110Articles
9Categories
2025-12-11Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-58360 OSGeo GeoServer Improper Restriction of XML External Entity Reference Vulnerability  This type of vulnerability is a frequent …
KEV
πŸ›
Hidden .NET HTTP proxy behavior can open RCE flaws in apps β€” a security issue Microsoft won’t fix
πŸ›
Fortinet admins urged to update software to close FortiCloud SSO holes
KEV
πŸ›
CVE-2025-40334 drm/amdgpu: validate userq buffer virtual address and size
πŸ›
CVE-2025-66418 urllib3 allows an unbounded number of links in the decompression chain
πŸ›
CVE-2025-62408 c-ares has a Use After Free vulnerability when connection is cleaned up after error
πŸ›
CVE-2025-55753 Apache HTTP Server: mod_md (ACME), unintended retry intervals
πŸ›
CVE-2025-40336 drm/gpusvm: fix hmm_pfn_to_map_order() usage
πŸ›
CVE-2025-40338 ASoC: Intel: avs: Do not share the name pointer between components
πŸ›
CVE-2025-66471 urllib3 Streaming API improperly handles highly compressed data
πŸ›
CVE-2025-58098 Apache HTTP Server: Server Side Includes adds query string to #exec cmd=...
πŸ›
CVE-2025-46818 Redis: Authenticated users can execute LUA scripts as a different user
πŸ›
CVE-2025-11934 Improper Validation of Signature Algorithm Used in TLS 1.3 CertificateVerify
πŸ›
CVE-2025-11933 DoS Vulnerability in wolfSSL TLS 1.3 CKS Extension
πŸ›
Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks
πŸ›
Ivantis EPM-Systeme anfΓ€llig fΓΌr Angriffe
πŸ›
High-Severity Jenkins Flaw Enables Unauthenticated DoS Through HTTP CLI
πŸ›
React2Shell flaw (CVE-2025-55182) exploited for remote code execution
πŸ›
SAML authentication broken almost beyond repair
πŸ›
2025 CWE Top 25 Most Dangerous Software Weaknesses
πŸ›
CVE-2025-64669 Windows Admin Center Elevation of Privilege Vulnerability
πŸ›
Chromium: CVE-2025-14373 Inappropriate implementation in Toolbar
πŸ›
Chromium: CVE-2025-14372 Use after free in Password Manager
⚠️
.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL
⚠️
React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors
⚠️
Security researchers given new boost
⚠️
Smashing Security podcast #447: Grok the stalker, the Louvre heist, and Microsoft 365 mayhem
⚠️
644K+ Websites at Risk Due to Critical React Server Components Flaw
⚠️
Active Attacks Exploit Gladinet's Hard-Coded Keys for Unauthorized Access and Code Execution
KEV
⚠️
Google Patches Mysterious Chrome Zero-Day Exploited in the Wild
KEV
⚠️
700+ self-hosted Git instances battered in 0-day attacks (RCE in Gogs)
⚠️
Google fixes eighth Chrome zero-day exploited in attacks in 2025
KEV
⚠️
Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw
⚠️
Wide Range of Malware Delivered in React2Shell Attacks
⚠️
Unpatched Gogs Zero-Day Exploited for Months
⚠️
Pierce County Library Data Breach Impacts 340,000
⚠️
Hackers exploit unpatched Gogs zero-day to breach 700 servers
⚠️
NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems
⚠️
.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL
⚠️
Cybersecurity isn’t underfunded β€” It’s undermanaged
⚠️
AIs Exploiting Smart Contracts
⚠️
New ClickFix Attacks Exploit Official ChatGPT Website to Deliver macOS Infostealer
⚠️
New β€œSOAPwn” .NET Flaws Expose Barracuda, Ivanti, and Microsoft Devices to RCE
⚠️
Hackers Are Using Shared AI Chats to Steal Your Passwords and Crypto
⚠️
CISA Releases 12 Industrial Control Systems Advisories
⚠️
Hackers exploit Gladinet CentreStack cryptographic flaw in RCE attacks
⚠️
Wie im Netz gezielt manipuliert wird
⚠️
DNS Spoofing for Firmware Updates
⚠️
Adversarial Poetry and the Efficacy of AI Guardrails
⚠️
Adversarial Poetry and the Efficacy of AI Guardrails
⚠️
Introducing mrva, a terminal-first approach to CodeQL multi-repo variant analysis
πŸ“‹
ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit β€” and 20 More Stories
πŸ“‹
A big finish to 2025 in December’s Patch Tuesday
πŸ“’
How to justify your security investments
πŸ“’
CISA: Pro-Russia Hacktivists Target US Critical Infrastructure
πŸ“’
Just a moment...
πŸ“’
GitLab security advisory (AV25-827)
πŸ“’
Google Chrome security advisory (AV25-829)
πŸ“’
Drupal security advisory (AV25-828)
πŸ”₯
GOLD SALEM tradecraft for deploying Warlock ransomware
πŸ”₯
Japanese Firms Suffer Long Tail of Ransomware Damage
πŸ”₯
AI is accelerating cyberattacks. Is your network prepared?
πŸ”₯
Breach of 120 000 IP cameras in South Korea: security tips | Kaspersky official blog
πŸ”₯
UK fines LastPass over 2022 data breach impacting 1.6 million users
πŸ”₯
New DroidLock Malware Locks Android Devices and Demands Ransom Payment
πŸ”₯
New 01Flip Ransomware Targets Both Windows and Linux Systems
πŸ”₯
US banks scramble to assess data theft after hackers breach financial tech firm | TechCrunch
πŸ”₯
Battering RAM hardware hack breaks secure CPU enclaves
πŸ”₯
Notepad++ fixes flaw that let attackers push malicious update files
πŸ”₯
Black Hat Europe 2025: Reputation matters – even in the ransomware economy
πŸ•΅οΈ
GitLab discovers widespread npm supply chain attack
πŸ•΅οΈ
ISC Stormcast For Thursday, December 11th, 2025 https://isc.sans.edu/podcastdetail/9734, (Thu, Dec 11th)
πŸ•΅οΈ
Using AI Gemma 3 Locally with a Single CPU , (Wed, Dec 10th)
πŸ•΅οΈ
Security Alert: 19 Fake PNG Extensions Found in VS Code Marketplace
πŸ•΅οΈ
New β€œSpiderman” Phishing Kit Lets Hackers Build Fake Bank Login Pages Instantly
πŸ•΅οΈ
LW ROUNDTABLE: Lessons from 2025 β€” Cyber risk got personal; accountability enters a new phase
πŸ•΅οΈ
IBM Patches Over 100 Vulnerabilities
πŸ•΅οΈ
WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor
πŸ•΅οΈ
New DroidLock malware locks Android devices and demands a ransom
πŸ•΅οΈ
ClickFix Style Attack Uses Grok, ChatGPT for Malware Delivery
πŸ•΅οΈ
MITRE Posts Results of 2025 ATT&CK Enterprise Evaluations
πŸ•΅οΈ
Former Accenture Employee Charged Over Cybersecurity Fraud
πŸ•΅οΈ
Invisible IT is becoming the next workplace priority - Help Net Security
πŸ•΅οΈ
Over 10,000 Docker Hub images found leaking credentials, auth keys
πŸ•΅οΈ
AI Agents: The Next Big Challenge in Identity Management
πŸ•΅οΈ
Virtual Event Today: Cyber AI & Automation Summit Day 2
πŸ•΅οΈ
1inch Named Exclusive Swap Provider at Launch for Ledger Multisig
πŸ•΅οΈ
INE Highlights Enterprise Shift Toward Hands-On Training Amid Widening Skills Gaps
πŸ•΅οΈ
Charming Kitten Leak Reveals Key Operatives, Front Firms, and Massive Global Compromise
πŸ•΅οΈ
ValleyRAT Malware Evades Windows 11 Security with Stealthy Driver Install
πŸ•΅οΈ
Contractors with hacking records accused of wiping 96 govt databases
πŸ•΅οΈ
Imposter for hire: How fake people can gain very real access
πŸ•΅οΈ
NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems
πŸ•΅οΈ
Fresh CKS (and CKA) tips and takeaways
πŸ•΅οΈ
New DroidLock malware locks Android devices and demands a ransom
πŸ•΅οΈ
Redefining Workspace: Prisma Browser Secures Leadership in Frost Radar
πŸ•΅οΈ
Tech Segment: MITM Automation + Security News - Josh Bressers - PSW #904
πŸ•΅οΈ
News alert: INE sees surge in Q4 budget shifts as enterprises embrace hands-on training for AI roles
🌐
Malicious VSCode Marketplace extensions hid trojan in fake PNG file
🌐
SHADOW-VOID-042 Targets Multiple Industries with Void Rabisu-like Tactics
🌐
Palestine Action: Operations and Global Network
πŸ“‘
Microsoft fixes Windows Explorer white flashes in dark mode
πŸ“‘
The Impact of Robotic Process Automation (RPA) on Identity and Access Management
πŸ“‘
Security flaws in Freedom Chat app exposed users’ phone numbers and PINs
πŸ“‘
New ConsentFix attack hijacks Microsoft accounts via Azure CLI
πŸ“‘
Microsoft bounty program now includes any flaw impacting its services
πŸ“‘
A modern tale of blinkenlights
πŸ“‘
Sophos Tops G2 Winter 2026 Reports: #1 Overall in Endpoint, XDR, MDR and Firewall
πŸ“‘
Brave browser starts testing agentic AI mode for automated tasks
πŸ“‘
Locks, SOCs and a cat in a box: What SchrΓΆdinger can teach us about cybersecurity