1
0
1
0
1
0
1
0
0
1
1
0
1
0
VulnHub

AI-Powered Cybersecurity Intelligence

Latest Intelligence

All CISA Advisories
CISA Releases Seven Industrial Control Systems Advisories

CISA has released seven advisories related to vulnerabilities in various Industrial Control Systems (ICS) as of August 12, 2025. These advisories highlight current security issues and provide guidance on mitigation strategies for affected systems. Read Original »


Impact: Ashlar-Vellum, Johnson Controls, Schneider Electric, AVEVA, MegaSys Computer Technologies, Santesoft

Remediation: CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.

Update

Added:

darkreading
ShinyHunters Tactics Now Mirror Scattered Spider

The article discusses the collaboration between two prominent cybercrime groups, ShinyHunters and Scattered Spider, as they target significant entities. This partnership raises concerns about the increasing sophistication and threat level posed by these groups in the cybercrime landscape. Read Original »


Impact: Not specified

Remediation: Not specified

Added:

SecurityWeek
SAP Patches Critical S/4HANA Vulnerability

SAP has addressed critical vulnerabilities in its S/4HANA product by releasing 15 new security notes during the August 2025 Patch Tuesday. This update is crucial for maintaining the security and integrity of SAP systems. Read Original »


Impact: S/4HANA

Remediation: Apply the security notes released by SAP.

VulnerabilityPatchUpdate

Added:

The Hacker News
The Ultimate Battle: Enterprise Browsers vs. Secure Browser Extensions

The article discusses the dilemma faced by security leaders regarding how to secure browser activities, highlighting the choice between deploying dedicated Enterprise Browsers or enhancing existing browsers with enterprise-grade controls. It emphasizes the significance of addressing security risks that occur within browsers, where most work and risks are concentrated. Read Original »


Impact: Not specified

Remediation: Not specified

Added:

SecurityWeek
OT Networks Targeted in Widespread Exploitation of Erlang/OTP Vulnerability

A recently patched vulnerability in Erlang/OTP, identified as CVE-2025-32433, has been actively exploited since early May. The flaw poses a significant risk, particularly to operational technology (OT) networks. Read Original »


Impact: Not specified

Remediation: Not specified

CVEVulnerability

Added:

The Hacker News
Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors

The Dutch National Cyber Security Centre has issued a warning about cyber attacks exploiting a critical vulnerability in Citrix NetScaler ADC products. The vulnerability, identified as CVE-2025-6543, is being actively exploited against several critical organizations in the Netherlands. Read Original »


Impact: Citrix NetScaler ADC

Remediation: Not specified

CVEVulnerability

Added:

darkreading
BlackSuit Ransomware Takes an Infrastructure Hit From Law Enforcement

Law enforcement agencies in the US and internationally have collaborated to dismantle the infrastructure of the BlackSuit ransomware group, which has been a significant threat to critical infrastructure. This operation resulted in the seizure of over $1 million linked to their activities. Read Original »


Impact: Not specified

Remediation: Not specified

Ransomware

Added:

darkreading
REvil Actor Accuses Russia of Planning 2021 Kaseya Attack

Yaroslav Vasinskyi, a convicted REvil affiliate involved in the 2021 Kaseya ransomware attack, has alleged that the Russian government played a significant role in facilitating the attack. This claim raises concerns about state-sponsored cybercrime and its implications for cybersecurity. Read Original »


Impact: Not specified

Remediation: Not specified

Ransomware

Added:

darkreading
Black Hat NOC Expands AI Implementation Across Security Operations

The article discusses the expansion of AI implementation in security operations at this year's Black Hat Network Operations Center, highlighting the security challenges and emerging trends associated with increased AI usage. James Pope from Corelight provides insights into these developments and their implications for cybersecurity. Read Original »


Impact: Not specified

Remediation: Not specified

Added:

darkreading
Researchers Warn of 'Hidden Risks' in Passwordless Account Recovery

The article highlights the growing use of passwordless authentication and the associated risks in account recovery processes, which can lead to account takeovers. It emphasizes that even less skilled attackers can exploit these vulnerabilities successfully. Read Original »


Impact: Not specified

Remediation: Not specified

Exploit

Added:

The Hacker News
New TETRA Radio Encryption Flaws Expose Law Enforcement Communications

Researchers have identified significant security vulnerabilities in the TETRA communications protocol, specifically in its end-to-end encryption mechanism. These flaws make the system susceptible to replay and brute-force attacks, potentially allowing attackers to decrypt encrypted communications. Read Original »


Impact: Not specified

Remediation: Not specified

Added:

darkreading
Utilities, Factories at Risk From Encryption Holes in Industrial Protocol

The OPC UA communication protocol, commonly used in industrial environments, has been found to have vulnerabilities despite its intricate cryptography. These weaknesses pose risks to utilities and factories relying on this protocol for secure communication. Read Original »


Impact: Not specified

Remediation: Not specified

Added:

The Hacker News
Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls

Researchers have identified a surge in exploits targeting a critical vulnerability in Erlang/OTP SSH, which has been actively exploited since May 2025. Approximately 70% of these attacks are aimed at firewalls that protect operational technology networks. Read Original »


Impact: Erlang/Open Telecom Platform (OTP) SSH, OT firewalls

Remediation: Apply the latest security patches

CVEVulnerability

Added:

darkreading
Echo Chamber, Prompts Used to Jailbreak GPT-5 in 24 Hours

Researchers have demonstrated a jailbreaking technique that manipulates a language model (LLM) to produce harmful content, specifically instructions for creating a Molotov cocktail, without using inappropriate language. This highlights vulnerabilities in AI systems that can be exploited through creative prompting and storytelling. Read Original »


Impact: Not specified

Remediation: Not specified

Added:

SecurityWeek
Chrome Sandbox Escape Earns Researcher $250,000

A researcher has successfully executed a sandbox escape in Google Chrome, leading to remote code execution. This achievement has earned the researcher a reward of $250,000, the highest in the Chrome bug bounty program. Read Original »


Impact: Google Chrome

Remediation: Not specified

Google

Added: