The Chinese national flag flies outside the Ministry of Foreign Affairs in Beijing on July 26, 2023. (Photo by GREG BAKER/AFP via Getty Images)
21
Aug
2025

CrowdStrike warns of uptick in Silk Typhoon attacks this summer

The Chinese state-backed threat group Silk Typhoon has raised the pace of attacks targeting government, technology, legal and professional services…

Kali Vagrant Rebuilt Released - Pre-configured DebOS VMs via Command Line
21
Aug
2025

Kali Vagrant Rebuilt Released – Pre-configured DebOS VMs via Command Line

The Kali Linux team has announced a significant enhancement of its Vagrant image build process, streamlining development and simplifying deployment…

Threat Actors Weaponize PDF Editor Trojan to Convert Devices into Proxies
21
Aug
2025

Threat Actors Weaponize PDF Editor Trojan to Convert Devices into Proxies

Researchers have discovered a complex campaign using trojanized software that uses authentic code-signing certificates to avoid detection and turn compromised…

Qilin Ransomware Gang Claims 4TB Data Breach at Nissan CBI
21
Aug
2025

Qilin Ransomware Gang Claims 4TB Data Breach at Nissan CBI

Qilin ransomware claims a 4TB data breach at Nissan CBI, leaking car design files, financial data, 3D models, and VR…

Derek B. Johnson
21
Aug
2025

FTC warns tech companies not to weaken encryption, free speech practices for foreign governments

Federal Trade Commission Chair Andrew Ferguson warned U.S. tech companies not to accede to laws in foreign countries that weaken…

APT MuddyWater Attacking CFOs Leveraging OpenSSH, Enables RDP, and Scheduled Task
21
Aug
2025

APT MuddyWater Attacking CFOs Leveraging OpenSSH, Enables RDP, and Scheduled Task

A sophisticated cyber espionage campaign attributed to APT MuddyWater has emerged targeting Chief Financial Officers and finance executives across Europe,…

AI Website Generators Repurposed by Adversaries for Malware Campaigns
21
Aug
2025

AI Website Generators Repurposed by Adversaries for Malware Campaigns

Adversaries are using AI-powered website builders to expedite the development of harmful infrastructure in a quickly changing threat landscape, hence…

Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks
21
Aug
2025

Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks

Aug 21, 2025Ravie LakshmananVulnerability / Software Security Commvault has released updates to address four security gaps that could be exploited…

Apple addressed the seventh actively exploited zero-day
21
Aug
2025

Apple addressed the seventh actively exploited zero-day

Apple addressed the seventh actively exploited zero-day Pierluigi Paganini August 21, 2025 Apple addressed a vulnerability impacting iOS, iPadOS, and…

Mozilla High Severity Vulnerabilities Enables Remote Code Execution
21
Aug
2025

Mozilla High Severity Vulnerabilities Enables Remote Code Execution

Mozilla has released Firefox 142 to address multiple high-severity security vulnerabilities that could allow attackers to execute arbitrary code remotely…

Vegas, Vulnerabilities, and Voices: Black Hat and Squadcon 2025
21
Aug
2025

Vegas, Vulnerabilities, and Voices: Black Hat and Squadcon 2025

The week of August 4th, I had the opportunity to attend two exciting conferences in the cybersecurity world: Black Hat…

Warlock Ransomware Exploits SharePoint Flaws for Initial Access and Credential Theft
21
Aug
2025

Warlock Ransomware Exploits SharePoint Flaws for Initial Access and Credential Theft

The Warlock ransomware group has intensified its operations by targeting unpatched on-premises Microsoft SharePoint servers, leveraging critical vulnerabilities to achieve…