105Articles
8Categories
2025-11-19Date
🚨
The nexus of risk and intelligence: How vulnerability-informed hunting uncovers what everything else missesFor years, I watched organizations treat vulnerability data like a compliance chore. It was something to scan, sort and patch against deadlines. Yet buried in those reports is a treasure map of sorts, where an attacker is likely to strike first. In my previous red team and incide…
KEV
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-13223 Google Chromium V8 Type Confusion Vulnerability  This type of vulnerability is a frequent attack vector for malicious cyber ac…
KEV
🐛
Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild
KEV
🐛
New FortiWeb 0-Day Code Execution Flaw Actively Exploited
KEV
🐛
Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild
KEV
🐛
Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)
🐛
CISA Alerts on Fortinet FortiWeb Vulnerability Exploited in Real-World Attacks
⚠️
Cybersecurity Today: CloudFlare Outage, Microsoft's AI Risk, New Red Team Tool, and More!
⚠️
Behind the firewall: The hidden struggles of cyber professionals with a disability
⚠️
New ShadowRay Exploit Targets Vulnerability in Ray AI Framework to Attack AI Systems
⚠️
Eurofiber Data Breach – Hackers Exploited Vulnerability to Exfiltrate Users’ Data
⚠️
Fortinet Discloses Second Exploited FortiWeb Zero-Day in a Week
⚠️
Health and Wellness of the CISO as They Crack Under Pressure and Need a BISO to Scale - BSW #422
⚠️
ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts
⚠️
Overcome the myriad challenges of password management to bolster data protection
⚠️
Legal Restrictions on Vulnerability Disclosure
⚠️
Two-Year-Old Ray AI Framework Flaw Exploited in Ongoing Campaign
⚠️
WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide
⚠️
CISA gives govt agencies 7 days to patch new Fortinet flaw
⚠️
CISA Releases Guide to Mitigate Risks from Bulletproof Hosting Providers
⚠️
Hidden API in Comet AI browser raises security red flags for enterprises
⚠️
New WrtHug campaign hijacks thousands of end-of-life ASUS routers
⚠️
Bitcoin Core audit
⚠️
Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices
⚠️
W3 Total Cache WordPress plugin vulnerable to PHP command injection
⚠️
Chinese PlushDaemon Hackers Exploit EdgeStepper Tool to Hijack Legitimate Updates and Redirect to Malicious Servers
⚠️
Hackers Exploit Tuoni C2 Framework to Stealthily Deploy In-Memory Payloads
⚠️
CredShields Joins Forces with Checkmarx to Bring Smart Contract Security to Enterprise AppSec Programs
⚠️
Researchers discover security vulnerability in WhatsApp— Worldwide enumeration of accounts was possible due to a —now closed— privacy vulnerability
⚠️
Researchers discover security vulnerability in WhatsApp— Worldwide enumeration of accounts was possible due to a —now closed— privacy vulnerability
⚠️
WhatsApp flaw allowed discovery of the 3.5 billion mobile numbers registered to the platform
⚠️
News alert: SquareX exposes obscure AI browser flaw that gives extensions full access to user devices
⚠️
Iranian APT hacks helped direct missile strikes in Israel and the Red Sea
⚠️
Risky Business #815 -- Anthropic's AI APT report is a big deal
📋
Critical SolarWinds Serv-U Flaws Allow Remote Admin-Level Code Execution
📋
‘PlushDaemon’ hackers hijack software updates in supply-chain attacks
📋
EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates
📢
Microsoft Unveils Security Enhancements for Identity, Defense, Compliance
📢
CISA Unveils Guide to Combat Bulletproof Hosting Cybercrime
📢
Atlassian security advisory (AV25-770)
📢
Microsoft Edge security advisory (AV25-771)
📢
SolarWinds security advisory (AV25-772)
📢
CISA Releases New Guides to Safeguard Critical Infrastructure from Unmanned Aircraft Systems Threats
📢
CISA Urges Critical Infrastructure to Be Air Aware
📢
VMware security advisory (AV25-773)
📢
News alert: ‘Shopping Cart Inspect’ wins top award for stopping online payment skimming in real time
🔥
Anthropic AI-powered cyberattack causes a stir
KEV
🔥
New .NET Malware Conceals Lokibot Inside PNG/BMP Files to Bypass Detection
🔥
Cloudflare Reveals Full Technical Explanation of Major Internet Outage
🔥
Datenpanne bei Eurofiber France
🔥
Meet ShinySp1d3r: New Ransomware-as-a-Service created by ShinyHunters
🔥
French agency Pajemploi reports data breach affecting 1.2M people
🔥
Russian bulletproof hosting provider sanctioned over ransomware ties
🔥
US, UK, and Australia sanction Russian ‘bulletproof’ web host used in ransomware attacks
🔥
Secure.com Raises $4.5 Million for Agentic Security
🔥
Alleged Data Breach of NVIDIA
🔥
Obscure MCP API in Comet Browser Breaches User Trust, Enabling Full Device Control via AI Browsers
🔥
The Gentlemen” Ransomware Group Deploys Dual-Extortion Tactics, Encrypting and Exfiltrating Data
🔥
Single Click on CAPTCHA Triggers Destructive Akira Ransomware Attack on Malicious Website
🕵️
Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar
🕵️
If I wish to explore the world of hacking, where do l begin ? I mean, it has to be with my own machine, correct ???
🕵️
ISC Stormcast For Wednesday, November 19th, 2025 https://isc.sans.edu/podcastdetail/9706, (Wed, Nov 19th)
🕵️
New npm Malware Campaign Checks If Visitor Is a Victim or Researcher Before Initiating Infection
🕵️
Microsoft Adds Azure Firewall With AI-Powered Security Copilot
🕵️
New Phishing Kit Using BitB Technique Targets Microsoft Accounts to Steal Credentials via Sneaky 2FA Attack
🕵️
Microsoft Adds New Threat Briefing Agent Inside Defender Portal
🕵️
Largest Azure DDoS Attack Powered by Aisuru Botnet
🕵️
AI Is Supercharging Phishing: Here’s How to Fight Back
🕵️
Agent Access Control: Trust Zones
🕵️
Self-replicating botnet attacks Ray clusters • The Register
🕵️
Bonkers Bitcoin heist: 5-star hotels, cash-filled envelopes, vanishing funds - Ars Technica
🕵️
Our CIO on Why Security Must Be Built Into AI from Day One
🕵️
AI-Enhanced Tuoni Framework Targets Major US Real Estate Firm - Infosecurity Magazine
🕵️
New ShadowRay attacks convert Ray clusters into crypto miners
🕵️
Mate Emerges From Stealth Mode With $15.5 Million in Seed Funding
🕵️
Half a Million Stolen FTSE 100 Credentials Found on Criminal Sites - Infosecurity Magazine
🕵️
How KnowBe4 Uses AI Efficiently to Get the Best Results
🕵️
Understanding vs Building LLMs
🕵️
Amazon Details Iran’s Cyber-Enabled Kinetic Attacks Linking Digital Spying to Physical Strikes
🕵️
FIRESIDE CHAT: Edge AI moves onto the silicon layer, redefining how connected systems run
🕵️
A Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone Numbers
🕵️
Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications
🕵️
Microsoft Teams Adds Option to Report Misidentified Threat Messages
🕵️
Nova Stealer Targets macOS Users, Swaps Legit Apps to Steal Crypto Wallets
🕵️
News alert: Secure.com debuts AI-native ‘Digital Security Teammate’ to help lean security teams
🕵️
How the classic anime ‘Ghost in the Shell’ predicted the future of cybersecurity 30 years ago
🕵️
News alert: CredShields and Checkmarx partner to extend AppSec into Web3 and smart contracts
🕵️
Cutting Through AI Hype
🕵️
PlushDaemon compromises network devices for adversary-in-the-middle attacks
📡
Cloudflare blames this week's massive outage on database issues
📡
California man admits to laundering crypto stolen in $230M heist
📡
Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software
📡
Hacking Black Friday: using LLMs to save on the “sale of the year” | Kaspersky official blog
📡
Security startup Guardio nabs $80M from ION Crossover Partners
📡
Joint guidance on mitigating risks from bulletproof hosting providers
📡
The Cloudflare Outage May Be a Security Roadmap
📡
The hidden risks in your DevOps stack data—and how to address them
📡
Unicode: It is more than funny domain names., (Wed, Nov 12th)
📡
Securing your network for the holidays
📡
Google Search is now using AI to create interactive UI to answer your questions
📡
Google's Gemini 3 is living up to the hype and creating games in one shot
📡
Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack
📡
Analysis of a Large-Scale DDoS Attack Against a Payment Processing Platform
📡
OpenAI says its latest GPT-5.1 Codex can code independently for hours
📡
Analysis of a Large-Scale DDoS Attack Against a Payment Processing Platform