2025-06-10
Amazon Security
Building identity-first security: A guide to the Identity and Access Management track at AWS re:Inforce 2025
Dark Reading
PoC Code Escalates Roundcube Vuln Threat
Ars Technica Security
Found in the wild: 2 Secure Boot exploits. Microsoft is patching only 1 of them.
Zero Day Initiative
The June 2025 Security Update Review
Synacktiv
Exploiting Heroes of Might and Magic V
Compass Security Blog
LinkedIn for OSINT: tips and tricks
Sicuranext Blog
Infuencing LLM Output using logprobs and Token Distribution
Sicuranext Blog
Infuencing LLM Output using logprobs and Token Distribution
TrustedSec
Common Mobile Device Threat Vectors
Rapid7
Patch Tuesday - June 2025
Eclypsium
Leading Cloud Computing Company Relies on Eclypsium to Protect AI Data Center Infrastructure
Datadog HQ
Explore your data with Sheets, DDSQL Editor, and Notebooks for advanced analysis in Datadog
Datadog HQ
Detect anomalies beyond spikes and new values with Content Anomaly Detection in Cloud SIEM
Datadog HQ
Reduce cloud storage costs and improve operational efficiency with Datadog Storage Monitoring
Talos Intelligence
Microsoft Patch Tuesday for June 2025 — Snort rules and prominent vulnerabilities
White Knight Labs
Understanding Double Free in Windows Kernel Drivers
2025-06-09
Malwarebytes
How and where to report an online scam
Malwarebytes
Been scammed online? Here’s what to do
Malwarebytes
A week in security (June 1 – June 7)
Schneier on Security
New Way to Track Covertly Android Users
Embrace The Red
Hosting COM Servers with an MCP Server
Amazon Security
Building secure foundations: A guide to network and infrastructure security at AWS re:Inforce 2025
Troy Hunt
Weekly Update 455
Dark Reading
'Librarian Ghouls' Cyberattackers Strike at Night
Dark Reading
Next-Gen Developers Are a Cybersecurity Powder Keg
Palo Alto Networks
Securing AI Agent Innovation with Prisma AIRS MCP Server
2025-06-08
Ars Technica Security
Cybercriminals turn to “residential proxy” services to hide malicious traffic
2025-06-06
Malwarebytes
How to update Chrome on every operating system
Malwarebytes
OpenAI forced to preserve ChatGPT chats
Schneier on Security
Friday Squid Blogging: Squid Run in Southern New England
Schneier on Security
Hearing on the Federal Government and AI
Schneier on Security
Report on the Malicious Uses of AI
Amazon Security
How to use on-demand rotation for AWS KMS imported keys
Dark Reading
F5 Acquires Agentic AI Security Startup Fletch
Dark Reading
Prep for Layoffs Before They Compromise Security
Ars Technica Security
Millions of low-cost Android devices turn home networks into crime platforms
Searchlight Cyber
BidenCash Marketplace Seized by U.S. Law Enforcement
Rapid7
Metasploit Wrap-up 06/06/25
Datadog HQ
Create rich, up-to-date visualizations of your AWS infrastructure with Cloudcraft in Datadog
Hunt and Hackett
Cyber Risks in Agriculture: A Guide for Business Leaders
2025-06-05
Malwarebytes
Ransomware hiding in fake AI, business tools
Microsoft Security
Connect with us at the Gartner Security & Risk Management Summit
Microsoft Security
Meet the Deputy CISOs who help shape Microsoft’s approach to cybersecurity: Part 3
Dark Reading
Backdoored Malware Reels in Newbie Cybercriminals
Dark Reading
Finding Balance in US AI Regulation
Krebs on Security
Proxy Services Feast on Ukraine’s IP Address Exodus
Eclypsium
SMM Callout Vulnerabilities in UEFI
Datadog HQ
Announcing Go tracer v2.0.0
Talos Intelligence
Everyone's on the cyber target list
Talos Intelligence
Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine
Palo Alto Networks
GenAI's Impact — Surging Adoption and Rising Risks in 2025
Offensive Security
CVE-2025-24893 – Unauthenticated Remote Code Execution in XWiki via SolrSearch Macro
2025-06-04
Schneier on Security
The Ramifications of Ukraine’s Drone Attack
Google Safety & Security
Our latest scams survey sees changing online security habits
XPN's Blog
Tokenization Confusion
Red Siege InfoSec Blog
Authentication vs. Authorization in Web App Penetration Testing
Dark Reading
35K Solar Devices Vulnerable to Potential Hijacking
Dark Reading
Vishing Crew Targets Salesforce Data
Dark Reading
How Neuroscience Can Help Us Battle 'Alert Fatigue'
Dark Reading
Beware of Device Code Phishing
Ars Technica Security
Two certificate authorities booted from the good graces of Chrome
Searchlight Cyber
Where Does Cyber Risk Come From Within an Organization?
Bishop Fox Security
2025 Red Team Tools – C2 Frameworks, Active Directory & Network Exploitation