Source: socprime.com – Author: Veronika Telychko WRITTEN BY Veronika Telychko Technical Writer [post-views] June 19, 2025 · 4 min read June has been a challenging month...
Day: June 19, 2025
Mocha Manakin Attack Detection: Hackers Spread a Custom NodeJS Backdoor Dubbed NodeInitRAT Using the Paste-and-Run Technique – Source: socprime.com
Source: socprime.com – Author: Veronika Telychko Mocha Manakin, believed to have ties to Interlock ransomware operations, has been observed using the paste-and-run phishing technique for initial...
Chain IQ, UBS Data Stolen in Ransomware Attack – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Swiss procurement service provider Chain IQ has confirmed falling victim to a cyberattack that led to the theft of customer...
Choosing a Clear Direction in the Face of Growing Cybersecurity Demands – Source: www.securityweek.com
Source: www.securityweek.com – Author: Marc Solomon For years, Chief Information Security Officers (CISOs) have faced an uphill battle in securing the resources they need to protect...
Security Evolution: From Pothole Repair to Road Building – Source: www.darkreading.com
Source: www.darkreading.com – Author: Andy Ellis Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Scammers Spread False Support Info Using Legitimate Websites – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have...
Paragon Commercial Spyware Infects Prominent Journalists – Source: www.darkreading.com
Source: www.darkreading.com – Author: Alexander Culafi, Senior News Writer, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why...
Iran-Israel War Triggers a Maelstrom in Cyberspace – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
Foreign aircraft, domestic risks – Source: www.csoonline.com
Source: www.csoonline.com – Author: Opinion Jun 19, 20259 mins Aerospace and Defense IndustryCyberattacksGovernment Retrofitting a legacy, foreign aircraft for high-security use reveals deep cyber risks, highlighting...
North Korea’s BlueNoroff uses AI deepfakes to push Mac malware in fake Zoom calls – Source: www.csoonline.com
Source: www.csoonline.com – Author: In a sophisticated new campaign, executives are being tricked into installing malware via AI-generated video calls with deepfake bosses, delivering custom-built, persistent...
Third-party risk management is broken — but not beyond repair – Source: www.csoonline.com
Source: www.csoonline.com – Author: TPRM today prioritizes fear of penalty over pursuit of real security. By investing in a comprehensive, targeted approach, organizations can reclaim TPRM...
Asana’s MCP AI connector could have exposed corporate data, CSOs warned – Source: www.csoonline.com
Source: www.csoonline.com – Author: Bug allowing access to other MCP users’ data was found a month after server released. CSOs with Asana’s Model Context Protocol (MCP)...
CSO30 Australia Awards 2025: Nominations deadline extended – Source: www.csoonline.com
Source: www.csoonline.com – Author: CSO Australia is accepting nominations for the 2025 CSO30 Awards, entries now close on 30 June. Nominations are officially open for the...
5 security secrets of elite defenders – Source: www.csoonline.com
Source: www.csoonline.com – Author: Advanced threats demand advanced defenses — how the best get it done. Nation-state actors and well-funded criminal organizations employ advanced persistent threat...
Overwhelmed by security alerts? XDR service providers offer a powerful solution – Source: www.csoonline.com
Source: www.csoonline.com – Author: Learn how XDR service providers bridge the security gap Cybersecurity professionals are under siege. In 2024, relentless cyberattacks (1636 per week on...
Sneaky Serpentine#Cloud slithers through Cloudflare tunnels to inject orgs with Python-based malware – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons A sneaky malware campaign slithers through Cloudflare tunnel subdomains to execute in-memory malicious code and give unknown attackers long-term access...
Iran’s internet goes offline for hours amid claims of ‘enemy abuse’ – Source: go.theregister.com
Source: go.theregister.com – Author: Simon Sharwood The government of Iran appears to have shut down the internet within its borders, perhaps in response to Israel-linked cyberattacks....
Minecraft cheaters never win … but they may get malware – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons Trojanized Minecraft cheat tools hosted on GitHub have secretly installed stealers that siphon credentials, crypto wallets, and other sensitive data...
Asana’s cutting-edge AI feature ran into a little data leakage problem – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons Asana has fixed a bug in its Model Context Protocol (MCP) server that could have allowed users to view other...
Veeam patches third critical RCE bug in Backup & Replication in space of a year – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Veeam Backup & Replication users are urged to apply the latest patches that fix another critical bug leading to remote...
Israeli Hacktivists Steal and Burn $90m+ from Iranian Crypo Biz – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A pro-Israeli hacktivist group has targeted Iranian cryptocurrency exchange Nobitex, stealing tens of millions in digital currency as well as source code...
Ghostwriting Scam – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier The variations seem to be endless. Here’s a fake ghostwriting scam that seems to be making boatloads of money. This...
AI Threat Intelligence – Source: socprime.com
Source: socprime.com – Author: Veronika Telychko The rapid advancement and widespread adoption of generative AI (GenAI) is reshaping the threat intelligence domain, paving the way for...
News alert: Halo Security’s attack surface management platform wins MSP Today’s top award – Source: securityboulevard.com
Source: securityboulevard.com – Author: cybernewswire Miami, June 18, 2025, CyberNewswire — Halo Security today announced that its attack surface management solution has been named a 2025...
Understanding IAM vs CIAM: A Comprehensive Guide to Identity Management Systems – Source: securityboulevard.com
Source: securityboulevard.com – Author: Dev Kumar Managing identities and access has become one of the most critical aspects of cybersecurity and user experience. However, not all...
Defending Your Cyber Castle, Part 1: Building the Walls, Moat & Drawbridge of K-12 Security – Source: securityboulevard.com
Source: securityboulevard.com – Author: Alexa Sander In a recent webinar, two expert K-12 technology leaders—Glen Drager, Network System Administrator at Tyrone Area School District, and Chris...
Unlock Powerful Capabilities in Secrets Rotation – Source: securityboulevard.com
Source: securityboulevard.com – Author: Alison Mack Uncover the Hidden Power of Secrets Rotation Have you ever pondered the security capabilities encrypted deep within your cloud environment?...
Lessons from the 23andMe Breach and NIST SP 800-63B – Source: securityboulevard.com
Source: securityboulevard.com – Author: Enzoic Preventing Credential Stuffing Introduction In 2023, personal genomics company 23andMe suffered a major data breach that exposed sensitive genetic and personal...
Cyber Risk Management Strategy: How to Plan – Source: securityboulevard.com
Source: securityboulevard.com – Author: FireMon Online threats are everywhere, and no organization is safe from them. Whether it’s stolen data, ransomware, or phishing, attacks are becoming...
Iran Reduces Internet Access After Israeli Airstrikes, Cyberattacks – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt The government of Iran appears to have severely restricted internet access in the country following Israeli’s week-long campaign of military...