U.S. CISA adds Synacor Zimbra Collaboration Suite (ZCS) flaw to its Known Exploited Vulnerabilities catalog

1 week ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Synacor Zimbra Collaboration Suite (ZCS) flaw to its Known Exploited Vulnerabilities catalog. The…

GoAnywhere MFT zero-day used by Storm-1175 in Medusa ransomware campaigns

1 week ago

Storm-1175 exploits GoAnywhere MFT flaw CVE-2025-10035 in Medusa attacks, allowing easy remote code execution via License Servlet bug. A cybercrime…

CrowdStrike ties Oracle EBS RCE (CVE-2025-61882) to Cl0p attacks began Aug 9, 2025

1 week ago

CrowdStrike links Oracle EBS flaw CVE-2025-61882 (CVSS 9.8) to Cl0p, enabling unauthenticated RCE, first exploited on August 9, 2025. CrowdStrike…

U.S. CISA adds Oracle, Mozilla, Microsoft Windows, Linux Kernel, and Microsoft IE flaws to its Known Exploited Vulnerabilities catalog<gwmw style="display:none;"></gwmw>

1 week ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Oracle, Mozilla, Linux Kernel, Microsoft Windows, and Microsoft IE flaws to its Known…

Discord discloses third-party breach affecting customer support data

1 week ago

Discord reported a data breach at a third-party customer service provider that exposed user data, including contact details, IPs, and…

Oracle patches critical E-Business Suite flaw exploited by Cl0p hackers

1 week ago

Oracle fixed a critical flaw (CVE-2025-61882, CVSS 9.8) in E-Business Suite that is actively exploited by Cl0p cybercrime group. Oracle…

LinkedIn sues ProAPIs for $15K/Month LinkedIn data scraping scheme

1 week ago

LinkedIn sued ProAPIs and its CEO Rahmat Alam for running millions of fake accounts to scrape and sell user data,…

Zimbra users targeted in zero-day exploit using iCalendar attachments

1 week ago

Threat actors exploited a Zimbra zero-day via malicious iCalendar (.ICS) files used to deliver attacks through calendar attachments. StrikeReady researchers…

Reading the ENISA Threat Landscape 2025 report

1 week ago

ENISA Threat Landscape 2025: Rising ransomware, AI phishing, and state-backed espionage mark a converging, persistent EU cyber threat landscape. ENISA…

Ghost in the Cloud: Weaponizing AWS X-Ray for Command & Control

2 weeks ago

Attackers can weaponize AWS X-Ray as a covert bidirectional C2 channel, abusing legitimate cloud tracing infrastructure for C2. Summary &…

This website uses cookies.