ICYMI: 2025-05-14
Latest Headlines
Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit
BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan
Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering
CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users
Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns
Learning How to Hack: Why Offensive Security Training Benefits Your Entire Security Team
Horabot Malware Targets 6 Latin American Nations Using Invoice-Themed Phishing Emails
Microsoft Fixes 78 Flaws, 5 Zero-Days Exploited; CVSS 10 Bug Impacts Azure DevOps Server
Fortinet Patches CVE-2025-32756 Zero-Day RCE Flaw Exploited in FortiVoice Systems
Ivanti Patches EPMM Vulnerabilities Exploited for Remote Code Execution in Limited Attacks
The Internet’s Biggest-Ever Black Market Just Shut Down Amid a Telegram Purge
CFPB Quietly Kills Rule to Shield Americans From Data Brokers
North Korean IT Workers Are Being Exposed on a Massive Scale
Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance Spyware
Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks
Kosovar Administrator of Cybercrime Marketplace Extradited to US
EU Cybersecurity Agency ENISA Launches European Vulnerability Database
Fortinet Patches Zero-Day Exploited Against FortiVoice Appliances
Ivanti Patches Two EPMM Zero-Days Exploited to Hack Customers
ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact
Cybersecurity Industry Gains $1.7 Billion to Develop Cutting-Edge Protection Technologies
Identity Theft Surges as Criminals Deploy Advanced Tactics to Steal Personal Data
Hackers Exploit Software Flaws within Hours Forcing Urgent Push for Faster Patches
Logicube’s Falcon®-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant
Global Powers Intensify Cyber Warfare with Covert Digital Strikes on Critical Systems
Critical Adobe Illustrator Vulnerability Let Attackers Execute Malicious Code
Weaponized Google Calendar Invites Delivers Malicious Payload With Just One Character
Samsung MagicINFO 9 Server Vulnerability Let Attackers Write Arbitrary File
Adobe Photoshop Vulnerability Let Attackers Execute Arbitrary Code
Google Chrome to block admin-level browser launches for better security
Australian Human Rights Commission leaks docs to search engines
Microsoft fixes Linux boot issues on dual-boot Windows systems
Steel giant Nucor Corporation facing disruptions after cyberattack
Focused Phishing: Attack Targets Victims With Trusted Sites and Live Validation
Fashion giant Dior discloses cyberattack, warns of data breach
Kosovo extradites BlackDB admin to face US cybercrime charges
– MTZ