Latest Intelligence
CISA Releases Seven Industrial Control Systems Advisories
CISA has released seven advisories related to vulnerabilities in various Industrial Control Systems (ICS) as of August 12, 2025. These advisories highlight current security issues and provide guidance on mitigation strategies for affected systems. Read Original »
ShinyHunters Tactics Now Mirror Scattered Spider
The article discusses the collaboration between two prominent cybercrime groups, ShinyHunters and Scattered Spider, as they target significant entities. This partnership raises concerns about the increasing sophistication and threat level posed by these groups in the cybercrime landscape. Read Original »
SAP Patches Critical S/4HANA Vulnerability
SAP has addressed critical vulnerabilities in its S/4HANA product by releasing 15 new security notes during the August 2025 Patch Tuesday. This update is crucial for maintaining the security and integrity of SAP systems. Read Original »
The Ultimate Battle: Enterprise Browsers vs. Secure Browser Extensions
The article discusses the dilemma faced by security leaders regarding how to secure browser activities, highlighting the choice between deploying dedicated Enterprise Browsers or enhancing existing browsers with enterprise-grade controls. It emphasizes the significance of addressing security risks that occur within browsers, where most work and risks are concentrated. Read Original »
OT Networks Targeted in Widespread Exploitation of Erlang/OTP Vulnerability
A recently patched vulnerability in Erlang/OTP, identified as CVE-2025-32433, has been actively exploited since early May. The flaw poses a significant risk, particularly to operational technology (OT) networks. Read Original »
Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors
The Dutch National Cyber Security Centre has issued a warning about cyber attacks exploiting a critical vulnerability in Citrix NetScaler ADC products. The vulnerability, identified as CVE-2025-6543, is being actively exploited against several critical organizations in the Netherlands. Read Original »
BlackSuit Ransomware Takes an Infrastructure Hit From Law Enforcement
Law enforcement agencies in the US and internationally have collaborated to dismantle the infrastructure of the BlackSuit ransomware group, which has been a significant threat to critical infrastructure. This operation resulted in the seizure of over $1 million linked to their activities. Read Original »
REvil Actor Accuses Russia of Planning 2021 Kaseya Attack
Yaroslav Vasinskyi, a convicted REvil affiliate involved in the 2021 Kaseya ransomware attack, has alleged that the Russian government played a significant role in facilitating the attack. This claim raises concerns about state-sponsored cybercrime and its implications for cybersecurity. Read Original »
Black Hat NOC Expands AI Implementation Across Security Operations
The article discusses the expansion of AI implementation in security operations at this year's Black Hat Network Operations Center, highlighting the security challenges and emerging trends associated with increased AI usage. James Pope from Corelight provides insights into these developments and their implications for cybersecurity. Read Original »
Researchers Warn of 'Hidden Risks' in Passwordless Account Recovery
The article highlights the growing use of passwordless authentication and the associated risks in account recovery processes, which can lead to account takeovers. It emphasizes that even less skilled attackers can exploit these vulnerabilities successfully. Read Original »
New TETRA Radio Encryption Flaws Expose Law Enforcement Communications
Researchers have identified significant security vulnerabilities in the TETRA communications protocol, specifically in its end-to-end encryption mechanism. These flaws make the system susceptible to replay and brute-force attacks, potentially allowing attackers to decrypt encrypted communications. Read Original »
Utilities, Factories at Risk From Encryption Holes in Industrial Protocol
The OPC UA communication protocol, commonly used in industrial environments, has been found to have vulnerabilities despite its intricate cryptography. These weaknesses pose risks to utilities and factories relying on this protocol for secure communication. Read Original »
Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls
Researchers have identified a surge in exploits targeting a critical vulnerability in Erlang/OTP SSH, which has been actively exploited since May 2025. Approximately 70% of these attacks are aimed at firewalls that protect operational technology networks. Read Original »
Echo Chamber, Prompts Used to Jailbreak GPT-5 in 24 Hours
Researchers have demonstrated a jailbreaking technique that manipulates a language model (LLM) to produce harmful content, specifically instructions for creating a Molotov cocktail, without using inappropriate language. This highlights vulnerabilities in AI systems that can be exploited through creative prompting and storytelling. Read Original »
Chrome Sandbox Escape Earns Researcher $250,000
A researcher has successfully executed a sandbox escape in Google Chrome, leading to remote code execution. This achievement has earned the researcher a reward of $250,000, the highest in the Chrome bug bounty program. Read Original »