⤷ Title: New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 16:21:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 16:21:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: The Wild West of Shadow IT
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 15:00:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 15:00:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 11:49:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 11:49:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 22:00:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 22:00:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: OUs and GPOs and WMI Filters, Oh My!
════════════════════════
𐀪 Author: Rasta Mouse
════════════════════════
ⴵ Time: Tue, 07 Jun 2022 18:23:09 GMT
════════════════════════
⌗ Tags: #active_directory #gpo
════════════════════════
𐀪 Author: Rasta Mouse
════════════════════════
ⴵ Time: Tue, 07 Jun 2022 18:23:09 GMT
════════════════════════
⌗ Tags: #active_directory #gpo
Rasta Mouse
OUs and GPOs and WMI Filters, Oh My!
Abusing GPOs is a tactic that’s been actively in-play for many years. ACL-based path-finding for GPOs was introduced to BloodHound 1.5 in 2018, and other tools have been released such as SharpGPOAbuse which implement various abuse primitives.
You may…
You may…
⤷ Title: Navigating Cybersecurity Risks in Crypto-Backed Lending
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:09:18 +0000
════════════════════════
⌗ Tags: #Cryptocurrency #Security #Bitcoin #Crypto #Cybersecurity #data breach #DeFi #Ethereum #Fintech #GDPR
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:09:18 +0000
════════════════════════
⌗ Tags: #Cryptocurrency #Security #Bitcoin #Crypto #Cybersecurity #data breach #DeFi #Ethereum #Fintech #GDPR
Hackread
Navigating Cybersecurity Risks in Crypto-Backed Lending
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: Over 100 Dell Laptop Models Plagued by Vulnerabilities Impacting Millions
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 16:43:59 +0000
════════════════════════
⌗ Tags: #Security #AI #ControlVault #Cybersecurity #Dell #Hugging Face #ReVault #Vulnerability
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 16:43:59 +0000
════════════════════════
⌗ Tags: #Security #AI #ControlVault #Cybersecurity #Dell #Hugging Face #ReVault #Vulnerability
Hackread
Over 100 Dell Laptop Models Plagued by Vulnerabilities Impacting Millions
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: Pandora Cyber Attack Exposes Customer Data Via Third-Party Vendor
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 14:51:56 +0000
════════════════════════
⌗ Tags: #Security #Cyber Attacks #Cyber Attack #Cybersecurity #data breach #Pandora #Privacy #Retail #Scattered Spider
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 14:51:56 +0000
════════════════════════
⌗ Tags: #Security #Cyber Attacks #Cyber Attack #Cybersecurity #data breach #Pandora #Privacy #Retail #Scattered Spider
Hackread
Pandora Cyber Attack Exposes Customer Data Via Third-Party Vendor
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: Discord CDN Link Abused to Deliver RAT Disguised as OneDrive File
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 11:49:26 +0000
════════════════════════
⌗ Tags: #Security #Phishing Scam #Atera #CDN #Cyber Attack #Cybersecurity #Microsoft 365 #OneDrive #Phishing #Splashtop Streamer #Sublime Security
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 11:49:26 +0000
════════════════════════
⌗ Tags: #Security #Phishing Scam #Atera #CDN #Cyber Attack #Cybersecurity #Microsoft 365 #OneDrive #Phishing #Splashtop Streamer #Sublime Security
Hackread
Discord CDN Link Abused to Deliver RAT Disguised as OneDrive File
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: Hackers Abuse Microsoft 365 Direct Send to Deliver Internal Phishing Emails
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 19:25:17 +0000
════════════════════════
⌗ Tags: #Security #Phishing Scam #Cyber Attack #Cybersecurity #Fraud #Microsoft 365 #Phishing #Scam
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 19:25:17 +0000
════════════════════════
⌗ Tags: #Security #Phishing Scam #Cyber Attack #Cybersecurity #Fraud #Microsoft 365 #Phishing #Scam
Hackread
Hackers Abuse Microsoft 365 Direct Send to Deliver Internal Phishing Emails
Follow us on Blue Sky, Mastodon Twitter, Facebook and LinkedIn @Hackread
⤷ Title: New JSCEAL Malware Targets Millions via Fake Crypto App Ads
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 15:51:45 +0000
════════════════════════
⌗ Tags: #Security #Cryptocurrency #Malware #Phishing Scam #Android #Check Point #Crypto #Cyber Attack #Cybersecurity #JSCEAL #Trading
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 15:51:45 +0000
════════════════════════
⌗ Tags: #Security #Cryptocurrency #Malware #Phishing Scam #Android #Check Point #Crypto #Cyber Attack #Cybersecurity #JSCEAL #Trading
Hackread
New JSCEAL Malware Targets Millions via Fake Crypto App Ads
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: Local Government Cybersecurity: Why Municipal Systems Need Extra Protection
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 14:05:48 +0000
════════════════════════
⌗ Tags: #Security #Cyber Attack #Cybersecurity
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 14:05:48 +0000
════════════════════════
⌗ Tags: #Security #Cyber Attack #Cybersecurity
Hackread
Local Government Cybersecurity: Why Municipal Systems Need Extra Protection
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: LegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Code
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 12:31:41 +0000
════════════════════════
⌗ Tags: #Security #Artificial Intelligence #AI #ChatGPT #Cybersecurity #Gemini #GenAI #Generative AI #GitHub Copilot #Grok #LegalPwn #LLM #Meta #OpenAI #Vulnerability
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 12:31:41 +0000
════════════════════════
⌗ Tags: #Security #Artificial Intelligence #AI #ChatGPT #Cybersecurity #Gemini #GenAI #Generative AI #GitHub Copilot #Grok #LegalPwn #LLM #Meta #OpenAI #Vulnerability
Hackread
LegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Code
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: Bitdefender Warns Users to Update Dahua Cameras Over Critical Flaws
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 11:07:35 +0000
════════════════════════
⌗ Tags: #Security #bitdefender #Camera #Cybersecurity #Dahua #IoT #Privacy #Surveillance #Vulnerability
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 11:07:35 +0000
════════════════════════
⌗ Tags: #Security #bitdefender #Camera #Cybersecurity #Dahua #IoT #Privacy #Surveillance #Vulnerability
Hackread
Bitdefender Warns Users to Update Dahua Cameras Over Critical Flaws
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: Early Bird Registration Now Open for The Inaugural OpenSSL Conference 2025
════════════════════════
𐀪 Author: CyberNewswire
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 10:03:51 +0000
════════════════════════
⌗ Tags: #Press Release
════════════════════════
𐀪 Author: CyberNewswire
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 10:03:51 +0000
════════════════════════
⌗ Tags: #Press Release
Hackread
Early Bird Registration Now Open for The Inaugural OpenSSL Conference 2025
Newark, United States, 4th August 2025, CyberNewsWire
⤷ Title: Critical Squid Flaw Allows Remote Code Execution & Data Leakage
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 03:39:00 +0000
════════════════════════
⌗ Tags: #Vulnerability #CVE_2025_54574 #cybersecurity #Heap Buffer Overflow #RCE #remote code execution #Squid #URN #vulnerability
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 03:39:00 +0000
════════════════════════
⌗ Tags: #Vulnerability #CVE_2025_54574 #cybersecurity #Heap Buffer Overflow #RCE #remote code execution #Squid #URN #vulnerability
Penetration Testing Tools
Critical Squid Flaw Allows Remote Code Execution & Data Leakage
A critical heap buffer overflow (CVE-2025-54574) in Squid allows unauthenticated RCE and information leakage when processing URN requests. Update to 6.4 now.
⤷ Title: Lazarus Group’s Covert Supply Chain Attack: North Korean APT Poisons Open Source to Steal Developer Secrets
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 03:35:39 +0000
════════════════════════
⌗ Tags: #Cybercriminals #CI/CD #Cyberespionage #Developer Security #Lazarus Group #malware #North Korea #npm #open source #PyPI #Software Supply Chain
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 03:35:39 +0000
════════════════════════
⌗ Tags: #Cybercriminals #CI/CD #Cyberespionage #Developer Security #Lazarus Group #malware #North Korea #npm #open source #PyPI #Software Supply Chain
Penetration Testing Tools
Lazarus Group's Covert Supply Chain Attack: North Korean APT Poisons Open Source to Steal Developer Secrets
North Korea's Lazarus Group is waging a covert cyberespionage campaign, poisoning 234+ open-source packages on npm/PyPI to steal secrets from CI/CD pipelines and developer environments.
⤷ Title: PlayPraetor: New Android RAT Infects 11,000+ Devices with Real-Time On-Device Fraud
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 03:33:41 +0000
════════════════════════
⌗ Tags: #Malware #Android malware #Chinese Threat Actors #cybersecurity #Financial Fraud #MaaS #ODF #On_Device Fraud #PlayPraetor #RAT
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 03:33:41 +0000
════════════════════════
⌗ Tags: #Malware #Android malware #Chinese Threat Actors #cybersecurity #Financial Fraud #MaaS #ODF #On_Device Fraud #PlayPraetor #RAT
Penetration Testing Tools
PlayPraetor: New Android RAT Infects 11,000+ Devices with Real-Time On-Device Fraud
Cleafy uncovers PlayPraetor, a Chinese-speaking MaaS Android RAT that has infected 11,000+ devices, using real-time control via Accessibility Services to conduct on-device fraud.
⤷ Title: Luxembourg Hit by “Sophisticated” Cyberattack: Huawei Equipment Targeted, Mobile Networks Down for Hours
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 03:32:01 +0000
════════════════════════
⌗ Tags: #Cybercriminals #cyberattack #cybersecurity #Denial of Service #Huawei #Luxembourg #Mobile Outage #POST Luxembourg #Telecom #VRP
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 03:32:01 +0000
════════════════════════
⌗ Tags: #Cybercriminals #cyberattack #cybersecurity #Denial of Service #Huawei #Luxembourg #Mobile Outage #POST Luxembourg #Telecom #VRP
Penetration Testing Tools
Luxembourg Hit by "Sophisticated" Cyberattack: Huawei Equipment Targeted, Mobile Networks Down for Hours
Luxembourg's government is investigating a "sophisticated" cyberattack on Huawei equipment that took down the nation's 4G/5G networks for hours, disrupting emergency services and banking.
⤷ Title: The Telecom Threat: Liminal Panda’s Covert Campaign Targets Southeast Asian Critical Infrastructure
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 03:27:47 +0000
════════════════════════
⌗ Tags: #Cybercriminals #APT #Cyber Espionage #cybercrime #Liminal Panda #network security #Southeast Asia #Telecom #vulnerability
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 03:27:47 +0000
════════════════════════
⌗ Tags: #Cybercriminals #APT #Cyber Espionage #cybercrime #Liminal Panda #network security #Southeast Asia #Telecom #vulnerability
Penetration Testing Tools
The Telecom Threat: Liminal Panda's Covert Campaign Targets Southeast Asian Critical Infrastructure
Palo Alto's Unit 42 reveals a sophisticated cyber-espionage campaign by Liminal Panda (CL-STA-0969) targeting Southeast Asian telecom infrastructure with custom backdoors.
⤷ Title: The Dark Side of Recall: Microsoft’s AI Feature is Still Capturing Sensitive Data and Poses Grave Security Risks
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 03:25:20 +0000
════════════════════════
⌗ Tags: #Data Leak #Windows #AI #cybersecurity #Data Capture #Microsoft Recall #privacy #VBS #vulnerability #Windows 11 #windows hello
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 03:25:20 +0000
════════════════════════
⌗ Tags: #Data Leak #Windows #AI #cybersecurity #Data Capture #Microsoft Recall #privacy #VBS #vulnerability #Windows 11 #windows hello
Penetration Testing Tools
The Dark Side of Recall: Microsoft's AI Feature is Still Capturing Sensitive Data and Poses Grave Security Risks
Microsoft's Recall AI feature still captures sensitive data like passwords and bank info, despite new protections. The system's VBS encryption and PIN access may also be vulnerable to remote exploits.