Falco – Real-Time Threat Detection for Linux and Containers

O2 VoLTE: locating any customer with a phone call
Frida 17 is out

Stateful Connection With Spoofed Source IP — NetImpostor
[Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications

Beware! A threat actor could steal the titles of your private (and draft) WordPress posts!

Weekly Update 452

Skitnet(Bossnet) Malware Analysis
Announcing the Official Parity Release of Volatility 3!
The Future is Coming Faster than You Think
New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors

Prescription for disaster: Sensitive patient data leaked in Ascension breach
Top 10 Best Practices for Effective Data Protection
Salt Security Partners With Wiz, Combines Cloud and API Security

Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks

Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Commit Stomping - Manipulating Git Histories to Obscure the Truth
Breachforums Boss to Pay $700k in Healthcare Breach

Welcoming the Malaysian Government to Have I Been Pwned
Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit

How the Microsoft Secure Future Initiative brings Zero Trust to life

Expression Payloads Meet Mayhem - Ivanti EPMM Unauth RCE Chain (CVE-2025-4427 and CVE-2025-4428) - watchTowr Labs

Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails

Pen Testing for Compliance Only? It's Time to Change Your Approach

New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy

5 BCDR Essentials for Effective Ransomware Defense

Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper
Smashing Security podcast #417: Hello, Pervert! – Sextortion scams and Discord disasters

Updates to Cisco’s Executive Leadership Team
Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit

BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan

Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering
Integrate LDAP into Keycloak to modernize rather than delete it
CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users
[CVE-2025-47916] Invision Community <= 5.0.6 (customCss) Remote Code Execution
Patch Tuesday, May 2025 Edition

Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns
ENISA Launches European Vulnerability Database to Bolster EU Cyber Resilience

Learning How to Hack: Why Offensive Security Training Benefits Your Entire Security Team

Horabot Malware Targets 6 Latin American Nations Using Invoice-Themed Phishing Emails

Microsoft Fixes 78 Flaws, 5 Zero-Days Exploited; CVSS 10 Bug Impacts Azure DevOps Server

Fortinet Patches CVE-2025-32756 Zero-Day RCE Flaw Exploited in FortiVoice Systems

Ivanti Patches EPMM Vulnerabilities Exploited for Remote Code Execution in Limited Attacks

Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

The AI Fix #50: AI brings dead man back for killer’s trial, and the judge loves it

China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide

Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads

AI Agents: Transformative or Turbulent?
Two years’ jail for down-on-his-luck man who sold ransomware online

Deepfake Defense in the Age of AI
North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress
Exploring CNAPP Options for Cloud Security in 2025

How Compliance Training Software Protects Your Business from Risk

Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency

Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers

High Court to decide if information from encrypted app legally obtained
Marbled Dust leverages zero-day in Output Messenger for regional espionage

Statistical Analysis to Detect Uncommon Code

ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files

⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams

How I ruined my vacation by reverse engineering WSC

SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths
The Persistence Problem: Why Exposed Credentials Remain Unfixed—and How to Change That
Fake AI Tools Used to Spread Noodlophile Malware, Targeting 62,000+ via Facebook Lures

One-Click RCE in ASUS’s Preinstalled Driver Software
Weekly Update 451
Exploiting DLL Search Order Hijacking in Microsoft Edge’s Trusted Directory: A Red Team Tactic

Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection

Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data

Stealthy .NET Malware: Hiding Malicious Payloads as Bitmap Resources
BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. - Dutch Operation

OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
WatchGuard transitions new CEO
Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
LockBit ransomware gang breached, secrets exposed

Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business

Beyond Vulnerability Management – Can You CVE What I CVE?
Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials

What Should You Consider When Choosing an AI Penetration Testing Company?

Hackers hit deportation airline GlobalX, leak flight manifests, and leave an unsubtle message for “Donnie” Trump
