86Articles
7Categories
2025-11-06Date
🐛
RCE in React Native CLI opens Dev Servers to attacks
🐛
HTTP/2 ‘MadeYouReset’ Vulnerability Enable Denial-of-Service (DoS) Attacks
🐛
Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703) - Help Net Security
KEV
🐛
Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362
🐛
Chromium: CVE-2025-12725 Out of bounds write in WebGPU
🐛
Chromium: CVE-2025-12727 Inappropriate implementation in V8
🐛
Chromium: CVE-2025-12726 Inappropriate implementation in Views.
⚠️
Google researchers detect first operational use of LLMs in active malware campaigns
⚠️
Synthient Credential Stuffing Threat Data - 1,957,476,021 breached accounts
⚠️
Gootloader Returns with a New ZIP File Tactic to Conceal Malicious Payloads
⚠️
Google Issues Emergency Chrome Update to Fix Critical RCE Flaw
⚠️
Hyundai AutoEver Confirms Data Breach Exposing Personal Data, Including SSNs and License Info
⚠️
What past ERP mishaps can teach CISOs about security platformization
⚠️
Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection
⚠️
Digital health can’t scale if cybersecurity falls behind
⚠️
Multiple Django Flaws Could Allow SQL Injection and Denial-of-Service Attacks
⚠️
Sandworm hackers use data wipers to disrupt Ukraine's grain sector
⚠️
KI-Malware ist keine Theorie mehr
⚠️
Rigged Poker Games
⚠️
DeFi Protocol Balancer Starts Recovering Funds Stolen in $128 Million Heist
⚠️
Cisco UCCX Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code
⚠️
Airstalk Malware Exploits AirWatch MDM for Covert C2 Communication
⚠️
Threat Actors Exploit VS Code Extensions for Ransomware via GitHub C2
⚠️
Cisco Confirms Active Exploitation of Secure ASA and FTD RCE Vulnerability
⚠️
Iranian Hackers Exploit RMM Tools to Target Academics and Foreign-Policy Experts
⚠️
Critical Cisco UCCX flaw lets attackers run commands as root
⚠️
Attackers exploit critical bypass flaw in WordPress JobMonster theme | SC Media
⚠️
The Great Firewall: Massive data leak reveals the inner workings of China's censorship regime
⚠️
The Great Firewall: Massive data leak reveals the inner workings of China's censorship regime
⚠️
CISA Releases Four Industrial Control Systems Advisories
⚠️
LastPass Phishing Campaign Informs Users of Phony Death Notifications
⚠️
Nikkei’s Slack breach leaks sensitive data from more than 17,000 users
⚠️
Multiple Vulnerabilities in Cisco Products Could Allow for Remote Code Execution
📢
2026 – nichts für schwache CI(S)O-Nerven
📢
Verdacht des systematischen Missbrauchs von Zahlungsdienstleistern
📢
From Tabletop to Turnkey: Building Cyber Resilience in Financial Services
🔥
HackedGPT: New Vulnerabilities in GPT Models Allow Attackers to Launch 0-Click Attacks
🔥
SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach
🔥
EndClient RAT Leverages Compromised Code-Signing to Slip Past Antivirus
🔥
Automotive IT Firm Hyundai AutoEver Discloses Data Breach
🔥
Nevada Ransomware Attack Started Months Before It Was Discovered, Per Report
🔥
Smashing Security podcast #442: The hack that messed with time, and rogue ransom where negotiators
🔥
HackedGPT - 7 New Vulnerabilities in GPT-4o and GPT-5 Enables 0-Click Attacks
🔥
Curly COMrades Hacker Group Using New Tools to Create Hidden Remote Access on Compromised Windows 10
🔥
5 ways to strengthen your firewall and endpoint’s defenses against ransomware – Sophos News
🔥
Iran's 'SmudgedSerpent APT Phishes US Policy Wonks
🔥
Critical Bug in Midnight Ransomware Tool Unlocks File Recovery
🔥
SonicWall says state-sponsored hackers behind September security breach
🔥
Credentials and Misconfigurations Behind Most Cloud Breaches, Says AWS – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
🔥
Nikkei-Daten über Slack-Konto eines Mitarbeiters geleakt
🔥
Hyundai AutoEver America data breach exposes SSNs, drivers licenses
🔥
The rising tide of cyber attacks against the UK water sector
🔥
How a ransomware gang encrypted Nevada government's systems
🔥
AI-Slop ransomware test sneaks on to VS Code marketplace
🔥
U.S. Congressional Budget Office hit by suspected foreign cyberattack
🕵️
ISC Stormcast For Thursday, November 6th, 2025 https://isc.sans.edu/podcastdetail/9688, (Thu, Nov 6th)
🕵️
Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary], (Wed, Nov 5th)
🕵️
Google Warns of PROMPTFLUX Malware That Uses Gemini API for Self-Rewriting Attacks
🕵️
Authorities Dismantle Large-Scale Credit Card Fraud Scheme Affecting 4.3 Million Users
🕵️
ValleyRAT Campaign Targets Windows via WeChat and DingTalk
🕵️
State-Sponsored Hackers Stole SonicWall Cloud Backups in Recent Attack
🕵️
Cisco Patches Critical Vulnerabilities in Contact Center Appliance
🕵️
Police busts credit card fraud rings with 4.3 million victims
🕵️
Checkpoint Analysis: Dissecting the $128M Balancer Pool Drain in Under 30 Minutes
🕵️
Follow Pragmatic Interventions to Keep Agentic AI in Check
🕵️
Google uncovers malware using LLMs to operate and evade detection - Help Net Security
🕵️
Truffle Security Raises $25 Million for Secret Scanning Engine
🕵️
AI Browsers That Beat Paywalls by Imitating Humans
🕵️
Perfectshift leak exposes healthcare credentials​ | Cybernews
🕵️
Researchers Hack ChatGPT Memories and Web Search Features
🕵️
Gootloader malware is back with new tricks after 7-month break
🕵️
New IDC research highlights a major cloud security shift
🕵️
I'm Hosting a New Podcast
🕵️
Microsoft Help Desk Phishing Attempt
🕵️
Turning To The Darkside & AI Cyberslop - PSW #899
🕵️
A CIO’s First Principles Reference Guide for Securing AI by Design
🕵️
ESET APT Activity Report Q2 2025–Q3 2025
🌐
Cloudflare Scrubs Aisuru Botnet from Top Domains List
🌐
ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More
🌐
ClickFix malware attacks evolve with multi-OS support, video tutorials
🌐
Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine
🌐
Italian political consultant says he was targeted with Paragon spyware
📡
Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response
📡
Continuous Purple Teaming: Turning Red-Blue Rivalry into Real Defense
📡
How enterprise efficiency grows with Kaspersky SD-WAN
📡
“Pay up or we share the tapes”: Hackers target massage parlour clients in blackmail scheme