Source: news.sophos.com – Author: Editor PRODUCTS & SERVICES Following multiple enhancements to Sophos Email – the only MDR-optimized email security solution – Sophos is introducing two...
Day: August 12, 2025
Microsoft Patch Tuesday, August 2025 Edition – Source: krebsonsecurity.com
Source: krebsonsecurity.com – Author: BrianKrebs Microsoft today released updates to fix more than 100 security flaws in its Windows operating systems and other software. At least...
Weekly Update 464 – Source: www.troyhunt.com
Source: www.troyhunt.com – Author: Troy Hunt I think the most amusing comment I had during this live stream was one to the effect of expecting me...
Android’s pKVM Becomes First Globally Certified Software to Achieve Prestigious SESIP Level 5 Security Certification – Source:security.googleblog.com
Source: security.googleblog.com – Author: Edward Fernandez. Security Blog The latest news and insights from Google on security and safety on the Internet Original Post url: http://security.googleblog.com/2025/08/Android-pKVM-Certified-SESIP-Level-5.html...
Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks – Source:thehackernews.com
Source: thehackernews.com – Author: . New research has uncovered Docker images on Docker Hub that contain the infamous XZ Utils backdoor, more than a year after...
Fortinet SSL VPNs Hit by Global Brute-Force Wave Before Attackers Shift to FortiManager – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers are warning of a “significant spike” in brute-force traffic aimed at Fortinet SSL VPN devices. The coordinated activity, per...
Cybercrime Groups ShinyHunters, Scattered Spider Join Forces in Extortion Attacks on Businesses – Source:thehackernews.com
Source: thehackernews.com – Author: . An ongoing data extortion campaign targeting Salesforce customers may soon turn its attention to financial services and technology service providers, as...
New ‘Curly COMrades’ APT Using NGEN COM Hijacking in Georgia, Moldova Attacks – Source:thehackernews.com
Source: thehackernews.com – Author: . A previously undocumented threat actor dubbed Curly COMrades has been observed targeting entities in Georgia and Moldova as part of a...
The Ultimate Battle: Enterprise Browsers vs. Secure Browser Extensions – Source:thehackernews.com
Source: thehackernews.com – Author: . Most security tools can’t see what happens inside the browser, but that’s where the majority of work, and risk, now lives....
Hacker Alleges Russian Government Role in Kaseya Cyber-Attack – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A hacker involved in the supply chain attack that targeted IT service provider Kaseya in July 2021 has claimed that he was...
GPT-5 Safeguards Bypassed Using Storytelling-Driven Jailbreak – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A new technique has been documented that can bypass GPT-5’s safety systems, demonstrating that the model can be led toward harmful outputs...
29,000 Servers Remain Unpatched Against Microsoft Exchange Flaw – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: More than 29,000 Microsoft Exchange servers exposed to the internet have remained unpatched against a high-severity vulnerability that could allow attackers to...
Home Office Phishing Scam Targets UK Immigration Sponsors – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: An active phishing campaign is impersonating the Home Office to compromise UK organizations licensed to sponsor foreign workers and students. The sophisticated...
Cybercriminals Exploit Low-Cost Initial Access Broker Market – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Initial access broker services are a booming dark web market, with threat actors able to purchase a variety of options at low...
Charon Ransomware Emerges With APT-Style Tactics – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
How to Stay a Step Ahead of a Non-Obvious Threat – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dirk Schrader Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
ShinyHunters Tactics Now Mirror Scattered Spider – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
Black Hat NOC Expands AI Implementation Across Security Operations – Source: www.darkreading.com
Source: www.darkreading.com – Author: Arielle Waldman Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Researchers Warn of ‘Hidden Risks’ in Passwordless Account Recovery – Source: www.darkreading.com
Source: www.darkreading.com – Author: Arielle Waldman Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Researchers cracked the encryption used by DarkBit ransomware – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Researchers at cybersecurity firm Profero cracked DarkBit ransomware encryption, allowing victims to recover files for free. Good news for the...
Chrome sandbox escape nets security researcher $250,000 reward – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Researcher earns Google Chrome ’s top $250K bounty for a sandbox escape vulnerability enabling remote code execution. A researcher who...
GPT-5 jailbroken hours after launch using ‘Echo Chamber’ and Storytelling exploit – Source: www.csoonline.com
Source: www.csoonline.com – Author: NeuralTrust says GPT-5 was jailbroken within hours of launch using a blend of ‘Echo Chamber’ and storytelling tactics that hid malicious goals...
Digitale Souveränität für Deutschland vorerst unerreichbar – Source: www.csoonline.com
Source: www.csoonline.com – Author: Bei einigen Zukunftstechnologien sind deutsche Behörden und Unternehmen auf außereuropäische Anbieter angewiesen. Die BSI-Präsidentin plädiert auch deshalb für mehr Kontrolle – etwa...
5 key takeaways from Black Hat USA 2025 – Source: www.csoonline.com
Source: www.csoonline.com – Author: News Analysis Aug 12, 20255 mins Black HatSecurity PracticesThreat and Vulnerability Management The industry’s biggest annual get together offers CISOs insights into...
9 things CISOs need know about the dark web – Source: www.csoonline.com
Source: www.csoonline.com – Author: What CISOs need to know about the trade of stolen information, new marketplaces, the availability of malicious tools, and the impact of...
So verwundbar sind KI-Agenten – Source: www.csoonline.com
Source: www.csoonline.com – Author: Sicherheitsforscher haben diverse Wege gefunden, um die KI-Agenten populärer Anbieter mit schadhaften Prompts zu füttern und dazu zu bringen, sensible Daten preiszugeben....
Interlock Ransomware Group Leaks 43GB of Data in City of St. Paul Cyberattack – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. St. Paul hit by Interlock ransomware attack, 43GB of sensitive data leaked, city refuses ransom, launches Operation Secure St. Paul...
Over 29,000 Unpatched Microsoft Exchange Servers Leaving Networks at Risk – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. A vulnerability in Microsoft Exchange leaves over 29,000 servers vulnerable. Learn how this unpatched security hole could compromise entire networks...
1Kosmos Raises $57 Million for Identity Verification and Authentication Platform – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs 1Kosmos on Tuesday announced raising $57 million in a Series B funding round for the expansion of its identity verification...
Flaws in Major Automaker’s Dealership Systems Allowed Car Hacking, Personal Data Theft – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Vulnerabilities discovered by a researcher in a major automaker’s dealership systems could have been exploited to remotely hack cars and...