Daily Security Review
Episodes
Salt Typhoon Strikes Again: National Guard, Telecoms, and a Crisis in U.S. Cyber Defense
16 Jul 2025
Contributed by Lukas
Salt Typhoon, a sophisticated Chinese state-sponsored cyber threat actor, is conducting one of the most aggressive and sustained espionage campaigns e...
DragonForce Ransomware Hits Belk: 150GB Data Leak and Operational Chaos
15 Jul 2025
Contributed by Lukas
In this episode, we dive into the May 2025 ransomware attack on Belk, the iconic U.S. department store chain, orchestrated by the DragonForce ransomwa...
NVIDIA Issues Urgent Rowhammer Warning: Enable ECC or Risk AI Integrity
15 Jul 2025
Contributed by Lukas
In this episode, we dissect a major hardware-level cybersecurity warning issued by NVIDIA, one that directly affects data center operators, AI researc...
Zip Security Secures $13.5M to Simplify and Scale Cyber Defense
15 Jul 2025
Contributed by Lukas
In this episode, we spotlight Zip Security, a rising New York-based cybersecurity startup that just closed a $13.5 million Series A funding round, led...
Century Support Services Breach: 160,000 Identities Compromised in Silent Cyberattack
15 Jul 2025
Contributed by Lukas
In this episode, we examine the major data breach at Century Support Servicesâalso operating under the name Next Level Finance Partnersâthat expos...
TikTok, China, and the EU: The Battle Over Data Sovereignty
11 Jul 2025
Contributed by Lukas
In this episode, we explore the mounting scrutiny TikTok faces over its handling of European user data, with the EUâs Data Protection Commission (DP...
Booz Allen Invests in Corsha: Defending Machine-to-Machine Communication at Scale
11 Jul 2025
Contributed by Lukas
As the cybersecurity landscape shifts toward hyperautomation and AI-driven autonomy, a new frontier has emerged: the identity and access security of m...
WSUS Meltdown: Global Sync Failures and the Shift Toward Cloud Patch Management
11 Jul 2025
Contributed by Lukas
Windows Server Update Services (WSUS) has long been a cornerstone of enterprise patch managementâbut recent global synchronization failures have rai...
Cracking eSIM: Exposing the Hidden Threats in Next-Gen Mobile Security
11 Jul 2025
Contributed by Lukas
eSIM technology has transformed the way we connectâbut has it also introduced new vulnerabilities into the heart of modern telecommunications?In thi...
Qantas Breach and Beyond: Cybersecurity Risks in Australiaâs Digital Supply Chains
10 Jul 2025
Contributed by Lukas
As Australia contends with a growing wave of cybersecurity incidents, this episode explores the intersection of national privacy laws, global supply c...
Taiwan Sounds the Alarm: TikTok, WeChat, and the Chinese Data Threat
09 Jul 2025
Contributed by Lukas
In this episode, we examine Taiwanâs growing alarm over Chinese mobile applications, especially TikTok and WeChat, in light of rising global concern...
The Evolution of Atomic macOS Stealer: Backdoors, Keyloggers, and Persistent Threats
08 Jul 2025
Contributed by Lukas
This episode exposes the growing menace of Atomic macOS Stealer (AMOS) â a rapidly evolving malware-as-a-service (MaaS) platform targeting macOS use...
CitrixBleed Returns: CVE-2025-5777 and the Exploitation of NetScaler Devices
08 Jul 2025
Contributed by Lukas
In this episode, we dissect CitrixBleed 2âa newly disclosed and actively exploited vulnerability affecting Citrix NetScaler ADC and Gateway applianc...
SAPâs July 2025 Patch Day: Critical Flaws, CVE-2025-30012, and Ransomware Risk
08 Jul 2025
Contributed by Lukas
In this episode, we break down SAPâs July 2025 Security Patch Dayâa high-stakes moment for any enterprise relying on SAPâs core business applica...
106GB Exposed? TelefĂłnica, HellCat, and the Silent Data Breach
07 Jul 2025
Contributed by Lukas
In this episode, we explore a shadowy and unconfirmedâbut highly consequentialâdata breach at Spanish telecommunications giant TelefĂłnica. Allege...
Ingram Microâs SafePay Ransomware Breach: Human-Operated Threats and Supply Chain Fallout
07 Jul 2025
Contributed by Lukas
The recent ransomware attack on Ingram Micro, a global technology distribution giant, reveals not only a sophisticated human-operated cyber assaultâ...
The Illusion of Shutdowns: What Hunters International's Closure Really Means
07 Jul 2025
Contributed by Lukas
In a sudden and cryptic announcement, the notorious ransomware group Hunters International has declared its shutdown, citing ârecent developmentsâ...
CISA Flags CVE-2025-6554: Patching Chromeâs Critical Flaw Before Itâs Too Late
07 Jul 2025
Contributed by Lukas
A newly discovered and actively exploited zero-day vulnerability in Google Chrome has sent ripples through the cybersecurity community. Known as CVE-2...
ANSSI vs. Houken: France Battles Advanced Chinese Hacking Threat
04 Jul 2025
Contributed by Lukas
In this episode, we uncover a high-stakes cyber campaign targeting the heart of French digital infrastructure. ANSSI, Franceâs national cybersecurit...
Psychological Manipulation and AI Fraud: How Spain Exposed a $12M Scam
04 Jul 2025
Contributed by Lukas
In this episode, we examine a growing threat reshaping financial crime in Europe: sophisticated, technology-driven investment fraud. Spanish law enfor...
CVE-2025-20309: Critical Cisco Root Access Flaw Threatens VoIP Security
04 Jul 2025
Contributed by Lukas
A devastating vulnerabilityâCVE-2025-20309âhas been discovered in Ciscoâs Unified Communications Manager (Unified CM) and its Session Management...
macOS Under Siege: NimDoor Malware Targets Telegram, Wallets, and Keychains
03 Jul 2025
Contributed by Lukas
A new, highly advanced malware strainâNimDoorâhas emerged as the latest cyber weapon in the arsenal of North Korean state-sponsored hackers, speci...
Cisco Unified CM Vulnerability: Root Access Risk for Enterprise VoIP Networks
03 Jul 2025
Contributed by Lukas
A newly disclosed vulnerabilityâCVE-2025-20309âin Cisco's Unified Communications Manager (Unified CM) and Session Management Edition has sent shoc...
Forminator Flaw Exposes WordPress Sites to Takeover Attacks: Vulnerability Threatens 600,000+ Sites
03 Jul 2025
Contributed by Lukas
A critical new WordPress vulnerabilityâCVE-2025-6463âhas been discovered in the widely used Forminator plugin, affecting over 600,000 active insta...
Kelly Benefits Breach: Over 550,000 Victims and the Rising Identity Theft Crisis
03 Jul 2025
Contributed by Lukas
In one of the latest large-scale data breaches to hit the U.S. private sector, Kelly Benefits, a provider of payroll and benefits administration servi...
FileFix, HTA, and MotW BypassâThe Alarming Evolution of HTML-Based Attacks
02 Jul 2025
Contributed by Lukas
A newly disclosed exploit dubbed FileFix is redefining how attackers bypass Microsoft Windows' built-in security protectionsâspecifically the Mark-o...
Sophisticated Cyberattack on the International Criminal Court: Justice in the Crosshairs
02 Jul 2025
Contributed by Lukas
The International Criminal Court (ICC), the worldâs foremost tribunal for prosecuting war crimes, genocide, and crimes against humanity, has confirm...
Critical Flaws in Microsens NMP Web+ Threaten Industrial Network Security
02 Jul 2025
Contributed by Lukas
In a major red flag for the industrial cybersecurity community, three newly disclosed vulnerabilities in Microsens NMP Web+, a popular network managem...
Qantas Data Breach: Third-Party Hack Exposes Millions of Frequent Flyers
02 Jul 2025
Contributed by Lukas
In a stark reminder of the aviation industry's growing exposure to cyber threats, Australian airline Qantas recently confirmed a serious data breachâ...
Berlin Regulator Targets DeepSeek AI Over Data Transfers to China
01 Jul 2025
Contributed by Lukas
Germanyâs battle over digital sovereignty and data privacy has intensified, with the Berlin Commissioner for Data Protection formally requesting tha...
CISA Flags Citrix NetScaler Flaws: What CVE-2025-6543 Means for Federal and Private Networks
01 Jul 2025
Contributed by Lukas
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added multiple Citrix NetScaler vulnerabilities to its Known Exploited Vulnerabil...
Cato Networks Secures $359M to Fuel AI-Powered SASE Expansion
01 Jul 2025
Contributed by Lukas
Cato Networks just raised $359 million in Series G funding, pushing its valuation past $4.8 billion and its total funding beyond the $1 billion markâ...
Chromeâs Latest Zero-Day: CVE-2025-6554 and Remote Code Execution Risks
01 Jul 2025
Contributed by Lukas
A new high-severity zero-day vulnerability in Google ChromeâCVE-2025-6554âhas sent shockwaves across the cybersecurity landscape. This episode div...
Russiaâs 16KB Curtain: Cloudflare Throttling and the Future of the RuNet
30 Jun 2025
Contributed by Lukas
Russia has entered a new phase of digital authoritarianism. In a sweeping move, Russian Internet Service Providers (ISPs) have begun systematically th...
Ahold Delhaize Data Breach: 2.2 Million Employee Records Exposed
30 Jun 2025
Contributed by Lukas
Ahold Delhaize, one of the worldâs largest food retailers, is now the subject of one of the most significant ransomware breaches in recent U.S. hist...
Why Canada Banned Hikvision: National Security vs. Geopolitics
30 Jun 2025
Contributed by Lukas
Canada has taken a definitive stance in the escalating global scrutiny of Chinese technology, ordering surveillance giant Hikvision to cease all opera...
Scattered Spider Takes Flight: Inside the Cybercrime Groupâs Move into Aviation
30 Jun 2025
Contributed by Lukas
As the aviation industry becomes more digitally interconnected, its exposure to sophisticated cyber threats continues to grow. One of the most dangero...
Fortnite and the FTC: How Epic Games Misled Players into Unwanted Purchases
27 Jun 2025
Contributed by Lukas
In a landmark case that reshapes the conversation around digital ethics, the Federal Trade Commissionâs $520 million settlement with Epic Games over...
Microsoft 365 Direct Send Exploited: How Phishing Emails Masquerade as Internal Messages
27 Jun 2025
Contributed by Lukas
Phishing has long been a favored weapon of cybercriminals, but a recent revelation about Microsoft 365âs Direct Send feature has elevated the threat...
Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Risk
27 Jun 2025
Contributed by Lukas
A critical flaw in the Open VSX Registryâan open-source alternative to the Visual Studio Code Marketplaceârecently put over 8 million developers a...
CitrixBleed 2: Critical NetScaler Vulnerability Enables Session Hijacking and MFA Bypass
27 Jun 2025
Contributed by Lukas
A new critical vulnerability in Citrix NetScaler ADC and Gateway systems, dubbed CitrixBleed 2 (CVE-2025-5777), has emerged as a serious threat to rem...
OneClik Cyberattack Campaign Targets Energy Sector Using Microsoft ClickOnce and AWS
26 Jun 2025
Contributed by Lukas
A sophisticated cyber-espionage campaign named OneClik is actively targeting energy, oil, and gas organizations using a combination of legitimate clou...
Central Kentucky Radiologyâs 2024 Data Breach Affects 167,000
26 Jun 2025
Contributed by Lukas
In October 2024, Central Kentucky Radiology (CKR), a Lexington-based imaging provider, became the latest victim of a growing trend in healthcare cyber...
Bonfy.AI Launches $9.5M Adaptive Content Security Platform to Govern AI and Human Data
26 Jun 2025
Contributed by Lukas
In a major development at the intersection of cybersecurity and AI governance, Israeli startup Bonfy.AI has officially launched its adaptive content s...
Zero-Day Level Cisco ISE Flaws: Urgent Patch Required for Enterprise Security
26 Jun 2025
Contributed by Lukas
Cisco has disclosed two critical security vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) products,...
U.S. Government Pushes Back on Meta: WhatsApp Labeled a High-Risk App
25 Jun 2025
Contributed by Lukas
The U.S. House of Representatives has officially banned the use of WhatsApp on all House-managed devices, citing significant data security risks. This...
How Cyberattacks on Mainline Health and Select Medical Exposed Over 200,000 Patients
25 Jun 2025
Contributed by Lukas
The healthcare industry is facing a relentless wave of cyber threats, as demonstrated by two recent breaches impacting Mainline Health Systems and Sel...
Prometei Botnetâs Global Surge: A Threat to Linux and Windows Systems Alike
25 Jun 2025
Contributed by Lukas
Prometei is one of the most persistent and sophisticated botnet threats in circulation today. First identified in 2020âand active since at least 201...
The Siemens-Microsoft Antivirus Dilemma Threatening OT Security
25 Jun 2025
Contributed by Lukas
This episode examines a serious conflict between Siemensâ Simatic PCS industrial control systems and Microsoft Defender Antivirus. The absence of an...
Patient Trust on the Line: The Fallout from McLaren Health Careâs 2024 Breach
24 Jun 2025
Contributed by Lukas
In this episode, we dive into the 2024 McLaren Health Care data breach that compromised the sensitive information of over 743,000 individualsâjust o...
NeuralTrustâs Echo Chamber: The AI Jailbreak That Slipped Through the Cracks
24 Jun 2025
Contributed by Lukas
This podcast dives deep into one of the most pressing vulnerabilities in modern AI â the rise of sophisticated "jailbreaking" attacks against large ...
AT&T, Verizon, and Beyond: How Salt Typhoon Targets Global Telcos
24 Jun 2025
Contributed by Lukas
In this episode, we dive deep into the alarming revelations about Salt Typhoonâa Chinese state-sponsored advanced persistent threat (APT) actor, als...
Fake Microsoft, Netflix, & Apple Support: The Scam Lurking in Google Search
24 Jun 2025
Contributed by Lukas
In this eye-opening episode, we break down a sophisticated new trend in tech support scams (TSS) thatâs catching even the most cautious users off gu...
From Malware to Court: Qilin Ransomwareâs âCall a Lawyerâ Tactic
23 Jun 2025
Contributed by Lukas
In this episode, we take a deep dive into the Qilin ransomware group â now regarded as the worldâs leading ransomware-as-a-service (RaaS) operatio...
Zero-Click, Zero-Warning: The FreeType Flaw Behind a Spyware Surge
23 Jun 2025
Contributed by Lukas
In this episode, we dive deep into the story behind CVE-2025-27363, a critical zero-click vulnerability in the widely used FreeType font rendering lib...
The Insurance Industry Under Fire: Anatomy of the Aflac Cyber Incident
23 Jun 2025
Contributed by Lukas
In this episode, we take a deep dive into the June 2025 cyberattack on Aflac, one of the latest strikes in a growing wave of sophisticated, AI-driven ...
The Nucor Cyberattack: How Ransomware Threatens American Steel
23 Jun 2025
Contributed by Lukas
In May 2025, a ransomware attack forced Nucor â one of Americaâs largest steel producers â to halt its metal production operations. This wasnâ...
Inside the $225M Crypto Seizure: How Law Enforcement Traced Illicit Funds Across Borders
22 Jun 2025
Contributed by Lukas
A staggering $225 million in illicit cryptocurrency was recently seized by U.S. authorities in what has become the largest digital asset recovery in S...
Inside CVE-2025-23121: Veeam RCE Flaw Opens Door to Ransomware
22 Jun 2025
Contributed by Lukas
Ransomware groups are no longer just encrypting data â they're going straight for the backups. And if those backups arenât properly protected, rec...
Fasanaâs Collapse: How One Ransomware Attack Crippled a German Manufacturer
21 Jun 2025
Contributed by Lukas
Ransomware just bankrupted a 100-year-old manufacturerâand the world should take notice.In this episode, we dissect the cyberattack that brought dow...
Inside the 16 Billion Credential Leak: The Infostealer Engine Behind the Biggest Breach Yet
21 Jun 2025
Contributed by Lukas
In this episode, we break down the true scale and mechanics behind the largest credential leak ever recordedâover 16 billion login credentials, most...
Over 1,500 Minecraft Users Infected in Stargazers Ghost Malware Campaign
20 Jun 2025
Contributed by Lukas
A malware distribution network hiding in plain sight â on GitHub.This episode unpacks the Stargazers Ghost Network, a massive Distribution-as-a-Serv...
Chain IQ Breach Exposes UBS & Pictet Employee Data: A Supply Chain Failure
20 Jun 2025
Contributed by Lukas
A single vendor was compromised â and suddenly, internal records from UBS, Pictet, Manor, and Implenia were leaked. The Chain IQ cyberattack is a te...
Weaponized GitHub Repositories: How Banana Squad and Water Curse Are Hitting Devs
20 Jun 2025
Contributed by Lukas
Cybercriminals are increasingly turning GitHub into a malware distribution network. In this episode, we unpack two of the most alarming recent campaig...
Oxford City Council Breach Exposes 21 Years of Data
20 Jun 2025
Contributed by Lukas
State and local governments are under cyber siege. In this episode, we break down how and why these public institutions have become top targets for at...
Citrix NetScaler Flaws Expose Enterprise Networks: CVE-2025-5349 & CVE-2025-5777
19 Jun 2025
Contributed by Lukas
Two newly disclosed critical vulnerabilitiesâCVE-2025-5349 and CVE-2025-5777âhave put Citrix NetScaler ADC and Gateway deployments at serious risk...
GerriScary: How CVE-2025-1568 Threatened Googleâs Open-Source Supply Chain
19 Jun 2025
Contributed by Lukas
CVE-2025-1568, dubbed "GerriScary", has shaken the open-source ecosystem by exposing a fundamental weakness in Googleâs Gerrit code review systemâ...
Cisco & Atlassian Under Fire: High-Severity Flaws and Whatâs at Risk
19 Jun 2025
Contributed by Lukas
Cisco and Atlassian have both released urgent security advisories in response to newly discovered high-severity vulnerabilitiesâand the implications...
Double Extortion, Biometric Data, and Donuts: How Play Ransomware Hit Krispy Kreme
19 Jun 2025
Contributed by Lukas
A deep dive into one of the most aggressive ransomware groups operating todayâPlayâand their latest high-profile target: Krispy Kreme.Operating si...
Archetyp Market Seized: âŹ250M Drug Empire Toppled by Operation Deep Sentinel
17 Jun 2025
Contributed by Lukas
In this episode, we unpack the dramatic takedown of Archetyp Market, a darknet marketplace that dominated the online drug trade since its launch in Ma...
KillSec Exploits Zero-Day to Breach Ocuco: 241K Patients Exposed
17 Jun 2025
Contributed by Lukas
In this episode, we break down one of 2025âs most significant healthcare cybersecurity incidents: the ransomware attack on Ocuco, a global eyecare s...
DragonForce Ransomware: The Evolving Threat to Healthcare Data
17 Jun 2025
Contributed by Lukas
In this episode, we dive deep into the current state of cybersecurity in healthcare, where the growing sophistication of cyber threats has led to incr...
Googleâs $32B Bid for Wiz Faces DOJ Fire: A Cloud Security Power Play or Market Grab?
17 Jun 2025
Contributed by Lukas
In this episode, we break down the seismic implications of Googleâs proposed $32 billion acquisition of Wiz, the worldâs largest cybersecurity uni...
SimpleHelp Exploit Fallout: Ransomware Hits Utility Billing Platforms
16 Jun 2025
Contributed by Lukas
In this critical episode, we dive into the alarming exploitation of CVE-2024-57727, a vulnerability in SimpleHelp Remote Monitoring and Management (RM...
TeamFiltration and Token Theft: The Cyber Campaign Microsoft Never Saw Coming
16 Jun 2025
Contributed by Lukas
In this episode, we dissect UNK_SneakyStrikeâa major account takeover campaign targeting Microsoft Entra ID users with precision and scale. Tracked ...
Three CVEs, One Risk: Arbitrary Code Execution in Nessus Agent for Windows
16 Jun 2025
Contributed by Lukas
In this episode, we dive deep into one of the most critical attack techniques in modern cyber warfare: privilege escalationâand how it recently hit ...
WestJet Cyberattack: Cracks in Aviationâs Digital Armor
16 Jun 2025
Contributed by Lukas
A major cyberattack has rocked Canada's second-largest airline, WestJetâcrippling internal systems and prompting warnings for customers to monitor t...
Silent Surveillance: The Hidden Risks in 40,000+ Unsecured Cameras
15 Jun 2025
Contributed by Lukas
In this episode, we dig into a disturbing yet underreported national security threat: the exploitation of internet-connected surveillance camerasâes...
Paragonâs Promise vs. Reality: How Graphite Is Being Used Against Journalists and Activists
15 Jun 2025
Contributed by Lukas
In this episode, we dive deep into the alarming revelations surrounding Graphite, a powerful spyware tool developed by Israeli firm Paragon Solutions....
zeroRISC Secures $10M to Commercialize OpenTitan and Reinvent Supply Chain Security
14 Jun 2025
Contributed by Lukas
zeroRISC just raised $10 million to bring OpenTitanâthe first open-source silicon Root of Trustâto market. In this episode, we break down what thi...
Fog, RedFox, and the Rise of Silent Intruders: Cyberattacks Surge Against Financial Institutions
14 Jun 2025
Contributed by Lukas
The financial services industry is under siege. In this episode, we unpack the latest findings from Radwareâs 2025 Financial Threat Analysis and mul...
9.8 Severity and Counting: Inside Trend Microâs Latest Security Emergency
13 Jun 2025
Contributed by Lukas
In this episode, we break down Trend Microâs urgent June 10th security update that patched ten high- and critical-severity vulnerabilitiesâsome wi...
Zero-Day in the Call Center: Mitel MiCollab Exploited in Active Attacks
13 Jun 2025
Contributed by Lukas
In this episode, we dissect the critical vulnerabilities plaguing Mitel MiCollab, a widely used unified communications platform, and explore how attac...
The Info-Stealer Sting: A Deep Dive into INTERPOL's Operation Secure
13 Jun 2025
Contributed by Lukas
Join us for a gripping discussion on "Operation Secure," a landmark international crackdown that reverberated through the dark corners of the cybercri...
Tomcat Manager Attacks: 400 IPs in Coordinated Brute-Force Attack
11 Jun 2025
Contributed by Lukas
On June 5, 2025, GreyNoise flagged a massive spike in coordinated brute-force login attempts targeting Apache Tomcat Manager interfaces. Nearly 400 un...
TxDOT Data Leak: 423,391 Texans Exposed
11 Jun 2025
Contributed by Lukas
On May 12, 2025, the Texas Department of Transportation (TxDOT) disclosed a significant data breach that compromised crash reports containing personal...
Ghost Students and AI Scams: How Identity Theft is Gutting Financial Aid
11 Jun 2025
Contributed by Lukas
What happens when hundreds of thousands of college applications are submittedânot by hopeful students, but by bots using stolen identities? In this ...
Inside the React Native NPM Supply Chain Breach: 16 Packages, 1 Million+ Downloads, and a RAT in the Code
10 Jun 2025
Contributed by Lukas
In this episode, we break down the massive supply chain attack that rocked the React Native ecosystem beginning on June 6, 2025. Over 16 NPM packages,...
Mirai Strikes Again: Spring4Shell, Wazuh, and TBK DVRs Exploited in Live Campaigns
10 Jun 2025
Contributed by Lukas
In this episode, we dive into the latest wave of active Mirai botnet campaigns exploiting high-severity remote code execution (RCE) vulnerabilities in...
UNFI Breach: How One Cyberattack Shook the North American Food Supply
10 Jun 2025
Contributed by Lukas
On June 5, 2025, United Natural Foods Inc. (UNFI)âNorth America's largest publicly traded wholesale food distributor and primary supplier for Whole ...
Malware-as-Code: The Rise of DaaS on GitHub and the Collapse of Open-Source Trust
07 Jun 2025
Contributed by Lukas
In this episode, we dissect one of the most sophisticated ongoing cybercrime trendsâmalware campaigns weaponizing GitHub repositories to compromise ...
ClickFix: How Fake Browser Errors Became the Internetâs Most Dangerous Trap
05 Jun 2025
Contributed by Lukas
In this episode, we dive deep into ClickFix, also tracked as ClearFix or ClearFakeâa highly effective and deceptive malware delivery tactic that eme...
Exposed and Extorted: The ViLE Hackers and the Legal Gaps Enabling Doxing
05 Jun 2025
Contributed by Lukas
Cybercrime is rapidly evolvingâand so are its tactics. In this episode, we dissect the findings of SoSafeâs Cybercrime Trends 2025 report and expl...
Chrome Under Fire: Three Zero-Days, One Month, and Nation-State Exploits
04 Jun 2025
Contributed by Lukas
In this episode, we dive deep into three actively exploited zero-day vulnerabilities discovered in Google Chrome in 2025, each of which was patched in...
Australia Forces Transparency: The Worldâs First Mandatory Ransomware Payment Reporting Law
04 Jun 2025
Contributed by Lukas
Australia just made cyber history. On May 30, 2025, the nation became the first in the world to enforce mandatory ransomware payment reporting under t...
$25M for AI Email Security: Trustifiâs Big Bet on the MSP Market
04 Jun 2025
Contributed by Lukas
In this episode, we dive into Trustifiâs recent $25 million Series A funding round, led by growth equity firm Camber Partners. Specializing in AI-po...
Google Chrome vs. Failing CAs: The Policy Behind the Distrust
03 Jun 2025
Contributed by Lukas
In this episode, we dissect Google's recent and upcoming decisions to distrust several Certificate Authorities (CAs) within the Chrome Root Store, inc...
CVE-2025-48827 & 48828: How vBulletinâs API and Template Engine Got Weaponized
03 Jun 2025
Contributed by Lukas
Two critical, actively exploited vulnerabilities in vBulletin forum softwareâCVE-2025-48827 and CVE-2025-48828âhave put thousands of websites at i...
JINX-0132: How Cryptojackers Hijacked DevOps Infrastructure via Nomad and Docker
03 Jun 2025
Contributed by Lukas
In this episode, we dissect the JINX-0132 cryptojacking campaign â a real-world example of how threat actors are exploiting cloud and DevOps environ...
Password Hashes Leaked via Linux Crash Handlers: The Truth Behind CVE-2025-5054 & 4598
02 Jun 2025
Contributed by Lukas
In this episode, we unpack two newly disclosed Linux vulnerabilitiesâCVE-2025-5054 and CVE-2025-4598âdiscovered by the Qualys Threat Research Unit...