Source: thehackernews.com – Author: . The threat actors behind the Qilin ransomware-as-a-service (RaaS) scheme are now offering legal counsel for affiliates to put more pressure on...
Day: June 20, 2025
Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist – Source:thehackernews.com
Source: thehackernews.com – Author: . Iran’s state-owned TV broadcaster was hacked Wednesday night to interrupt regular programming and air videos calling for street protests against the...
New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud, and NFC Theft – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have exposed the inner workings of an Android malware called AntiDot that has compromised over 3,775 devices as part...
In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer – Source: www.securityweek.com
Source: www.securityweek.com – Author: SecurityWeek News SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy stories that might have slipped under the radar. We provide...
Hackers Access Legacy Systems in Oxford City Council Cyberattack – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Oxford City Council in the United Kingdom (UK) is notifying current and former employees that their personal information was likely...
Cybersecurity Compliance in South Africa – Source:davinciforensics.co.za
Source: davinciforensics.co.za – Author: cyberpro. A Continued Cycle South Africa has had a slow approach to compliance with the government regulations and laws set in place....
New Mocha Manakin Malware Deploys NodeInitRAT via Clickfix Attack – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. A new and concerning cyber threat, dubbed Mocha Manakin, has been identified by cybersecurity research firm Red Canary. First tracked...
Linux flaws chain allows Root access across major distributions – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Researchers discovered two local privilege escalation flaws that could let attackers gain root access on systems running major Linux distributions....
A ransomware attack pushed the German napkin firm Fasana into insolvency – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini A cyberattack pushed the German napkin firm Fasana into insolvency, likely worsening existing financial troubles and serving as the final...
Researchers discovered the largest data breach ever, exposing 16 billion login credentials – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Researchers discovered the largest data breach ever, exposing 16 billion login credentials, likely due to multiple infostealers. Researchers announced the...
China-linked group Salt Typhoon breached satellite firm Viasat – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini China-linked APT Typhoon has reportedly targeted satellite firm Viasat, the group has breached multiple telecom providers in the past. China-linked...
How to Lock Down the No-Code Supply Chain Attack Surface – Source: www.darkreading.com
Source: www.darkreading.com – Author: Amichai Shulman Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
The Rising Deepfake Risk for Businesses: A Step-By-Step Defense Strategy Built Around the Basics of Security – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team Deepfakes are the exciting new thing in cyber security, but at their core they are not a new threat –...
Innovator Spotlight: ESET – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: Gary Cybersecurity’s Enduring Guardians: ESET’s 35-Year Journey of Threat Intelligence The Berlin Wall crumbled, and from its digital shadows emerged a cybersecurity...
The Rise of Identity Risk Intelligence – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team For many years, cybersecurity professionals have relied on Indicators of Compromise (IOCs) such as IP addresses, domain names, and file...
GitHub hit by a sophisticated malware campaign as ‘Banana Squad’ mimics popular repos – Source: www.csoonline.com
Source: www.csoonline.com – Author: Attackers use typo-squatting, obfuscation, and fake accounts to slip Python-based malware into open-source projects, raising fresh alarms for OSS supply chain security....
IBM combines governance and security tools to solve the AI agent oversight crisis – Source: www.csoonline.com
Source: www.csoonline.com – Author: With AI agents multiplying across enterprises, IBM’s watsonx–Guardium integration aims to provide unified AgentOps visibility, automated red teaming, and regulatory accelerators to...
Hacker legen Leymann Baustoffe lahm – Source: www.csoonline.com
Source: www.csoonline.com – Author: Die Baumarktkette Leymann Baustoffe wurde Ziel einer Cyberattacke. Alle Standorte sind betroffen. Alle Filialen der Baumarktkette Leymann Baustoffe müssen aufgrund einer Cyberattacke...
How to conduct an effective post-incident review – Source: www.csoonline.com
Source: www.csoonline.com – Author: Mitigation and remediation aren’t the endpoints of incident response. Having a structured process to analyze and learn from a cybersecurity incident once...
Chain IQ data theft highlights need to oversee third party suppliers – Source: www.csoonline.com
Source: www.csoonline.com – Author: Firm says hack on 19 companies came from ‘tools and techniques that had never before been seen on a global scale.’ Cybersecurity...
Phishing campaign abuses Cloudflare Tunnels to sneak malware past firewalls – Source: www.csoonline.com
Source: www.csoonline.com – Author: Serpentine#Cloud attack by unknown attackers opens RAT-based backdoor. Another threat group has started abusing the Cloudflare Tunnel service to get phishing emails...
6 Steps to 24/7 In-House SOC Success – Source:thehackernews.com
Source: thehackernews.com – Author: . Hackers never sleep, so why should enterprise defenses? Threat actors prefer to target businesses during off-hours. That’s when they can count...
Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider – Source:thehackernews.com
Source: thehackernews.com – Author: . Cloudflare on Thursday said it autonomously blocked the largest ever distributed denial-of-service (DDoS) attack ever recorded, which hit a peak of...
200+ Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have uncovered a new campaign in which the threat actors have published more than 67 GitHub repositories that claim...
UK Gov Cybersecurity Jobs Average Salary is Under £45,000, Study Finds – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: UK public sector cybersecurity roles offer an average salary of just £44,739 ($60,070) per annum, according to a study by Bridwell. The...
Russia Expert Falls Prey to Elite Hackers Disguised as US Officials – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Keir Giles, a British expert on Russian information operations, has been targeted by a sophisticated spear phishing attack using novel social engineering...
Self-Driving Car Video Footage – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments Ian Stewart • June 19, 2025 8:36 AM Does anyone really care? I was talking to the manager...
Boffins devise voice-altering tech to jam ‘vishing’ schemes – Source: go.theregister.com
Source: go.theregister.com – Author: Thomas Claburn Researchers based in Israel and India have developed a defense against automated call scams. ASRJam is a speech recognition jamming...
Uncle Sam seeks time in tower dump data grab case after judge calls it ‘unconstitutional’ – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones The United States is requesting [PDF] a month-long extension to the deadline for its final decision regarding an appeal against...
Glazed and confused: Hole lotta highly sensitive data nicked from Krispy Kreme – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Krispy Kreme finally revealed the number of people affected by its November cyberattack, and it’s easy to see why analyzing...