U.S. CISA adds Synacor Zimbra Collaboration Suite (ZCS) flaw to its Known Exploited Vulnerabilities catalog

2 months ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Synacor Zimbra Collaboration Suite (ZCS) flaw to its Known Exploited Vulnerabilities catalog. The…

GoAnywhere MFT zero-day used by Storm-1175 in Medusa ransomware campaigns

2 months ago

Storm-1175 exploits GoAnywhere MFT flaw CVE-2025-10035 in Medusa attacks, allowing easy remote code execution via License Servlet bug. A cybercrime…

CrowdStrike ties Oracle EBS RCE (CVE-2025-61882) to Cl0p attacks began Aug 9, 2025

3 months ago

CrowdStrike links Oracle EBS flaw CVE-2025-61882 (CVSS 9.8) to Cl0p, enabling unauthenticated RCE, first exploited on August 9, 2025. CrowdStrike…

U.S. CISA adds Oracle, Mozilla, Microsoft Windows, Linux Kernel, and Microsoft IE flaws to its Known Exploited Vulnerabilities catalog<gwmw style="display:none;"></gwmw>

3 months ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Oracle, Mozilla, Linux Kernel, Microsoft Windows, and Microsoft IE flaws to its Known…

Discord discloses third-party breach affecting customer support data

3 months ago

Discord reported a data breach at a third-party customer service provider that exposed user data, including contact details, IPs, and…

Oracle patches critical E-Business Suite flaw exploited by Cl0p hackers

3 months ago

Oracle fixed a critical flaw (CVE-2025-61882, CVSS 9.8) in E-Business Suite that is actively exploited by Cl0p cybercrime group. Oracle…

LinkedIn sues ProAPIs for $15K/Month LinkedIn data scraping scheme

3 months ago

LinkedIn sued ProAPIs and its CEO Rahmat Alam for running millions of fake accounts to scrape and sell user data,…

Zimbra users targeted in zero-day exploit using iCalendar attachments

3 months ago

Threat actors exploited a Zimbra zero-day via malicious iCalendar (.ICS) files used to deliver attacks through calendar attachments. StrikeReady researchers…

Reading the ENISA Threat Landscape 2025 report

3 months ago

ENISA Threat Landscape 2025: Rising ransomware, AI phishing, and state-backed espionage mark a converging, persistent EU cyber threat landscape. ENISA…

Ghost in the Cloud: Weaponizing AWS X-Ray for Command & Control

3 months ago

Attackers can weaponize AWS X-Ray as a covert bidirectional C2 channel, abusing legitimate cloud tracing infrastructure for C2. Summary &…

This website uses cookies.