1
0
1
0
1
0
1
0
0
1
1
0
1
0
VulnHub

AI-Powered Cybersecurity Intelligence

Latest Intelligence

SecurityWeek
OpenAI’s Sam Altman Warns of AI Voice Fraud Crisis in Banking

Sam Altman of OpenAI has raised concerns about the growing threat of AI voice fraud in the banking sector, where AI voice clones can mimic individuals so accurately that they are nearly indistinguishable from reality. This situation necessitates the development of new verification methods to combat potential fraud. Read Original »


Impact: Not specified

Remediation: Not specified

Added:

The Hacker News
New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials

A new variant of the Coyote banking trojan has been identified as the first malware to exploit the Windows UI Automation framework to steal banking credentials. This variant specifically targets Brazilian users and can extract information from 75 banking institutions and cryptocurrency exchanges. Read Original »


Impact: 75 banking institutes and cryptocurrency exchanges

Remediation: Not specified

WindowsExploit

Added:

SecurityWeek
Should We Trust AI? Three Approaches to AI Fallibility

The article discusses the inherent risks of trusting agentic AI, highlighting concerns about its fallibility, the hype surrounding it, and the lack of transparency. Experts caution that these issues necessitate careful consideration before the pace of automation surpasses our understanding of AI systems. Read Original »


Impact: Not specified

Remediation: Not specified

Added:

SecurityWeek
France Says Administrator of Cybercrime Forum XSS Arrested in Ukraine

French authorities have announced the arrest of an alleged administrator of the cybercrime forum XSS.is in Ukraine. This forum is noted as one of the longest-running platforms for cybercriminal activities. Read Original »


Impact: Not specified

Remediation: Not specified

Added:

SecurityWeek
UK’s Ransomware Payment Ban: Bold Strategy or Dangerous Gamble?

The article discusses concerns regarding the UK's proposed ban on ransomware payments, highlighting potential unintended consequences such as increased secrecy among victims and a shift in tactics by attackers. Critics argue that this bold strategy may lead to more harm than good in the fight against ransomware. Read Original »


Impact: Not specified

Remediation: Not specified

Ransomware

Added:

SecurityWeek
Coyote Banking Trojan First to Abuse Microsoft UIA

The Coyote Banking Trojan has been identified as the first malware to exploit Microsoft’s UIA accessibility framework to extract sensitive data. This highlights a new method of attack that leverages legitimate software features for malicious purposes. Read Original »


Impact: Microsoft UIA

Remediation: Not specified

MicrosoftExploit

Added:

SecurityWeek
Organizations Warned of Interlock Ransomware Attacks

The US government has issued an alert regarding the Interlock ransomware, which employs drive-by download attacks to target organizations. This warning highlights the growing threat posed by ransomware in the cybersecurity landscape. Read Original »


Impact: Not specified

Remediation: Not specified

Ransomware

Added:

The Hacker News
Kerberoasting Detections: A New Approach to a Decade-Old Challenge

Kerberoasting remains a persistent challenge in cybersecurity, primarily due to the reliance on brittle heuristics and static rules for detection. These methods often lead to false positives and fail to identify subtle attack patterns in Kerberos traffic. Read Original »


Impact: Not specified

Remediation: Not specified

Added:

SecurityWeek
Critical Vulnerabilities Patched in Sophos Firewall

Sophos has addressed five critical vulnerabilities in its Sophos Firewall that could enable remote attackers to execute arbitrary code. These patches are essential for maintaining the security and integrity of the affected systems. Read Original »


Impact: Sophos Firewall

Remediation: Apply the latest patches provided by Sophos

Added:

SecurityWeek
High-Severity Flaws Patched in Chrome, Firefox

Recent security updates for Chrome and Firefox have addressed multiple high-severity memory safety vulnerabilities. These updates are crucial for maintaining the security and integrity of users' data. Read Original »


Impact: Chrome, Firefox

Remediation: Apply the latest security updates

Added:

SecurityWeek
Lumma Stealer Malware Returns After Takedown Attempt

The Lumma Stealer malware has resurfaced following attempts by Microsoft and law enforcement to disrupt its infrastructure. This indicates that the efforts to take down the malware were not entirely successful. Read Original »


Impact: Not specified

Remediation: Not specified

Microsoft

Added:

The Hacker News
Google Launches OSS Rebuild to Expose Malicious Code in Widely Used Open-Source Packages

Google has launched OSS Rebuild to enhance the security of open-source package ecosystems and mitigate software supply chain attacks. This initiative aims to provide security teams with valuable data to prevent compromises without overburdening upstream maintainers. Read Original »


Impact: Not specified

Remediation: Not specified

Google

Added:

SecurityWeek
Hackers Start Exploiting Critical Cisco ISE Vulnerabilities

Cisco has reported that hackers are actively exploiting critical vulnerabilities in its Identity Services Engine (ISE), which could allow for unauthenticated remote code execution. The situation underscores the urgency for organizations to address these vulnerabilities to prevent potential breaches. Read Original »


Impact: Cisco ISE

Remediation: Not specified

Cisco

Added:

SecurityWeek
CISA Warns of SysAid Vulnerability Exploitation

CISA has identified and added two vulnerabilities in SysAid, designated as CVE-2025-2776 and CVE-2025-2775, to its Known Exploited Vulnerabilities (KEV) catalog. This highlights the potential risks associated with these vulnerabilities and the need for immediate attention from affected users. Read Original »


Impact: SysAid

Remediation: Not specified

CVEVulnerability

Added:

The Hacker News
CISA Warns: SysAid Flaws Under Active Attack Enable Remote File Access and SSRF

CISA has identified two critical vulnerabilities in SysAid IT support software that are currently being actively exploited. These vulnerabilities allow for remote file access and could lead to significant security risks for affected systems. Read Original »


Impact: SysAid IT support software

Remediation: Not specified

CVEVulnerability

Added: