06/11

Stealth Falcon's Exploit of Microsoft Zero Day Vulnerability - Check Point Research

https://research.checkpoint.com/2025/stealth-falcon-zero-day/
Stealth Falcon's Exploit of Microsoft Zero Day Vulnerability - Check Point Research

RedTeam Pentesting - Blog - A Look in the Mirror - The Reflective Kerberos Relay Attack

https://blog.redteam-pentesting.de/2025/reflective-kerberos-relay-attack/
RedTeam Pentesting - Blog - A Look in the Mirror - The Reflective Kerberos Relay Attack

NTLM reflection is dead, long live NTLM reflection! – An in-depth

https://www.synacktiv.com/publications/ntlm-reflection-is-dead-long-live-ntlm-reflection-an-in-depth-analysis-of-cve-2025
NTLM reflection is dead, long live NTLM reflection! – An in-depth

Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks

https://thehackernews.com/2025/06/former-black-basta-members-use.html
Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks

SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords

https://thehackernews.com/2025/06/sinotrack-gps-devices-vulnerable-to.html
SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords

Hackers exploited Windows WebDav zero-day to drop malware

https://www.bleepingcomputer.com/news/security/stealth-falcon-hackers-exploited-windows-webdav-zero-day-to-drop-malware/
Hackers exploited Windows WebDav zero-day to drop malware

CVE-2025-47956 - Security Update Guide - Microsoft - Windows Security App Spoofing Vulnerability

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47956
CVE-2025-47956 - Security Update Guide - Microsoft - Windows Security App Spoofing Vulnerability

New BrowserVenom malware being distributed via fake DeepSeek phishing website | Securelist

https://securelist.com/browservenom-mimicks-deepseek-to-use-malicious-proxy/115728/
New BrowserVenom malware being distributed via fake DeepSeek phishing website | Securelist

Weaponized Google OAuth Triggers Malicious WebSocket - c/side

https://cside.dev/blog/weaponized-google-oauth-triggers-malicious-websocket
Weaponized Google OAuth Triggers Malicious WebSocket - c/side

Flaw in Industrial Computer Maker's UEFI Apps Enables Secure Boot Bypass on Many Devices - SecurityWeek

https://www.securityweek.com/flaw-in-industrial-computer-makers-uefi-apps-enables-secure-boot-bypass-on-many-devices/
Flaw in Industrial Computer Maker's UEFI Apps Enables Secure Boot Bypass on Many Devices - SecurityWeek

INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure

https://thehackernews.com/2025/06/interpol-dismantles-20000-malicious-ips.html
INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure

Zero-click AI data leak flaw uncovered in Microsoft 365 Copilot

https://www.bleepingcomputer.com/news/security/zero-click-ai-data-leak-flaw-uncovered-in-microsoft-365-copilot/
Zero-click AI data leak flaw uncovered in Microsoft 365 Copilot

Microsoft creates separate Windows 11 24H2 update for incompatible PCs

https://www.bleepingcomputer.com/news/microsoft/microsoft-creates-separate-windows-11-24h2-update-for-incompatible-pcs/
Microsoft creates separate Windows 11 24H2 update for incompatible PCs

Sign in - YesWeHack

https://yeswehack.com/learn-bug-bounty/how-exploit-graphql-endpoint-bug-bounty
Sign in - YesWeHack

Brute-force attacks target Apache Tomcat management panels

https://www.bleepingcomputer.com/news/security/brute-force-attacks-target-apache-tomcat-management-panels/
Brute-force attacks target Apache Tomcat management panels

Defense-Through-Offense Mindset: From a Taiwanese Hacker to the Engine of China’s Cybersecurity Industry

https://nattothoughts.substack.com/p/defense-through-offense-mindset-from
Defense-Through-Offense Mindset: From a Taiwanese Hacker to the Engine of China’s Cybersecurity Industry

40,000 Security Cameras Exposed to Remote Hacking - SecurityWeek

https://www.securityweek.com/40000-unprotected-security-cameras-found-on-internet/
40,000 Security Cameras Exposed to Remote Hacking - SecurityWeek

Seeker: How a Simple Link Can Reveal Your Smartphone’s Location

https://www.mobile-hacker.com/2025/06/10/seeker-how-a-simple-link-can-reveal-your-smartphones-location/
Seeker: How a Simple Link Can Reveal Your Smartphone’s Location