89Articles
8Categories
2025-11-18Date
๐Ÿšจ
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-58034 Fortinet FortiWeb OS Command Code Injection Vulnerability  This type of vulnerability is a frequent attack vector for maliciouโ€ฆ
KEV
๐Ÿ›
Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability
KEV
๐Ÿ›
W3 Total Cache Security Vulnerability Exposes One Million WordPress Sites to RCE
๐Ÿ›
Chrome Zero-Day Type Confusion Flaw Actively Exploited in the Wild
KEV
๐Ÿ›
CISA Reports Active Attacks on FortiWeb WAF Vulnerability Allowing Admin Access
KEV
๐Ÿ›
Fortinetโ€™s silent patch sparks alarm as a critical FortiWeb flaw is exploited in the wild
KEV
๐Ÿ›
Chromium: CVE-2025-13224 Type Confusion in V8
๐Ÿ›
Chromium: CVE-2025-13223 Type Confusion in V8
๐Ÿ›
More work for admins as Google patches latest zero-day Chrome vulnerability
KEV
โš ๏ธ
Microsoft fixes Windows 10 update flaw
โš ๏ธ
Rethinking identity for the AI era: CISOs must build trust at machine speed
โš ๏ธ
Chrome 142 Update Patches Exploited Zero-Day
โš ๏ธ
Imunify AI-Bolit Flaw Allows Arbitrary Code Execution and Root Privilege Escalation
โš ๏ธ
Microsoft Mitigates Record 5.72 Tbps DDoS Attack Driven by AISURU Botnet
โš ๏ธ
Google fixes new Chrome zero-day flaw exploited in attacks
โš ๏ธ
Azure blocks record 15 Tbps DDoS attack as IoT botnets gain new firepower
โš ๏ธ
Data Stolen in Eurofiber France Hack
โš ๏ธ
Energiesektor im Visier von Hackern
โš ๏ธ
Researchers Detail Tuoni C2's Role in an Attempted 2025 Real-Estate Cyber Intrusion
โš ๏ธ
CISA Releases Six Industrial Control Systems Advisories
โš ๏ธ
Fortinet warns of new FortiWeb zero-day exploited in attacks
โš ๏ธ
News alert: SpyCloud forecasts Top 10 identity threats set to define 2026 security landscape
โš ๏ธ
New EchoGram Trick Makes AI Models Accept Dangerous Inputs
โš ๏ธ
DoorDash Confirms Data Breach Compromised User Data
โš ๏ธ
Authorities Dismantle Thousands of Servers from Illicit Hosting Company Linked to Cyberattacks
โš ๏ธ
New ShadowRay attacks convert Ray clusters into crypto miners
โš ๏ธ
Multiple Vulnerabilities in Fortinet Products Could Allow for Arbitrary Code Execution
๐Ÿ“ข
Mapping Remcos RAT C2 Activity and Associated Communication Ports
๐Ÿ“ข
Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities
๐Ÿ“ข
Google Chrome security advisory (AV25-766)
๐Ÿ“ข
Zyxel security advisory (AV25-767)
๐Ÿ“ข
MI5 Warns Lawmakers That Chinese Spies Are Trying to Reach Them via LinkedIn
๐Ÿ“ข
How to securely vet browser extensions across your organization
๐Ÿ“ข
SecurityMetrics Wins โ€œData Leak Detection Solution of the Yearโ€ in 2025 CyberSecurity Breakthrough Awards Program
๐Ÿ“ข
HPE security advisory (AV25-768)
๐Ÿ“ข
Fortinet security advisory (AV25-769)
๐Ÿ”ฅ
Threat Actors Use Compromised RDP to Deploy Lynx Ransomware After Deleting Backups
๐Ÿ”ฅ
A miracle: A company says sorry after a cyber attack โ€“ and donates the ransom to cybersecurity research
๐Ÿ”ฅ
Breaking Down S3 Ransomware: Variants, Attack Paths and Trend Vision Oneโ„ข Defenses
๐Ÿ”ฅ
Pennsylvania Attorney General Confirms Data Breach After Ransomware Attack
๐Ÿ”ฅ
Princeton University Data Breach Impacts Alumni, Students, Employees
๐Ÿ”ฅ
French agency Pajemploi reports data breach affecting 1.2M people
๐Ÿ”ฅ
We Hacked Flock Safety Cameras in under 30 Seconds - Benn Jordan (YouTube, 40 min)
๐Ÿ”ฅ
We Hacked Flock Safety Cameras in under 30 Seconds - Benn Jordan (YouTube, 40 min)
๐Ÿ”ฅ
Ransomware Surge in Q3 2025
๐Ÿ”ฅ
Cloudflare Outage Not Caused by Cyberattack
๐Ÿ”ฅ
Princeton University Data Breach: Donor Information Exposed in Compromised Database
๐Ÿ•ต๏ธ
ISC Stormcast For Tuesday, November 18th, 2025 https://isc.sans.edu/podcastdetail/9704, (Tue, Nov 18th)
๐Ÿ•ต๏ธ
Lazarus APT Groupโ€™s New ScoringMathTea RAT Enhances Remote Command Execution and More
๐Ÿ•ต๏ธ
Massive 15 Tbps DDoS Attack From 500K Devices Slams Azure Network
๐Ÿ•ต๏ธ
UNC1549 Hackers With Custom Tools Attacking Aerospace and Defense Systems to Steal Logins
๐Ÿ•ต๏ธ
Secure Coding as Critical Thinking Instead of Vulnspotting - Matias Madou - ASW #357
๐Ÿ•ต๏ธ
AI and Voter Engagement
๐Ÿ•ต๏ธ
CISOs: Balancing Security Budgets
๐Ÿ•ต๏ธ
SpearSpecter
๐Ÿ•ต๏ธ
Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages
๐Ÿ•ต๏ธ
Stadtwerke Detmold von Hackerangriff betroffen
๐Ÿ•ต๏ธ
CyberheistNews Vol 15 #46 [The Click Trap] Users Pasting Malware With Just One Shortcut
๐Ÿ•ต๏ธ
Nudge Security Raises $22.5 Million in Series A Funding
๐Ÿ•ต๏ธ
Apono Raises $34 Million for Cloud Identity Management Platform
๐Ÿ•ต๏ธ
Cloudflare hit by outage affecting global network services
๐Ÿ•ต๏ธ
Frontline Intelligence: Analysis of UNC1549 TTPs, Custom Tools, and Malware Targeting the Aerospace and Defense Ecosystem | Google Cloud Blog
๐Ÿ•ต๏ธ
Webinar Today: Protecting What WAFs and Gateways Canโ€™t See โ€“ Register
๐Ÿ•ต๏ธ
Meta Paid Out $4 Million via Bug Bounty Program in 2025
๐Ÿ•ต๏ธ
Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks
๐Ÿ•ต๏ธ
Prisma AIRS Integrates Azure AI Foundry for Comprehensive AI Security
๐Ÿ•ต๏ธ
Advancing Cybersecurity for Microsoft Environments
๐Ÿ•ต๏ธ
Agents built into your workflow: Get Security Copilot with Microsoft 365 E5
๐Ÿ•ต๏ธ
โ€‹โ€‹Ambient and autonomous security for the agentic eraโ€‹โ€‹
๐Ÿ•ต๏ธ
Is there any other means of surfing the world wide web without the internet and services of companies like cloudflare ?
๐Ÿ•ต๏ธ
SpyCloud Unveils Top 10 Cybersecurity Predictions Poised to Disrupt Identity Security in 2026
๐Ÿ•ต๏ธ
WhatsApp Screen-Sharing Scam: How Attackers Are Deceiving Users to Expose Sensitive Information
๐Ÿ•ต๏ธ
Google Play Store to Show Warning for Power-Hungry Apps
๐Ÿ•ต๏ธ
Warning: New Phishing Kit Targets Italian Entities
๐Ÿ•ต๏ธ
Cloudflare, Gh0stRAT, npm, North Koreans, Arch, Steam, Documentaries, Aaran Leyland - SWN #530
๐Ÿ•ต๏ธ
UEFI Shells: A Hidden Threat
๐ŸŽ™๏ธ
The AI Fix #77: Genome LLM makes a super-virus, and should AI decide if you live?
๐Ÿ“ก
KongTuke activity, (Tue, Nov 18th)
๐Ÿ“ก
Cloudflare hit by outage affecting global network services
๐Ÿ“ก
Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale
๐Ÿ“ก
Tycoon 2FA and the Collapse of Legacy MFA
๐Ÿ“ก
From point-in-time audits to continuous confidence: How Sophos IT transformed identity defense
๐Ÿ“ก
The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA
๐Ÿ“ก
Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year
๐Ÿ“ก
Microsoft Teams to let users report messages wrongly flagged as threats
๐Ÿ“ก
Microsoft is bringing native Sysmon support to Windows 11, Server 2025
๐Ÿ“ก
Microsoft to integrate Sysmon directly into Windows 11, Server 2025
๐Ÿ“ก
Windows 11 gets new Cloud Rebuild, Point-in-Time Restore tools
๐Ÿ“ก
Thunderbird adds native support for Microsoft Exchange accounts