Attackers Abuse TikTok and Instagram APIs — API Security
22
May
2025

Attackers Abuse TikTok and Instagram APIs — API Security

It must be the season for API security incidents. Hot on the heels of a developer leaking an API key…

Panda bear
22
May
2025

Chinese hackers breach US local governments using Cityworks zero-day

Chinese-speaking hackers have exploited a now-patched Trimble Cityworks zero-day to breach multiple local governing bodies across the United States. Trimble…

New NIST Security Metric Aims to Pinpoint Exploited Vulnerabilities
22
May
2025

New NIST Security Metric Aims to Pinpoint Exploited Vulnerabilities

Researchers from the National Institute of Standards and Technology (NIST) and the Cybersecurity and Infrastructure Security Agency (CISA) have introduced…

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise
22
May
2025

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

May 22, 2025Ravie LakshmananCybersecurity / Vulnerability A privilege escalation flaw has been demonstrated in Windows Server 2025 that makes it…

Attackers Exploit BIND DNS Server Vulnerability to Crash Servers Using Malicious Packets
22
May
2025

Attackers Exploit BIND DNS Server Vulnerability to Crash Servers Using Malicious Packets

The vulnerability in BIND DNS server software allowed attackers to crash DNS servers by sending specifically crafted malicious packets. This…

Who's Patching Your Network?
22
May
2025

Who’s Patching Your Network?

According to Cybersecurity Ventures, cybercrime cost the world an estimated $9.5 trillion last year. Cybercriminals are no longer focused on big…

Trap for Lumma thief
22
May
2025

Lumma information stealer infrastructure disrupted

The US Department of Justice (DOJ) and Microsoft have disrupted the infrastructure of the Lumma information stealer (infostealer). Lumma Stealer,…

Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program
22
May
2025

Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

May 22, 2025The Hacker NewsSecurity Framework / Cyber Defense It’s not enough to be secure. In today’s legal climate, you…

Security Theater or Real Defense? The KPIs That Tell the Truth
22
May
2025

Security Theater or Real Defense? The KPIs That Tell the Truth

A critical step in maturing any cybersecurity program is the ability to measure and report on its performance. Yet measuring…

GoDaddy
22
May
2025

FTC finalizes order requiring GoDaddy to secure hosting services

The U.S. Federal Trade Commission (FTC) has finalized an order requiring web hosting giant GoDaddy to secure its services to…

Linux kernel SMB 0-Day Vulnerability Uncovered Using ChatGPT
22
May
2025

Linux kernel SMB 0-Day Vulnerability Uncovered Using ChatGPT

Security researcher Sean has successfully identified a zero-day vulnerability in the Linux kernel using OpenAI’s o3 model. The discovery, designated…

Grafana Zero-Day Vulnerability Allows Attackers to Redirect Users to Malicious Sites
22
May
2025

Grafana Zero-Day Vulnerability Allows Attackers to Redirect Users to Malicious Sites

The High-severity cross-site scripting (XSS) vulnerability has been discovered in Grafana, prompting the immediate release of security patches across all…