Storm Watch (
)

2025-08-01: 9 news articles added 2025-08-01: 17 files added 2025-07-21 (1753056000) Plenty of interesting files today as well as headlines. Friendly reminder that automating scraping of the site results in not only failure, but blocking at the perimeter. 2025-07-16 (1752624000) Bot activity will continue to be dropped as detected. If you don't want your entire /12 blocked, please stop your crawls Microsoft. If anyone can afford API access, it's you. Shameful. ... [ View Full Changelog ] |
Polls (
)

Packet Storm has long believed that if you do not have an inventory of what you are trying to protect, then you are starting from a point of failure. Incidents, monitoring and scanning, access controls, and more will be impossible to manage. Gauging cost for any security initiative is near impossible without defined scope and knowing what you have to protect.
| |
Answers | Results |
No, because then someone would find all of our super secret environments. | 50% |
No, we prefer to live life on the edge and never see our families. | 12% |
Yes, and everyone is forced to use it. | 25% |
Yes, but no one is required to use it. | 12% |
It's too hard to get agreement on what constitutes an asset. | 0% |
Grab Gear (
)

Files (
)

FullControl: Remote for Mac 4.0.5 Remote Command Execution
Posted: 2025-08-01
Posted: 2025-08-01
FullControl: Remote for Mac 4.0.5 Directory Traversal / Enumeration
Posted: 2025-08-01
Posted: 2025-08-01
Packet Storm New Exploits for July, 2025
Posted: 2025-08-01
Posted: 2025-08-01
Ubuntu Security Notice USN-7682-4
Posted: 2025-08-01
Posted: 2025-08-01
Red Hat Security Advisory 2025-12473-03
Posted: 2025-08-01
Posted: 2025-08-01
Red Hat Security Advisory 2025-12468-03
Posted: 2025-08-01
Posted: 2025-08-01
Red Hat Security Advisory 2025-12450-03
Posted: 2025-08-01
Posted: 2025-08-01
Red Hat Security Advisory 2025-12447-03
Posted: 2025-08-01
Posted: 2025-08-01
Red Hat Security Advisory 2025-12416-03
Posted: 2025-08-01
Posted: 2025-08-01
Red Hat Security Advisory 2025-12360-03
Posted: 2025-08-01
Posted: 2025-08-01
News (
)

$1,000,000 for WhatsApp 0-Click RCE Exploit at Pwn2Own Ireland 2025
Posted: 2025-08-01
Posted: 2025-08-01
Florida Prison Exposes Visitor Contact Info to Inmates
Posted: 2025-08-01
Posted: 2025-08-01
Storm-2603 Deploys DNS-Controlled Backdoor in Ransomware Attacks
Posted: 2025-08-01
Posted: 2025-08-01
Russian Cyberspies Target Foreign Embassies in Moscow Via AiTM Attacks
Posted: 2025-08-01
Posted: 2025-08-01
Microsoft Boosts .NET Bounty Program Rewards to $40,000
Posted: 2025-08-01
Posted: 2025-08-01
Staggering 800% Rise in Infostealer Credential Theft
Posted: 2025-08-01
Posted: 2025-08-01
Threat Actor Uses AI to Create a Better Crypto Wallet Drainer
Posted: 2025-08-01
Posted: 2025-08-01
Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing
Posted: 2025-08-01
Posted: 2025-08-01
Storm Watch (
)

2025-08-01: 9 news articles added 2025-08-01: 17 files added 2025-07-21 (1753056000) Plenty of interesting files today as well as headlines. Friendly reminder that automating scraping of the site results in not only failure, but blocking at the perimeter. 2025-07-16 (1752624000) Bot activity will continue to be dropped as detected. If you don't want your entire /12 blocked, please stop your crawls Microsoft. If anyone can afford API access, it's you. Shameful. ... [ View Full Changelog ] |
Polls (
)

Packet Storm has long believed that if you do not have an inventory of what you are trying to protect, then you are starting from a point of failure. Incidents, monitoring and scanning, access controls, and more will be impossible to manage. Gauging cost for any security initiative is near impossible without defined scope and knowing what you have to protect.
| |
Answers | Results |
No, because then someone would find all of our super secret environments. | 50% |
No, we prefer to live life on the edge and never see our families. | 12% |
Yes, and everyone is forced to use it. | 25% |
Yes, but no one is required to use it. | 12% |
It's too hard to get agreement on what constitutes an asset. | 0% |
Files (
)

FullControl: Remote for Mac 4.0.5 Remote Command Execution
Posted: 2025-08-01
Posted: 2025-08-01
FullControl: Remote for Mac 4.0.5 Directory Traversal / Enumeration
Posted: 2025-08-01
Posted: 2025-08-01
Packet Storm New Exploits for July, 2025
Posted: 2025-08-01
Posted: 2025-08-01
Ubuntu Security Notice USN-7682-4
Posted: 2025-08-01
Posted: 2025-08-01
Red Hat Security Advisory 2025-12473-03
Posted: 2025-08-01
Posted: 2025-08-01
Red Hat Security Advisory 2025-12468-03
Posted: 2025-08-01
Posted: 2025-08-01
Red Hat Security Advisory 2025-12450-03
Posted: 2025-08-01
Posted: 2025-08-01
Red Hat Security Advisory 2025-12447-03
Posted: 2025-08-01
Posted: 2025-08-01
Red Hat Security Advisory 2025-12416-03
Posted: 2025-08-01
Posted: 2025-08-01
Red Hat Security Advisory 2025-12360-03
Posted: 2025-08-01
Posted: 2025-08-01
News (
)

$1,000,000 for WhatsApp 0-Click RCE Exploit at Pwn2Own Ireland 2025
Posted: 2025-08-01
Posted: 2025-08-01
Florida Prison Exposes Visitor Contact Info to Inmates
Posted: 2025-08-01
Posted: 2025-08-01
Storm-2603 Deploys DNS-Controlled Backdoor in Ransomware Attacks
Posted: 2025-08-01
Posted: 2025-08-01
Russian Cyberspies Target Foreign Embassies in Moscow Via AiTM Attacks
Posted: 2025-08-01
Posted: 2025-08-01
Microsoft Boosts .NET Bounty Program Rewards to $40,000
Posted: 2025-08-01
Posted: 2025-08-01
Staggering 800% Rise in Infostealer Credential Theft
Posted: 2025-08-01
Posted: 2025-08-01
Threat Actor Uses AI to Create a Better Crypto Wallet Drainer
Posted: 2025-08-01
Posted: 2025-08-01
Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing
Posted: 2025-08-01
Posted: 2025-08-01