2025-10-04 Daily Vulns
NEW: CVE vendor-product description metric Referenceurl title GithubURL CVE-2021-42193 n/a - n/a nopCom...
NEW: CVE vendor-product description metric Referenceurl title GithubURL CVE-2021-42193 n/a - n/a nopCom...
Oracle said on Thursday that customers of its E-Business Suite of products “have received extortion emails,” confirming a warning first issued on Wednesday by Alphabet’s Google. In a blog post, the...
An extortion group calling itself the Crimson Collective claims to have breached Red Hat’s private GitHub repositories, stealing nearly 570GB of compressed data across 28,000 internal projects. Thi...
Phishing and vulnerability exploitation accounted for the vast majority of initial access in cyber-attacks against EU organizations over the past year, according to ENISA. Over the period, phishing...
Today, we begin exposing the Iranian APT affiliated with the Counterintelligence Division (Unit 1500) of the IRGC-IO, known as Charming Kitten. Heading this operation is Abbas Rahrovi (aka Abbas H...
Security researchers at Infoblox have uncovered a massive network of 30,000 unique website addresses across 584 top-level domains, such as .com. These websites contain no malware or scams themselve...
Recent enforcement actions include OFAC sanctions in August targeting a Russian national who facilitated payments to DPRK-based Chinyong Information Technology Cooperation Company (Chinyong), also ...
A newly patched high-severity VMware vulnerability has been exploited as a zero-day since October 2024 for code execution with elevated privileges, NVISO Labs reports. According to NVISO, which was...
NEW: CVE vendor-product description metric Referenceurl title GithubURL CVE-2025-10773 B-Link - BL-AC2100 ...
Broadcom has warned about severe zero-day vulnerabilities affecting VMware software, which is widely used to power virtual machines. China-linked hackers may have been exploiting the flaws for mont...
Phantom Taurus is a previously undocumented nation-state actor whose espionage operations align with People’s Republic of China (PRC) state interests. Over the past two and a half years, Unit 42 re...
A new phishing and malware distribution toolkit called MatrixPDF allows attackers to convert ordinary PDF files into interactive lures that bypass email security and redirect victims to credential ...
Tenable dubbed its latest discovery the “Gemini Trifecta” because it consists of three ways that threat actors can manipulate the Google GenAI tool for indirect prompt injection and data exfiltrati...
NEW: CVE vendor-product description metric Referenceurl title GithubURL CVE-2024-5200 Unknown - Postie ...
The attack, in a nutshell, involves leveraging a custom-built, low-cost DDR4 interposer hardware hack to stealthily redirect physical addresses and gain unauthorized access to protected memory regi...
The SVG Security Analysis Toolkit by HackingLZ offers a comprehensive [OPEN SOURCE] solution: a suite of four Python-based tools designed to reveal hidden scripts, decode obfuscated URLs, and verif...
The cybersecurity community is currently observing a surge in interest around Olymp Loader, a recently unveiled Malware-as-a-Service (MaaS) platform written entirely in Assembly. Its author, operat...
Microsoft is calling attention to a new phishing campaign primarily aimed at U.S.-based organizations that has likely utilized code generated using large language models (LLMs) to obfuscate payload...
The Medusa ransomware group is claiming responsibility for a ransomware attack on Comcast Corporation, a global media and technology company best known for its broadband, television, and film busin...
Authorities arrested 260 cybercrime suspects during a two-week operation spanning 14 African countries, Interpol announced Friday. The globally coordinated summertime crackdown dubbed “Operation Co...