2025-07-03
Github Security Blog
CVE-2025-53367: An exploitable out-of-bounds write in DjVuLibre
Krebs on Security
Big Tech’s Mixed Response to U.S. Treasury Sanctions
Talos Intelligence
A message from Bruce the mechanical shark
Schneier on Security
Surveillance Used by a Drug Cartel
Offensive Security
CVE-2025-29306 – Unauthenticated Remote Code Execution in FoxCMS v1.2.5 via Unserialize Injection
Okta Security
How this ClickFix campaign leads to Redline Stealer
Hunt and Hackett
Turning incident response challenges into scalable solutions
Datadog HQ
This Month in Datadog - June 2025
Datadog HQ
Migrate from your existing SIEM and quickly onboard security teams with Datadog Cloud SIEM
Elastic Security Labs
Taking SHELLTER: a commercial evasion framework abused in-the-wild
Google Safety & Security
Opening up ‘Zero-Knowledge Proof’ technology to promote privacy in age assurance
ReversingLabs
3CX’s Software Supply Chain Compromise: Lessons Learned
Ars Technica Security
Provider of covert surveillance app spills passwords for 62,000 users
Palo Alto Networks
Why Diverse Cloud Environments Require Flexible Security
2025-07-02
Talos Intelligence
PDFs: Portable documents, or perfect deliveries for phish?
Schneier on Security
Ubuntu Disables Spectre/Meltdown Protections
Malwarebytes
Qantas: Breach affects 6 million people, “significant” amount of data likely taken
Trail of Bits
Buckle up, Buttercup, AIxCC’s scored round is underway!
Troy Hunt
Weekly Update 458
Dark Reading
Qantas Airlines Breached, Impacting 6M Customers
Dark Reading
US Treasury Sanctions BPH Provider Aeza Group
Ars Technica Security
AT&T rolls out Wireless Account Lock protection to curb the SIM-swap scourge
Red Siege InfoSec Blog
Penetration Testing in SDLC
Red Siege InfoSec Blog
Logic Attacks: Abusing The System
Searchlight Cyber
How Modern ASM Uncovers Hidden Risks in Real Time
Palo Alto Networks
Navigating Heightened Cyber Risks from Iranian Threats
2025-07-01
Microsoft Security
Planning your move to Microsoft Defender portal for all Microsoft Sentinel customers
Github Security Blog
Understand your software’s supply chain with GitHub’s dependency graph
Schneier on Security
Iranian Blackout Affected Misinformation Campaigns
Malwarebytes
Facebook wants to look at your entire camera roll for “AI restyling” suggestions, and more
Cloudflare
Message Signatures are now part of our Verified Bots Program, simplifying bot authentication
Google Safety & Security
We are announcing Sparkasse as our first national credential partner for EU age assurance.
White Knight Labs
Understanding Out-Of-Bounds in Windows Kernel Driver
Leviathan Security
Integrating Security Metrics into Quality Models: A DORA-Aligned Strategy
Amazon Security
Remote access to AWS: A guide for hybrid workforces
Dark Reading
Like SEO, LLMs May Soon Fall Prey to Phishing Scams
Dark Reading
We've All Been Wrong: Phishing Training Doesn't Work
Ars Technica Security
US critical infrastructure exposed as feds warn of possible attacks from Iran
Searchlight Cyber Research
How we got persistent XSS on every AEM cloud site, thrice
2025-06-30
Microsoft Security
Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations
Krebs on Security
Senator Chides FBI for Weak Advice on Mobile Security
Schneier on Security
How Cybersecurity Fears Affect Confidence in Voting Systems
Malwarebytes
AT&T to pay compensation to data breach victims. Here’s how to check if you were affected
Malwarebytes
A week in security (June 23 – June 29)
Meta Security
Meta joins Kotlin Foundation
Dark Reading
Why Cybersecurity Should Come Before AI in Schools
Ars Technica Security
Drug cartel hacked FBI official’s phone to track and kill informants, report says
2025-06-28
2025-06-27
Microsoft Security
Unveiling RIFT: Enhancing Rust malware analysis through pattern matching
Github Security Blog
GitHub Advisory Database by the numbers: Known security vulnerabilities and what you can do about them
SpiderLabs
Tracing Blind Eagle to Proton66
Schneier on Security
Friday Squid Blogging: What to Do When You Find a Squid “Egg Mop”
Schneier on Security
The Age of Integrity
Malwarebytes
Fake DocuSign email hides tricky phishing attempt
Eclypsium
Ars Technica: Actively exploited vulnerability gives extraordinary control over server fleets
Eclypsium
The Hacker News: CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet
Dark Reading
'CitrixBleed 2' Shows Signs of Active Exploitation
Dark Reading
US Falling Behind China in Exploit Production
Ars Technica Security
Microsoft changes Windows in attempt to prevent next CrowdStrike-style catastrophe
Searchlight Cyber
Scattered Spider Shifts Focus to Insurance Industry