Threats & Attacks
Organizations
Sectors & Regions
Threats & Attacks
Organizations
Sectors & Regions
Finextra Security ARTICLE
Article
High

From Friction to Function: Optimising Onboarding in an Age of AML, AI and Rising Risk

Finextra Security

From Friction to Function: Optimising Onboarding in an Age of AML, AI and Rising Risk Join this webinar, hosted in association with nCino, to the challenges of commercial onboarding, particularly...

17 hours ago Finextra Security 6 entities
Score: 67
7 obsolete security practices that should be terminated immediately
Cluster
High

7 obsolete security practices that should be terminated immediately

Cluster: APT41 - Zero-Day - Ransomware

Bad habits can be hard to break. Yet when it comes to security, an outdated practice is not only useless, but potentially dangerous. Breaking bad habits and building better ones is a journey that...

1 hour ago 2 articles 79% similarity
Score: 75
Energy Microsoft Microsoft Security Ransomware Zero-Day Active Directory +4 more
CSO Online ARTICLE
Article
Critical

7 obsolete security practices that should be terminated immediately

CSO Online

Bad habits can be hard to break. Yet when it comes to security, an outdated practice is not only useless, but potentially dangerous. Breaking bad habits and building better ones is a journey that...

1 hour ago CSO Online 24 entities
Score: 82
Microsoft Security Ransomware Energy Microsoft Google AWS +2 more
Chrome Update Patches Fifth Zero-Day of 2025
Cluster
Critical

Chrome Update Patches Fifth Zero-Day of 2025 Developing +1

Cluster: CVE-2025-6558 - CVE-2025-7656 - Zero-Day

Google on Tuesday announced a fresh set of Chrome security updates that resolve six vulnerabilities, including one exploited in the wild.The zero-day bug, tracked as CVE-2025-6558, is described as...

1 hour ago 3 articles 100% similarity
Score: 87
Microsoft Ransomware Windows Zero-Day Zero-day Exploit AWS +4 more
SecurityWeek ARTICLE
Article
Critical

Chrome Update Patches Fifth Zero-Day of 2025

SecurityWeek

Google on Tuesday announced a fresh set of Chrome security updates that resolve six vulnerabilities, including one exploited in the wild.The zero-day bug, tracked as CVE-2025-6558, is described as...

1 hour ago SecurityWeek 12 entities
Score: 87
Windows Zero-Day Google Linux macOS CVE-2025-6558 +2 more
The Cyber Express ARTICLE
Article
Medium

NCSC Expands Vulnerability Research to Tackle Evolving Cyber Threats

The Cyber Express

The UK’s National Cyber Security Centre (NCSC) has taken proactive steps to deepen its understanding of security vulnerabilities and improve national cyber resilience. A central pillar of this...

1 hour ago The Cyber Express
Score: 49
Former U.S. Army Member Pleads Guilty in Telecom Hacking Case
Cluster
Critical

Former U.S. Army Member Pleads Guilty in Telecom Hacking Case Developing +1

Cluster: WannaCryptor - DDoS - XSS

Former U.S. Army Member Pleads Guilty in Telecom Hacking Case A 21-year-old former U.S. Army soldier has pleaded guilty to participating in a sophisticated cybercrime operation that targeted...

1 hour ago 3 articles 100% similarity
Score: 84
Cybersecurity and Infrastructure Security Agency Microsoft Palo Alto Networks Ransomware Russia United States +4 more
GB Hackers ARTICLE
Article
High

Former U.S. Army Member Pleads Guilty in Telecom Hacking Case

GB Hackers

Former U.S. Army Member Pleads Guilty in Telecom Hacking Case A 21-year-old former U.S. Army soldier has pleaded guilty to participating in a sophisticated cybercrime operation that targeted...

1 hour ago GB Hackers 39 entities
Score: 79
Ransomware Windows Microsoft AWS Google Water +2 more
CLUSTER 3 articles
Cluster
High

Iranian Threat Actors Attacking U.S. Critical Infrastructure Including Water Systems Developing +1

Cluster: DDoS - DoS - Ransomware

Iranian cyber operatives have intensified their assault on American critical infrastructure, with Intelligence Group 13 emerging as a primary threat actor targeting water treatment facilities,...

1 hour ago 3 articles 100% similarity
Score: 79
China Energy Microsoft Ransomware Russia United States +4 more
Cybersecurity News ARTICLE
Article
Critical

Iranian Threat Actors Attacking U.S. Critical Infrastructure Including Water Systems

Cybersecurity News

Iranian cyber operatives have intensified their assault on American critical infrastructure, with Intelligence Group 13 emerging as a primary threat actor targeting water treatment facilities,...

1 hour ago Cybersecurity News 19 entities
Score: 84
United States Water APT19 Credential Theft Phishing VMware +2 more
CLUSTER 2 articles
Cluster
Critical

VMware ESXi and Workstation Vulnerabilities Let Attackers Execute Malicious Code on Host

Cluster: APT41 - CVE-2025-41236 - CVE-2025-41237

Multiple severe vulnerabilities have been addressed affectingVMware ESXi, Workstation, Fusion, and Tools that could allow attackers to execute malicious code on host systems. The vulnerabilities,...

1 hour ago 2 articles 93% similarity
Score: 82
Microsoft Ransomware Windows AWS Azure Google +4 more
Cybersecurity News ARTICLE
Article
High

VMware ESXi and Workstation Vulnerabilities Let Attackers Execute Malicious Code on Host

Cybersecurity News

Multiple severe vulnerabilities have been addressed affectingVMware ESXi, Workstation, Fusion, and Tools that could allow attackers to execute malicious code on host systems. The vulnerabilities,...

1 hour ago Cybersecurity News 23 entities
Score: 78
Windows Water Linux VMware ESXi Information Disclosure ICS +2 more
Security Brief UK ARTICLE
Article
High

F5 unveils AI Assistant to automate iRules & simplify app security

Security Brief UK

F5 unveils AI Assistant to automate iRules & simplify app security F5 has introduced new AI-powered capabilities to its Application Delivery and Security Platform with the addition of the F5 AI...

2 hours ago Security Brief UK 4 entities
Score: 67
F5 Nginx
Security Brief UK ARTICLE
Article
High

Rubrik boosts AWS database security with DynamoDB, RDS tools

Security Brief UK

Rubrik boosts AWS database security with DynamoDB, RDS tools Rubrik has announced new support for Amazon DynamoDB and released a cyber resilience solution for relational databases, initially...

2 hours ago Security Brief UK 5 entities
Score: 69
AWS Amazon PostgreSQL
CLUSTER 2 articles
Cluster
High

Octalyn Stealer Steals VPN Configurations, Passwords and Cookies in Structured Folders

Cluster: DDoS - DoS - Ransomware

A sophisticated new credential stealer disguised as a legitimate forensic toolkit has emerged on GitHub, targeting sensitive user data including VPN configurations, browser credentials, and...

2 hours ago 2 articles 89% similarity
Score: 73
Microsoft Ransomware Windows AWS Azure Google +4 more
Cybersecurity News ARTICLE
Article
High

Octalyn Stealer Steals VPN Configurations, Passwords and Cookies in Structured Folders

Cybersecurity News

A sophisticated new credential stealer disguised as a legitimate forensic toolkit has emerged on GitHub, targeting sensitive user data including VPN configurations, browser credentials, and...

2 hours ago Cybersecurity News 17 entities
Score: 76
Windows Microsoft Ransomware Linux Google ICS +2 more
GB Hackers ARTICLE
Article
High

Node.js Vulnerabilities Leave Windows Apps Vulnerable to Path Traversal and HashDoS

GB Hackers

Node.js Vulnerabilities Leave Windows Apps Vulnerable to Path Traversal and HashDoS The Node.js project has released critical security updates across multiple release lines to address two...

2 hours ago GB Hackers 35 entities
Score: 77
Ransomware Windows Microsoft Azure Water AWS +2 more
GB Hackers ARTICLE
Article
High

VMware ESXi and Workstation Vulnerabilities Allow Host-Level Code Execution

GB Hackers

VMware ESXi and Workstation Vulnerabilities Allow Host-Level Code Execution Broadcom disclosed four critical vulnerabilities in VMware’s virtualization suite on July 15, 2025, enabling attackers...

2 hours ago GB Hackers 43 entities
Score: 77
Ransomware Microsoft Windows Azure Water AWS +2 more
GB Hackers ARTICLE
Article
Critical

Google Chrome 0-Day Vulnerability Under Active Exploitation

GB Hackers

Google Chrome 0-Day Vulnerability Under Active Exploitation Google has released an emergency security update for Chrome 138 to address a critical zero-day vulnerability that is actively being...

2 hours ago GB Hackers 38 entities
Score: 81
Zero-Day Ransomware Windows Microsoft Linux Google +2 more
North Korean Hackers Weaponized 67 Malicious npm Packages to Deliver XORIndex Malware
Cluster
High

North Korean Hackers Weaponized 67 Malicious npm Packages to Deliver XORIndex Malware Developing +2

Cluster: APT41 - WageMole - DDoS

North Korean threat actors have escalated their software supply chain attacks with the deployment of 67 malicious npm packages that collectively garnered over 17,000 downloads before...

3 hours ago 4 articles 100% similarity
Score: 76
Ransomware Remote Code Execution Supply Chain Attack Windows AWS Azure +4 more
Cybersecurity News ARTICLE
Article
High

North Korean Hackers Weaponized 67 Malicious npm Packages to Deliver XORIndex Malware

Cybersecurity News

North Korean threat actors have escalated their software supply chain attacks with the deployment of 67 malicious npm packages that collectively garnered over 17,000 downloads before...

3 hours ago Cybersecurity News 16 entities
Score: 78
Ransomware Google Linux ICS Command and Control VMware +2 more
Ransomware, AI & vendor risks drive billions in 2025 breaches
Cluster
High

Ransomware, AI & vendor risks drive billions in 2025 breaches Developing +5

Cluster: APT41 - BlackCat - Zero-Day

Ransomware, AI & vendor risks drive billions in 2025 breaches New research from Secureframe has identified ransomware, artificial intelligence-powered attacks, and social engineering as the...

4 hours ago 7 articles 100% similarity
Score: 74
Financial Services Healthcare Microsoft Ransomware Zero-Day Zero-day Exploit +4 more
Security Brief UK ARTICLE
Article
High

Mobile app breaches cost firms USD $7 million despite confidence

Security Brief UK

Mobile app breaches cost firms USD $7 million despite confidence More than 60% of organisations have experienced at least one mobile app security incident over the past year, despite high...

4 hours ago Security Brief UK 7 entities
Score: 66
United States United Kingdom Singapore
Security Brief UK ARTICLE
Article
High

Ransomware, AI & vendor risks drive billions in 2025 breaches

Security Brief UK

Ransomware, AI & vendor risks drive billions in 2025 breaches New research from Secureframe has identified ransomware, artificial intelligence-powered attacks, and social engineering as the...

4 hours ago Security Brief UK 18 entities
Score: 79
Microsoft Zero-Day Zero-day Exploit Ransomware Healthcare ISO 27001 +2 more
Security Brief UK ARTICLE
Article
High

DevOps platforms see surge in outages & downtime in 2024 report

Security Brief UK

DevOps platforms see surge in outages & downtime in 2024 report GitProtect.io has released a report detailing a significant increase in outages and security incidents across key DevOps platforms,...

4 hours ago Security Brief UK 10 entities
Score: 76
Microsoft Windows Azure GitHub GitLab Atlassian
Google Gemini vulnerability enables hidden phishing attacks
Cluster
High

Google Gemini vulnerability enables hidden phishing attacks Developing +1

Cluster: Turla - Phishing - Supply Chain Attack

A bug in Google Gemini allows attackers to hijack email summaries and launch phishing attacks. Google Gemini for Workspace can be abused to generate email summaries that appear legitimate but...

4 hours ago 4 articles 100% similarity
Score: 75
CISA Microsoft Supply Chain Attack Zero-Day Google Turla +4 more
CSO Online ARTICLE
Article
High

Google Gemini vulnerability enables hidden phishing attacks

CSO Online

A bug in Google Gemini allows attackers to hijack email summaries and launch phishing attacks. Google Gemini for Workspace can be abused to generate email summaries that appear legitimate but...

4 hours ago CSO Online 9 entities
Score: 79
Zero-Day Google Phishing Social Engineering Gozi
Security Brief UK ARTICLE
Article
High

UK universities & insurers launch GBP £2 million AI risk project

Security Brief UK

UK universities & insurers launch GBP £2 million AI risk project A partnership has been launched between academic institutions and the insurance sector to develop insurance products addressing the...

4 hours ago Security Brief UK 11 entities
Score: 74
Financial Services Healthcare Aviation Manufacturing Pharmaceuticals Insurance +1 more
Cybersecurity News ARTICLE
Article
High

Hacktivist Groups Attacks on Critical ICS Systems to Steal Sensitive Data

Cybersecurity News

The cybersecurity landscape has witnessed an alarming evolution in hacktivist operations, with threat actors increasingly shifting their focus from traditional DDoS attacks and website defacements...

4 hours ago Cybersecurity News 21 entities
Score: 79
Windows Ransomware Microsoft Russia Energy Linux +2 more
CSO Online ARTICLE
Article
High

7 fundamentale Cloud-Bedrohungen

CSO Online

Cloud-Sicherheitsrisiken zu ignorieren, geht nicht gut aus. Ganz besonders in diesen sieben Fällen. Dieser Artikel hilft, Unsicherheiten in Cloud-Umgebungen vorzubeugen. Foto: Roman Samborskyi |...

5 hours ago CSO Online 8 entities
Score: 79
Google DDoS DoS Phishing IBM
Cybersecurity News ARTICLE
Article
Critical

Google Chrome 0-day Vulnerability Actively Exploited in the Wild

Cybersecurity News

Google has released an emergency security update for Chrome, addressing a critical zero-day vulnerability that attackers are actively exploiting in real-world attacks. The tech giant confirmed...

5 hours ago Cybersecurity News 20 entities
Score: 81
Windows Zero-day Exploit Zero-Day Microsoft Ransomware Google +2 more
IT News Security ARTICLE
Article
High

Google's Big Sleep security AI agent foils bug exploitation

IT News Security

News Technology Security Google's Big Sleep security AI agent foils bug exploitation AI applied in more vulnerability detection scenarios. Google has used a security-specific AI agent to detect a...

5 hours ago IT News Security 15 entities
Score: 74
CISA Supply Chain Attack Turla Mandiant Google Memory Corruption +2 more
Wing FTP Remote Code Execution Vulnerability
Cluster
High

Wing FTP Remote Code Execution Vulnerability Developing +4

Cluster: APT41 - Turla - Cobalt Strike

Threat Signal Report Wing FTP Remote Code Execution Vulnerability Description What is the Vulnerability? CVE-2025-47812 is a recently disclosed Remote Code Execution (RCE) vulnerability impacting...

6 hours ago 10 articles 100% similarity
Score: 74
China CISA Cybersecurity and Infrastructure Security Agency Microsoft Ransomware RCE +4 more
FortiGuard Threat Signal ARTICLE
Article
Critical

Wing FTP Remote Code Execution Vulnerability

FortiGuard Threat Signal

Threat Signal Report Wing FTP Remote Code Execution Vulnerability Description What is the Vulnerability? CVE-2025-47812 is a recently disclosed Remote Code Execution (RCE) vulnerability impacting...

6 hours ago FortiGuard Threat Signal 6 entities
Score: 81
Remote Code Execution RCE CISA Remote Code Execution CVE-2025-47812 APT41
Alert: Nvidia GPUs are vulnerable to Rowhammer attacks
Cluster
High

Alert: Nvidia GPUs are vulnerable to Rowhammer attacks Developing +2

Cluster: APT41 - Turla - Privilege Escalation

IT leaders need to ensure that error correction code in GPUs is turned on to avoid data compromise. Nvidia has issued a security reminder to application developers, computer manufacturers, and IT...

6 hours ago 4 articles 100% similarity
Score: 72
CISA Microsoft Supply Chain Attack AWS Azure Google +4 more
CSO Online ARTICLE
Article
High

Alert: Nvidia GPUs are vulnerable to Rowhammer attacks

CSO Online

IT leaders need to ensure that error correction code in GPUs is turned on to avoid data compromise. Nvidia has issued a security reminder to application developers, computer manufacturers, and IT...

6 hours ago CSO Online 5 entities
Score: 66
NVIDIA Intel AMD
Security Brief UK ARTICLE
Article
High

Netskope named Leader in Gartner SASE Magic Quadrant again

Security Brief UK

Netskope named Leader in Gartner SASE Magic Quadrant again Netskope has been named as a Leader in the Gartner Magic Quadrant for Secure Access Service Edge (SASE) Platforms for the second...

7 hours ago Security Brief UK 4 entities
Score: 62
Netskope QuantumLocker
Security Brief UK ARTICLE
Article
High

RedShield launches Third Horizon to combat rising DDoS threats

Security Brief UK

RedShield launches Third Horizon to combat rising DDoS threats RedShield has launched a new cybersecurity feature named 'Third Horizon' to provide additional protection against Distributed...

7 hours ago Security Brief UK 10 entities
Score: 68
AWS DDoS Credential Theft Imperva
ThreatCluster ARTICLE
Article
Critical

2025-07-16 - Cluster AI Daily Threat Brief

ThreatCluster

# Daily Threat Intelligence Brief - July 16, 2025 ## Executive Summary The cybersecurity landscape continues to evolve, with a significant uptick in sophisticated threats, particularly from...

8 hours ago ThreatCluster 20 entities
Score: 83
CISA China Advanced Persistent Threat Amazon Web Services Active Directory AWS +2 more
Data Breach Today UK ARTICLE
Article
High

France Says Russia Is Top Threat, Warns of 'Open Warfare'

Data Breach Today UK

Cyberwarfare / Nation-State Attacks,Fraud Management & Cybercrime,Government France Says Russia Is Top Threat, Warns of 'Open Warfare' Credit Eligible Get Permission France has identified Russia...

8 hours ago Data Breach Today UK 10 entities
Score: 77
China Healthcare Russia Ukraine France ANSSI +2 more
Cloudflare records largest DDoS attack at 7.3 Tbps in Q2 2025
Cluster
High

Cloudflare records largest DDoS attack at 7.3 Tbps in Q2 2025 Developing +2

Cluster: DDoS - Ransomware - DDoS Attack

Cloudflare records largest DDoS attack at 7.3 Tbps in Q2 2025 Cloudflare's latest DDoS Threat Report for Q2 2025 highlights a year-on-year increase in both the scale and complexity of distributed...

9 hours ago 4 articles 100% similarity
Score: 78
China Financial Services Information Technology Ransomware Russia United States +4 more
Security Brief UK ARTICLE
Article
High

Cloudflare records largest DDoS attack at 7.3 Tbps in Q2 2025

Security Brief UK

Cloudflare records largest DDoS attack at 7.3 Tbps in Q2 2025 Cloudflare's latest DDoS Threat Report for Q2 2025 highlights a year-on-year increase in both the scale and complexity of distributed...

9 hours ago Security Brief UK 18 entities
Score: 73
China Russia Cloudflare DDoS Cloudflare Germany +2 more
Data Breach Today UK ARTICLE
Article
High

Trump Lifts Nvidia Chip Restrictions to China, Raising Concerns

Data Breach Today UK

Artificial Intelligence & Machine Learning,Government,Industry Specific Trump Lifts Nvidia Chip Restrictions to China, Raising Concerns Credit Eligible Get Permission President Donald Trump's...

9 hours ago Data Breach Today UK 12 entities
Score: 75
Energy Russia China United States APT41 NVIDIA +2 more
CyberScoop ARTICLE
Article
High

Former Army soldier pleads guilty to widespread attack spree linked to AT&T, Snowflake and others

CyberScoop

A 21-year-oldformer Army soldier pleaded guiltyTuesday to charges stemming from a series of attacks and extortion attempts last year on telecommunications companies, including AT&T. Cameron John...

9 hours ago CyberScoop 8 entities
Score: 70
Russia United States Telecommunications
The Register Security ARTICLE
Article
High

Ex-US soldier who Googled 'can hacking be treason' pleads guilty to extortion

The Register Security

Cyber-crime Ex-US soldier who Googled 'can hacking be treason' pleads guilty to extortion File this one under what not to if you've committed a crime A former US Army soldier, who reportedly...

9 hours ago The Register Security 26 entities
Score: 76
United States Ransomware Cybersecurity and Infrastructure Security Agency Palo Alto Networks Russia Advanced Persistent Threat +2 more
TechRepublic Security ARTICLE
Article
High

Trump Announces Pennsylvania Will Receive $90B+ in AI and Energy Investments

TechRepublic Security

Tech companies and investors will devote more than $90 billion to AI and energy infrastructure investments in Pennsylvania, President Donald Trump and Sen. Dave McCormick (R-Pa.) announced today...

9 hours ago TechRepublic Security 16 entities
Score: 74
United States China Energy Turla Nuclear Google +2 more
Why 'AI Fatigue' Is Risky to Cyber Leaders and Their Teams
Cluster
High

Why 'AI Fatigue' Is Risky to Cyber Leaders and Their Teams Developing +3

Cluster: APT41 - Ransomware - Advanced Persistent Threat

Artificial Intelligence & Machine Learning,Healthcare,Industry Specific Why 'AI Fatigue' Is Risky to Cyber Leaders and Their Teams Credit Eligible Get Permission The flood of new artificial...

10 hours ago 7 articles 100% similarity
Score: 71
CISA Financial Services Healthcare Microsoft Palo Alto Networks Ransomware +4 more
Security Brief UK ARTICLE
Article
High

AI transforms security, safety & efficiency in global industries

Security Brief UK

AI transforms security, safety & efficiency in global industries Artificial Intelligence Appreciation Day marks a moment to reflect on the transformative effect artificial intelligence is having...

10 hours ago Security Brief UK 13 entities
Score: 62
United States India Logistics Barracuda Construction
Data Breach Today UK ARTICLE
Article
High

Why 'AI Fatigue' Is Risky to Cyber Leaders and Their Teams

Data Breach Today UK

Artificial Intelligence & Machine Learning,Healthcare,Industry Specific Why 'AI Fatigue' Is Risky to Cyber Leaders and Their Teams Credit Eligible Get Permission The flood of new artificial...

10 hours ago Data Breach Today UK 5 entities
Score: 64
Healthcare APT41 Media
'Ghost in the Machine' Exploits Spotted in Gigabyte Firmware
Cluster
High

'Ghost in the Machine' Exploits Spotted in Gigabyte Firmware Developing +1

Cluster: APT41 - CVE-2025-7029 - CVE-2025-7028

Endpoint Security,Governance & Risk Management,Hardware / Chip-level Security 'Ghost in the Machine' Exploits Spotted in Gigabyte Firmware Credit Eligible Get Permission Multiple high-severity...

10 hours ago 4 articles 100% similarity
Score: 73
CISA Microsoft RCE Windows AWS Azure +4 more
Data Breach Today UK ARTICLE
Article
High

'Ghost in the Machine' Exploits Spotted in Gigabyte Firmware

Data Breach Today UK

Endpoint Security,Governance & Risk Management,Hardware / Chip-level Security 'Ghost in the Machine' Exploits Spotted in Gigabyte Firmware Credit Eligible Get Permission Multiple high-severity...

10 hours ago Data Breach Today UK 13 entities
Score: 68
CVE-2025-7027 CVE-2025-7029 CVE-2025-7028 CVE-2025-7026 CERT Cobalt +1 more
CLUSTER 2 articles
Cluster
High

Ransomware Gangs Actively Expanding to Attack VMware and Linux Systems

Cluster: DoS - DDoS - Ransomware

The cybersecurity landscape has experienced a dramatic shift as ransomware operators increasingly target Linux and VMware environments, abandoning their traditional focus on Windows...

10 hours ago 2 articles 97% similarity
Score: 75
Microsoft Ransomware Windows AWS Azure Google +4 more
Cybersecurity News ARTICLE
Article
High

Ransomware Gangs Actively Expanding to Attack VMware and Linux Systems

Cybersecurity News

The cybersecurity landscape has experienced a dramatic shift as ransomware operators increasingly target Linux and VMware environments, abandoning their traditional focus on Windows...

10 hours ago Cybersecurity News 31 entities
Score: 72
Ransomware Microsoft Windows Google Linux VMware +2 more
Hackread ARTICLE
Article
Medium

Fake Telegram Apps Spread via 607 Domains in New Android Malware Attack

Hackread

Fake Telegram apps are being spread through 607 malicious domains to deliver Android malware, using blog-style pages and phishing tactics to trick users.

10 hours ago Hackread
Score: 43
OSS Security ARTICLE
Article
Critical

CVE-2025-48795: Apache CXF: Denial of Service and sensitive data exposure in logs

OSS Security

oss-secmailing list archives CVE-2025-48795: Apache CXF: Denial of Service and sensitive data exposure in logs Current thread: CVE-2025-48795: Apache CXF: Denial of Service and sensitive data...

11 hours ago OSS Security 3 entities
Score: 81
Denial of Service CVE-2025-48795 Apache
[vim-security]: path traversal issue with zip.vim and special crafted zip archives in Vim < v9.1.1551
Cluster
High

[vim-security]: path traversal issue with zip.vim and special crafted zip archives in Vim < v9.1.1551

Cluster: Path Traversal - Security - Issue

oss-secmailing list archives [vim-security]: path traversal issue with zip.vim and special crafted zip archives in Vim < v9.1.1551 Current thread: [vim-security]: path traversal issue with zip.vim...

11 hours ago 2 articles 88% similarity
Score: 68
Path Traversal
OSS Security ARTICLE
Article
High

[vim-security]: path traversal issue with zip.vim and special crafted zip archives in Vim < v9.1.1551

OSS Security

oss-secmailing list archives [vim-security]: path traversal issue with zip.vim and special crafted zip archives in Vim < v9.1.1551 Current thread: [vim-security]: path traversal issue with zip.vim...

11 hours ago OSS Security 1 entities
Score: 60
Path Traversal
Cybersecurity News ARTICLE
Article
High

North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups

Cybersecurity News

North Korean threat actors have escalated their sophisticated cyber operations against cryptocurrency startups, deploying an evolved malware campaign that leverages fraudulent Zoom meeting...

11 hours ago Cybersecurity News 28 entities
Score: 70
Ransomware Windows Microsoft Google Linux Android +2 more
OSS Security ARTICLE
Article
High

[vim-security] path traversal issue with tar.vim and special crafted tar archives in Vim < 9.1.1552

OSS Security

oss-secmailing list archives [vim-security] path traversal issue with tar.vim and special crafted tar archives in Vim < 9.1.1552 Current thread: [vim-security] path traversal issue with tar.vim...

11 hours ago OSS Security 1 entities
Score: 60
Path Traversal
Data Breach Today UK ARTICLE
Article
High

Seychelles Commercial Bank Confirms Customer Data Breach

Data Breach Today UK

Data Breach Notification,Data Security,Fraud Management & Cybercrime Seychelles Commercial Bank Confirms Customer Data Breach Credit Eligible Get Permission A hacker claims to have stolen and sold...

11 hours ago Data Breach Today UK 12 entities
Score: 69
Fortinet Banking Oracle Media Fortinet
Dark Reading ARTICLE
Article
Medium

AsyncRAT Spawns Concerning Labyrinth of Forks

Dark Reading

Since surfacing on GitHub in 2019, AsyncRAT has become a poster child for how open source malware can democratize cybercrime, with a mazelike footprint of variants available across the spectrum of...

12 hours ago Dark Reading
Score: 45
Apache Tomcat Coyote Vulnerability Let Attackers Trigger DoS Attack
Cluster
High

Apache Tomcat Coyote Vulnerability Let Attackers Trigger DoS Attack Developing +2

Cluster: CVE-2025-53506 - CVE-2025-52434 - DoS

A newly disclosed flaw in Apache Tomcat’s Coyote engine—tracked as CVE-2025-53506—has surfaced in the latest round of HTTP/2 security advisories. First noted in the National Vulnerability Database...

12 hours ago 4 articles 100% similarity
Score: 72
Microsoft RCE Windows AWS Azure Google +4 more
Cybersecurity News ARTICLE
Article
High

Apache Tomcat Coyote Vulnerability Let Attackers Trigger DoS Attack

Cybersecurity News

A newly disclosed flaw in Apache Tomcat’s Coyote engine—tracked as CVE-2025-53506—has surfaced in the latest round of HTTP/2 security advisories. First noted in the National Vulnerability Database...

12 hours ago Cybersecurity News 19 entities
Score: 66
Windows Microsoft Google NCSC Android DoS +2 more
CyberScoop ARTICLE
Article
High

Waltz brushes off SignalGate questions, points finger at CISA

CyberScoop

Former White House national security adviser Mike Waltz brushed aside criticisms Tuesday that he put sensitive military operations at risk by holding discussions military strikes in a Signal group...

12 hours ago CyberScoop 6 entities
Score: 68
CISA Communications Telecommunications
TechRepublic Security ARTICLE
Article
High

Hidden AI Prompts Trick Academics Into Giving Research Papers Only Positive Comments

TechRepublic Security

Researchers from 14 academic institutions in eight countries hid AI prompts in their research papers to fool reviewers who use AI tools into providing positive feedback, Nikkei reported in July....

13 hours ago TechRepublic Security 13 entities
Score: 68
Microsoft China Cloudflare Meta Apple Cloudflare +2 more
NCSC Urges Organizations to Upgrade Microsoft Windows 11 to Defend Cyberattacks
Cluster
High

NCSC Urges Organizations to Upgrade Microsoft Windows 11 to Defend Cyberattacks Developing +1

Cluster: Sea Turtle - RCE - Zero-Day

The National Cyber Security Centre (NCSC) has issued a critical advisory urging organizations to prioritize upgrading to Windows 11 before the October 14, 2025 end-of-life deadline for Windows...

13 hours ago 3 articles 100% similarity
Score: 74
Microsoft Ransomware RCE Windows Zero-Day AWS +4 more
Cybersecurity News ARTICLE
Article
High

NCSC Urges Organizations to Upgrade Microsoft Windows 11 to Defend Cyberattacks

Cybersecurity News

The National Cyber Security Centre (NCSC) has issued a critical advisory urging organizations to prioritize upgrading to Windows 11 before the October 14, 2025 end-of-life deadline for Windows...

13 hours ago Cybersecurity News 19 entities
Score: 67
Ransomware Microsoft Windows Google DoS National Cyber Security Centre +2 more
AsyncRAT seeds family of more than 30 remote access trojans
Cluster
High

AsyncRAT seeds family of more than 30 remote access trojans Developing +1

Cluster: DDoS - DoS - Ransomware

AsyncRAT, the most prevalent remote access trojan observed in the wild, hasspawned more than 30 forks and variantsthat increase the impact of the open-source malware, making it a popular and...

13 hours ago 3 articles 100% similarity
Score: 73
Ransomware Windows AWS Azure Communications Google +4 more
CyberScoop ARTICLE
Article
High

AsyncRAT seeds family of more than 30 remote access trojans

CyberScoop

AsyncRAT, the most prevalent remote access trojan observed in the wild, hasspawned more than 30 forks and variantsthat increase the impact of the open-source malware, making it a popular and...

13 hours ago CyberScoop 11 entities
Score: 66
Credential Theft Phishing GitHub
KnowBe4 launches AI-powered Prevent to tackle email risk
Cluster
High

KnowBe4 launches AI-powered Prevent to tackle email risk Developing +2

Cluster: Phishing - Social Engineering - Microsoft

KnowBe4 launches AI-powered Prevent to tackle email risk KnowBe4 has launched KnowBe4 Prevent, an artificial intelligence-powered email security solution targeted at small to medium-sized...

14 hours ago 4 articles 100% similarity
Score: 73
Microsoft Microsoft Security AWS Communications GDPR Check Point +4 more
Oracle July 2025 Critical Patch Update Addresses 165 CVEs
Cluster
High

Oracle July 2025 Critical Patch Update Addresses 165 CVEs Developing +1

Cluster: Earth Lusca - CVE-2025-47981 - CVE-2025-49719

Oracle July 2025 Critical Patch Update Addresses 165 CVEs Oracle addresses 165 CVEs in its third quarterly update of 2025 with 309 patches, including nine critical updates. Background On July 15,...

15 hours ago 7 articles 100% similarity
Score: 74
Microsoft RCE Remote Code Execution Windows Zero-Day Active Directory +4 more
CLUSTER 2 articles
Cluster
High

Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams

Cluster: RCE - DDoS - Data Exfiltration

Cybersecurity researchers have identified a sophisticated international fraud campaign that leverages impersonated news websites from major outlets including CNN, BBC, CNBC, News24, and ABC News...

16 hours ago 2 articles 96% similarity
Score: 71
CISA RCE United States AWS Azure FBI +4 more
Risk management, legacy tech pose major threats to healthcare firms, report finds
Cluster
High

Risk management, legacy tech pose major threats to healthcare firms, report finds Developing +1

Cluster: Ransomware - Microsoft - Google

Risk management, legacy tech pose major threats to healthcare firms, report finds Companies have improved their recovery processes and user controls but still lag in risk preparedness, according...

16 hours ago 3 articles 100% similarity
Score: 75
Healthcare Information Technology Microsoft Ransomware Communications Google +1 more
Konfety Android Malware on Google Play Uses ZIP Manipulation to Imitate Legitimate Apps
Cluster
High

Konfety Android Malware on Google Play Uses ZIP Manipulation to Imitate Legitimate Apps

Cluster: Google - Apple - Android

Sophisticated Android malware variant exploits ZIP-level manipulation and dynamic code loading to evade detection while conducting ad fraud operations targeting mobile users globally. Zimperium’s...

17 hours ago 2 articles 91% similarity
Score: 72
Communications Google Android Apple Banking Wiz +1 more
Virtual Event Preview: Cloud & Data Security Summit 2025 – Tackling Exposed Attack Surfaces in the Cloud
Cluster
High

Virtual Event Preview: Cloud & Data Security Summit 2025 – Tackling Exposed Attack Surfaces in the Cloud Developing +5

Cluster: APT41 - Phishing - Intel

Virtual Event | Wednesday, June 16, 2025–RegisterAs organizations double down on digital transformation and cloud-first strategies, securing dynamic and complex cloud environments has become one...

17 hours ago 7 articles 100% similarity
Score: 74
Microsoft Microsoft Security Palo Alto Networks Ransomware Windows AWS +4 more
DragonForce hackers claim responsibility for Belk data breach
Cluster
High

DragonForce hackers claim responsibility for Belk data breach

Cluster: Scattered Spider - Ransomware - Sophos

DragonForce hackers claim responsibility for Belk data breach The North Carolina-based retailer is the latest known victim in a spree of attacks in the U.K. and U.S. DragonForce, a cyber criminal...

17 hours ago 2 articles 90% similarity
Score: 69
Ransomware Insurance Sophos Arctic Wolf Scattered Spider Retail
Threat Actors Use SVG Smuggling for Browser-Native Redirection
Cluster
High

Threat Actors Use SVG Smuggling for Browser-Native Redirection

Cluster: Phishing - Social Engineering - Microsoft

Ontinue warns of a newly observed phishing campaign leveraging Scalable Vector Graphics (SVG) files in redirect attacks that evade traditional detection.While considered harmless image formats,...

17 hours ago 2 articles 90% similarity
Score: 71
Microsoft Google Microsoft 365 Phishing Social Engineering
Grok 4 mit Jailbreak-Angriff geknackt
Cluster
High

Grok 4 mit Jailbreak-Angriff geknackt

Cluster: APT41 - Phishing - Microsoft

Sicherheitsforscher haben herausgefunden, wie sich die Sicherheitsfilter von Musks neuem Chatbot aushebeln lassen. Svet foto – shutterstock.com Erst vor wenigen Tagen präsentierte Elon Musk sein...

17 hours ago 2 articles 75% similarity
Score: 66
Microsoft Google Microsoft 365 Phishing APT41
No Data on Devices: How Virtual Mobile Infrastructure Changes the Game
Cluster
High

No Data on Devices: How Virtual Mobile Infrastructure Changes the Game

Cluster: Virtual - Data

No Data on Devices: How Virtual Mobile Infrastructure Changes the Game Credit Eligible Get Permission Today’s ISOs face relentless challenges: hybrid workforces, advanced persistent threats, and...

17 hours ago 2 articles 98% similarity
Score: 64
Digital Transformation Demands Zero Trust: How SASE is Changing EU Security
Cluster
High

Digital Transformation Demands Zero Trust: How SASE is Changing EU Security

Cluster: APT41 - Gozi - Lateral Movement

Digital Transformation Demands Zero Trust: How SASE is Changing EU Security Credit Eligible Get Permission Zero Trust, SASE, and SSE are at the core of a new network security paradigm in EMEA. As...

17 hours ago 2 articles 75% similarity
Score: 68
AWS Azure Banking Check Point APT41 GitHub +2 more
CLUSTER 2 articles
Cluster
High

GLOBAL GROUP RaaS Operators Enable AI-powered Negotiation Functionality

Cluster: DDoS - DoS - Ransomware

A sophisticated new ransomware-as-a-service operation has emerged with advanced AI-powered negotiation capabilities and mobile management features, targeting organizations across healthcare,...

18 hours ago 2 articles 93% similarity
Score: 73
Healthcare Microsoft Ransomware Russia United States Windows +4 more
14 Hackers Arrested in Massive Tax Fraud Scheme, Authorities Confirm
Cluster
High

14 Hackers Arrested in Massive Tax Fraud Scheme, Authorities Confirm Developing +1

Cluster: APT41 - Turla - DDoS

14 Hackers Arrested in Massive Tax Fraud Scheme, Authorities Confirm The arrests demonstrate the growing collaboration between UK and Romanian law enforcement agencies in combating cross-border...

19 hours ago 3 articles 100% similarity
Score: 72
CISA Ransomware Supply Chain Attack Windows AWS Azure +4 more
CLUSTER 2 articles
Cluster
High

2.3 Million Times Downloaded LaRecipe Tool Vulnerability Let Attackers Take Full Control Of Servers

Cluster: APT41 - CVE-2025-53833 - Remote Code Execution

A critical security vulnerability has been discovered in LaRecipe, a popular documentation generator tool that has been downloaded over 2.3 million times. The vulnerability, identified...

19 hours ago 2 articles 89% similarity
Score: 70
Ransomware RCE Remote Code Execution Windows AWS Azure +4 more
CLUSTER 3 articles
Cluster
High

CISA Releases Six Industrial Control Systems Advisories Developing +1

Cluster: Siemens - ICS - Industrial Control Systems

CISA Releases Six Industrial Control Systems Advisories CISA released six Industrial Control Systems (ICS) advisories on July 15, 2025. These advisories provide timely information current security...

20 hours ago 3 articles 100% similarity
Score: 75
CISA Energy ICS Industrial Control Systems Siemens ABB
PoC Exploit Released for High-Severity Git CLI Arbitrary File Write Vulnerability
Cluster
High

PoC Exploit Released for High-Severity Git CLI Arbitrary File Write Vulnerability

Cluster: CVE-2025-48384 - Remote Code Execution - RCE

A critical vulnerability in Git CLI enables arbitrary file writes on Linux and macOS systems, with working proof-of-concept exploits now publicly available. CVE-2025-48384, assigned a CVSS...

20 hours ago 2 articles 96% similarity
Score: 70
CISA RCE Remote Code Execution Windows AWS Azure +4 more
NCSC sets up Vulnerability Research Initiative
Cluster
High

NCSC sets up Vulnerability Research Initiative

Cluster: QuantumLocker - Zero-Day - Ransomware

SolisImages - stock.adobe.com this item with your network: Alex Scroxton,Security Editor The UK’sNational Cyber Security Centre(NCSC) has lifted the lid on a Vulnerability Research Initiative...

21 hours ago 2 articles 92% similarity
Score: 71
CISA Ransomware Zero-Day FBI National Cyber Security Centre NCSC +4 more
Government Organizations Targeted via AWS Lambda URL Endpoint Exploits
Cluster
High

Government Organizations Targeted via AWS Lambda URL Endpoint Exploits Developing +1

Cluster: Broomstick - RCE - DDoS

Government Organizations Targeted via AWS Lambda URL Endpoint Exploits Unit 42 researchers from Palo Alto Networks have been monitoring a sophisticated threat cluster designated CL-STA-1020, which...

21 hours ago 3 articles 100% similarity
Score: 74
CISA Microsoft Palo Alto Networks RCE Windows Advanced Persistent Threat +4 more
MITRE Launches AADAPT Framework to Counter Real-World Attacks on Digital Asset Systems
Cluster
High

MITRE Launches AADAPT Framework to Counter Real-World Attacks on Digital Asset Systems

Cluster: QuantumLocker - Privilege Escalation - RCE

MITRE Launches AADAPT Framework to Counter Real-World Attacks on Digital Asset Systems The MITRE Corporation has unveiled its comprehensive AADAPT™ framework (Adversarial Actions in Digital Asset...

22 hours ago 2 articles 96% similarity
Score: 71
CISA RCE Windows AWS Azure Google +4 more
Sesame Workshop Regains Control of Elmo’s Hacked X Account After Racist Posts
Cluster
High

Sesame Workshop Regains Control of Elmo’s Hacked X Account After Racist Posts Developing +2

Cluster: Phishing - X - Twitter

Sesame Workshop regained control of its Elmo account on the X platform Monday after a hacker gained access and posted a string of racist and antisemitic messages. “Elmo’s X account was compromised...

23 hours ago 4 articles 100% similarity
Score: 70
China CISA Ransomware Windows FBI Google +4 more
CLUSTER 2 articles
Cluster
High

Symantec Endpoint Management Suite Vulnerability Allows Malicious Code Execution Remotely

Cluster: CVE-2025-5333 - Remote Code Execution - RCE

A critical security vulnerability has been discovered in Broadcom’s Symantec Endpoint Management Suite that enables unauthenticated remote code execution, posing significant risks to enterprise IT...

1 day ago 2 articles 94% similarity
Score: 70
CISA Microsoft RCE Remote Code Execution Windows AWS +4 more
CLUSTER 2 articles
Cluster
High

Red Bull-Themed Phishing Attacks Target Job Seekers’ Credentials

Cluster: RCE - DDoS - Phishing

Red Bull-Themed Phishing Attacks Target Job Seekers’ Credentials A few significant investments in email filtering, authentication procedures, and endpoint protection, attackers are constantly...

1 day ago 2 articles 95% similarity
Score: 69
CISA Energy Microsoft RCE Windows AWS +4 more
8 tough trade-offs every CISO must navigate
Cluster
High

8 tough trade-offs every CISO must navigate Developing +1

Cluster: APT41 - Turla - Phishing

Increasing responsibilities and greater need to align with business objectives have security leaders facing greater risks — and more frequent and challenging security strategy compromises. One key...

1 day ago 4 articles 100% similarity
Score: 69
Healthcare Microsoft Ransomware Google Turla DDoS +4 more
Why Scattered Spider Persists as Major Threat to Insurers
Cluster
High

Why Scattered Spider Persists as Major Threat to Insurers

Cluster: Scattered Spider - Data Exfiltration - Ransomware

Cybercrime as-a-service,Fraud Management & Cybercrime,Healthcare Why Scattered Spider Persists as Major Threat to Insurers Credit Eligible Get Permission Cybercrime gang Scattered Spider is the...

1 day ago 2 articles 72% similarity
Score: 64
Healthcare Microsoft Ransomware Active Directory AWS Azure +4 more
French cops cuff Russian pro basketball player on ransomware charges
Cluster
High

French cops cuff Russian pro basketball player on ransomware charges

Cluster: APT41 - WannaCryptor - Ransomware

Cyber-crime French cops cuff Russian pro basketball player on ransomware charges 'He's useless with computers and can't even install an application' says lawyer A Russian professional basketball...

1 day ago 4 articles 92% similarity
Score: 72
China Healthcare Microsoft Ransomware Russia United States +4 more
CISA Flags Remote Linking Protocol Flaws Allowing Attackers to Hijack Train Brake Systems
Cluster
High

CISA Flags Remote Linking Protocol Flaws Allowing Attackers to Hijack Train Brake Systems

Cluster: APT41 - CVE-2025-1727 - DoS

CISA Flags Remote Linking Protocol Flaws Allowing Attackers to Hijack Train Brake Systems The Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority security alert...

1 day ago 3 articles 89% similarity
Score: 68
CISA Cybersecurity and Infrastructure Security Agency Energy Microsoft RCE United States +4 more
CitrixBleed 2 beckons sweeping alarm as exploits spread across the globe
Cluster
High

CitrixBleed 2 beckons sweeping alarm as exploits spread across the globe

Cluster: APT41 - CVE-2025-5777 - CVE-2023-4966

Authorities and researchers are intensifying warnings active exploitation and pervasive scanning of a critical vulnerability affecting multiple versions of Citrix NetScaler products. There is now...

1 day ago 2 articles 83% similarity
Score: 68
CISA Cybersecurity and Infrastructure Security Agency Financial Services United States Denial of Service Improper Access Control +4 more
Interlock ransomware adopts FileFix method to deliver malware
Cluster
High

Interlock ransomware adopts FileFix method to deliver malware Developing +1

Cluster: Command and Control - Social Engineering - Windows

Interlock ransomware adopts FileFix method to deliver malware Bill Toulas July 14, 2025 02:36 PM 0 Hackers have adopted the new technique called 'FileFix' in Interlock ransomware attacks to drop...

1 day ago 3 articles 100% similarity
Score: 74
Energy Financial Services Healthcare Microsoft Palo Alto Networks Ransomware +4 more
CLUSTER 2 articles
Cluster
High

Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games

Cluster: RCE - DDoS - Phishing

A sophisticated malware campaign targeting Generation Z gamers has emerged, leveraging weaponized versions of popular games to infiltrate gaming communities and steal sensitive information. The...

1 day ago 2 articles 90% similarity
Score: 66
CISA Microsoft RCE Windows AWS Azure +4 more
CLUSTER 2 articles
Cluster
High

New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting Remote Desktop Protocol

Cluster: Broomstick - RCE - DDoS

Cybersecurity researchers have developed innovativeforensicmethods to track sophisticated attackers who exploit Remote Desktop Protocol (RDP) for lateral movement within enterprise networks. This...

1 day ago 2 articles 92% similarity
Score: 68
CISA Microsoft Ransomware RCE Windows Advanced Persistent Threat +4 more
RenderShock 0-Click Vulnerability Executes Payloads via Background Process Without User Interaction
Cluster
High

RenderShock 0-Click Vulnerability Executes Payloads via Background Process Without User Interaction

Cluster: Remote Code Execution - RCE - Remote Code Execution

A sophisticated zero-click attack methodology called RenderShock that exploits passive file preview and indexing behaviors in modern operating systems to execute malicious payloads without...

1 day ago 2 articles 93% similarity
Score: 68
CISA Microsoft RCE Remote Code Execution Windows AWS +4 more