84Articles
7Categories
2025-11-07Date
🐛
Cisco fixes critical flaws in Unified Contact Center Express
KEV
🐛
Amazon WorkSpaces for Linux Vulnerability Exposes Valid Auth Tokens to Attackers
🐛
Chrome 142 Update Patches High-Severity Flaws
🐛
Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362
🐛
Data Exposure Vulnerability Found in Deep Learning Tool Keras
🐛
Landfall Android Spyware Targeted Samsung Phones via Zero-Day
🐛
Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp
⚠️
Malicious npm packages contain Vidar infostealer
⚠️
Claude Desktop Hit by Critical RCE Flaws Allowing Remote Code Execution
⚠️
Innovative Tools and Tactics in Cybersecurity
⚠️
Why can’t enterprises get a handle on the cloud misconfiguration problem?
⚠️
Wie CISOs vom ERP-Leid profitieren
⚠️
New Phishing Campaign Targets Travelers via Compromised Hotel Booking.com Accounts
⚠️
Over 15 Malicious npm Packages Exploiting Windows to Deploy Vidar Malware
⚠️
Business continuity and cybersecurity: Two sides of the same coin
⚠️
Attackers Exploit Active Directory Sites to Escalate Privileges and Compromise Domain
⚠️
‘Landfall’ spyware abused zero-day to hack Samsung Galaxy phones
⚠️
Vibe-coded ransomware proof-of-concept ended up on Microsoft’s marketplace
⚠️
New Analysis Reveals LockBit 5.0’s Core Features and Dual-Stage Attack Model
⚠️
Washington Post victim of Cl0p gang Oracle hack​Washington Post is latest victim of Oracle-hacking Cl0p gang | Cybernews
⚠️
Defending digital identity from computer-using agents (CUAs)
⚠️
ClickFix Attack Evolves: Weaponized Videos Trigger Self-Infection Tactics
⚠️
Bronze Butler APT Exploits 0-Day Bug to Root Japan Orgs
⚠️
ID verification laws are fueling the next wave of breaches
⚠️
Cisco: Actively exploited firewall flaws now abused for DoS attacks
KEV
⚠️
Kubevirt security audit
⚠️
Phishing Emails Use Invisible Hyphens to Avoid Detection
⚠️
QNAP fixes seven NAS zero-day flaws exploited at Pwn2Own
⚠️
New LandFall spyware exploited Samsung zero-day via WhatsApp messages
⚠️
Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
📢
OPNsense Firewall Update Addresses Multiple Security Issues and Enhances Features
📢
U.S. Congressional Budget Office Hit by Cyberattack, Sensitive Data Compromised
📢
Apple security advisory (AV25-727)
📢
Google Chrome security advisory (AV25-728)
📢
Microsoft Edge security advisory (AV25-730)
📢
Drupal security advisory (AV25-729)
📢
Qualcomm security advisory – November 2025 monthly rollup (AV25-731)
🔥
Cavalry Werewolf Launches Cyberattack on Government Agencies to Deploy Network Backdoor
🔥
Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities
🔥
Influence of Chinese Hacker Organizations on U.S. Foreign Policy
🔥
Destructive Russian Cyberattacks on Ukraine Expand to Grain Sector
🔥
The Congressional Budget Office Was Hacked. It Says It Has Implemented New Security Measures
🔥
U.S. Congressional Budget Office hit by suspected foreign cyberattack
🔥
Threat Actors Use Stolen RDP Credentials to Deploy Cephalus Ransomware
🔥
Nikkei Suffers Breach Via Slack Compromise
🔥
AI-Slop ransomware test sneaks on to VS Code marketplace
🔥
In Other News: Controversial Ransomware Report, Gootloader Returns, More AN0M Arrests
🔥
From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools
🔥
Congressional Budget Office confirms it was hacked
🔥
Cavalry Werewolf Launches Cyberattack on Government Agencies to Deploy Network Backdoor
🔥
​​Whisper Leak: A novel side-channel attack on remote language models
🔥
Africa is Being Targeted by a Surge in AI-Fueled Phishing Attacks
🔥
Washington Post confirms data breach linked to Oracle hacks
🕵️
ISC Stormcast For Friday, November 7th, 2025 https://isc.sans.edu/podcastdetail/9690, (Fri, Nov 7th)
🕵️
Sandworm Hackers Target Ukrainian Organizations With Data-Wiping Malware
🕵️
Attackers Deploy LeakyInjector and LeakyStealer to Hijack Crypto Wallets and Browser Info
🕵️
18 Arrested in Crackdown on Credit Card Fraud Rings
🕵️
Researchers Bypass Elastic EDR Call-Stack Signatures Using Call Gadgets
🕵️
Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts
🕵️
New Android Malware ‘Fantasy Hub’ Spies on Users’ Calls, Contacts, and Messages
🕵️
DOJ Antitrust Review Clears Google’s $32 Billion Acquisition of Wiz
🕵️
Report: Nevada State Hackers Evaded Detection for Months
🕵️
Faking Receipts with AI
🕵️
Herodotus Android Banking Trojan Takes Over Devices, Outsmarts Security Tools
🕵️
Malicious npm packages contain Vidar infostealer | CSO Online
🕵️
ClickFix Attacks Against macOS Users Evolving
🕵️
Hacktivist-Driven DDoS Dominates Attacks on Public Sector - Infosecurity Magazine
🕵️
German ISP aurologic GmbH Identified as Key Hub for Malicious Hosting Infrastructure
🕵️
Sandworm hackers use data wipers to disrupt Ukraine's grain sector
🕵️
Introducing KnowBe4 Studios | Fresh Content Updates from October 2025
🕵️
Radical Empowerment From Your Leadership: Understood by Few, Essential for All
🕵️
Warning: Malicious Apps Are Impersonating AI Tools
🕵️
Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation
🕵️
Malicious Infrastructure Finds Stability with aurologic GmbH
🕵️
Friday Squid Blogging: Squid Game: The Challenge, Season Two
🕵️
AI-Obfuscating Malware, China Influence Ops, and Meta’s Fraud Fortune and Jason Wood - SWN #527
🕵️
The who, where, and how of APT attacks in Q2 2025–Q3 2025
🌐
Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation
🌐
Malicious NuGet packages drop disruptive 'time bombs'
📡
Enterprise Credentials at Risk – Same Old, Same Old?
📡
Leak confirms Google Gemini 3 Pro and Nano Banana 2 could launch soon
📡
How scammers use email for blackmail and extortion | Kaspersky official blog
📡
Microsoft testing faster Quick Machine Recovery in Windows 11
📡
In memoriam: David Harley