YouTube Marketing Lesson From RSA Conference 2025
13
Jun
2025

Tales From Leading Women in Cybersecurity

The Black Hat USA 2025 two-day main conference on Aug. 6 and 7 will feature more than 100 selected Briefings. Some of the…

Microsoft 365
13
Jun
2025

Microsoft confirms auth issues affecting Microsoft 365 users

Microsoft is investigating an ongoing incident that is causing users to experience errors with some Microsoft 365 authentication features. As…

New SmartAttack Steals Sensitive Data From Air-Gapped Systems via Smartwatches
13
Jun
2025

New SmartAttack Steals Sensitive Data From Air-Gapped Systems via Smartwatches

A sophisticated new attack method called “SmartAttack” that can breach supposedly secure air-gapped computer systems using smartwatches as covert data…

Amazon Cloud Cam Flaw Allows Attackers to Intercept and Modify Network Traffic
13
Jun
2025

Amazon Cloud Cam Flaw Allows Attackers to Intercept and Modify Network Traffic

A critical vulnerability (CVE-2025-6031) has been identified in Amazon Cloud Cam devices, which reached end-of-life (EOL) status in December 2022….

iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
13
Jun
2025

iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)

A zero-click attack leveraging a freshly disclosed Messages vulnerability (CVE-2025-43200) has infected the iPhones of two European journalists with Paragon’s…

Monitoring Alerts to Measuring Risk
13
Jun
2025

Shifting from Monitoring Alerts to Measuring Risk

Introduction: Security at a Tipping Point Security Operations Centers (SOCs) were built for a different era, one defined by perimeter-based…

Victoria’s Secret
13
Jun
2025

Victoria’s Secret restores critical systems after cyberattack

Victoria’s Secret has restored all critical systems impacted by a May 24 security incident that forced it to shut down…

New GitHub Device Code Phishing Attacks Targeting Developers to Steal Tokens
13
Jun
2025

New GitHub Device Code Phishing Attacks Targeting Developers to Steal Tokens

Cybersecurity researchers have identified a sophisticated new phishing campaign that exploits GitHub’s OAuth2 device authorization flow to compromise developer accounts…

Microsoft Defender Spoofing Flaw Enables Privilege Escalation and AD Access
13
Jun
2025

Microsoft Defender Spoofing Flaw Enables Privilege Escalation and AD Access

A newly disclosed spoofing vulnerability (CVE-2025-26685) in Microsoft Defender for Identity (MDI) enables unauthenticated attackers to capture Net-NTLM hashes of…

Ransomware Gangs Exploit Unpatched SimpleHelp Flaws
13
Jun
2025

Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday disclosed that ransomware actors are targeting unpatched SimpleHelp Remote Monitoring…

HashiCorp Nomad Vulnerability Allows Privilege Escalation via ACL Policy Lookup Exploit
13
Jun
2025

HashiCorp Nomad Vulnerability Allows Privilege Escalation via ACL Policy Lookup Exploit

A significant security vulnerability in HashiCorp Nomad workload orchestrator that allows attackers to escalate privileges by exploiting the Access Control…

Apple released security updates to fix multiple flaws in iOS and macOS
13
Jun
2025

Apple confirmed that Messages app flaw was actively exploited in the wild

Apple confirmed that Messages app flaw was actively exploited in the wild Pierluigi Paganini June 13, 2025 Apple confirmed that…