$1,000,000 for WhatsApp 0-Click RCE Exploit at Pwn2Own Ireland 2025
01
Aug
2025

$1,000,000 for WhatsApp 0-Click RCE Exploit at Pwn2Own Ireland 2025

Trend Micro’s Zero Day Initiative (ZDI) announces an unprecedented $1,000,000 bounty for a zero-click remote code execution (RCE) exploit targeting…

Threat Actors Exploit Proofpoint and Intermedia Link Wrapping to Conceal Phishing Payloads
01
Aug
2025

Threat Actors Exploit Proofpoint and Intermedia Link Wrapping to Conceal Phishing Payloads

Cybercriminals are increasingly exploiting link wrapping features from vendors like Proofpoint and Intermedia to mask malicious payloads, leveraging the inherent…

Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks
01
Aug
2025

Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks

Aug 01, 2025Ravie LakshmananThreat Intelligence / Ransomware The threat actor linked to the exploitation of the recently disclosed security flaws…

CISA Issues ICS Advisories for Rockwell Automation, VMware, and Güralp Seismic Monitoring Systems
01
Aug
2025

CISA Issues ICS Advisories for Rockwell Automation, VMware, and Güralp Seismic Monitoring Systems

CISA released two high-severity Industrial Control Systems (ICS) advisories on July 31, 2025, highlighting critical vulnerabilities in widely deployed industrial…

Microsoft to Block External Workbook Links to Unsafe File Types by Default
01
Aug
2025

Microsoft to Block External Workbook Links to Unsafe File Types by Default

Microsoft announced a significant security enhancement for Excel users, revealing plans to block external workbook links to unsafe file types…

Threat Actors Abuse Proofpoint's and Intermedia’s Link Wrapping Features to Hide Phishing Payloads
01
Aug
2025

Threat Actors Abuse Proofpoint’s and Intermedia’s Link Wrapping Features to Hide Phishing Payloads

The latest wave of credential-phishing campaigns has revealed an unexpectedly convenient ally for threat actors: the very e-mail security suites…

CISA released Thorium platform to support malware and forensic analysis
01
Aug
2025

CISA released Thorium platform to support malware and forensic analysis

CISA released Thorium platform to support malware and forensic analysis Pierluigi Paganini August 01, 2025 CISA releases Thorium, an open-source…

Solving the challenges of a bug bounty program manager (BBPM). Strategic execution for security leaders.
01
Aug
2025

Solving the challenges of a bug bounty program manager (BBPM). Strategic execution for security leaders.

As more organizations lean on third-party platforms, cloud infrastructure, and remote development teams, the attack surface grows, often faster than…

AI Engine Plugin Flaw Exposes 100K Sites To RCE Risk
01
Aug
2025

AI Engine Plugin Flaw Exposes 100K Sites To RCE Risk

A security flaw affecting over 100,000 WordPress websites has been discovered in the AI Engine plugin, specifically impacting versions 2.9.3…

ChatGPT Conversations are Being Indexed by Search Engines!
01
Aug
2025

ChatGPT Conversations are Being Indexed by Search Engines!

ChatGPT shared conversations are being indexed by major search engines, effectively turning private exchanges into publicly discoverable content accessible to…

Open-Source Malware and Forensics Tool Now Public
01
Aug
2025

Open-Source Malware and Forensics Tool Now Public

The Cybersecurity and Infrastructure Security Agency (CISA) has made a significant contribution to the cybersecurity community by publicly releasing Thorium,…

Smart steps to keep your AI future-ready
01
Aug
2025

Smart steps to keep your AI future-ready

In this Help Net Security interview, Rohan Sen, Principal, Cyber, Data, and Tech Risk, PwC US, discusses how organizations can…