ICYMI: 2025-08-06
Latest Headlines
Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft
Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams
AI Slashes Workloads for vCISOs by 68% as SMBs Demand More – New Report Reveals
Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools
Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems
CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures
AI Is Transforming Cybersecurity Adversarial Testing - Pentera Founder’s Vision
CISA Adds 3 D-Link Vulnerabilities to KEV Catalog Amid Active Exploitation Evidence
A Single Poisoned Document Could Leak ‘Secret’ Data Via ChatGPT
Hackers Hijacked Google’s Gemini AI With a Poisoned Calendar Invite to Take Over a Smart Home
Nuclear Experts Say Mixing AI and Nuclear Weapons Is Inevitable
Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation
Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities
PLoB: A Behavioral Fingerprinting Framework to Hunt for Malicious Logins
WhatsApp Takes Down 6.8 Million Accounts Linked to Criminal Scam Centers, Meta Says
Trend Micro Patches Apex One Vulnerabilities Exploited in Wild
Ox Security Launches AI Agent That Auto-Generates Code to Fix Vulnerabilities
Flaws Expose 100 Dell Laptop Models to Implants, Windows Login Bypass
Threat Actors Weaponize Smart Contracts to Drain User Crypto Wallets of More Than $900k
Mustang Panda Attacking Windows Users With ToneShell Malware Mimic as Google Chrome
UAC-0099 Hackers Weaponizing HTA Files to Deliver MATCHBOIL Loader Malware
Google’s Salesforce Instances Hacked in Ongoing Attack – Hackers Exfiltrate User Data
Threat Actors Leveraging GenAI for Phishing Attacks Impersonating Government Websites
Global Jewellery Brand Pandora Suffers Hacked – Customer Data Exposed
Rockwell Arena Simulation Vulnerabilities Let Attackers Execute Malicious Code Remotely
Sophisticated DevilsTongue Windows Spyware Tracking Users Globally
Akira ransomware abuses CPU tuning tool to disable Microsoft Defender
New Ghost Calls tactic abuses Zoom and Microsoft Teams for C2 operations
Hacker extradited to US for stealing $3.3 million from taxpayers
Google suffers data breach in ongoing Salesforce data theft attacks
National Bank of Canada online systems down due to ’technical issue’
ReVault flaws let hackers bypass Windows login on Dell laptops
Microsoft pays record $17 million in bounties over the last 12 months
– MTZ