CVEFeed Newsroom – Latest Cybersecurity Updates
The "Cyber Newsroom Feed" module is a live feed of the latest cyber news enriched with CVE and vulnerability data. The feed is updated every 5 minutes and includes the latest news from the cyber security industry. The feed is designed to provide users with a comprehensive overview of the latest cyber security news and trends.
-
Daily CyberSecurity
YouTube Downloader Sites Are Now Hiding Proxyware to Hijack Your Bandwidth
Attack Flow | Image: ASEC Cybercriminals are once again exploiting popular online habits—this time leveraging YouTube video download sites as bait for distributing Proxyware malware. AhnLab SEcurity i ...
-
BleepingComputer
Murky Panda hackers exploit cloud trust to hack downstream customers
A Chinese state-sponsored hacking group known as Murky Panda (Silk Typhoon) exploits trusted relationships in cloud environments to gain initial access to the networks and data of downstream customers ...
-
The Cyber Express
China-linked Silk Typhoon Hackers Target SaaS Providers, Zero Days
The China-linked advanced persistent threat (APT) group Silk Typhoon has shown a rare ability to compromise trusted relationships in the cloud. That’s one of the key takeaways from new research by Cro ...
-
DoublePulsar
Colt Technical Services gets ransomware’d via SharePoint initial access— some learning points
6 min read1 hour agoBack on August 12th 2025, I’d suspected Colt Technical Services had a ransomware incident running. For those who haven’t heard, Colt are quite important in the UK and Europe:At the ...
-
CybersecurityNews
CISA Warns of Apple iOS, iPadOS, and macOS 0-day Vulnerability Exploited in Attacks
CISA has issued an urgent warning regarding a critical zero-day vulnerability affecting Apple’s iOS, iPadOS, and macOS operating systems that threat actors are actively exploiting. The vulnerability, ...
-
Help Net Security
China-linked Murky Panda targets and moves laterally through cloud services
In its recently released 2025 Threat Hunting Report, Crowdstrike pointed out an interesting trend: a 136% surge in cloud intrusions. A good chunk of this surge is due to “China-nexus adversaries”, Mur ...
-
CybersecurityNews
Windows Docker Desktop Vulnerability Leads to Full Host Compromise
A newly disclosed vulnerability in Docker Desktop for Windows has revealed how a simple Server-Side Request Forgery (SSRF) attack could lead to complete host system compromise. CVE-2025-9074, discover ...
-
The Hacker News
Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage
Cybersecurity researchers are calling attention to malicious activity orchestrated by a China-nexus cyber espionage group known as Murky Panda that involves abusing trusted relationships in the cloud ...
-
TheCyberThrone
CISA KEV Catalog H1 2025 Analysis
August 22, 2025The CISA Known Exploited Vulnerabilities (KEV) Catalog is a critical resource designed to enhance cybersecurity defenses by identifying vulnerabilities actively exploited in the wild. T ...
-
The Cyber Express
70,000 WordPress Sites Exposed by Inspiro Theme Security Flaw
A critical security vulnerability, officially tracked as CVE-2025-8592, has been identified in the popular Inspiro WordPress theme. The flaw, affecting over 70,000 active installations, enables unauth ...