CyberPulse SMB - Daily Security Topic Digest
Date: September 25, 2025
⚠️ What Every Business Leader Should Know
Current threats highlight significant risks for SMBs, including supply chain attacks targeting npm packages, ransomware (Obscura variant), malicious browser-based attacks, and exploitation of vulnerabilities in widely used software (Ivanti, Apple iOS). Advanced persistent threats (APTs) and data breaches continue to pose a substantial danger, coupled with the ongoing risk of phishing and social engineering attacks. The increasing sophistication of these attacks necessitates a proactive and layered security approach.
The overwhelming majority of detected threats are phishing attacks leveraging publicly available feeds of malicious URLs. These attacks target employees via email and deceptive websites mimicking legitimate services (e.g., SAP, various financial institutions). Successful attacks compromise user credentials, potentially leading to data breaches, financial losses, and disruption of business operations. The high volume and consistent nature of these attacks highlight the critical need for proactive employee training and robust security awareness measures.
🔴 High-Risk Issues
Passwords & Email
Phishing attacks and credential stuffing remain prevalent, exploiting weak passwords and exploiting vulnerabilities in email security. Sophisticated attacks leverage AI to personalize phishing emails, making them harder to detect.
**Business Risk:** A successful phishing attack can lead to data breaches, financial losses, and reputational damage, impacting customer trust and potentially leading to regulatory fines.
- Implement multi-factor authentication (MFA) for all accounts.
- Conduct regular security awareness training for employees.
- Use strong, unique passwords and a password manager.
Ransomware
Ransomware attacks continue to rise, targeting vulnerable systems and demanding significant ransoms for data recovery. New variants like Obscura are becoming increasingly difficult to detect and remove.
**Business Risk:** A ransomware attack can cripple operations, lead to significant data loss, and incur substantial financial costs for recovery and potential ransoms.
- Regularly back up critical data to an offline location.
- Keep all software updated with the latest security patches.
- Implement robust endpoint detection and response (EDR) solutions.
Supply Chain Attacks
Attacks targeting software supply chains, such as compromised npm packages, pose a significant risk. Malicious code can be introduced into widely used software, affecting numerous businesses.
**Business Risk:** Compromised software can lead to data breaches, malware infections, and disruption of critical business processes.
- Vet third-party vendors carefully and verify their security practices.
- Regularly review and update your software dependencies.
- Implement robust vulnerability scanning and penetration testing.
⚙️ Foundational Policy Risks
Outdated Software
Unpatched software creates significant vulnerabilities that cybercriminals actively exploit. Many known vulnerabilities exist in widely used applications, making your business an easy target.
**Business Risk:** Outdated software leaves your systems exposed to malware, data breaches, and operational disruptions.
- Implement a regular patching schedule for all software and operating systems.
- Utilize automated patching tools where possible.
Weak Access Controls
Insufficient access controls, including weak passwords and excessive user permissions, create significant security gaps. This allows unauthorized access to sensitive data and systems.
**Business Risk:** Weak access controls can lead to data breaches, unauthorized access, and potential regulatory non-compliance.
- Implement the principle of least privilege, granting users only necessary access.
- Enforce strong password policies and multi-factor authentication.
📢 Security Awareness Gaps
Phishing Attacks
Phishing emails remain a primary attack vector, exploiting human error to gain access to sensitive information. AI-powered phishing attacks are becoming increasingly sophisticated.
**Business Risk:** Successful phishing attacks can lead to credential theft, data breaches, and financial losses.
- Provide regular security awareness training to employees on identifying phishing attempts.
- Implement email filtering and anti-phishing solutions.
📦 What You Should Prioritize Now
| Priority | Action |
|---|---|
| Implement MFA | Enable MFA on all critical accounts (email, cloud services, etc.). |
| Patching | Update all software and operating systems to the latest versions. |
| Data Backup | Create regular backups of critical data to an offline location. |
| Security Awareness Training | Conduct regular training for employees on phishing and other threats. |
| Password Management | Enforce strong password policies and encourage the use of password managers. |
| Vendor Risk Assessment | Review and assess the security practices of your third-party vendors. |
| Vulnerability Scanning | Conduct regular vulnerability scans to identify and address security weaknesses. |
| Incident Response Plan | Develop and test an incident response plan to handle security breaches. |
💬 Final Thought
Consistent, simple security practices—like MFA, regular software updates, and employee training—offer the most significant long-term protection against cyber threats. Prioritizing these foundational elements is crucial for safeguarding your business.
🔗 Additional Reading
High-Risk
- OpenPhish URL: ledgrrr------com----start.pages.dev — Phishing URL from OpenPhish public feed
- CVE-2025-58016 | CVSS MEDIUM 4.3 — Missing Authorization vulnerability in Codexpert, Inc CF7 Submissions allows Exploiting Incorrectly Configured Access Control Security Levels.
- CVE-2025-58012 | CVSS LOW 3.8 — Authorization Bypass Through User-Controlled Key vulnerability in Alex Content Mask allows Exploiting Incorrectly Configured Access Control Security Levels.
- CVE-2025-58009 | CVSS LOW 3.8 — Missing Authorization vulnerability in codepeople CP Multi View Event Calendar allows Exploiting Incorrectly Configured Access Control Security Levels.
- CVE-2025-58004 | CVSS MEDIUM 5.3 — Missing Authorization vulnerability in SmartDataSoft DriCub allows Exploiting Incorrectly Configured Access Control Security Levels.
- CVE-2025-58003 | CVSS MEDIUM 5.3 — Missing Authorization vulnerability in javothemes Javo Core allows Exploiting Incorrectly Configured Access Control Security Levels.
- CVE-2025-57997 | CVSS MEDIUM 4.3 — Missing Authorization vulnerability in Trustpilot Trustpilot Reviews allows Exploiting Incorrectly Configured Access Control Security Levels.
- CVE-2025-57995 | CVSS MEDIUM 4.3 — Missing Authorization vulnerability in Detheme DethemeKit For Elementor allows Exploiting Incorrectly Configured Access Control Security Levels.
- CVE-2025-57994 | CVSS MEDIUM 5.4 — Authorization Bypass Through User-Controlled Key vulnerability in Sayful Islam Upcoming Events Lists allows Exploiting Incorrectly Configured Access Control Se…
- CVE-2025-57991 | CVSS MEDIUM 5.4 — Missing Authorization vulnerability in Clariti Clariti allows Exploiting Incorrectly Configured Access Control Security Levels.
- CVE-2025-57990 | CVSS MEDIUM 5.4 — Missing Authorization vulnerability in solwininfotech Blog Designer allows Exploiting Incorrectly Configured Access Control Security Levels.
- CVE-2025-57987 | CVSS MEDIUM 5.3 — Missing Authorization vulnerability in ThimPress WP Events Manager allows Exploiting Incorrectly Configured Access Control Security Levels.
- CVE-2025-57985 | CVSS MEDIUM 4.3 — Missing Authorization vulnerability in MantraBrain Ultimate Watermark allows Exploiting Incorrectly Configured Access Control Security Levels.
- Security technologies — Security technologies
- [SMB] BreachForums Founder Resentenced to Three Years After Appeal — <p> </p><div class="separator" style="clear: both;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQeXTip6E5LYOr8LBAj5o0FLLsFP9oskES…
- Hacking Furbo - A Hardware Research Project – Part 5: Exploiting BLE — Introduction Part 5 of the Hacking Furbo blog series is here and in this article we'll be focusing on an area which has gotten little attention thus far: Bluet…
- Yet Another Random Story. VBScript's Randomize Internals. — Yet Another Random Story: VBScript's Randomize Internals In one of our recent posts, Dennis shared an interesting case study of C# exploitation that rode on Ra…
- ReDisclosure: New technique for exploiting Full-Text Search in MySQL (myBB case study) — ReDisclosure: New technique for exploiting Full-Text Search in MySQL (myBB case study) "Even a small key can open a big lock" Azerbaijani Proverb ---[ Index 1 …
- ReDoS: The Regex Attack That Can Bring Your Service to Its Knees — ReDoS: The Regex Attack That Can Bring Your Service to Its Knees In the digital battlefield of cybersecurity, some of the most devastating attacks come from th…
- Jaguar Land Rover to be hit with £2billion bill because it was NOT insured against hacking — Jaguar Land Rover was not insured against the cyber attack that shut down production and left its suppliers facing collapse, it was claimed last night.
- Safe in the sandbox: security hardening for Cloudflare Workers — We are further hardening Cloudflare Workers with the latest software and hardware features.
- [SMB] Smashing Security podcast #436: The €600,000 gold heist, powered by ransomware — Ransomware doesn’t just freeze computers - it can silence alarms too.
- Massive npm infection: the Shai-Hulud worm and patient zero — We dissect a recent incident where npm packages with millions of downloads were infected by the Shai-Hulud worm.
- Bookworm to Stately Taurus Using the Unit 42 Attribution Framework — <p>We connect Bookworm malware to Chinese APT Stately Taurus using our attribution framework, enhancing our understanding of threat group tradecraft.</p> <p>Th…
- [SMB] Malicious-Looking URL Creation Service — <p><a href="https://phishyurl.com/">This site</a> turns your URL into something sketchy-looking.</p> <p>For example, <tt>www.schneier.com</tt> becomes<br /> <t…
- New Supermicro BMC flaws can create persistent backdoors — Two vulnerabilities affecting the firmware of Supermicro hardware, including Baseboard Management Controller (BMC) allow attackers to update systems with malic…
- Teen suspected of Vegas casino cyberattacks released to parents — A 17-year-old hacker who surrendered to face charges over cyberattacks targeting Vegas casinos in 2023 has been released into the custody of his parents, a fam…
- Zero-day deja vu as another Cisco IOS bug comes under attack — <h4>The latest in a run of serious networking bugs gives attackers root if they have SNMP access</h4> <p>Cisco has confirmed a new IOS and IOS XE zero-day, the…
- CISA: Attackers Breach Federal Agency via Critical GeoServer Flaw — Threat actors exploited CVE-2024-36401 less than two weeks after it was initially disclosed and used it to gain access to a large federal civilian executive br…
- Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds — The latest Gcore Radar report analyzing attack data from Q1–Q2 2025, reveals a 41% year-on-year increase in total attack volume.
- [SMB] Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More — /* ===== Container ===== */ .td-wrap {} /* ===== Section ===== */ .td-section { } .td-title { margin: 16px 0 4px; font-size: 32px; line-height: 1.2; font-weigh…
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — The North Korea-linked threat actors associated with the Contagious Interview campaign have been attributed to a previously undocumented backdoor called Akdoor…
- Joint Statement on SharePoint vulnerabilities: Assessment and advice on recovery and mitigating actions — The European Commission, the EU Agency for Cybersecurity (ENISA), the Cybersecurity Service for the Union institutions, bodies, offices and agencies (CERT-EU),…
- Cybersecurity and AI: Integrating and Building on Existing NIST Guidelines — What is NIST up to? On April 3, 2025, NIST hosted a Cybersecurity and AI Profile Workshop at our National Cybersecurity Center of Excellence (NCCoE) to hear fe…
- [SMB] EDR-Freeze: New Windows Technique Can Put Security Tools into “Coma State” — <div class="separator" style="clear: both;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZHs6y4BKYvqXkfYc39Fd7rKAdcQ5r5yaZNsjLu8adBVelH…
- [SMB] Two-factor authentication complicates security with privacy risks, unreliability, and permanent lockouts — <p> </p><div style="text-align: justify;"><div class="separator" style="clear: both;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsE…
- [SMB] SIM Cloning and Aadhaar Data Theft Expose Massive Cyber Heist in Amroha — <p> </p><div class="separator" style="clear: both;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQ6lMKBqT0Fx2apsEV8wBlY15EIx-QTeEF…
- [SMB] North Korean Threat Actors Leverage ChatGPT in Deepfake Identity Scheme — <p style="text-align: justify;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2…
- [SMB] FBI Warns of Hackers Exploiting Salesforce to Steal Corporate Data — <p style="text-align: justify;"> </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/…
- [SMB] Digital Twins: Benefits and the Cybersecurity Risks They Bring — <p> </p><div class="separator" style="clear: both;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgt6ZyetUeJzE11U4s_qU3Q803QKkYIvfXL…
- [SMB] FileFix Attack Uses Fake Meta Suspensions to Spread StealC Malware — <p> </p><div style="text-align: justify;"><div class="separator" style="clear: both;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsE…
- [SMB] Rising Online Scams: From Phishing Emails to Fake News Feeds — <p> </p> <div class="separator" style="clear: both;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjh69b4vOAdhD11uUGZz25CQVBvN9Yde9i…
- https://news.sophos.com/en-us/2025/09/10/the-state-of-ransomware-in-education-2025/ — As many students across parts of the world return to class, ransomware remains a pressing threat to the education sector.
- https://news.sophos.com/en-us/2025/09/10/september-patch-tuesday-handles-81-cves/ — .Microsoft on Tuesday announced 81 patches affecting 15 product families.
- https://news.sophos.com/en-us/2025/09/17/gold-salems-warlock-operation-joins-busy-ransomware-landscape/ — Counter Threat Unit™ (CTU) researchers are monitoring a threat group that refers to itself as Warlock Group.
- https://news.sophos.com/en-us/2025/09/18/k-12-schools-cybersecurity-risks/ — Phishing was the most common access vector for ransomware infections at lower education institutions over the past year As schools continue to expand their dig…
- Dissecting PipeMagic: Inside the architecture of a modular backdoor framework — Among the plethora of advanced attacker tools that exemplify how threat actors continuously evolve their tactics, techniques, and procedures (TTPs) to evade de…
- CISA Shares Lessons Learned from an Incident Response Engagement — The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this Cybersecurity Advisory to highlight lessons learned from an incident response eng…
- CISA Adds One Known Exploited Vulnerability to Catalog — CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CISA Releases Six Industrial Control Systems Advisories — CISA released six Industrial Control Systems (ICS) advisories on September 23, 2025.
- CISA Releases Advisory on Lessons Learned from an Incident Response Engagement — Today, CISA released a cybersecurity advisory detailing lessons learned from an incident response engagement following the detection of potential malicious act…
- AutomationDirect CLICK PLUS — View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION : Exploitable remotely/low attack complexity : Exploitable remotely/low attack complexity Vendor : Automat…
- Mitsubishi Electric MELSEC-Q Series CPU Module — View CSAF 1. EXECUTIVE SUMMARY CVSS v3.1 6.8 ATTENTION : Exploitable remotely : Exploitable remotely Vendor : Mitsubishi Electric : Mitsubishi Electric Equipme…
- Schneider Electric SESU — View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.3 ATTENTION : Low Attack Complexity : Low Attack Complexity Vendor : Schneider Electric : Schneider Electric Equipment…
- Viessmann Vitogate 300 — View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION : Low attack complexity : Low attack complexity Vendor : Viessmann : Viessmann Equipment : Vitogate 300 : …
- Widespread Supply Chain Compromise Impacting npm Ecosystem — CISA is releasing this Alert to provide guidance in response to a widespread software supply chain compromise involving the world’s largest JavaScript registry…
- Vulnerability reports — Vulnerability reports
- [SMB] CVE-2025-48869 | horilla 1.3.0 access control — A vulnerability described as <a href="https://vuldb.com/?kb.risk">critical</a> has been identified in <a href="https://vuldb.com/?product.horilla">horilla 1.3.…
- How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking — Talos discovered that a new PlugX variant’s features overlap with both the RainyDay and Turian backdoors
- What happens when you engage Cisco Talos Incident Response? — What happens when you bring in a team of cybersecurity responders? How do we turn chaos into control, and what is the long-term value that Talos IR provides to…
- Building unique, per-customer defenses against advanced bot threats in the AI era — Today, we are announcing a new approach to catching bots: using models to provide behavioral anomaly detection unique to each bot management customer and stop …
- Securing data in SaaS to SaaS applications — The recent Salesloft breach taught us one thing: companies do not have visibility over data in SaaS applications.
- A simpler path to a safer Internet: an update to our CSAM scanning tool — Cloudflare has made it even easier to enable our free child safety tooling for all customers.
- [SMB] New string of phishing attacks targets Python developers — <h4>If you recently got an email asking you to verify your credentials to a PyPI site, better change that password</h4> <p>The Python Software Foundation warne…
- macOS Security Compliance Project (mSCP) simplifies the creation of security baselines for macOS, streamlining compliance and enhancing security. — As we know, today, corporate devices are not restricted to major desktop/laptop operating systems like Windows.
- BlackLock Ransomware: From Meteoric Rise to Sudden Disruption — BlackLock has quickly climbed the ranks in the global ransomware scene, setting new benchmarks for attack frequency and technical complexity.
- New Infostealer Campaign Targeting Mac Users via GitHub Pages Claiming to Offer LastPass Premium — The LastPass Threat Intelligence, Mitigation, and Escalation (TIME) team is tracking an ongoing, widespread infostealer campaign targeting Mac users through fr…
- Electron App Vulnerabilities testcases — What’s electron?, the design of electron desktop app, the story bug of the bug, the static code of the bug and how to find it, how to develop it and explain th…
- Tea continued - Unauthenticated access to 150+ Firebase databases, storage buckets and secrets — Introducing OpenFirebase - Time to clean up the Firebase mess Date: 16 September 2025 By: Mike Oude Reimer Think the Tea data breach was bad? Multiply it by ab…
- Is This Bad? This Feels Bad. (GoAnywhere CVE-2025-10035) - watchTowr Labs — File transfer used to be simple fun - fire up your favourite FTP client, log in to a glFTPd site, and you were done.
- Prototype Pollution: The Silent Killer in Your JavaScript Dependencies — Prototype Pollution: The Silent Killer in Your JavaScript Dependencies In the ever-evolving landscape of web security, few vulnerabilities are as insidious and…
- Honeypots in Go (work in progress) — Ussuri: Collection of honeypots and related utils This idea came from wanting to see if I could write my own ssh honeypot in Go which I've been able to do and …
- SolarWinds releases fix for second patch bypass of exploited RCE flaw — SolarWinds releases fix for second patch bypass of exploited RCE flaw
- Brickstorm malware powering ‘next-level’ Chinese cyberespionage campaign — Ambitious, suspected Chinese hackers with a slew of goals — stealing intellectual property, mining intelligence on national security and trade, developing aven…
- Supermicro server motherboards can be infected with unremovable malware — Servers running on motherboards sold by Supermicro contain high-severity vulnerabilities that can allow hackers to remotely install malicious firmware that run…
- Chinese hackers breach US software and law firms amid trade fight, experts say — Digital security Asia China Federal agencies See all topics Follow A team of suspected Chinese hackers has infiltrated US software developers and law firms in …
- [SMB] Retail at risk: How one alert uncovered a persistent cyberthreat — <p>In the latest edition of our Cyberattack Series, we dive into real-world cases targeting retail organizations.
- [SMB] INC ransomware: what you need to know — INC is the name of a ransomware-as-a-service (RaaS) operation that first appeared in late summer 2023.
- [SMB] Obscura, an obscure new ransomware variant — Huntress analysts discovered a previously unseen ransomware variant, Obscura, spreading from a victim company's domain controller.
- [SMB] Unpatched flaw in OnePlus phones lets rogue apps text messages — A vulnerability in multiple OnePlus OxygenOS versions allows any installed app to access SMS data and metadata without requiring permission or user interaction…
- Cisco warns of IOS zero-day vulnerability exploited in attacks — Cisco has released security updates to address a high-severity zero-day vulnerability in Cisco IOS and IOS XE Software that is currently being exploited in att…
- Exploit Attempts Against Older Hikvision Camera Vulnerability, (Wed, Sep 24th) — I notice a new URL showing up in our web honeypot logs, which looked a bit interesting:
- Npm Package Hides Malware in Steganographic QR Codes — The poisoned package, purporting to be a JavaScript utility, threatens the software supply chain with a highly obsfuscated credential stealer.
- UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors — Companies in the legal services, software-as-a-service (SaaS) providers, Business Process Outsourcers (BPOs), and technology sectors in the U.S.
- Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike — A suspected cyber espionage activity cluster that was previously found targeting global government and private sector organizations spanning Africa, Asia, Nort…
- Automatically Secure: how we upgraded 6,000,000 domains by default to get ready for the Quantum Future — After a year since we started enabling Automatic SSL/TLS, we want to talk about these results, why they matter, and how we’re preparing for the next leap in In…
- [SMB] Microsoft Purview delivered 30% reduction in data breach likelihood — <p>A recent Total Economic Impact™ (TEI) Of Microsoft Purview study by Forrester Consulting, commissioned by Microsoft, offers valuable insights into how organ…
- [SMB] AI vs. AI: Detecting an AI-obfuscated phishing campaign — <p>Microsoft Threat Intelligence recently detected and blocked a credential phishing campaign that likely used AI-generated code to obfuscate its payload and e…
- [SMB] US Disrupts Massive Cell Phone Array in New York — <p>This is a <a href="https://www.bbc.com/news/articles/cn4w0d8zz22o">weird story</a>:</p> <blockquote><p>The US Secret Service disrupted a network of telecomm…
- Libraesva ESG issues emergency fix for bug exploited by state hackers — Libraesva rolled out an emergency update for its Email Security Gateway solution to fix a vulnerability exploited by threat actors believed to be state sponsor…
- Boyd Gaming discloses data breach after suffering a cyberattack — US gaming and casino operator Boyd Gaming Corporation disclosed it suffered a breach after threat actors gained access to its systems and stole data, including…
- [SMB] GitHub notifications abused to impersonate Y Combinator for crypto theft — A massive phishing campaign targeted GitHub users with cryptocurrency drainers, delivered via fake invitations to the Y Combinator (YC) W2026 program. [...]
- [SMB] PyPI urges users to reset credentials after new phishing attacks — The Python Software Foundation has warned victims of a new wave of phishing attacks using a fake Python Package Index (PyPI) website to reset credentials. [...]
- [SMB] UK arrests suspect for RTX ransomware attack causing airport disruptions — The UK's National Crime Agency has arrested a suspect linked to a ransomware attack that is causing widespread disruptions across European airports. [...]
- Cybercriminals cash out with casino giant's employee data — <h4>Attackers hit jackpot after targeting Boyd Gaming</h4> <p>Hotel and casino operator Boyd Gaming has disclosed a cyberattack to US regulators, warning that …
- [SMB] UK agency makes arrest in airport cyberattack investigation — <h4>After air passenger travel hit across the Atlantic, organized crime agency strikes</h4> <p><strong>Breaking</strong> The UK's National Crime Agency has arr…
- Feds Tie ‘Scattered Spider’ Duo to $115M in Ransoms — U.S. prosecutors last week levied criminal hacking charges against 19-year-old U.K.
- Exposed Docker Daemons Fuel DDoS Botnet — The for-hire platform leverages legitimate cloud-native tools to make detection and disruption harder for defenders and SOC analysts.
- GitHub Aims to Secure Supply Chain as NPM Hacks Ramp Up — GitHub will address weak authentication and overly permissive tokens in the NPM ecosystem, following high-profile threat campaigns like those involving Shai-Hu…
- Threat Actor Deploys 'OVERSTEP' Backdoor in Ongoing SonicWall SMA Attacks — Hackers tracked as UNC6148 are attacking SonicWall security devices by installing hidden software, allowing them to control systems, steal passwords, and hide …
- State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability — Libraesva has released a security update to address a vulnerability in its Email Security Gateway (ESG) solution that it said has been exploited by state-spons…
- Hackers Exploit Pandoc CVE-2025-51591 to Target AWS IMDS and Steal EC2 IAM Credentials — Cloud security company Wiz has revealed that it uncovered in-the-wild exploitation of a security flaw in a Linux utility called Pandoc as part of attacks desig…
- iframe Security Exposed: The Blind Spot Fueling Payment Skimmer Attacks — Think payment iframes are secure by design? Think again. Sophisticated attackers have quietly evolved malicious overlay techniques to exploit checkout pages an…
- New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus — Cybersecurity researchers have disclosed details of a new malware family dubbed YiBackdoor that has been found to share "significant" source code overlaps with…
- [SMB] How One Bad Password Ended a 158-Year-Old Business — Most businesses don't make it past their fifth birthday - studies show that roughly 50% of small businesses fail within the first five years.
- From Beginner to Builder: Your First Code Contribution — Maybe you've used open source before and wondered how it all works, or you're early in your career and heard that open source contributions can boost your grow…
- What’s in the SOSS? Podcast #40 – S2E17 From Manager to Open Source Security Pioneer: Kate Stewart’s Journey Through SBOM, Safety, and the Zephyr Project — Intro Music + Promo Clip (00:00) CRob (00:07.862) Welcome, welcome, welcome to “What’s in the SOSS?” the OpenSSF’s podcast where we talked to the amazing peopl…
- Zero trust with zero clicks, a new take on IdPs — With Tailscale and tsidp, it’s even possible to securely isolate and authorize MCP servers for private AI deployments with minimal effort.
- Operation Rewrite: Chinese-Speaking Threat Actors Deploy BadIIS in a Wide Scale SEO Poisoning Campaign — <p>SEO poisoning campaign "Operation Rewrite” uses a malicious IIS module called BadIIS to redirect users to unwanted websites.</p> <p>The post <a href="https:…
- [SMB] Airport disruptions in Europe caused by a ransomware attack — The disruptions over the weekend at several major European airports were caused by a ransomware attack targeting the check-in and boarding systems. [...]
- NPM package caught using QR Code to fetch cookie-stealing malware — Newly discovered npm package 'fezbox' employs QR codes to hide a second-stage payload to steal cookies from a user's web browser.
- GitHub tightens npm security with mandatory 2FA, access tokens — GitHub is introducing a set of defenses against supply-chain attacks on the platform that led to multiple large-scale incidents recently. [...]
- SonicWall releases SMA100 firmware update to wipe rootkit malware — SonicWall has released a firmware update that can help customers remove rootkit malware deployed in attacks targeting SMA 100 series devices. [...]
- [SMB] SolarWinds releases third patch to fix Web Help Desk RCE bug — SolarWinds has released a hotfix for a critical a critical vulnerability in Web Help Desk that allows remote code execution (RCE) without authentication. [...]
- Suspected Iran-backed attackers targeting European aerospace sector with novel malware — <h4>Instead of job offers, victims get MiniJunk backdoor and MiniBrowse stealer</h4> <p>Suspected Iranian government-backed online attackers have expanded thei…
- Oracle gets to store US users' TikTok data, says Trump — <h4>President to announce details on Big Red’s storage and security deal for Chinese social media phenomenon later this week</h4> <p>The White House has promis…
- [SMB] GitHub moves to tighten npm security amid phishing, malware plague — <h4>Hundreds of compromised packages pulled as registry shifts to 2FA and trusted publishing</h4> <p>GitHub, which owns the npm registry for JavaScript package…
- BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells — Cybersecurity researchers are calling attention to a search engine optimization (SEO) poisoning campaign likely undertaken by a Chinese-speaking threat actor u…
- GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security — GitHub on Monday announced that it will be changing its authentication and publishing options "in the near future" in response to a recent wave of supply chain…
- ShadowV2 Botnet Exploits Misconfigured AWS Docker Containers for DDoS-for-Hire Service — Cybersecurity researchers have disclosed details of a new botnet that customers can rent access to conduct distributed denial-of-service (DDoS) attacks against…
- SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw — SolarWinds has released hot fixes to address a critical security flaw impacting its Web Help Desk software that, if successfully exploited, could allow attacke…
- 22nd September – Threat Intelligence Report — <p>For the latest discoveries in cyber research for the week of 22nd September, please download our Threat Intelligence Bulletin.
- Nimbus Manticore Deploys New Malware Targeting Europe — <p>Nimbus Manticore Deploys New Malware Targeting Europe Key Findings Introduction Since early 2025, Check Point Research (CPR) has tracked waves of Nimbus Man…
- [SMB] What happens when a cybersecurity company gets phished? — A Sophos employee was phished, but we countered the threat with an end-to-end defense process
- Microsoft Entra ID flaw allowed hijacking any company's tenant — A critical combination of legacy components could have allowed complete access to the Microsoft Entra ID tenant of every company in the world. [...]
- Car giant Stellantis says customer data nicked after partner vendor pwned — <h4>Automaker insists only names and emails exposed, no financials</h4> <p>Car giant Stellantis is admitting that attackers targeted one of its third-party par…
- [SMB] EU’s cyber agency blames ransomware as Euro airport check-in chaos continues — <h4>Airport staff revert to manual ops as travellers urged to use self-service check-in where possible</h4> <p>The EU's cybersecurity agency today confirmed th…
- 15 Years of Zero Trust: Why It Matters More Than Ever — With the emergence of AI-driven attacks and quantum computing, and the explosion of hyperconnected devices, zero trust remains a core strategy for security ope…
- [SMB] Microsoft Patches Critical Entra ID Flaw Enabling Global Admin Impersonation Across Tenants — A critical token validation failure in Microsoft Entra ID (previously Azure Active Directory) could have allowed attackers to impersonate any user, including G…
- [SMB] ⚡ Weekly Recap: Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More — The security landscape now moves at a pace no patch cycle can match.
Policy
- OpenPhish URL: izaacsecho.github.io — Phishing URL from OpenPhish public feed
- If you're a EU citizen and care about your privacy, please sign this EDRi petition against ChatControl. — You must have JavaScript enabled to use this form. Children deserve a secure and safe internet Dear Member of the European Parliament, I am joining 124 civil s…
- Bcachefs goes DKMS after Torvalds' kernel banishment — <h4>Performance of new version mostly good, but future uncertain</h4> <p>The bcachefs file system, now "externally maintained" outside the Linux kernel codebas…
- [SMB] Generative AI in Cybersecurity: Balancing Innovation and Risk — Generative AI is rapidly influencing a wide range of fields-including cybersecurity.
- The Impact of Artificial Intelligence on the Cybersecurity Workforce — Credit: NICE The NICE Workforce Framework for Cybersecurity (NICE Framework) was revised in November 2020 as NIST Special Publication 800-181 rev.1 to enable m…
- Nine Years and Counting: NICE RAMPS Communities Keep Expanding Opportunities in Cybersecurity Work and Learning — A lot has changed in America’s cybersecurity workforce development ecosystem since 2016: employment in cybersecurity occupations has grown by more than 300,000…
- Reflections from the First Cyber AI Profile Workshop — Thank you to everyone who participated in the Cyber AI Profile Workshop NIST hosted this past April! This work intends to support the cybersecurity and AI comm…
- Let’s get Digital! Updated Digital Identity Guidelines are Here! — Credit: NIST Join our Revision 4 Public Webinar! August 20, 2025 | 12:00 PM – 1:30 PM EDT This informative webinar featuring NIST’s identity team will cover th…
- [SMB] DHS Data Sharing Error Left Sensitive Intelligence Open to Thousands — <p style="text-align: justify;"> </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/…
- Dow’s 125-year legacy: Innovating with AI to secure a long future — Founded more than 125 years ago, Dow has demonstrated a commitment to leveraging science to make the world a better place.
- SonicWall Releases Advisory for Customers after Security Incident — SonicWall released a security advisory to assist their customers with protecting systems impacted by the MySonicWall cloud backup file incident.
- [SMB] Cloudflare Confidence Scorecards - making AI safer for the Internet — Cloudflare Confidence Scorecards are now live in the Application Library. Get transparent risk ratings for SaaS and Gen-AI apps.
- Securing today for the quantum future: WARP client now supports post-quantum cryptography (PQC) — To prepare for a future where powerful quantum computers come online, we've upgraded our WARP client with post-quantum cryptography.
- Some positive new from the chat control opposition: Former MEP Patrick Breyer: Danish Minister Uses “Blatant Lie” to Blackmail EU into “Chat Control“ Mass Surveillance Deal — Some positive new from the chat control opposition: Former MEP Patrick Breyer: Danish Minister Uses “Blatant Lie” to Blackmail EU into “Chat Control“ Mass Surve
- Kali Linux 2025.3 released with 10 new tools, wifi enhancements — Kali Linux has released version 2025.3, the third version of 2025, featuring ten new tools, Nexmon support, and NetHunter improvements. [...]
- [SMB] JRFM, Vol. 18, Pages 539: Committee Diversity Effect on Corporate Investment Risk Practices — Background: This study examines how diversifying committees influence corporate investment risk practices, specifically in decision-making and resource allocat…
- [SMB] The AI Fix #69: How we really use ChatGPT, and will AI agents crash the economy? — In episode 69 of The AI Fix, our hosts discover brain rot, a shark wears trainers on its fins, an AI writes a terrible J-Pop song, Graham learns that ants don’…
- Campaigners urge UK PM Starmer to dump digital ID wheeze before it's announced — <h4>Labour accused of sneaking in plans it denied before the general election</h4> <p>Seven campaign groups have written to UK prime minister Keir Starmer urgi…
- CISA Announces Steve Casapulla as Executive Assistant Director for Infrastructure Security — WASHINGTON – Today, the Cybersecurity and Infrastructure Security Agency (CISA) announced the appointment of Stephen L.
- From FBI to CISO: Unconventional Paths to Cybersecurity Success — Cybersecurity leader Jason Manar shares insights on diverse career paths, essential skills, and practical advice for entering and thriving in the high-stress y…
- Slow Wi-Fi? Add houseplants to the list of suspects — <h4>Not as bad as other interference, but maybe it's time for a wired connection</h4> <p>Houseplants could be slowing down your Wi-Fi, according to Broadband G…
- Lean Teams, Higher Stakes: Why CISOs Must Rethink Incident Remediation — Big companies are getting smaller, and their CEOs want everyone to know it.
- Data, Vol. 10, Pages 151: Validation of Anthropogenic Emission Inventories in Japan: A WRF-Chem Comparison of PM2.5, SO2, NOx and CO Against Observations — Reliable, high-resolution emission inventories are essential for accurately simulating air quality and for designing evidence-based mitigation policies.
Awareness
- OpenPhish URL: hayzxnffa.github.io — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.whats-fo.vip — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.whats-fe.vip — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.whats-gi.vip — Phishing URL from OpenPhish public feed
- OpenPhish URL: ljintkosve.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: facebook-alerts.blogspot.bg — Phishing URL from OpenPhish public feed
- OpenPhish URL: ledger-n.github.io — Phishing URL from OpenPhish public feed
- OpenPhish URL: pickup.freightinternationalservices.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: sites.google.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: yg.naws.pp.ua — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap25379v1.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap26180uj.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap37693tz.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap2488t8r.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: rdscf-6397.twil.io — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap37256i2.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap3699w96.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap2526fir.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.tap4588oi3.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap2575rab.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: tap456660r.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: 88-dbs.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: discontcomputers.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: loggmaskmetha-uk34.godaddysites.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.whats-gy.vip — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap3624ljr.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap34922bi.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap3316nwq.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap2510952.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap24798vp.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: cooinbace-pro-logi.godaddysites.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.netflix-clone-ayushagrawal.vercel.app — Phishing URL from OpenPhish public feed
- OpenPhish URL: account.webaccess-email.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: methamskkloggeys.godaddysites.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap3680jbi.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: tap4572s2i.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: upohulld_iogin.godaddysites.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: app.legder.xyz — Phishing URL from OpenPhish public feed
- OpenPhish URL: webmail.freightinternationalservices.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap2770afr.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap25326r1.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap25326r1.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: tap4154100.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: evmvalidation.pages.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: pub-ea66fe1b3c8e4757bafadfb9728b159c.r2.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: 3guq.sap3386erj.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: tap41827gx.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.amazon-clone-jet-eight-44.vercel.app — Phishing URL from OpenPhish public feed
- OpenPhish URL: meta-support-passwordhub.pages.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: meta-support-accessvault.pages.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: snapchat-web.vercel.app — Phishing URL from OpenPhish public feed
- OpenPhish URL: blockkfilogin9.godaddysites.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: gwmillss.wixstudio.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: us-uphold-wallet-io.pages.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: pub-5e9fa772ba4146d1bb14336449066f34.r2.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.instagram-page-omega.vercel.app — Phishing URL from OpenPhish public feed
- OpenPhish URL: playground.midasbuy-page.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: sonai-eight.vercel.app — Phishing URL from OpenPhish public feed
- OpenPhish URL: iman70.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: mail.lucrativehiring.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: iman182.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: iman124.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: fullaski.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: 3guq.sap3397108.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap2509435.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: statutory-inc-genetic-one.trycloudflare.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: pub-0f913529526241fc8964926c7777865b.r2.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: netflix-nine-alpha.vercel.app — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap257327f.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap2486785.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap24739hj.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap27904gn.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap25518ng.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap25657aj.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: tap427605h.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap278894j.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: meta-maskloig.godaddysites.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: sites.google.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.whats-fa.vip — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.whats-fv.vip — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.whats-fx.vip — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.3huj-bmmanager972915.vercel.app — Phishing URL from OpenPhish public feed
- OpenPhish URL: ee-account-home.web.app — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.diyanetisleribakanligi.vercel.app — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap2706iif.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.tap42756qr.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.tap42927vs.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: tap42795tu.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: mayonetteofficialjob.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: diyanetisleribakanligi.vercel.app — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.vakifbnksubeduyurularim.vercel.app — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.vercellsanane.vercel.app — Phishing URL from OpenPhish public feed
- OpenPhish URL: vakifbnksubeduyurularim.vercel.app — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.whats-fg.vip — Phishing URL from OpenPhish public feed
- OpenPhish URL: urlto.me — Phishing URL from OpenPhish public feed
- OpenPhish URL: pub-0e9742749a2e4c47b402f57daef5a41b.r2.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: netflix-clone-green-eight.vercel.app — Phishing URL from OpenPhish public feed
- OpenPhish URL: nlink.at — Phishing URL from OpenPhish public feed
- OpenPhish URL: mtpkor.poiu.biz.id — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.whats-gk.vip — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap2483dcc.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap2472fiw.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: tap4280wgg.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap27720jg.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap27782hm.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap27196ia.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: tap41982tf.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.whats-gx.vip — Phishing URL from OpenPhish public feed
- OpenPhish URL: auth.properties — Phishing URL from OpenPhish public feed
- OpenPhish URL: mopkl09.github.io — Phishing URL from OpenPhish public feed
- OpenPhish URL: mopkl09.github.io — Phishing URL from OpenPhish public feed
- OpenPhish URL: sso-coin-base-coms-x-auth.pages.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: secure-trezurwallet-cloud.pages.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: auth-sso-upheld-com-cdn.pages.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: home-eng-ndaxx-io-auth.pages.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: portal-nda-x-auth-sso-cdn.pages.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: auth-uphld-com-t-auth.pages.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap2538fdm.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: instagram-login-layout-nine.vercel.app — Phishing URL from OpenPhish public feed
- OpenPhish URL: cloud-walletledgur-faq.pages.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: auth-coin-bases-secure-us-en.pages.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: uphold-ip-login.pages.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: home-uphld-login.pages.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: login-ntcoins.pages.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: help-nda-ens-auth.pages.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: robinnhodlognw.github.io — Phishing URL from OpenPhish public feed
- OpenPhish URL: logiiin---com----uphlddd.pages.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap2796feh.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: tap42555vy.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap2777jc5.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap2764rxs.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap25953jc.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap25977wn.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.tap4223b3w.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap27481j1.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap2558ppa.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.track-lsrael-post-il.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: ex-odua-we-b-3-wallet-eng.wstd.io — Phishing URL from OpenPhish public feed
- OpenPhish URL: sites.google.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: r32222.vercel.app — Phishing URL from OpenPhish public feed
- OpenPhish URL: classifieds.creditunion-authority.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: applsauce.facilities-communications.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: tap41657aq.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap2477wmt.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: tap4253zsl.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: tap42862ae.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap2733qfx.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap27272k3.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: tap4256jzn.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap2587k8b.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.kkinstagram.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.tap4259dds.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: dgpj.cv — Phishing URL from OpenPhish public feed
- OpenPhish URL: conibsse_prro-xwlogii.godaddysites.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.kkinstagram.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: kookoin-logen.godaddysites.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap27548tm.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.tap42226b3.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap25906fd.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: tap42339n3.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap25153w8.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: dpkg.wujialin.dpdns.org — Phishing URL from OpenPhish public feed
- OpenPhish URL: mottamask-lloggjin.godaddysites.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: 851749262175512044219798392350qzonnamoimjvwbu.adelon.com.br — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap27768ri.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap27266mn.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap2728sgo.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap259372i.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: tap41939zq.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: tap42400s6.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.caixadirecta-depositos.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: webaccess-email.mx — Phishing URL from OpenPhish public feed
- OpenPhish URL: current-news-alerts.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.timestesol.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap2676822.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap27170tb.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.tap4227ifo.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: tap4278kxq.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.sap25846mu.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap25927si.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.thecatholicatheist.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: spotify-clone-iota-ashen.vercel.app — Phishing URL from OpenPhish public feed
- OpenPhish URL: login-----live---ldgrrrr.pages.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: sudeepykalapur.github.io — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.tap0660pch.top — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap254508o.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap27957t7.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.tap4226tvh.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: sap2580ktb.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: voicemail.webaccess-alert.com — Phishing URL from OpenPhish public feed
- OpenPhish URL: coinbase-walletconnect.vercel.app — Phishing URL from OpenPhish public feed
- OpenPhish URL: ww2-abk.pages.dev — Phishing URL from OpenPhish public feed
- OpenPhish URL: bafybeibnkcf3t5gnn73ws6mzy3ntctlha4dzc6wkkhrzypck6uzdth37pm.ipfs.dweb.link — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.tap42875cr.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: www.tap42037x7.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: tap4177jy8.cc — Phishing URL from OpenPhish public feed
- OpenPhish URL: instagram-nextjs-three.vercel.app — Phishing URL from OpenPhish public feed
- OpenPhish URL: deyblox.netlify.app — Phishing URL from OpenPhish public feed
- [SMB] Building Digital Skills Early Becomes Essential for Elementary Students — <p style="text-align: justify;"> </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/…
- Police seizes $439 million stolen by cybercrime rings worldwide — In a five-month joint operation led by Interpol, law enforcement agencies have seized more than $439 million in cash and cryptocurrency linked to cyber-enabled…
- PC memory costs to climb as fabs chase filthy lucre in servers and HBM — <h4>TrendForce warns of Q4 memory hikes as suppliers squeeze consumer markets</h4> <p>PC memory prices are set to rise as the major suppliers allocate manufact…
Emerging
- Incidents — Incidents
- Predator drones shift from border patrol to protest surveillance — When MQ-9 Predator drones flew over anti-ICE protests in Los Angeles this summer, it was the first time they had been dispatched to monitor demonstrations on U…
- TikTok accused of collecting personal data on thousands of Canadian children | Report finds TikTok allowed advertisers to target sensitive traits of Canadian children — TikTok accused of collecting personal data on thousands of Canadian children | Report finds TikTok allowed advertisers to target sensitive traits of Canadian ch
- Apple's propaganda obscures iPhone maker's fight against consumers, EU and DMA — Apple is fighting for its own wallet, against fair competition and against its own customers, using propaganda to deliberately incite consumers against the EU …
- Mao: A protracted people's rootkit. — Mao A protracted people's rootkit. Another x86_64 userland rootkit for Linux.
- Why “contained” doesn’t mean “safe” in modern SOCs — Why “contained” doesn’t mean “safe” in modern SOCs
- That Secret Service SIM farm story is bogus — Today, the Secret Service announced they foiled some big national security threat.
- Data Harvester — Linux - OSINT Guide ⚫️ 🎯 GOAL: Start with just a name → find more info (accounts, location, contacts, etc.) 🔍 PROCESS: Step-by-step breakdown ⚠️ Please read DI…
- A year of improving Node.js compatibility in Cloudflare Workers — Over the year we have greatly expanded Node.js compatibility.
- Announcing Cloudflare Email Service’s private beta — Today, we’re launching Cloudflare Email Service. Send and receive email directly from your Workers with native bindings—no API keys needed.
- Choice: the path to AI sovereignty — Championing AI sovereignty through choice: diverse tools, data control, and no vendor lock-in.
- Announcing the Cloudflare Data Platform: ingest, store, and query your data directly on Cloudflare — The Cloudflare Data Platform, launching today, is a fully-managed suite of products for ingesting, transforming, storing, and querying analytical data, built o…
- Every Cloudflare feature, available to everyone — Cloudflare is making every feature available to any customer.
- R2 SQL: a deep dive into our new distributed query engine — R2 SQL provides a built-in, serverless way to run ad-hoc analytic queries against your R2 Data Catalog.
- Cloudflare's developer platform keeps getting better, faster, and more powerful. Here's everything that's new. — Cloudflare's developer platform keeps getting better, faster, and more powerful. Here's everything that's new.
- OpenAI is testing a new GPT-5-based AI agent "GPT-Alpha" — OpenAI is internally testing a new version of its AI agent, which uses a special version of GPT-5 dubbed "GPT-Alpha." [...]
- SAP's 'simplified' licensing leaves users more confused — <h4>Business Suite nostalgia unlikely to ease customers' public cloud journey</h4> <p>SAP experts are doubting the enterprise software giant's message that it …
- Oracle saddles up with $18B debt amid AI infrastructure gamble — <h4>Ballooning leverage and shaky customer funding could strain Big Red's balance sheet</h4> <p>Oracle has raised $18 billion in debt, which could help fund ma…
- Google reminds EU that Microsoft's cloudy licensing still stinks a year later — <h4>Mountain View gripes over slow-moving regulators while Redmond rakes it in</h4> <p>Google is like a dog with a bone over Microsoft's cloud licensing polici…
- ISC Stormcast For Thursday, September 25th, 2025 https://isc.sans.edu/podcastdetail/9628, (Thu, Sep 25th) — ISC Stormcast For Thursday, September 25th, 2025 https://isc.sans.edu/podcastdetail/9628, (Thu, Sep 25th)
- Russia Targets Moldovan Election in Disinformation Play — Researchers have tracked a Russian disinformation campaign against upcoming Moldovan elections, linking it to a previous campaign that began in 2022.
- The Fall of Scattered Spider? Teen Member Surrenders Amid Group's Shutdown Claims — The cybercrime group continues to gain attention despite its apparent shutdown last week.
- Malicious Rust Crates Steal Solana and Ethereum Keys — 8,424 Downloads Confirmed — Cybersecurity researchers have discovered two malicious Rust crates impersonating a legitimate library called fast_log to steal Solana and Ethereum wallet keys…
- [SMB] CTEM's Core: Prioritization and Validation — Despite a coordinated investment of time, effort, planning, and resources, even the most up-to-date cybersecurity systems continue to fail.
- Best SAST Tools of 2025 — Tooling Guides
- Cloudflare’s 2025 Annual Founders’ Letter — Cloudflare launched 15 years ago. We like to celebrate our birthday by launching new products that give back to the Internet.
- CVE-2025-57437 | CVSS CRITICAL 9.8 — The Blackmagic Web Presenter HD firmware version 3.3 exposes sensitive information via an unauthenticated Telnet service on port 9977.
- CVE-2025-59411 | CVSS MEDIUM 5.4 — CubeCart is an ecommerce software solution. Prior to version 6.5.11, the contact form’s Enquiry field accepts raw HTML and that HTML is included verbatim in th…
- CVE-2025-36202 | CVSS HIGH 7.5 — IBM webMethods Integration 10.15 and 11.1 could allow an authenticated user with required execute Services to execute commands on the system due to the imprope…
- CVE-2025-9983 | CVSS — GALAYOU G2 cameras stream video output via RTSP streams. By default these streams are protected by randomly generated credentials.
- CVE-2025-53692 | CVSS HIGH 7.1 — Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Sitecore Sitecore Experience Manager (XM), Sitecor…
- EU Cyber Crisis Management 2.0: The New Blueprint Has Arrived! — On June 6, the Council of the European Union adopted the Recommendation on an EU Blueprint for cyber crisis management.
- https://news.sophos.com/en-us/2025/09/04/cis-launches-commercial-cloud-mdr-powered-by-sophos-to-protect-sltt-government-organizations/ — State, Local, Tribal, and Territorial (SLTT) government organizations face escalating cyber threats but often lack the scale, budget, or staffing to respond ef…
- https://news.sophos.com/en-us/2025/09/09/new-enhancements-to-the-sophos-ai-assistant/ — We’re pleased to announce new features to the Sophos AI Assistant, which puts easier case triage and investigation, MDR-grade expertise, guided workflows, and …
- https://news.sophos.com/en-us/2025/09/16/sophos-tops-g2-fall-2025-reports-1-overall-in-mdr-and-firewall/ — G2 has published its Fall 2025 Reports, and customers once again put Sophos at the top.
- https://news.sophos.com/en-us/2025/09/16/not-all-endpoint-protection-is-created-equal/ — If you’re evaluating endpoint protection, you’ve likely noticed something: Everything starts to sound the same.
- Connect with the security community at Microsoft Ignite 2025 — In today’s AI-powered world, security professionals are facing unprecedented challenges—and opportunities.
- Microsoft Sentinel data lake: Unify signals, cut costs, and power agentic AI — You can’t protect what you can’t see. Security operations teams have long been faced with the challenge of managing massive, fast-growing datasets, and the cos…
- Publications — Publications
- Industrial threats — Industrial threats
- A Lookback at Workers Launchpad and a Warm Welcome to Cohort #6 — Workers Launchpad program offers resources and mentorship for founders building on the Cloudflare network.
- Cap'n Web: a new RPC system for browsers and web servers — Cap'n Web is a new open source, JavaScript-native RPC protocol for use in browsers and web servers.
- Introducing free access to Cloudflare developer features for students — Students in the United States over the age of 18 with a .edu email can now get one year of free access to Cloudflare developer features.
- Free access to Cloudflare developer services for non-profit and civil society organizations — We're expanding Cloudflare for Startups to include non-profits, civil society, and public interest orgs.
- Help build the future: announcing Cloudflare’s goal to hire 1,111 interns in 2026 — We are incredibly excited to announce our most ambitious intern program yet: Cloudflare aims to hire as many as 1,111 interns over the course of 2026.
- Helping protect journalists and local news from AI crawlers with Project Galileo — We are excited to announce that Project Galileo will now include access to Cloudflare's Bot Management and AI Crawl Control services.
- Deploy your own AI vibe coding platform — in one click! — Introducing VibeSDK, an open-source AI "vibe coding" platform that anyone can deploy to build their own custom platform.
- To build a better Internet in the age of AI, we need responsible AI bot principles. Here’s our proposal. — We are proposing—as starting points—responsible AI bot principles that emphasize transparency, accountability, and respect for content access and use preferenc…
- Lib Dems consider ditching opposition to ID cards — If a UK system was about "giving individuals power to access public services" Sir Ed said he could be in favour because "that could increase people's freedom a…
- Appeals Court: Abandoned Phones Don’t Equal Abandoned Privacy Rights — This posted was drafted by EFF legal intern Alexandra Halbeck The Court of Appeals for the Ninth Circuit, which covers California and most of the Western U.S.,…
- App for outing Charlie Kirk’s critics leaked its users’ personal data — An app for anonymously reporting individuals accused of speaking ill against conservative activist Charlie Kirk leaked personal data about its users.
- The DHS has been quietly harvesting DNA from Americans for years | The DNA of nearly 2,000 US citizens has been entered into an FBI crime database. — For years, Customs and Border Protection agents have been quietly harvesting DNA from American citizens, including minors, and funneling the samples into an FB…
- That Drone in the Sky Could Be Tracking Your Car — Police are using their drones as flying automated license plate readers (ALPRs), airborne police cameras that make it easier than ever for law enforcement to f…
- Image Forensics: Detecting AI Fakes with Compression Artifacts — Let’s start with some context. Why am I writing this post? I work at Fourthline, a company that manages the Know Your Customer (KYC) process for companies like…
- Tiantong-1 and satphone security: Part 2 — General satphone SIGINT capabilities Given their prominence in matters of national security, it is unsurprising there are many (commercialized) SIGINT capabili…
- US banking giant Citi pilots agentic AI with 5,000 staff — <h4>Financial services firm admits it may mean fewer staff</h4> <p>US banking giant Citi has revved the Stylus Workspaces AI platform it has been rolling out t…
- AI hype train may jump the tracks over $2T infrastructure bill, warns Bain — <h4>Industry looks like it's going to come up short – by about $800B</h4> <p>The AI craze is fueling massive growth in infrastructure, but the industry will ne…
- US Navy: I can't quit you, Azure — <h4>AWS, Google, and Oracle admitted they can't support current setup</h4> <p>Microsoft has the US Navy over a barrel, as the service admits it can't separate …
- Zorin OS 18 beta makes Linux look like anything but Linux — <h4>Windows, macOS, Cinnamon, even iPadOS – all just a layout switch away</h4> <p>Although Zorin doesn't aim to closely track its Ubuntu upstream, version 18 o…
- [SMB] Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models — Cybersecurity researchers have disclosed two security flaws in Wondershare RepairIt that exposed private user data and potentially exposed the system to artifi…
- Microorganisms, Vol. 13, Pages 2239: Antibiotic Residues in Muscle Tissues of Lueyang Black-Bone Chickens Under Free-Range Mountainous Conditions and Their Association with Gut Microbiota — The absorption, transport, and distribution of antibiotics in animals are influenced by the composition and function of the intestinal microbial community.
- Electronics, Vol. 14, Pages 3781: Fus: Combining Semantic and Structural Graph Information for Binary Code Similarity Detection — Binary code similarity detection (BCSD) plays an important role in software security.
- ISC Stormcast For Wednesday, September 24th, 2025 https://isc.sans.edu/podcastdetail/9626, (Wed, Sep 24th) — ISC Stormcast For Wednesday, September 24th, 2025 https://isc.sans.edu/podcastdetail/9626, (Wed, Sep 24th)
- Workers: Yes, RTO makes sense. No, we’re not going to do it — <h4>Report uncovers widespread clock blocking, coffee badging</h4> <p>UK workers totally understand why bosses want to get them back into the office – but woul…
- Google-sponsored DORA report reframes AI as central to software development — <h4>Most organizations use AI in dev, the question now is how to use it properly, claims report</h4> <p>Google Cloud's 2025 DORA (DevOps Research and Assessmen…
- As Incidents Rise, Japanese Government's Cybersecurity Falls Short — The Japanese government suffered the most cybersecurity incidents in 2024 — 447, nearly double the previous year — while failing to manage 16% of critical syst…
- Pharmaceuticals, Vol. 18, Pages 1426: Src and Abl as Therapeutic Targets in Lung Cancer: Opportunities for Drug Repurposing — Personalized medicine has gained an important relevance over the years with the development of targeted therapies, especially in cancer, adapted to the individ…
- Open Infrastructure is Not Free: A Joint Statement on Sustainable Stewardship — An Open Letter from the Stewards of Public Open Source Infrastructure Over the past two decades, open source has revolutionized the way software is developed.
- ISC Stormcast For Tuesday, September 23rd, 2025 https://isc.sans.edu/podcastdetail/9624, (Tue, Sep 23rd) — ISC Stormcast For Tuesday, September 23rd, 2025 https://isc.sans.edu/podcastdetail/9624, (Tue, Sep 23rd)
- Workers fear for their jobs as JLR's latest shutdown extended — <h4>With no idea when engines restart, families gear down on spending ahead of Christmas</h4> <p>Jaguar Land Rover is extending the shutdown of its production …
- BDCC, Vol. 9, Pages 242: A Critical Analysis of Government Communication via X (Twitter) — Social media has dramatically impacted all sectors of society, including public communication and governmental relations.
- Sustainability, Vol. 17, Pages 8506: Analysis of the Summer Sea Breeze Cooling Capacity on Coastal Cities Based on Computer Fluid Dynamics — Summer sea breezes provide cooling in coastal cities; however, their temporal cooling distribution and inland penetration distance remain inadequately studied.
- Entropy, Vol. 27, Pages 991: Category Name Expansion and an Enhanced Multimodal Fusion Framework for Few-Shot Learning — With the advancement of image processing techniques, few-shot learning (FSL) has gradually become a key approach to addressing the problem of data scarcity.
- Upgrade your travel kit with a tiny, Tailscale-friendly router — I’ll be on vacation when this post is published. It’s not a tropical, cultural, or adventure vacation, but a kind of remote staycation, in a big rented house, …
- [SMB] Details About Chinese Surveillance and Propaganda Companies — <p>Details from <a href="https://www.wired.com/story/made-in-china-how-chinas-surveillance-industry-actually-works/">leaked documents</a>:</p> <blockquote><p>W…
- Verified Steam game steals streamer's cancer treatment donations — A gamer seeking financial support for cancer treatment lost $32,000 after downloading from Steam a verified game named BlockBlasters that drained his cryptocur…
- Microsoft says recent updates cause DRM video playback issues — Microsoft has confirmed a known issue that prevents some apps from playing Digital Rights Management (DRM) protected video content or displaying and recording …
- Help Wanted: What are these odd reuqests about?, (Sun, Sep 21st) — Looking at our web honeypot data, I came across an odd new request header I hadn&#;x26;#;39;t seen before: "X-Forwarded-App".
- ISC Stormcast For Monday, September 22nd, 2025 https://isc.sans.edu/podcastdetail/9622, (Mon, Sep 22nd) — ISC Stormcast For Monday, September 22nd, 2025 https://isc.sans.edu/podcastdetail/9622, (Mon, Sep 22nd)
- Brit scientists over the Moon after growing tea in lunar soil — <h4>It's one small sip for man...</h4> <p>British boffins say they've discovered a way of taking one of the country's favorite pastimes – having a nice cup of …
- Don't despair. iFixit says you can still repair that iPhone Air — <h4>Thinnest yet still fixable, though not without effort</h4> <p>iFixit has given Apple's slimline new smartphone, the iPhone Air, a thumbs-up for repairabili…
- How to Gain Control of AI Agents and Non-Human Identities — We hear this a lot: “We’ve got hundreds of service accounts and AI agents running in the background.
Controls
- Microsoft will offer free Windows 10 security updates in Europe — Microsoft will offer free extended security updates for Windows 10 users in the European Economic Area (EEA), which includes Iceland, Liechtenstein, Norway, an…
Other
- GitHub is included on the list that could make their platform restricted under Australia's social media ban — GitHub is included on the list that could make their platform restricted under Australia's social media ban
- Interview for Cyber Protection Team — Interview for Cyber Protection Team
- Blackberry: Too Brilliant to Survive — Blackberry: Too Brilliant to Survive
- Partnering to make full-stack fast: deploy PlanetScale databases directly from Workers — We’ve teamed up with PlanetScale to make shipping full-stack applications on Cloudflare Workers even easier.
- How Cloud Service Disruptions Are Making Resilience Critical for Developers — Outages affecting DevOps tools threaten to leave developers coding like it's 1999. How serious is the threat and what can companies do?
- https://news.sophos.com/en-us/2025/09/16/sophos-supports-objective-see-foundation-to-advance-macos-security-and-inclusive-cybersecurity-education/ — Dedicated to building a stronger, more inclusive Apple security community through open-source security tools Sophos is proud to be a gold friend of the Objecti…
- Come build with us: Cloudflare's new hubs for startups — In 2026, Cloudflare is opening our San Francisco, Austin, London, and Lisbon offices to builders and Startups.
- Supporting the future of the open web: Cloudflare is sponsoring Ladybird and Omarchy — We are excited to announce our support of two independent, open source projects: Ladybird, an ambitious project to build an independent browser, and Omarchy, a…
- Launching the x402 Foundation with Coinbase, and support for x402 transactions — Cloudflare is partnering with Coinbase to create the x402 Foundation and adding x402 support to the Agents SDK & MCP Servers.
- Why Cloudflare, Netlify, and Webflow are collaborating to support Open Source tools like Astro and TanStack — Today, Cloudflare is proud to announce support for two cornerstone frameworks in the modern web ecosystem: we’re partnering with Webflow to sponsor Astro, and …
- Giving users choice with Cloudflare’s new Content Signals Policy — Cloudflare’s Content Signals Policy gives creators a new tool to control use of their content.
- People should look into Faraday bags — People should look into Faraday bags
- In 2012, mass protests led to ACTA being rejected by the European Parliament, the same can and must happen with chatcontrol. — In 2012, mass protests led to ACTA being rejected by the European Parliament, the same can and must happen with chatcontrol.
- AGE VERFICATION LEGILASTION SOUTH AFRICA — AGE VERFICATION LEGILASTION SOUTH AFRICA
- Journeys in Hosting 1/x - Precomputed SSH Host Keys — Posted: 2025-09-22 In what I hope will be the debut of many in a series to come, I want to share my experience and musings as a frequent traveler in the world …
- Security in "Vibe Coded" Web Apps is a Disaster — Security in "Vibe Coded" Web Apps is a Disaster
- Pivoting in my career at 40 into cyber security, looking for advice from other professionals that were in a similar position and how they navigated, experience, certifications, and development, and now enjoying a rewarding career in tech — Pivoting in my career at 40 into cyber security, looking for advice from other professionals that were in a similar position and how they navigated, experience,
- Kali Linux 2025.3 is here! — Another quarter, another drop - Kali 2025.3 is now here! Bringing you another round of updates, new features and introducing some new tools - pushing Kali furt…
- [SMB] Apple’s New Memory Integrity Enforcement — <p>Apple has introduced a new hardware/software security feature in the iPhone 17: “<a href="https://security.apple.com/blog/memory-integrity-enforcement…
- [Guest Diary] Distracting the Analyst for Fun and Profit, (Tue, Sep 23rd) — &#;x26;#;x5b;This is a Guest Diary by Taylor House, an ISC intern as part of the SANS.edu Bachelor&#;x26;#;3…
- Windows 11 update leaves Blu-ray and TV apps stuttering — <h4>Protected content in some Blu-ray and DVD applications broken</h4> <p>Microsoft has added another entry to its growing list of problematic updates in the W…