[tl;dr sec] #295 - AI Code Analysis, AWS Detection Engineering, Anthropic Threat Intel Report
04
Sep
2025

[tl;dr sec] #295 – AI Code Analysis, AWS Detection Engineering, Anthropic Threat Intel Report

I hope you’ve been doing well! Gonna be Golden This past weekend I watched KPop Demon Hunters, and it was…

NoisyBear Weaponizing ZIP Files to PowerShell Loaders and Exfiltrate Sensitive Data
04
Sep
2025

NoisyBear Weaponizing ZIP Files to PowerShell Loaders and Exfiltrate Sensitive Data

A sophisticated threat actor known as NoisyBear has emerged as a significant concern for Kazakhstan’s energy sector, employing advanced tactics…

GhostRedirector Hackers Target Windows Servers Using Malicious IIS Module
04
Sep
2025

GhostRedirector Hackers Target Windows Servers Using Malicious IIS Module

ESET security researchers have uncovered a sophisticated cyber threat campaign targeting Windows servers across multiple countries, with attackers deploying custom…

Google fixes actively exploited Android vulnerabilities (CVE-2025-48543, CVE-2025-38352)
04
Sep
2025

Google fixes actively exploited Android vulnerabilities (CVE-2025-48543, CVE-2025-38352)

Google has provided fixes for over 100 Android vulnerabilities, including CVE-2025-48543 and CVE-2025-38352, which “may be under limited, targeted exploitation.”…

Black Hat USA 2025 CISO Podcast Series: Episode 5 Live Now
04
Sep
2025

Black Hat USA 2025 CISO Podcast Series: Episode 5 Live Now

The Cyber Express, in collaboration with Suraksha Catalyst, has officially released Episode 5 of the Black Hat USA 2025 CISO…

Bridgestone tire
04
Sep
2025

Tire giant Bridgestone confirms cyberattack impacts manufacturing

Car tire giant Bridgestone confirms it is investigating a cyberattack that impacts the operation of some manufacturing facilities in North America. The company believes…

Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers
04
Sep
2025

Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers

The Django development team has issued critical security updates to address a high-severity vulnerability that could allow attackers to execute…

NoisyBear Exploits ZIP Files for PowerShell Loaders and Data Exfiltration
04
Sep
2025

NoisyBear Exploits ZIP Files for PowerShell Loaders and Data Exfiltration

The threat actor known as NoisyBear has launched a sophisticated cyber-espionage effort called Operation BarrelFire, using specially designed phishing lures…

New Malware Uses Windows Character Map for Cryptomining
04
Sep
2025

New Malware Uses Windows Character Map for Cryptomining

Darktrace reports new malware hijacking Windows Character Map for cryptomining, exposing risks of hidden attacks in everyday software processes. Cybersecurity…

macOS vulnerability allowed Keychain and iOS app decryption without a password
04
Sep
2025

macOS vulnerability allowed Keychain and iOS app decryption without a password

Today at Nullcon Berlin, a researcher disclosed a macOS vulnerability (CVE-2025-24204) that allowed attackers to read the memory of any…

Roblox logo
04
Sep
2025

Roblox introduces age checks to use communication features

Roblox is an online platform that allows users to build, play and share online worlds and 3D games. Unfortunately, it’s…

How the newest ISAC aims to help food and agriculture firms thwart cyberattacks
04
Sep
2025

How the newest ISAC aims to help food and agriculture firms thwart cyberattacks

Listen to the article 9 min This audio is auto-generated. Please let us know if you have feedback. As food…