QUIC-LEAK Vulnerability Allows Attackers to Drain Server Memory and Cause DoS
21
Aug
2025

QUIC-LEAK Vulnerability Allows Attackers to Drain Server Memory and Cause DoS

Security researchers at Imperva have disclosed a critical pre-handshake memory exhaustion vulnerability in the widely-used LSQUIC QUIC implementation that enables…

Scattered Spider Hacker Gets 10 Years, $13M Restitution for SIM Swapping Crypto Theft
21
Aug
2025

Scattered Spider Hacker Gets 10 Years, $13M Restitution for SIM Swapping Crypto Theft

Aug 21, 2025Ravie LakshmananData Breach / Cybercrime A 20-year-old member of the notorious cybercrime gang known as Scattered Spider has…

Spider
21
Aug
2025

Scattered Spider hacker gets sentenced to 10 years in prison

Noah Michael Urban, a key member of the Scattered Spider cybercrime collective, was sentenced to 10 years in prison on…

New MITM6 + NTLM Relay Attack Let Attackers Escalate Privileges and Compromise Entire Domain
21
Aug
2025

New MITM6 + NTLM Relay Attack Let Attackers Escalate Privileges and Compromise Entire Domain

A sophisticated attack chain that combines MITM6 with NTLM relay techniques to achieve full Active Directory domain compromise.  The attack…

Russia-linked group Static Tundra exploit old Cisco flaw for espionage
21
Aug
2025

Russia-linked group Static Tundra exploit old Cisco flaw for espionage

FBI: Russia-linked group Static Tundra exploit old Cisco flaw for espionage Pierluigi Paganini August 21, 2025 FBI warns FSB-linked group…

Microsoft VS Code Remote-SSH Extension Hacked to Execute Malicious Code on Developer’s Machine
21
Aug
2025

Microsoft VS Code Remote-SSH Extension Hacked to Execute Malicious Code on Developer’s Machine

A critical security vulnerability has been discovered in Microsoft’s VS Code Remote-SSH extension that allows attackers to execute malicious code…

Operator of ‘Rapper Bot’ DDoS Botnet Faces Charges
21
Aug
2025

Operator of ‘Rapper Bot’ DDoS Botnet Faces Charges

Federal authorities have charged a 22-year-old Oregon man with operating one of the most powerful distributed denial-of-service (DDoS) botnets ever…

CISOs need to think about risks before rushing into AI
21
Aug
2025

CISOs need to think about risks before rushing into AI

Organizations are increasing investments in cloud, AI, and emerging technologies, but their infrastructure and security strategies often lag behind. A…

Static Tundra, Energetic Bear, Cisco, Critical Infrastructure
21
Aug
2025

Russia’s FSB-Linked Hackers Targeting Cisco Network Gear

How often do you hear people talking about issues of legacy systems—especially in critical infrastructure environments? Here’s another example of…

UK agrees to drop encryption 'backdoor' mandate for Apple
21
Aug
2025

UK agrees to drop encryption ‘backdoor’ mandate for Apple

Britain has dropped its demand for the iPhone maker Apple to provide a “backdoor” that would have enabled access to…

US CERT/CC warns of flaws in Workhorse Software accounting software used by hundreds of municipalities in Wisconsin
21
Aug
2025

US CERT/CC warns of flaws in Workhorse Software accounting software used by hundreds of municipalities in Wisconsin

US CERT/CC warns of flaws in Workhorse Software accounting software used by hundreds of municipalities in Wisconsin Pierluigi Paganini August…

Orange
21
Aug
2025

Orange Belgium discloses data breach impacting 850,000 customers

Orange Belgium, a subsidiary of telecommunications giant Orange Group, disclosed on Wednesday that attackers who breached its systems in July…