October 2025

04
Signal Protocol and Post-Quantum Ratchets
04
Building AI for cyber defenders
04
Red Hat confirms security incident after hackers breach GitLab instance
02
Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite
02
China Imposes One-Hour Reporting Rule for Major Cyber Incidents

September 2025

30
From a Single Click: How Lunar Spider Enabled a Near Two-Month Intrusion
29
Digital Threat Modeling Under Authoritarianism
29
Pointer leaks through pointer-keyed data structures
27
Domino Effect: How One Vendor's AI App Breach Toppled Giants
27
Securing Microsoft Entra ID: Lessons from the Field – Part 1
27
Microsoft will offer free Windows 10 extended security updates in Europe
24
Average Cost of a Data Breach
24
Brussels Airport Paralysed: Are You Ready for the Next Supply Chain Cyber Crisis?
23
Airport Chaos Shows Human Impact of 3rd-Party Attacks
23
PHP Documentation Audit Complete!
23
New EDR-Freeze tool uses Windows WER to suspend security software
19
H1 x HTB (AI_GON3_ROGU3) : Writeup
18
Scattered Lapsus$ Hunters,' Others Announce End of Hacking Spree
18
Self-Replicating 'Shai-hulud' Worm Targets NPM Packages
17
Microsoft seizes 338 websites to disrupt rapidly growing ‘RaccoonO365’ phishing service
16
Microsoft: WMIC will be removed after Windows 11 25H2 upgrade
16
DISSECTING DCOM PARTIE 1
12
Microsoft September 2025 Patch Tuesday fixes 81 flaws, two zero-days
11
How an Attacker’s Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations
11
Blurring the Lines: Intrusion Shows Connection With Three Major Ransomware Gangs
11
THIS SUPPLY CHAIN HACK PROVES ONE MAINTAINER CAN BREAK EVERYTHING
11
What’s Your Cybersecurity Maturity?
09
Deepfake North Korean Remote Workers: a New Data Loss Threat
09
Salt Typhoon and UNC4841: Silent Push Discovers New Domains; Urges Defenders to Check Telemetry and Log Data
09
Czech cyber agency warns against Chinese tech in critical infrastructure
09
How the NTFS USN Journal Powers DFIR Investigations
09
Azure mandatory multifactor authentication: Phase 2 starting in October 2025
09
Russian APT28 Deploys "NotDoor" Outlook Backdoor Against Companies in NATO Countries
09
HTB: Media
09
Why Threat Hunting Should Be Part of Every Security Program
03
You Can't Find Weird If You Don't Know Normal
03
NIST Revises Security and Privacy Control Catalog to Improve Software Update and Patch Releases
03
HTB: Race
03
HTB: Eureka
03
Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE

August 2025

29
Google previews cyber ‘disruption unit’ as U.S. government, industry weigh going heavier on offense
29
IBM X-Force Threat Analysis: QuirkyLoader - A new malware loader delivering infostealers and RATs
29
Loophole allows threat actors to claim VS Code extension names
29
HTB: Sendai
29
Velociraptor incident response tool abused for remote access
29
ESET discovers PromptLock, the first AI-powered ransomware
29
NSA and Others Provide Guidance to Counter China State-Sponsored Actors Targeting Critical Infrastructure Organizations
26
ENISA to operate the EU Cybersecurity Reserve with EUR 36 million
25
Reading Location Position Value in Microsoft Word Documents
25
HTB: TheFrizz
25
Staffing strategies for an effective SOC
25
The Silent, Fileless Threat of VShell
22
Less than half of Belgian companies use the most basic security measures!
22
CYCON 2025 SERIES – DECIDING WITH AI SYSTEMS: RETHINKING DYNAMICS IN MILITARY DECISION-MAKING
21
Quantum-safe security: Progress towards next-generation cryptography
21
Warlock: From SharePoint Vulnerability Exploit to Enterprise Ransomware
21
HTB: Phantom
19
Phrack 72
18
Dissecting PipeMagic: Inside the architecture of a modular backdoor framework
18
Wazuh for Regulatory Compliance
15
Water Systems Under Attack: Norway, Poland Blame Russia Actors
15
Using Security Expertise to Bridge the Communication Gap
14
Cybersecurity Spending Slows & Security Teams Shrink
14
HTB: Sweep
14
#TROOPERS25 AD & Entra ID Security Track
13
Microsoft August 2025 Patch Tuesday fixes one zero-day, 107 flaws
12
Shedding Light on PoisonSeed’s Phishing Kit
12
New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises
12
HTB: Zero
12
North Korean Kimsuky hackers exposed in alleged data breach
11
Every Reason Why I Hate AI and You Should Too
11
Will Secure AI Be the Hottest Career Path in Cybersecurity?
11
Debian 13 "Trixie" Released: What’s New in the Latest Version?
10
Tabletop exercises in cybersecurity: what they are, why they matter, and how to run one
09
Ransomware Attacks Fall by Almost Half in Q2
09
Before you build, break it on paper
09
From Chrome renderer code exec to kernel with MSG_OOB
09
Prompt injection engineering for attackers: Exploiting GitHub Copilot
09
Data Dump From APT Actor Yields Clues to Attacker Capabilities
08
ChatGPT's GPT-5 models released: everything you need to know
08
HTB: Rainbow
07
Dissecting the CastleBot Malware-as-a-Service operation
07
Microsoft warns of high-severity flaw in hybrid Exchange deployments
07
HTB: Build
07
Sharing practical guidance: Launching Microsoft Secure Future Initiative (SFI) patterns and practices
06
Introducing gpt-oss
06
Project Ire autonomously identifies malware at scale
06
Ranking the top threats and techniques for the first half of 2025
06
Your security team studies while hackers learn
05
New Tallinn Paper analysis Russian cyber agression and proposes ways to strengthen Europe’s cyber defence
04
First Sentencing in Scheme to Help North Koreans Infiltrate US Companies

July 2025

31
CISA open-sources Thorium platform for malware, forensic analysis
31
HTB: LustrousTwo
31
Extending AD CS attack surface to the cloud with Intune certificates
31
What’s Your Secret?: Secret Scanning by DeepPass2
31
Introducing Proton Authenticator – secure 2FA, your way
31
UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud
31
Silk Typhoon Linked to Powerful Offensive Tools
30
The New EU Corporate Sustainability Reporting Directive (EU CSRD) Is Here. Stand out with cyber volunteering!
30
Root Evidence Bets on New Concept for Vulnerability Patch Management
30
ControlMonkey Unifies Cloud and Security Teams with IaC Risk Index
30
How the Browser Became the Main Cyber Battleground
30
Gunra Ransomware Group Unveils Efficient Linux Variant
30
Policy and Disclosure: 2025 Edition
29
BadSuccessor
28
Revisiting UNC3886 Tactics to Defend Against Present Risk
28
Why Microsoft’s New Sentinel Data Lake Actually Matters
26
HTB: Cypher
26
SharePoint ToolShell – One Request PreAuth RCE Chain
26
AI-Generated Linux Miner 'Koske' Beats Human Malware
25
Escaping the Confines of Port 445
25
Translating Cyber-Risk for the Boardroom
24
Introducing Lumo, the AI where every conversation is confidential
24
Fact Sheet: President Donald J. Trump Prevents Woke AI in the Federal Government
24
Automating Azure App Services Token Decryption
23
US nuclear weapons agency hacked in Microsoft SharePoint attacks
23
Introducing OSS Rebuild: Open Source, Rebuilt to Last
23
Detecting ADCS Privilege Escalation
23
China Introduces National Cyber ID Amid Privacy Concerns
22
How to Advance from SOC Manager to CISO?
21
Why it’s time for the US to go on offense in cyberspace
21
Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
20
Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Company Servers
19
HTB: Scepter
18
Nearly 2,000 MCP Servers Possess No Security Whatsoever
17
Printer Security Gaps: A Broad, Leafy Avenue to Compromise
17
HTB: Redelegate
17
Hiding Payloads in Linux Extended File Attributes
17
Chinese hackers breached National Guard to steal network configurations
17
Lessons Learned From McDonald's Big AI Flub
15
Keylogger Data Stored in an ADS
15
MITRE Introduces AADAPT Cybersecurity Framework for Cryptocurrency
15
Weaponizing Windows Drivers: A Hacker's Guide for Beginners
15
I Attempted to Build an Agentic AI ... And It Immediately Got Stuck in a Loop.
15
Hive0145 back in German inboxes with Strela Stealer and a backdoor
15
DOGE Denizen Marko Elez Leaked API Key for xAI
14
LudusHound: Raising BloodHound Attack Paths to Life
14
Improving IT efficiency with Microsoft Security Copilot in Microsoft Intune and Microsoft Entra
14
Commission presents guidelines and age verification app prototype for a safer online space for children
14
The Cyber Resilience Act: What Belgian Businesses Need to Know
13
Microsoft’s 19-hour Outlook outage exposes fragility in cloud infrastructure
12
'123456' password exposed chats for 64 million McDonald’s job applicants
11
Cybersecurity Snapshot: AI Security Field Gets Boost from New CSA Framework and from SANS - OWASP Partnership
11
Understanding the CISO: Role, skills, and security impact
10
North American APT Uses Exchange Zero-Day to Attack China
10
Microsoft confirms Windows Server Update Services (WSUS) sync is broken
10
Nonprofit Contributions to Cybersecurity: Stories, Gaps, and Opportunities for Policy and Collaboration
09
Microsoft expands Zero Trust workshop to cover network, SecOps, and more
09
Suricata 8.0.0 released
09
Know Your Enemy: Understanding Dark Market Dynamics
09
Enhancing Microsoft 365 security by eliminating high-privilege access
08
CVE-2025-1729 - Privilege Escalation Using TPQMAssistant.exe
08
Microsoft July 2025 Patch Tuesday fixes one zero-day, 137 flaws
08
Android malware Anatsa infiltrates Google Play to target US banks
08
Detection Engineering: Practicing Detection-as-Code – Introduction – Part 1
08
How a Low-Level IT Worker Helped Hack Brazil’s Banking System — Step by Step
07
Learn how to build an AI-powered, unified SOC in new Microsoft e-book
07
Commission launches strategy to make Europe Quantum leader by 2030
05
ScriptCase - Pre-Authenticated Remote Command Execution
04
Ubuntu Disables Spectre/Meltdown Protections
04
Identifying and abusing Azure Arc for hybrid escalation and persistence
02
We've All Been Wrong: Phishing Training Doesn't Work
02
Houken seeking a path by living on the edge with zero-days
01
Protecting the Core: Securing Protection Relays in Modern Substations

June 2025

30
Hide Your RDP: Password Spray Leads to RansomHub Deployment
30
NIS2 Technical Implementation Guidance
27
Unveiling RIFT: Enhancing Rust malware analysis through pattern matching
27
US Falling Behind China in Exploit Production
27
The Journey of Bypassing Ubuntu’s Unprivileged Namespace Restriction
27
Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options
27
How Today’s Pentest Models Compare and Why Continuous Wins
27
The road to Top 1: How XBOW did it
21
Are Forgotten AD Service Accounts Leaving You at Risk?
21
HTB: Shibuya
21
Understanding and Mitigating Golden SAML Attacks
21
HTB: Down
21
[BE/FR] Le futur quartier militaire de Charleroi, symbole des défis immobiliers de l’armée belge
21
Fact Sheet: President Donald J. Trump Reprioritizes Cybersecurity Efforts to Protect America
16
NIST Offers 19 Ways to Build Zero Trust Architectures
14
HTB: Infiltrator
13
Cyberattacks on Humanitarian Orgs Jump Worldwide
13
Why CISOs Must Align Business Objectives & Cybersecurity
12
Foundations of Cybersecurity: Reassessing What Matters
12
SmartAttack uses smartwatches to steal data from air-gapped systems
12
CVE-2025-26685 – Spoofing to Elevate Privileges with Microsoft Defender for Identity
11
Breaking down ‘EchoLeak’, the First Zero-Click AI Vulnerability Enabling Data Exfiltration from Microsoft 365 Copilot
11
NTLM REFLECTION IS DEAD, LONG LIVE NTLM REFLECTION! – AN IN-DEPTH ANALYSIS OF CVE-2025-33073
11
Introducing secure password deployment in Microsoft Edge for Business
10
Microsoft Outlook to block more risky attachments used in attacks
10
Microsoft’s June 2025 Patch Tuesday
09
Update: Dumping Entra Connect Sync Credentials
07
HTB: Backfire
05
Introducing Wazuh CTI
04
35K Solar Devices Vulnerable to Potential Hijacking
04
RemoteMonologue: Weaponizing DCOM for NTLM authentication coercions
03
Is Your CISO Navigating Your Flight Path?

May 2025

28
Microsoft wants Windows to update all software on your PC
19
The Windows Subsystem for Linux is now open source
16
Announcing the Official Parity Release of Volatility 3!
13
Consult the European Vulnerability Database to enhance your digital security!
09
LockBit Ransomware Gang Breached, Secrets Exposed
Some news and recent articles about cybersecurity that I find interesting. Entirely subjective and obviously not error-free. Belgian bias. Sometimes, each word stands out; other times, it’s the overall idea that matters most. No comment, just the link. Dates indicate when the link was added, not the article’s original date.
contact : [email protected]