cyber
: Fluent Bit has 15B+ deployments … and 5 newly assigned CVEs
HelixGuard provides open-source research on supply chain malware and vulnerability intelligence. Advanced threat detection tools and datasets for the security community.
Worldwide enumeration of accounts was possible due to a —now closed— privacy vulnerability
Microsoft said today that the Aisuru botnet hit its Azure network with a 15.72 terabits per second (Tbps) DDoS attack, launched from over 500,000 IP addresses.
The Ubuntu 25.10 transition to using some Rust system utilities continues proving quite rocky
A lively discussion about open source, security, and who pays the bills has erupted on Twitter.
Log4Shell proved that open source security isn't guaranteed and isn’t just a code problem.
Scan MCP Servers for vulnerabilities. Contribute to cisco-ai-defense/mcp-scanner development by creating an account on GitHub.
A new command injection vulnerability in OpenSSH, tracked as CVE-2025-61984, has been disclosed, which could allow an attacker to achieve remote code execution on a victim's machine.
CodeMender is a new AI-powered agent that improves code security automatically. It instantly patches new software vulnerabilities, and rewrites and secures existing code, eliminating entire...
Enterprise software giant Red Hat is now being extorted by the ShinyHunters gang, with samples of stolen customer engagement reports (CERs) leaked on their data leak site.
Cybercriminals connected to a recent string of ransomware attacks on major British retailers said on Friday they had stolen almost 1 billion records from cloud technology giant Salesforce, opens new tab by focusing on companies that use its software
One of Discord’s third-party customer service providers was compromised by an “unauthorized party” that may have accessed things like names, usernames, and emails.
How MCP Authentication Flaws Enable RCE in Claude Code, Gemini CLI, and More
While preparing for my Black Hat and DEF CON talks in July of this year, I found the most impactful Entra ID vulnerability that I will probably ever find. One that could have allowed me to compromise every Entra ID tenant in the world (except probably those in national cloud deployments). If you are an Entra ID admin reading this, yes that means complete access to your tenant. The vulnerability consisted of two components: undocumented impersonation tokens that Microsoft uses in their backend for service-to-service (S2S) communication, called “Actor tokens”, and a critical vulnerability in the (legacy) Azure AD Graph API that did not properly validate the originating tenant, allowing these tokens to be used for cross-tenant access.
With informed decision-making, organizations can strengthen their overall resilience and maintain the agility needed to adapt to emerging threats, without sacrificing innovation or productivity.
People gonna people
It has officially begun. The CRA info request counter is no longer at zero.
Researchers in Shanghai break record by factoring 22-bit RSA key using quantum computing, threatening future cryptographic keys.
In mid-May 2025, blocked the largest DDoS attack ever recorded: a staggering 7.3 terabits per second (Tbps).
Scammers are impersonating the ASD's ACSC sending out phishing emails to the public with the email content suggesting to download a malicious antivirus program.
Blue Team playbooks are essential—but tools like Wazuh take them to the next level. From credential dumping to web shells and brute-force attacks, see how Wazuh strengthens real-time detection and automated response.