89Articles
10Categories
2025-11-13Date
🚨
When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed SecurityThe Race for Every New CVE Based on multiple 2025 industry reports: roughly 50 to 61 percent of newly disclosed vulnerabilities saw exploit code weaponized within 48 hours. Using the CISA Known Exploited Vulnerabilities Catalog as a reference, hundreds of software flaws are now c…
KEV
🐛
Active Exploitation of Cisco and Citrix 0-Day Vulnerabilities Allows Webshell Deployment
🐛
Citrix NetScaler ADC and Gateway Flaw Allows Cross-Site Scripting (XSS) Attacks
🐛
CISA Warns of Active Exploitation of WatchGuard Firebox Out-of-Bounds Write Flaw
KEV
🐛
Critical Dell Data Lakehouse Flaw Allows Remote Attackers to Escalate Privileges
🐛
CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks
KEV
🐛
GitLab Vulnerabilities Expose Users to Prompt Injection Attacks and Data Theft
🐛
Cisco ISE, CitrixBleed 2 Vulnerabilities Exploited as Zero-Days: Amazon
🐛
Kibana Vulnerabilities Expose Systems to SSRF and XSS Attacks
🐛
Zero-day exploits hit Cisco ISE and Citrix systems in an advanced campaign
🐛
Critical WatchGuard Firebox Vulnerability Exploited in Attacks
🐛
CISA Warns of Active Exploitation of Windows Kernel 0-Day Enabling Privilege Escalation
🐛
Rust in Android: move fast and fix things
🐛
Chromium: CVE-2025-13042 Inappropriate implementation in V8
🐛
Privilege Escalation from lightdm Service User to root in KAuth Helper Service (CVE-2025-62876)
⚠️
Google asks US court to shut down Lighthouse phishing-as-a-service operation
⚠️
What CISOs need to know about new tools for securing MCP servers
⚠️
New ClickFix Attack Targeting Windows and macOS Users to Deploy Infostealer Malware
⚠️
CISA warns of WatchGuard firewall flaw exploited in attacks
KEV
⚠️
ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories
⚠️
Operation Endgame: Authorities Takedown 1,025 Servers Linked to Rhadamanthys, VenomRAT, and Elysium
⚠️
Police disrupts Rhadamanthys, VenomRAT, and Elysium malware operations
⚠️
Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown
⚠️
CISA warns feds to fully patch actively exploited Cisco flaws
KEV
⚠️
OpenAI Sora 2 Vulnerability Allows Exposure of Hidden System Prompts from Audio Data
⚠️
Rogue MCP servers can take over Cursor’s built-in browser
⚠️
Phishing Emails Alert: How Spam Filters Can Steal Your Email Logins in an Instant
⚠️
1,000+ Servers Hit in Law Enforcement Takedown of Rhadamanthys, VenomRAT, Elysium
⚠️
ChatGPT Vulnerability Exposed Underlying Cloud Infrastructure
⚠️
CISA and Partners Release Advisory Update on Akira Ransomware
⚠️
CISA warns federal agencies to patch flawed Cisco firewalls amid ‘active exploitation’ across the US government
KEV
⚠️
EOL-Software gefährdet Unternehmenssicherheit
⚠️
CISA Releases 18 Industrial Control Systems Advisories
⚠️
RCE flaw in ImunifyAV puts millions of Linux-hosted sites at risk
⚠️
Vulnerability Management: Tackling the Wrong Problem
⚠️
Fortinet FortiWeb flaw with public PoC exploited to create admin users
KEV
⚠️
DoorDash hit by yet another data breach this October
⚠️
DoorDash hit by new data breach in October exposing user information
📋
Going Around EDR - PSW #900
📢
Hackers Using RMM Tools LogMeIn and PDQ Connect to Deploy Malware as Legitimate Software
📢
BreachLock and Vanta Bridge the Gap Between Continuous Security Testing and Compliance with New Integration
📢
Operation Endgame schaltet Schadsoftware ab
📢
Webinar Today: The Future of Industrial Network Security
📢
Drupal security advisory (AV25-750)
📢
CISA Updates Guidance on Patching Cisco Devices Targeted in China-Linked Attacks
📢
GitLab security advisory (AV25-751)
📢
CISA, FBI and Partners Unveil Critical Guidance to Protect Against Akira Ransomware Threat
📢
[Control systems] Rockwell Automation security advisory (AV25-753)
📢
[Control systems] Schneider Electric security advisory (AV25-752)
📢
CISA warns of Akira ransomware Linux encryptor targeting Nutanix VMs
🔥
Operation Endgame 3.0 - 2,046,030 breached accounts
🔥
Synnovis Confirms Patient Information Stolen in Disruptive Ransomware Attack
🔥
NHS Investigating Oracle EBS Hack Claims as Hackers Name Over 40 Alleged Victims
🔥
Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain
🔥
Washington Post data breach impacts nearly 10K employees, contractors
🔥
H&M and Adidas yarn supplier breached, hackers claim​ | Cybernews
🔥
Kraken ransomware benchmarks systems for optimal encryption choice
🔥
How password managers can be hacked – and how to stay safe
🕵️
ISC Stormcast For Thursday, November 13th, 2025 https://isc.sans.edu/podcastdetail/9698, (Thu, Nov 13th)
🕵️
ThreatBook Peer-Recognized as a Strong Performer in the 2025 Gartner® Peer Insights™ Voice of the Customer for Network Detection and Response — for the Third Consecutive Year
🕵️
News Alert: Gartner ranks ThreatBook a ‘strong performer’ in NDR for the third consecutive year
🕵️
Google Sues “Lighthouse” Over Massive Phishing Attacks
🕵️
Firefox 145 and Chrome 142 Patch High-Severity Flaws in Latest Releases
🕵️
Beware of Fake Bitcoin Tools Concealing DarkComet RAT Malware
🕵️
Formbook Delivered Through Multiple Scripts, (Thu, Nov 13th)
🕵️
Malicious Chrome Extension Grants Full Control Over Ethereum Wallet
🕵️
GUEST ESSAY: How to defend against decision mimicry — a practical AI-era checklist for leaders
🕵️
Tens of Thousands of Malicious NPM Packages Distribute Self-Replicating Worm
🕵️
Hackers Infiltrate npm Registry with 43,000 Spam Packages, Linger for Nearly Two Years
🕵️
Threat Actors Use JSON Storage for Hosting and Delivering Malware via Trojanized Code
🕵️
Microsoft rolls out screen capture prevention for Teams users
🕵️
SmartApeSG Uses ClickFix to Deploy NetSupport RAT
🕵️
Case Study: University of West England uses Sophos solutions to protect thousands of students across multiple campuses
🕵️
Malicious npm Package with 206K Downloads Targeting GitHub Repositories to Steal Tokens
🕵️
Tycoon 2FA Phishing Kit Grows More Sophisticated
🕵️
Increase in Lumma Stealer Activity Coincides with Use of Adaptive Browser Fingerprinting Tactics
🕵️
Printer Driver Updater Flaws Could Usher in Poisoned Updates
🕵️
Over 67,000 Fake npm Packages Flood Registry in Worm-Like Spam Attack
🕵️
Cyber-Insurance Payouts Soar 230% in UK - Infosecurity Magazine
🌐
Popular Android-based photo frames download malware on boot
🌐
Police take down three cybercrime operations in latest round of ‘whack-a-mole’
🎙️
Smashing Security podcast #443: Tinder’s camera roll and the Buffett deepfake
📡
Over 46,000 Fake npm Packages Flood Registry in Worm-Like Spam Attack
📡
Book Review: The Business of Secrets
📡
Sophos named a Leader in the KuppingerCole 2025 Leadership Compass for Email Security
📡
Google Sues to Disrupt Chinese SMS Phishing Triad
📡
Kerberoasting in 2025: How to protect your service accounts
📡
How a fake AI sidebar can steal your data | Kaspersky official blog
📡
New ‘IndonesianFoods’ worm floods npm with 100,000 packages