InfoSec
@infosec.skyfleet.blue
Relay Tracking News & Blogs about infosec, cybersec
- source removal/addition suggestions welcome !
CVE : check out @cve.skyfleet.blue
🆘 @skyfleet.blue
- source removal/addition suggestions welcome !
CVE : check out @cve.skyfleet.blue
🆘 @skyfleet.blue
APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins
APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins
cybersecuritynews.com
November 10, 2025 at 4:56 PM
APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins
Russia Detains Eight in Bashkortostan Over Alleged Telecom Sabotage Plot
Russia Detains Eight in Bashkortostan Over Alleged Telecom Sabotage Plot - Cyberwarzone
Russian authorities have detained eight individuals in the republic of Bashkortostan, alleging their involvement in a plot to sabotage telecommunications infrastructure. The detentions signal a heightened focus on internal security amidst ongoing international tensions.
cyberwarzone.com
November 10, 2025 at 4:41 PM
Russia Detains Eight in Bashkortostan Over Alleged Telecom Sabotage Plot
Ukraine Urges U.S. for Patriot Missile Systems Amid Escalating Russian Attacks on Power Grid
Ukraine Urges U.S. for Patriot Missile Systems Amid Escalating Russian Attacks on Power Grid - Cyberwarzone
Kyiv is intensifying its plea to Washington for additional Patriot air defense systems, a critical request as Russia escalates its systematic targeting of Ukraine's energy infrastructure.
cyberwarzone.com
November 10, 2025 at 4:36 PM
Ukraine Urges U.S. for Patriot Missile Systems Amid Escalating Russian Attacks on Power Grid
Chinese Cybersecurity Firm Data Breach Exposes State-Sponsored Hackers Cyber Weapons and Target List
Chinese Cybersecurity Firm Data Breach Exposes State-Sponsored Hackers Cyber Weapons and Target List
cybersecuritynews.com
November 10, 2025 at 3:56 PM
Chinese Cybersecurity Firm Data Breach Exposes State-Sponsored Hackers Cyber Weapons and Target List
ClickFix Campaign Targets Hotels, Spurs Secondary Customer Attacks
ClickFix Campaign Targets Hotels, Spurs Secondary Customer Attacks
Attackers compromise hospitality providers with an infostealer and RAT malware and then use stolen data to launch a phishing attacks against customers via both email and WhatsApp.
www.darkreading.com
November 10, 2025 at 3:51 PM
ClickFix Campaign Targets Hotels, Spurs Secondary Customer Attacks
Russian missile barrage disrupts internet, customs databases in Ukraine
Russian missile barrage disrupts internet, customs databases in Ukraine
Emergency blackouts lasting up to 12 hours were introduced following the attack, with Kyiv and other regions facing widespread internet and communication outages, according to internet watchdog NetBlocks.
therecord.media
November 10, 2025 at 3:41 PM
Russian missile barrage disrupts internet, customs databases in Ukraine
Russian broker pleads guilty to profiting from Yanluowang ransomware attacks
Russian broker pleads guilty to assisting US cyberattacks
: Aleksei Volkov faces years in prison, may have been working with other crews
www.theregister.com
November 10, 2025 at 3:36 PM
Russian broker pleads guilty to profiting from Yanluowang ransomware attacks
Denmark and Norway investigate Yutong bus security flaw amid rising tech fears
Denmark and Norway investigate Yutong bus security flaw amid rising tech fears
Denmark and Norway probe a security flaw in Chinese-made Yutong buses, deepening EU fears over reliance on Chinese tech and potential risks
securityaffairs.com
November 10, 2025 at 3:31 PM
Denmark and Norway investigate Yutong bus security flaw amid rising tech fears
Monsta FTP Vulnerability Exposed Thousands of Servers to Full Takeover
Monsta FTP Vulnerability Exposed Thousands of Servers to Full Takeover
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
hackread.com
November 10, 2025 at 3:26 PM
Monsta FTP Vulnerability Exposed Thousands of Servers to Full Takeover
The Washington Post getroffen door aanval op E-Business Suite van Oracle
The Washington Post getroffen door aanval op E-Business Suite van Oracle - Security.NL
The Washington Post getroffen door aanval op E-Business Suite van Oracle
The Washington Post is getroffen door een cyberaanval op de E-Business Suite van Oracle, meldt de Amerikaanse krant in een verklaring. De impact van de aanval is onduidelijk.
Oracle E-Business Suite i ...
Read more
Published Date:
Nov 10, 2025 (2 hours, 9 minutes ago)
Vulnerabilities has been mentioned in this article.
CVE-2025-61882
www.security.nl
November 10, 2025 at 3:21 PM
The Washington Post getroffen door aanval op E-Business Suite van Oracle
Short-term renewal of cyber information sharing law appears in bill to end shutdown
Short-term renewal of cyber information sharing law appears in bill to end shutdown
An expired 2015 law that gives companies liability protection when they share cyberthreat information with the federal government would be renewed through January 30 under Senate legislation to end the government shutdown.
therecord.media
November 10, 2025 at 3:12 PM
Short-term renewal of cyber information sharing law appears in bill to end shutdown
5 reasons why attackers are phishing over LinkedIn
5 reasons why attackers are phishing over LinkedIn
Attackers are increasingly phishing over LinkedIn to reach executives and bypass email security tools. Push Security explains how real-time browser protection detects and blocks phishing across apps and channels as users load malicious pages.
www.bleepingcomputer.com
November 10, 2025 at 3:11 PM
5 reasons why attackers are phishing over LinkedIn
OWASP Top 10 2025 – Revised Version Released With Two New Categories
OWASP Top 10 2025 - Revised Version Released With Two New Categories
cybersecuritynews.com
November 10, 2025 at 2:57 PM
OWASP Top 10 2025 – Revised Version Released With Two New Categories
Incident Response Team (ShieldForce) Partners with AccuKnox for Zero Trust CNAPP in Latin America
Incident Response Team (ShieldForce) Partners with AccuKnox for Zero Trust CNAPP in Latin America
cybersecuritynews.com
November 10, 2025 at 2:52 PM
Incident Response Team (ShieldForce) Partners with AccuKnox for Zero Trust CNAPP in Latin America
The Enterprise Browser: A New Cyber Frontier, Report Warns
The Enterprise Browser: A New Cyber Frontier, Report Warns - Cyberwarzone
A new report highlights a critical shift in the landscape of enterprise cybersecurity, positing that the user's browser has become a convergence point for significant identity, SaaS, and AI-related risks, often evading the purview of traditional security measures.
cyberwarzone.com
November 10, 2025 at 2:32 PM
The Enterprise Browser: A New Cyber Frontier, Report Warns
LangGraph Vulnerability Allows Malicious Python Code Execution During Deserialization
LangGraph Vulnerability Allows Malicious Python Code Execution During Deserialization
cybersecuritynews.com
November 10, 2025 at 1:32 PM
LangGraph Vulnerability Allows Malicious Python Code Execution During Deserialization
Critical Vulnerability in Popular NPM Library Exposes AI and NLP Apps to Remote Code Execution
Critical Vulnerability in Popular NPM Library Exposes AI and NLP Apps to Remote Code Execution
cybersecuritynews.com
November 10, 2025 at 1:27 PM
Critical Vulnerability in Popular NPM Library Exposes AI and NLP Apps to Remote Code Execution
⚡ Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More
⚡ Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More
thehackernews.com
November 10, 2025 at 1:22 PM
⚡ Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More
New Browser Security Report Reveals Emerging Threats for Enterprises
New Browser Security Report Reveals Emerging Threats for Enterprises
thehackernews.com
November 10, 2025 at 1:17 PM
New Browser Security Report Reveals Emerging Threats for Enterprises
Agentic AI in Cybersecurity: Beyond Triage to Strategic Threat Hunting
Agentic AI in Cybersecurity: Beyond Triage to Strategic Threat Hunting
With a 4M cybersecurity worker shortage, agentic AI helps SOCs move beyond triage, enabling proactive security once thought impossible.
securityaffairs.com
November 10, 2025 at 1:07 PM
Agentic AI in Cybersecurity: Beyond Triage to Strategic Threat Hunting
CISA’s expiration leaves a dangerous void in US cyber collaboration
CISA’s expiration leaves a dangerous void in US cyber collaboration
On Sept. 30, 2025, the Cybersecurity Information Sharing Act (CISA 2015) officially expired, ending a decade-long framework that helped government and industry share cyber-threat data safely and consistently. For the first time in ten years, the United States lacks the statutory foundation that underpinned its public-private threat-intelligence ecosystem.
cyberscoop.com
November 10, 2025 at 12:32 PM
CISA’s expiration leaves a dangerous void in US cyber collaboration
Cyber information sharing law would get extension under shutdown deal bill
Cyber information sharing law would get extension under shutdown deal bill
The Cybersecurity and Information Sharing Act of 2015 would go from expired to extended through Jan. 30.
cyberscoop.com
November 10, 2025 at 12:27 PM
Cyber information sharing law would get extension under shutdown deal bill
New Attacks Against Secure Enclaves
New Attacks Against Secure Enclaves - Schneier on Security
Encryption can protect data at rest and data in transit, but does nothing for data in use. What we have are secure enclaves. I’ve written about this before: Almost all cloud services have to perform some computation on our data. Even the simplest storage provider has code to copy bytes from an internal storage system and deliver them to the user. End-to-end encryption is sufficient in such a narrow context. But often we want our cloud providers to be able to perform computation on our raw data: search, analysis, AI model training or fine-tuning, and more. Without expensive, esoteric techniques, such as secure multiparty computation protocols or homomorphic encryption techniques that can perform calculations on encrypted data, cloud servers require access to the unencrypted data to do anything useful...
www.schneier.com
November 10, 2025 at 12:22 PM
New Attacks Against Secure Enclaves