Rhysida ransomware exploits Microsoft certificate to slip malware past defenses
โš ๏ธ
Hacktivists increasingly target industrial control systems, Canada Cyber Centre warns
โš ๏ธ
UNC6384 Targets European Diplomats Via Windows Exploit
โš ๏ธ
China-linked hackers exploited Lanscope flaw as a zero-day in attacks
โš ๏ธ
Attackers dig up $11M in Garden Finance crypto exploit โ€ข The Register
โš ๏ธ
Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks
โš ๏ธ
Microsoft: Patch for WSUS flaw disabled Windows Server hotpatching
KEV
โš ๏ธ
Report: AI Poisoning Attacks Are Easier Than Previously Thought
โš ๏ธ
Fake Solidity VSCode extension on Open VSX backdoors developers
โš ๏ธ
How an ex-L3 Harris Trenchant boss stole and sold cyber exploits to Russia
โš ๏ธ
Lawmakers say stolen police logins are exposing Flock surveillance cameras to hackers
โš ๏ธ
Creating a Linux Application Using VSCodium, Cline, OpenRouter, and Claude
๐Ÿ“ข
Dell security advisory (AV25-715)
๐Ÿ“ข
IBM security advisory (AV25-714)
๐Ÿ“ข
Ubuntu security advisory (AV25-716)
๐Ÿ“ข
Red Hat security advisory (AV25-717)
๐Ÿ“ข
[Control systems] CISA ICS security advisories (AV25โ€“718)
๐Ÿ“ข
[Control systems] ABB security advisory (AV25-719)
๐Ÿ“ข
Microsoft Edge security advisory (AV25-720)
๐Ÿ“ข
Ubiquiti security advisory (AV25-721)
๐Ÿ”ฅ
Proton Warns of 300 Million Stolen Login Details Circulating on Dark Web
๐Ÿ”ฅ
Conti Ransomware Operator Extradited to the United States
๐Ÿ”ฅ
Weekly Update 476
๐Ÿ”ฅ
Ribbon Communications Breach Marks Latest Telecom Hack
๐Ÿ”ฅ
โ€˜We got hackedโ€™ emails threaten to leak University of Pennsylvania data
๐Ÿ”ฅ
Researchers Uncover BankBot-YNRK and DeliveryRAT Android Trojans Stealing Financial Data
๐Ÿ”ฅ
Open VSX Registry Responds to Leaked Tokens and Malicious Extension Incident
๐Ÿ”ฅ
Ground zero: 5 things to do after discovering a cyberattack
๐Ÿ”ฅ
โšก Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More
๐Ÿ”ฅ
Claude AI APIs Can Be Abused for Data Exfiltration
๐Ÿ”ฅ
New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea
๐Ÿ”ฅ
Hackers use RMM tools to breach freighters and steal cargo shipments
๐Ÿ”ฅ
US cybersecurity experts indicted for BlackCat ransomware attacks
๐Ÿ”ฅ
SesameOp: Novel backdoor uses OpenAI Assistants API for command and control
๐Ÿ”ฅ
DOJ accuses US ransomware negotiators of launching their own ransomware attacks
๐Ÿ•ต๏ธ
ISC Stormcast For Monday, November 3rd, 2025 https://isc.sans.edu/podcastdetail/9682, (Mon, Nov 3rd)
๐Ÿ•ต๏ธ
OpenAI Introduces Aardvark, an AI Security Agent Powered by GPT-5
๐Ÿ•ต๏ธ
Windows 11 24H2/25H2 Flaw Keeps Task Manager Running After You Close It
๐Ÿ•ต๏ธ
Google Pays $100,000 in Rewards for Two Chrome Vulnerabilities
๐Ÿ•ต๏ธ
Chinese APT Uses โ€˜Airstalkโ€™ Malware in Supply Chain Attacks
๐Ÿ•ต๏ธ
AI Summarization Optimization
๐Ÿ•ต๏ธ
Open VSX rotates access tokens used in supply-chain malware attack
๐Ÿ•ต๏ธ
Cybersecurity M&A Roundup: 45 Deals Announced in October 2025
๐Ÿ•ต๏ธ
Crooks target luxury brands with 1,330 fake domains | Cybernews
๐Ÿ•ต๏ธ
The Evolution of SOC Operations: How Continuous Exposure Management Transforms Security Operations
๐Ÿ•ต๏ธ
Malware implant authors can see you delete their evil code โ€ข The Register
๐Ÿ•ต๏ธ
Who is Zico Kolter? A Professor Leads OpenAI Safety Panel With Power to Halt Unsafe AI Releases
๐Ÿ•ต๏ธ
Connect with Jesper Gerved: Talking cyber risk quantification with Richard Seiersen
๐Ÿ•ต๏ธ
CISO Burnout โ€“ Epidemic, Endemic, or Simply Inevitable?
๐Ÿ•ต๏ธ
How Software Development Teams Can Securely and Ethically Deploy AI Tools
๐Ÿ•ต๏ธ
Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case
๐Ÿ•ต๏ธ
'TruffleNet' Attack Uses Stolen Credentials Against AWS
๐Ÿ•ต๏ธ
Hackers Help Organized Crime Groups in Cargo Freight Heists - Infosecurity Magazine
๐ŸŒ
OAuth Device Code Phishing: Azure vs. Google Compared
๐ŸŒ
Microsoft: SesameOp malware abuses OpenAI Assistants API in attacks
๐ŸŒ
Malicious VSX Extension "SleepyDuck" Uses Ethereum to Keep Its Command Server Alive
๐Ÿ“ก
Microsoft: Windows Task Manager wonโ€™t quit after KB5067036 update
๐Ÿ“ก
Kaspersky for Linux expands security options for home users | Kaspersky official blog
๐Ÿ“ก
Hacker steals over $120 million from Balancer DeFi crypto protocol