News
Entertainment
Science & Technology
Sport
Business & Money
Life
Culture & Art
Hobbies
8 | Follower
Security Affairs
12.08.2025
Researcher earns Google Chrome ’s top $250K bounty for a sandbox escape vulnerability enabling remote code execution.
Researchers showed how hackers can exploit flaws in a bus’ onboard and remote systems for tracking, control and spying.
11.08.2025
MedusaLocker ransomware gang announced on its Tor data leak site that it is looking for new pentesters.......
Google disclosed a Salesforce Customer Relationship Management (CRM) breach that exposed data of some prospective Google Ads customers.
10.08.2025
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape
A new round of the weekly Security Affairs newsletter is out! Every week, the best security articles from Security Affairs in your email box
Lenovo webcam flaws, dubbed BadCam, let attackers turn them into BadUSB devices to inject keystrokes and launch OS-independent attacks.
Embargo ransomware, likely a BlackCat/Alphv successor, has netted $34.2M in crypto since mid-2024, researchers say.
09.08.2025
Germany’s top court ruled police can use spyware only for crimes punishable by at least three years in prison.
Bouygues Telecom suffered a cyberattack that compromised the personal information of 6.4 million customers.
Columbia University was hit by a cyberattack, exposing personal data of over 860,000 students, applicants, and employees.
WinRAR flaw CVE-2025-8088, fixed in v7.13, was exploited as a zero-day in phishing attacks to install RomCom malware.
08.08.2025
WhatsApp removed 6.8M accounts linked to global scam centers, mainly in Cambodia, in a crackdown with Meta and OpenAI.
U.S. CISA adds D-Link cameras and Network Video Recorder flaws to its Known Exploited Vulnerabilities catalog.
Microsoft’s Project Ire uses AI to autonomously reverse engineer and classify software as malicious or benign.
CISA and Microsoft warn of CVE-2025-53786, a high-severity Exchange flaw allowing privilege escalation in hybrid cloud environments.
ReVault flaws in Dell ControlVault3 firmware allow firmware implants and Windows login bypass on 100+ laptop models via physical access.
CTEM is a continuous strategy that assesses risk from an attacker’s view, helping orgs prioritize threats across cloud and hybrid environments
Ukraine's CERT-UA warns of phishing attacks by UAC-0099 targeting defense sectors, using malware like MATCHBOIL, MATCHWOK, and DRAGSTARE.
Air France and KLM warn of a data breach exposing customer data via unauthorized access to a third-party platform.
SonicWall found no evidence of a new vulnerability after probing reports of a zero-day used in ransomware attacks.
Trend Micro patched two critical Apex One flaws (CVE-2025-54948, CVE-2025-54987) exploited in the wild, allowing RCE via console injection.
03.08.2025
A stealthy Linux backdoor named Plague, hidden as a malicious PAM module, allows attackers to bypass auth and maintain persistent SSH access.
China questioned Nvidia over suspected backdoors in its H20 chips, adding to rising tensions in the tech fight between the U.S. and Beijing.
02.08.2025
Meta backs Pwn2Own Ireland 2025 in Cork, offering up to $1M for WhatsApp exploits; targets include phones and wearables.
Storm-2603 group exploits SharePoint flaws and uses a custom C2 framework, AK47 C2, with HTTP- and DNS-based variants.
AI-created npm package @kodane/patch-manager drained Solana wallets; 1,500+ downloads before takedown on July 28, 2025.
01.08.2025
CISA has released Thorium, an open-source tool for malware and forensic analysis, now available to analysts.
PyPI warns of phishing emails from noreply@pypj[.]org posing as "[PyPI] Email verification" to redirect users to fake package sites.
Russia-linked Secret Blizzard targets foreign embassies in Moscow via ISP-level AitM attacks, deploying custom ApolloShadow malware.
Apple addressed a high-severity vulnerability that has been exploited in zero-day attacks targeting Google Chrome users.
Critical flaws in Dahua cameras let hackers take control remotely. The vendor has released patches, users should update firmware asap.
Hackers exploit a critical vulnerability, tracked as CVE-2025-5394 (CVSS score of 9.8), in the 'Alone WordPress theme to hijack sites.
FBI Dallas seized 20 BTC from Chaos ransomware affiliate "Hors," tied to cyberattacks on Texas firms, on April 15, 2025.
Researchers have released a decryptor for the ransomware FunkSec, allowing victims to recover their encrypted files for free.
30.07.2025
Hackers exploited a SAP NetWeaver bug to deploy upgraded Auto-Color Linux malware in an attack on U.S. chemicals firm.
Orange, France’s largest telecom provider, reported a cyberattack on one of its internal systems, impacting its operations in EU and Africa.
The dating safety app Tea was hacked, leaking images, and comments of thousands of users who shared anonymous "red flag" reports on men
A cyberattack claimed by Ukrainian group Silent Crow and Belarusian Cyber-Partisans crippled Aeroflot ’s systems, canceling over 100 flights.
29.07.2025
Critical vulnerability in Post SMTP plugin risks full site takeover, over 400k sites use it, and nearly half remain unpatched.