Source: go.theregister.com – Author: Richard Speed A mysterious piece of “under development” code is playing havoc with the Windows Firewall after the latest preview update for...
Day: July 3, 2025
Young Consulting finds even more folks affected in breach mess – now over 1 million – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Young Consulting’s cybersecurity woes continue after the number of affected individuals from last year’s suspected ransomware raid passed the 1...
Meta calls €200M EU fine over pay-or-consent ad model ‘unlawful’ – Source: go.theregister.com
Source: go.theregister.com – Author: Richard Speed Meta has come out swinging following the European Commission’s decision that its pay-or-consent model falls foul of the Digital Markets...
Ransomware crew Hunters International shuts down, hands out keys to victims – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Ransomware gang Hunters International has shut up shop and offered decryption keys to all victims as a parting favor. Announcing...
Let’s Encrypt rolls out free security certs for IP addresses – Source: go.theregister.com
Source: go.theregister.com – Author: Thomas Claburn Let’s Encrypt, a certificate authority (CA) known for its free TLS/SSL certificates, has begun issuing digital certificates for IP addresses....
ChatGPT creates phisher’s paradise by recommending the wrong URLs for major companies – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson AI-powered chatbots often deliver incorrect information when asked to name the address for major companies’ websites, and threat intelligence business...
WordPress Plugin Flaw Exposes 600,000 Sites to File Deletion – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A severe vulnerability in the widely used Forminator WordPress plugin has been disclosed, exposing websites to the risk of arbitrary file deletion...
Scattered Spider Attacks US Airlines – The MSP Cyber News Snapshot – July 3rd – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși From courtroom breaches to cockpit infiltration, here’s this week’s Cyber Snapshot. Five critical stories you need on your radar, with...
Heimdal Partners with Portland to Deliver Unified Cybersecurity for Benelux MSPs – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Madalina Popovici Amsterdam, Netherlands – July 3, 2025 – Heimdal, a leading European provider of unified, AI-driven cybersecurity solutions, today announced a...
Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams – Source:thehackernews.com
Source: thehackernews.com – Author: . A mobile ad fraud operation dubbed IconAds that consisted of 352 Android apps has been disrupted, according to a new report...
Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have uncovered over 40 malicious browser extensions for Mozilla Firefox that are designed to steal cryptocurrency wallet secrets, putting...
TA829, UNK_GreenSec malware campaigns underpinned by same infrastructure – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: Malware, Threat Intelligence (Adobe Stock) Highly similar infrastructure and techniques have been leveraged by Russia-linked hacking operation TA829 and threat cluster UNK_GreenSec...
Scammers have a new tactic: impersonating DOGE – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: Skip to main content An email reviewed by Scoop News Group and analyzed by Proofpoint reveals the latest attempt by fraudsters to...
Surveillance Used by a Drug Cartel – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Once you build a surveillance system, you can’t control who will use it: A hacker working for the Sinaloa drug...
How to Shop Safely During Amazon Prime Day – Source:www.mcafee.com
Source: www.mcafee.com – Author: Jasdev Dhaliwal. As Amazon Prime Day approaches (July 8-11, 2025), millions of shoppers are gearing up for what promises to be one...
Cisco Duo Self-Service Portal Command Injection Vulnerability – Source:sec.cloudapps.cisco.com
Source: sec.cloudapps.cisco.com – Author: . Cisco Duo Self-Service Portal Command Injection Vulnerability Medium CVE-2025-20258 CWE-77 Download CSAF Email Summary A vulnerability in the self-service portal of...
Cisco Unified Contact Center Enterprise Cloud Connect Insufficient Access Control Vulnerability – Source:sec.cloudapps.cisco.com
Source: sec.cloudapps.cisco.com – Author: . Cisco Unified Contact Center Enterprise Cloud Connect Insufficient Access Control Vulnerability Medium CVE-2025-20242 CWE-284 Download CSAF Email Summary A vulnerability in...
Safeguarding Those Who Served: Cybersecurity Challenges for Veterans – Source:www.mcafee.com
Source: www.mcafee.com – Author: Jasdev Dhaliwal. As we honor Veterans Day, it’s crucial to recognize not only the sacrifices made by those who served but also...
Every Step You Take, Every Call You Make: Is Your Phone Tracking You? – Source:www.mcafee.com
Source: www.mcafee.com – Author: Jasdev Dhaliwal. So, what does your phone know about you? Taken all together it knows plenty — sometimes in ways that feel...
How To Tell If Your Smartphone Has Been Hacked – Source:www.mcafee.com
Source: www.mcafee.com – Author: Jasdev Dhaliwal. It takes a bit of effort, but iPhones can wind up with viruses and malware. And that can indeed lead...
How to Protect Your Digital Identity – Source:www.mcafee.com
Source: www.mcafee.com – Author: Amy Bunn. People under 60 are losing it online. And by it, I mean money—thanks to digital identity theft. In its simplest form,...
How To Protect Yourself from Black Friday and Cyber Monday AI Scams – Source:www.mcafee.com
Source: www.mcafee.com – Author: Jasdev Dhaliwal. As Black Friday approaches, eager bargain hunters are gearing up to snag the best deals online. But with the excitement...
Gift Card Scams — The Gift That Keeps on Taking – Source:www.mcafee.com
Source: www.mcafee.com – Author: Jasdev Dhaliwal. Gift card scams are an easy payday for scammers—and a costly mistake for victims. They work because gift cards are...
The Top 5 Scariest Mobile Threats – Source:www.mcafee.com
Source: www.mcafee.com – Author: Jasdev Dhaliwal. Scary movies are great. Scary mobile threats, not so much. Ghosts, killer clowns, and the creatures can stir up all...
New Fake Marketplace From China Mimics Top Retail Brands for Fraud – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. Cybersecurity firm Silent Push has exposed a massive phishing scam originating from China, which has created thousands of fake e-commerce...
N Korean Hackers Drop NimDoor macOS Malware Via Fake Zoom Updates – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. A new report from SentinelLabs, released on July 2, 2025, reveals a sophisticated cyberattack campaign targeting Web3 and cryptocurrency companies....
China Linked Houken Hackers Breach French Systems with Ivanti Zero Days – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. In a report published by ANSSI on July 1, 2025, the French cybersecurity agency revealed a highly skilled cybercrime group,...
Ethereum’s Pivotal Role in Decentralized Finance Evolution – Source:hackread.com
Source: hackread.com – Author: Owais Sultan. Once upon a time, say, 2016, Ethereum was a curious new arrival in the crypto space. It promised more than...
News alert: SquareX research finds browser AI agents are proving riskier than human employees – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido Palo Alto, Calif., Jun. 30, 2025, CyberNewswire–Every security practitioner knows that employees are the weakest link in an organization, but this...
Privilege Escalation Flaw Found in Azure Machine Learning Service – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A critical privilege escalation vulnerability affecting Azure Machine Learning (AML) has been discovered by cybersecurity researchers. The flaw allows attackers with only...