Hacked Law Enforcement and Government Email Accounts Sold on Dark Web

Hacked Law Enforcement and Government Email Accounts Sold on Dark Web

Cybercriminals are selling access to active law enforcement and government email accounts for as little as $40 on the dark web, according to an investigation by Abnormal AI. These compromised accounts belong to officials from the US, UK, India, Brazil and Germany, with agencies such as the FBI among those affected. The ability to impersonate … Ler mais

CISA Publishes Operational Technology Guide for Critical Infrastructure Stakeholders

CISA Publishes Operational Technology Guide for Critical Infrastructure Stakeholders

The Cybersecurity and Infrastructure Security Agency (CISA), in partnership with eight other national cyber agencies, has released a comprehensive “Foundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operators.” Published on August 13, 2025, this new guide equips critical infrastructure stakeholders—spanning energy, water and wastewater, manufacturing, and beyond—with best practices for developing and maintaining … Ler mais

Microsoft IIS Web Deploy Vulnerability Allows Remote Code Execution

Microsoft IIS Web Deploy Vulnerability Allows Remote Code Execution

Microsoft has disclosed a critical security vulnerability in its Internet Information Services (IIS) Web Deploy tool that could allow attackers to execute arbitrary code remotely on affected systems. The vulnerability, designated as CVE-2025-53772, was announced on August 12, 2025, and carries an “Important” severity rating with a CVSS score of 8.8 out of 10. Vulnerability … Ler mais

LLM Coding Integrity Breach – Schneier on Security

Here’s an interesting story about a failure being introduced by LLM-written code. Specifically, the LLM was doing some code refactoring, and when it moved a chunk of code from one file to another it changed a “break” to a “continue.” That turned an error logging statement into an infinite loop, which crashed the system. This … Ler mais

Leak: OpenAI's browser will use ChatGPT Agent to control the browser

GPT

OpenAI is building an agentic future with its upcoming Chromium-based browser and a new leak confirms GPT Agent integration. ChatGPT already comes with Agent mode, which uses a virtual machine to browse the web. The vrtual machine is powered by Linuxand it works in a cloud environment (Azure). While Agent mode can do everything for … Ler mais

Splunk Publishes Defender’s Guide to Spot ESXi Ransomware Early

Splunk Publishes Defender’s Guide to Spot ESXi Ransomware Early

Splunk has released a comprehensive defender’s guide aimed at helping cybersecurity teams detect and prevent ransomware attacks targeting ESXi infrastructure before they can cause widespread damage. The guide comes as organizations continue to face mounting pressure from cybercriminals who increasingly target VMware’s ESXi hypervisor platform as a high-value attack vector. Growing Threat to Critical Infrastructure … Ler mais

CISA warns of N-able N-central flaws exploited in zero-day attacks

Picus Red Report 2025

​CISA warned on Wednesday that attackers are actively exploiting two security vulnerabilities in N‑able’s N-central remote monitoring and management (RMM) platform. N-central is commonly used by managed services providers (MSPs) and IT departments to monitor, manage, and maintain client networks and devices from a centralized web-based console. According to CISA, the two flaws can allow … Ler mais

Zoom patches critical Windows flaw allowing privilege escalation

Zoom patches critical Windows flaw allowing privilege escalation

Zoom patches critical Windows flaw allowing privilege escalation Zoom fixed a critical Windows client flaw (CVE-2025-49457, CVSS 9.6) involving an untrusted search path that could enable privilege escalation. Cloud-based video conferencing and online collaboration platform Zoom addressed a critical security flaw, tracked as CVE-2025-49457 (CVSS score of 9.6) in Zoom Clients for Windows. An unauthenticated … Ler mais

U.S. CISA adds N-able N-Central flaws to its Known Exploited Vulnerabilities catalog – Security Affairs

U.S. CISA adds D-Link cameras and Network Video Recorder flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds N-able N-Central flaws to its Known Exploited Vulnerabilities catalog U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds N-able N-Central flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA)added N-able N-Central flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the descriptions for these flaws: CVE-2025-8875N-able … Ler mais

Microsoft fixes Windows 11 24H2 updates failing with 0x80240069 error

Picus Red Report 2025

Microsoft has resolved a known issue preventing the August 2025 Windows 11 24H2 cumulative update from being delivered via Windows Server Update Services (WSUS). Introduced almost twenty years ago, WSUS helps IT administrators defer, approve, and schedule updates for Microsoft products on enterprise networks from a single local update server, rather than having each endpoint … Ler mais