[
News
|
Newsletters
|
Blogs
|
Reddits
|
Lists
|
Media
|
Jobs
]
HoneyDB
DarkReading
Using Security Expertise to Bridge the Communication Gap
Water Systems Under Attack: Norway, Poland Blame Russia Actors
Downgrade Attack Allows Phishing Kits to Bypass FIDO
State and Local Leaders Lobby Congress for Cybersecurity Resources
Agentic AI Use Cases for Security Soar, but Risks Demand Close Attention
Google Chrome Enterprise: Advanced Browser Security for the Modern Workforce
Police & Government Email Access for Sale on Dark Web
NIST Digital Identity Guidelines Evolve With Threat Landscape
CISA Warns N-able Bugs Under Attack, Patch Now
Cybersecurity Spending Slows & Security Teams Shrink
Ars Technica
Is AI really trying to escape human control and blackmail people?
OpenAI brings back GPT-4o after user revolt
Why it’s a mistake to ask chatbots about their mistakes
High-severity WinRAR 0-day exploited for weeks by 2 groups
The GPT-5 rollout has been a big mess
Encryption made for police and military radios may be easily cracked
It’s getting harder to skirt RTO policies without employers noticing
Adult sites are stashing exploit code inside racy .svg files
Google discovered a new scam—and also fell victim to it
OpenAI launches GPT-5 free to all ChatGPT users
CyberScoop
US widens sanctions on Russian crypto exchange Garantex, its successor and affiliate firms
Russia restricts WhatsApp, Telegram calls, alleging criminal, terrorist activity
Fortinet SIEM issue coincides with spike in brute-force traffic against company’s SSL VPNs
The overlooked changes that two Trump executive orders could bring to cybersecurity
Patch the vulnerability: Confirm Sean Plankey as CISA director
Microsoft Patch Tuesday follows SharePoint attacks, Exchange server warnings
Guess what else GPT-5 is bad at? Security
SonicWall pins firewall attack spree on year-old vulnerability
Why cyber modernization requires partners with technical plus acquisition expertise
Researchers determine old vulnerabilities pose real-world threat to sensitive data in public clouds
HITBSecNews
Found on VirusTotal: The world’s first UEFI bootkit for Linux
OpenAI is at war with its own Sora video testers following brief public leak
North Korean hackers posing as IT workers steal over $1B in cyberattack
WhatsApp: NSO Group Operates Pegasus Spyware for Customers
Korea extradites Russian, Vietnamese suspects linked to $16M ransomware scheme
CISA Director Jen Easterly, in Place Since 2021, to Step Down
Man sick of crashes sues Intel for allegedly hiding CPU defects
North Korean hackers target cryptocurrency with malware
Law enforcement operation takes down 22,000 malicious IP addresses worldwide
Youth of today say passwords are old news, passkeys are the future
ZDNet
Is a refurbished MacBook viable in 2025? I did the math, and here's my expert advice
How much RAM do you really need in 2025?
5 easy ways to make your headphones sound and feel like new
This flash drive offers military-grade protection for a budget price tag
This AirTag key organizer has survived the ultimate torture test - and it's only $30
I tested the best laptop docking stations -- here's what I recommend for your office setup
You should clean your headphones ASAP (and the correct way to do it)
The best headphones and earbuds of 2025
I've tested several Android tablets for work travel - why I recommend this Samsung the most
Samsung will sell you the latest Galaxy S25 model for $250 off - and the price is finally right
The Hacker News
U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions
Zero Trust + AI: Privacy in the Age of Agentic AI
Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution
New HTTP/2 'MadeYouReset' Vulnerability Enables Large-Scale DoS Attacks
Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS
Have You Turned Off Your Virtual Oven?
New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits
Simple Steps for Attack Surface Reduction
Google Requires Crypto App Licenses in 15 Regions as FBI Warns of $9.9M Scam Losses
CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog
BleepingComputer
Cisco warns of max severity flaw in Firewall Management Center
Microsoft reminds of Windows 10 support ending in two months
Plex warns users to patch security vulnerability immediately
US sanctions Grinex crypto-exchange, successor to Garantex
Over $300 million in cybercrime crypto seized in anti-fraud effort
Crypto24 ransomware hits large orgs with custom EDR evasion tool
Pro-Russian hackers blamed for water dam sabotage in Norway
Microsoft fixes Windows Server bug causing cluster, VM issues
Booking.com phishing campaign uses sneaky 'ん' character to trick you
When Theft Replaces Encryption: Blue Report 2025 on Ransomware & Infostealers
Cybersecurity Dive
Water sector expands partnership with volunteer hackers
Trump administration cyber cuts eroding private sector’s trust, confidence
White House urged to revamp cyber regulations
CISA, Microsoft update guidance on Exchange Server vulnerability
US agencies, international allies issue guidance on OT asset inventorying
Xerox patches critical vulnerability in FreeFlow Core application
Financial impact from severe OT events could top $300B
Citrix NetScaler flaws lead to critical infrastructure breaches
DOJ, international partners take down BlackSuit group’s infrastructure
Research shows AI agents are highly vulnerable to hijacking attacks
Threatpost
Student Loan Breach Exposes 2.5M Records
Watering Hole Attacks Push ScanBox Keylogger
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Ransomware Attacks are on the Rise
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Twitter Whistleblower Complaint: The TL;DR Version
Firewall Bug Under Active Attack Triggers CISA Warning
Fake Reservation Links Prey on Weary Travelers
iPhone Users Urged to Update to Patch 2 Zero-Days
Google Patches Chrome’s Fifth Zero-Day of the Year
The Register
Cyberattack on Dutch prosecution service is keeping speed cameras offline
Telco giant Colt suffers attack, takes systems offline
LLM chatbots trivial to weaponise for data theft, say boffins
Should UK.gov save money by looking for open source alternatives to Microsoft? You decide
Ransomware crews don't care about your endpoint security – they've already killed it
Psst: wanna buy a legit FBI email account for $40?
'MadeYouReset' HTTP/2 flaw lets attackers DoS servers
Lock down your critical infrastructure, CISA begs admins
BtcTurk suspends operations amid alleged $49M hot wallet heist
Law and water: Russia blamed for US court system break-in and Norwegian dam drama
VentureBeat
Anthropic takes on OpenAI and Google with new Claude AI features designed for students and developers
The end of perimeter defense: When your own AI tools become the threat actor
Claude can now process entire software projects in single request, Anthropic says
Study warns of security risks as ‘OS agents’ gain control of computers and phones
Black Hat 2025: Why your AI tools are becoming the next insider threat
Anthropic ships automated security reviews for Claude Code as AI-generated vulnerabilities surge
Anthropic’s new Claude 4.1 dominates coding tests days before GPT-5 arrives
ChatGPT rockets to 700M weekly users ahead of GPT-5 launch with reasoning superpowers
Shadow AI adds $670K to breach costs while 97% of enterprises skip basic access controls, IBM reports
Nightfall launches ‘Nyx,’ an AI that automates data loss prevention at enterprise scale
TechCrunch
Norway spy chief blames Russian hackers for hijacking dam
How we found TeaOnHer spilling users’ driver’s licenses in less than 10 minutes
Russian government hackers said to be behind US federal court filing system hack: Report
Hackers breach and expose a major North Korean spying operation
US government seized $1M from Russian ransomware gang
Electronic Arts blocks more than 300,000 attempts to cheat after launching Battlefield 6 beta
Security flaws in a carmaker’s web portal let one hacker remotely unlock cars from anywhere
After researchers unmasked a prolific SMS scammer, a new operation has emerged in its wake
Data breach at French telecom giant Bouygues affects millions of customers
TeaOnHer, a rival Tea app for men, is leaking users’ personal data and driver’s licenses
Network World Security
Cisco’s 9% security growth is misleadingly low
VMware Explore 2025: Latest news and insights
Nvidia targets data center with new servers, AI software
Cisco Q4 results: AI infrastructure orders surpass goal
SonicWall rolls out eight new firewalls, expands cyber warranty
Cisco strengthens AI networking story
DEF CON research takes aim at ZTNA, calls it a bust
New Compute Exchange service answers GPU pricing queries
Trump meets with Intel CEO after calling for his resignation
Data center sustainability efforts stall slightly in 2025
Help Net Security
How military leadership prepares veterans for cybersecurity success
Cyber insurance market shows early signs of maturity
Obot MCP Gateway: Open-source platform to securely manage the adoption of MCP servers
Fighting fraud with AI: The new identity security playbook
Employees race to build custom AI apps despite security risks
New infosec products of the week: August 15, 2025
Brute-force attacks hammer Fortinet devices worldwide
Palo Alto Networks helps organizations accelerate their quantum readiness
For $40, you can buy stolen police and government email accounts
Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)
InfoSecurity Magazine
US and Five Global Partners Release First Unified OT Security Taxonomy
Cisco Discloses Critical RCE Flaw in Firewall Management Software
Majority of Organizations Ship Vulnerable Code, Study Finds
Authorized Push Payment Fraud a National Security Risk to UK, Report Finds
KernelSU v0.5.7 Flaw Lets Android Apps Gain Root Access
Malvertising Campaign Deploys Modular PowerShell Malware PS1Bot
FBI Shares Tips to Spot Fake Lawyer Schemes Targeting Crypto Scam Victims
Hacked Law Enforcement and Government Email Accounts Sold on Dark Web for $40
Fortinet Warns Exploit Code Available for Critical Vulnerability
Campaigners Slam Expansion of Police Facial Recognition Schemes in UK
© 2025 RiskDiscovery | Sponsored by:
Deception Logic