61.
62.
ClickFix Campaign Targets Hotels, Spurs Secondary Customer Attacks
(darkreading.com)
63.
5 reasons why attackers are phishing over LinkedIn
(bleepingcomputer.com)
64.
Supply chain attacks are exploiting our assumptions
(news.ycombinator.com)
65.
Multiple ChatGPT Security Bugs Allow Rampant Data Theft
(darkreading.com)
66.
Critical Cisco UCCX flaw lets attackers run commands as root
(bleepingcomputer.com)
67.
APT 'Bronze Butler' Exploits Zero-Day to Root Japan Orgs
(darkreading.com)
68.
Critical Site Takeover Flaw Affects 400K WordPress Sites
(darkreading.com)
69.
Europe Sees Increase in Ransomware, Extortion Attacks
(darkreading.com)
71.
72.
On the Road Again: Hackers Hijack Physical Cargo Freight
(darkreading.com)
73.
China-linked hackers exploited Lanscope flaw as a zero-day in attacks
(bleepingcomputer.com)
74.
'TruffleNet' Attack Wields Stolen Credentials Against AWS
(darkreading.com)
75.
76.
77.
6 browser-based attacks all security teams should be ready for in 2025
(bleepingcomputer.com)
78.
MATLAB dev says ransomware gang stole data of 10,000 people
(bleepingcomputer.com)
79.
The Rise of Native Phishing: Microsoft 365 Apps Abused in Attacks
(bleepingcomputer.com)
80.
Google discovered a new scam—and also fell victim to it
(arstechnica.com)
81.
Shattering the rotation illusion: The attacker view and AWSKeyLockdown (2024)
(news.ycombinator.com)
82.
Shattering the Rotation Illusion: The Attacker View & AWSKeyLockdown
(news.ycombinator.com)
83.
Employee gets $920 for credentials used in $140 million bank heist
(bleepingcomputer.com)
84.
85.
New Linux udisks flaw lets attackers get root on major Linux distros
(news.ycombinator.com)
86.
87.
88.
New Linux udisks flaw lets attackers get root on major Linux distros
(bleepingcomputer.com)
89.
Trend Micro fixes critical vulnerabilities in multiple products
(bleepingcomputer.com)
90.
Ribbon Communications Breach Marks Latest Telecom Attack
(darkreading.com)
Today's top topics:
anthropic