Source: socprime.com – Author: Veronika Telychko WRITTEN BY Veronika Telychko Technical Writer [post-views] June 19, 2025 · 4 min read June has been a challenging month...
Day: June 19, 2025
Mocha Manakin Attack Detection: Hackers Spread a Custom NodeJS Backdoor Dubbed NodeInitRAT Using the Paste-and-Run Technique – Source: socprime.com
Source: socprime.com – Author: Veronika Telychko Mocha Manakin, believed to have ties to Interlock ransomware operations, has been observed using the paste-and-run phishing technique for initial...
New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have exposed the inner workings of an Android malware called AntiDot that has compromised over 3,775 devices as part...
BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with macOS Backdoor Malware – Source:thehackernews.com
Source: thehackernews.com – Author: . The North Korea-aligned threat actor known as BlueNoroff has been observed targeting an employee in the Web3 sector with deceptive Zoom...
Secure Vibe Coding: The Complete New Guide – Source:thehackernews.com
Source: thehackernews.com – Author: . DALL-E for coders? That’s the promise behind vibe coding, a term describing the use of natural language to create software. While...
Chain IQ, UBS Data Stolen in Ransomware Attack – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Swiss procurement service provider Chain IQ has confirmed falling victim to a cyberattack that led to the theft of customer...
Choosing a Clear Direction in the Face of Growing Cybersecurity Demands – Source: www.securityweek.com
Source: www.securityweek.com – Author: Marc Solomon For years, Chief Information Security Officers (CISOs) have faced an uphill battle in securing the resources they need to protect...
Security Evolution: From Pothole Repair to Road Building – Source: www.darkreading.com
Source: www.darkreading.com – Author: Andy Ellis Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Scammers Spread False Support Info Using Legitimate Websites – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have...
Paragon Commercial Spyware Infects Prominent Journalists – Source: www.darkreading.com
Source: www.darkreading.com – Author: Alexander Culafi, Senior News Writer, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why...
Iran-Israel War Triggers a Maelstrom in Cyberspace – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
The MSP Cyber Snapshot – Weekly News with Adam Pilton – June 19th 2025 – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși In this week’s Snapshot, cybersecurity advisor Adam Pilton breaks down the latest news on dodgy VPNs, sneaky phishing, a worrying...
What Is Phishing? Common Attacks Explained – Source:levelblue.com
Source: levelblue.com – Author: hello@alienvault.com. Phishing remains one of the biggest cyber threats in circulation today. Billions of emails are sent every single day and together...
Foreign aircraft, domestic risks – Source: www.csoonline.com
Source: www.csoonline.com – Author: Opinion Jun 19, 20259 mins Aerospace and Defense IndustryCyberattacksGovernment Retrofitting a legacy, foreign aircraft for high-security use reveals deep cyber risks, highlighting...
North Korea’s BlueNoroff uses AI deepfakes to push Mac malware in fake Zoom calls – Source: www.csoonline.com
Source: www.csoonline.com – Author: In a sophisticated new campaign, executives are being tricked into installing malware via AI-generated video calls with deepfake bosses, delivering custom-built, persistent...
Third-party risk management is broken — but not beyond repair – Source: www.csoonline.com
Source: www.csoonline.com – Author: TPRM today prioritizes fear of penalty over pursuit of real security. By investing in a comprehensive, targeted approach, organizations can reclaim TPRM...
Asana’s MCP AI connector could have exposed corporate data, CSOs warned – Source: www.csoonline.com
Source: www.csoonline.com – Author: Bug allowing access to other MCP users’ data was found a month after server released. CSOs with Asana’s Model Context Protocol (MCP)...
CSO30 Australia Awards 2025: Nominations deadline extended – Source: www.csoonline.com
Source: www.csoonline.com – Author: CSO Australia is accepting nominations for the 2025 CSO30 Awards, entries now close on 30 June. Nominations are officially open for the...
5 security secrets of elite defenders – Source: www.csoonline.com
Source: www.csoonline.com – Author: Advanced threats demand advanced defenses — how the best get it done. Nation-state actors and well-funded criminal organizations employ advanced persistent threat...
Overwhelmed by security alerts? XDR service providers offer a powerful solution – Source: www.csoonline.com
Source: www.csoonline.com – Author: Learn how XDR service providers bridge the security gap Cybersecurity professionals are under siege. In 2024, relentless cyberattacks (1636 per week on...
N. Korean Hackers Use PylangGhost Malware in Fake Crypto Job Scam – Source:hackread.com
Source: hackread.com – Author: Waqas. A new series of cyber attacks is targeting professionals in the crypto and blockchain industries using fake recruitment scams, according to...
Iran experienced a near-total national internet blackout – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Iran experienced a near-total internet blackout on Wednesday as tensions with Israel escalated into the first week of conflict. Global...
Malicious Minecraft mods distributed by the Stargazers DaaS target Minecraft gamers – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Java-based malware targets Minecraft users via fake cheat tools, utilizing the Stargazers Ghost Network distribution-as-a-service (DaaS). Check Point researchers found...
Healthcare services company Episource data breach impacts 5.4 Million people – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Data breach at Healthcare services company Episource exposes personal and health data of over 5.4 million people in major cyberattack....
Watch out, Veeam fixed a new critical bug in Backup & Replication product – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Veeam addressed a new critical flaw in Backup & Replication product that could potentially result in remote code execution. Veeam...
Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session – Source:thehackernews.com
Source: thehackernews.com – Author: . Most cyberattacks today don’t start with loud alarms or broken firewalls. They start quietly—inside tools and websites your business already trusts....
Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign – Source:thehackernews.com
Source: thehackernews.com – Author: . Threat actors with suspected ties to Russia have been observed taking advantage of a Google account feature called application specific passwords...
Meta Adds Passkey Login Support to Facebook for Android and iOS Users – Source:thehackernews.com
Source: thehackernews.com – Author: . Meta Platforms on Wednesday announced that it’s adding support for passkeys, the next-generation password standard, on Facebook. “Passkeys are a new...
New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have uncovered two local privilege escalation (LPE) flaws that could be exploited to gain root privileges on machines running...
Sneaky Serpentine#Cloud slithers through Cloudflare tunnels to inject orgs with Python-based malware – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons A sneaky malware campaign slithers through Cloudflare tunnel subdomains to execute in-memory malicious code and give unknown attackers long-term access...