Security researchers have discovered alarming new firmware for the popular Flipper Zero device that can completely bypass the rolling code security systems protecting millions of […]
Category: Cyber Security News
CISA Issues Urgent Advisory to Address Microsoft Exchange Flaw
The Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive 25-02 on August 7, 2025, requiring federal agencies to immediately address a critical vulnerability […]
Retbleed Vulnerability Exploited to Access Any Process’s Memory on Newer CPUs
Security researchers have successfully demonstrated a sophisticated exploit of the Retbleed vulnerability, a critical CPU security flaw that allows attackers to read arbitrary memory from any […]
ChatGPT-5 Launches – Discover What’s New in the Next-Gen AI Agent
OpenAI has officially launched ChatGPT-5, marking a significant leap forward in artificial intelligence technology with a revolutionary unified system that combines multiple specialized models to […]
So sparen CISOs, ohne die Sicherheit zu torpedieren
Geht’s dem Security-Budget an den Kragen, ist der Spielraum für CISOs denkbar gering. TippaPatt | shutterstock.com Vor etlichen Jahren fand sich David Mahdi, heute CISO […]
Black Hat 2025 Recap: A look at new offerings announced at the show
Black Hat 2025 is on its home stretch, having gathered together thousands of security professionals to discuss the latest developments in adversarial tradecraft and cybersecurity […]
Silver Fox APT Blurs the Line Between Espionage & Cybercrime
Silver Fox is the Hannah Montana of Chinese threat actors, effortlessly swapping between petty criminal and nation-state-type attacks. ​The original article found on darkreading Read […]
Air France, KLM Alert Authorities of Data Breach
While no sensitive financial data like credit card information was compromised, the threat actors were able to get away with names, email addresses, phone numbers, […]
Privilege Escalation Issue in Amazon ECS Leads to IAM Hijacking
A software developer discovered a way to abuse an undocumented protocol in Amazon’s Elastic Container Service to escalate privileges, cross boundaries and gain access to […]
10 Best Red Teaming Companies for Advanced Attack Simulation in 2025
Red teaming companies are specialized cybersecurity firms that use a proactive, adversarial approach to test an organization’s defenses by simulating a real-world cyberattack. Unlike traditional […]