2025-06-13
Google Safety & Security
An age assurance tool for Europe and beyond
Dark Reading
Cyberattacks on Humanitarian Orgs Jump Worldwide
Schneier on Security
Friday Squid Blogging: Stubby Squid
Schneier on Security
Paragon Spyware Used to Spy on European Journalists
Amazon Security
How to create post-quantum signatures using AWS KMS and ML-DSA
Amazon Security
AI security strategies from Amazon and the CIA: Insights from AWS Summit Washington, DC
Eclypsium
Secure Device Lifecycle Management
Google Security Blog
Mitigating prompt injection attacks with a layered defense strategy
Palo Alto Networks
The New AI Attack Surface — How Cortex Cloud Secures MCP
2025-06-12
Troy Hunt
Weekly Update 456
Cloudflare
Cloudflare service outage June 12, 2025
Microsoft Security
Cyber resilience begins before the crisis
Offensive Security
CVE-2024-21683 – Authenticated RCE via “Add a New Language” in Atlassian Confluence
Offensive Security
CVE‑2025‑49113 – Post‑Auth Remote Code Execution in Roundcube via PHP Object Deserialization
Elastic Security Labs
Call Stacks: No More Free Passes For Malware
Talos Intelligence
Know thyself, know thy environment
Sansec Threat Research
Adobe patches critical Magento admin takeover via menu injection
Schneier on Security
Airlines Secretly Selling Passenger Data to the Government
The Citizen Lab
Graphite Caught: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted
Eclypsium
Securing AI Data Centers
Ars Technica Security
Coming to Apple OSes: A seamless, secure way to import and export passkeys
Krebs on Security
Inside a Dark Adtech Empire Fed by Fake CAPTCHAs
Palo Alto Networks
See How We’re Fortifying Cloud and AI at AWS re:Inforce 2025
2025-06-11
Fastly
DDoS in May
Project Black
FileFlows SQL Injection by Decompiling .NET Code
Dark Reading
ConnectWise to Rotate Code-Signing Certificates
Dark Reading
Agentic AI Takes Over Gartner's SRM Summit
Talos Intelligence
catdoc zero-day, NVIDIA, High-Logic FontCreator and Parallel vulnerabilities
Amazon Security
AWS completes Police-Assured Secure Facilities (PASF) audit in Europe (London) AWS Region
Black Lantern Security
Doomla! Zero Days
Synacktiv
NTLM reflection is dead, long live NTLM reflection! – An in-depth analysis of CVE-2025-33073
Searchlight Cyber
Why is Attack Surface Management Now Worth the Cost?
Krebs on Security
Patch Tuesday, June 2025 Edition
Redteam-Pentesting.de
A Look in the Mirror - The Reflective Kerberos Relay Attack
2025-06-10
Rapid7
Patch Tuesday - June 2025
Dark Reading
PoC Code Escalates Roundcube Vuln Threat
Talos Intelligence
Microsoft Patch Tuesday for June 2025 — Snort rules and prominent vulnerabilities
White Knight Labs
Understanding Double Free in Windows Kernel Drivers
Amazon Security
Building identity-first security: A guide to the Identity and Access Management track at AWS re:Inforce 2025
Eclypsium
Leading Cloud Computing Company Relies on Eclypsium to Protect AI Data Center Infrastructure
Datadog HQ
Explore your data with Sheets, DDSQL Editor, and Notebooks for advanced analysis in Datadog
Datadog HQ
Detect anomalies beyond spikes and new values with Content Anomaly Detection in Cloud SIEM
Datadog HQ
Reduce cloud storage costs and improve operational efficiency with Datadog Storage Monitoring
Ars Technica Security
Found in the wild: 2 Secure Boot exploits. Microsoft is patching only 1 of them.
Synacktiv
Exploiting Heroes of Might and Magic V
Sicuranext Blog
Influencing LLM Output using logprobs and Token Distribution
Compass Security Blog
LinkedIn for OSINT: tips and tricks
Sicuranext Blog
Influencing LLM Output using logprobs and Token Distribution
Zero Day Initiative
The June 2025 Security Update Review
TrustedSec
Common Mobile Device Threat Vectors
2025-06-09
Troy Hunt
Weekly Update 455
Embrace The Red
Hosting COM Servers with an MCP Server
Malwarebytes
How and where to report an online scam
Malwarebytes
Been scammed online? Here’s what to do
Malwarebytes
A week in security (June 1 – June 7)
Dark Reading
'Librarian Ghouls' Cyberattackers Strike at Night
Dark Reading
Next-Gen Developers Are a Cybersecurity Powder Keg
Schneier on Security
New Way to Covertly Track Android Users
Amazon Security
Building secure foundations: A guide to network and infrastructure security at AWS re:Inforce 2025
Palo Alto Networks
Securing AI Agent Innovation with Prisma AIRS MCP Server
2025-06-08
Ars Technica Security
Cybercriminals turn to “residential proxy” services to hide malicious traffic