SECURITY 70
- Follow-Up Cisco Updates Advisory with Additional Maximum Severity Unauthenticated RCE in ISE and ISE-PIC (CVE-2025-20337)
- The Linuxsys Cryptominer
- Mobile Forensics Tool Used by Chinese Law Enforcement Dissected
- Flaw in Signal App Clone Could Leak Passwords — GreyNoise Identifies Active Reconnaissance and Exploit Attempts
- Tracking Protestware Spread 28 npm Packages Affected by Payload Targeting Russian-Language Users
- Threat Actors Exploit SVG Files in Stealthy JavaScript Redirects
- Google Gemini Tricked Into Showing Phishing Message Hidden in Email
- Contagious Interview Campaign Escalates With 67 Malicious npm Packages and New Malware Loader
- Nvidia warns its GPUs – even Blackwells – need protection against Rowhammer attacks
- Ransomware Delivered Through GitHub A PowerShell-Powered Attack
- Fix the Click Preventing the ClickFix Attack Vector
- AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs
- PerfektBlue 1-click RCE attack
- Critical RCE Vulnerability in mcp-remote CVE-2025-6514 Threatens LLM Clients
- Attackers Inject Code into WordPress Theme to Redirect Visitors
- Malicious pull request infects VS Code extension
- Animation-Driven Tapjacking on Android
- Hackers abuse leaked Shellter red team tool to deploy infostealers
- Ingram Micro outage caused by SafePay ransomware attack
- Critical Sudo bugs expose major Linux distros to local Root exploits
- Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
- Okta observes v0 AI tool used to build phishing sites
- Critical ICS vulnerabilities threaten Mitsubishi Electric and TrendMakers hardware across commercial facilities
- Zero-day Bluetooth gap turns millions of headphones into listening stations
- Taking the shine off BreachForums
- Supply Chain Incident Imperils Glasgow Council Services and Data
- Gogs Remote Command Execution Vulnerability (CVE-2024-56731)
- Decrement by one to rule them all AsIO3.sys driver exploitation
- Cisco ISE Vulnerability Allows Remote Attackers to Execute Malicious Commands
- Realtek Bluetooth Flaw Allows Attackers to Launch DoS Attacks During Pairing
- Don't panic, but it's only a matter of time before critical 'CitrixBleed 2' is under attack
- Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
- SparkKitty, SparkCat’s little brother A new Trojan spy found in the App Store and Google Play
- Threat actor Banana Squad exploits GitHub repos in new campaign
- Famous Chollima deploying Python version of GolangGhost RAT
- Washington Post's email system hacked, journalists' accounts compromised
- VMOSX Data Leak Info of Thousands of Mac Cloud Users Potentially Exposed Online
- Tenable Fixes Three High-Severity Flaws in Vulnerability Scanner Nessus
- Kali Linux 2025.2 released with 13 new tools, car hacking updates
- Paraguay is Being Targeted by Cybercriminals - 7.4 Million Citizen Records for Sale
- Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
- New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches
- Inside FluxPanel How Phishing Enables Real-Time Ecommerce Checkout Hijacks
- Don't Get Caught in the Headlights - DeerStealer Analysis
- Over 80,000 servers hit as Roundcube RCE bug gets rapidly exploited
- NTLM reflection is dead, long live NTLM reflection! – An in-depth analysis of CVE-2025-33073
- Attackers Unleash TeamFiltration Account Takeover Campaign (UNK_SneakyStrike) Leverages Popular Pentesting Tool
- The Evolution of Linux Binaries in Targeted Cloud Operations
- Security Flaws in eMagicOne Store Manager for WooCommerce in WordPress (CVE-2025-5058 and CVE-2025-4603)
- Flask Phishing Kit Targeted Credential Theft Using Open-Source Technology
- Coordinated Brute Force Activity Targeting Apache Tomcat Manager Indicates Possible Upcoming Threats
- iMessage Zero-Click Attacks Suspected in Targeting of High-Value Individuals
- Two Botnets, One Flaw Mirai Spreads Through Wazuh Vulnerability
- Sleep with one eye open how Librarian Ghouls steal data by night
- PayU Plugin Flaw Allows Account Takeover on 5000 WordPress Sites
- Grocery wholesale giant United Natural Foods hit by cyberattack
- Operation DRAGONCLONE Chinese Telecommunication industry targeted via VELETRIX & VShell malware
- Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721
- Unmasking Insecure HTTP Data Leaks in Popular Chrome Extensions
- ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware
- Android Spyware Alert! Fake government app targeting Android users in India!
- Fake WordPress Caching Plugin Used to Steal Admin Credentials
- Criminals Bribed Outsourced Contractors to Steal Coinbase User Data
- Victims risk AsyncRAT infection after being redirected to fake Booking.com sites
- Qualcomm fixes three Adreno GPU zero-days exploited in attacks
- XSSing TypeErrors in Safari
- Zanubis in motion Tracing the active evolution of the Android banking malware
- MATLAB dev confirms ransomware attack behind service outage
- DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers
- Bypassing MTE with CVE-2025-0072