Source: www.csoonline.com – Author: News Jul 17, 20255 mins CyberattacksMobile SecurityRansomware A hacker group connected to data theft, extortion, and ransomware is targeting SonicWall SMA 100...
Day: July 17, 2025
Oracle-Lücke birgt Gefahr für RCE-Attacken – Source: www.csoonline.com
Source: www.csoonline.com – Author: Nur ein Klick zur Kompromittierung: Eine Schwachstelle im Oracle Cloud Code Editor ermöglicht RCE-Angriffe. Oracle hat das Sicherheitsproblem im Code Editor bereits...
China-linked hackers target Taiwan chip firms in a coordinated espionage campaign – Source: www.csoonline.com
Source: www.csoonline.com – Author: Three threat groups conduct sophisticated phishing attacks against chip manufacturers and financial analysts between March and June 2025. Chinese state-sponsored hackers have...
Ermittlern gelingt Schlag gegen prorussische Hacker – Source: www.csoonline.com
Source: www.csoonline.com – Author: Internationale Behörden haben die Server einer prorussischen Hackerbande abgeschaltet. Ihre Ziele lagen auch in Deutschland und sollten Politik und Gesellschaft stören. Durch...
How AI is changing the GRC strategy – Source: www.csoonline.com
Source: www.csoonline.com – Author: CISOs find themselves at a pinch-point needing to manage AI risks while supporting organizational innovation. The way forward is adapting GRC frameworks....
Malware-as-a-Service Campaign Exploits GitHub to Deliver Payloads – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A new malware distribution campaign leveraging public GitHub repositories as a delivery infrastructure for various malicious payloads has been uncovered by security researchers...
AI Cloaking Tools Enable Harder-to-Detect Cyber-Attacks – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Cybercriminals have been observed adopting AI-powered cloaking tools to bypass traditional security measures and keep phishing and malware sites hidden from detection....
Massive Data Leak at Texas Adoption Agency Exposes 1.1 Million Records – Source:hackread.com
Source: hackread.com – Author: Waqas. “While scanning the web for exposed databases, cybersecurity researcher Jeremiah Fowler discovered a massive set of unprotected records linked to the...
Police Shut Down 100 Servers Tied to Russian NoName057(16), Arrest 2 – Source:hackread.com
Source: hackread.com – Author: Waqas. In a coordinated operation this week, law enforcement from a dozen countries gathered together in an attempt to dismantle the infrastructure...
GitHub Abused to Spread Amadey, Lumma and Redline InfoStealers in Ukraine – Source:hackread.com
Source: hackread.com – Author: Waqas. A newly identified Malware-as-a-Service (MaaS) operation is using GitHub repositories to spread a mix of infostealer families. This campaign was spotted...
Chinese Salt Typhoon Infiltrated US National Guard Network for Months – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. A sophisticated Chinese APT group, Salt Typhoon, successfully infiltrated the US state’s Army National Guard network for nearly a year,...
Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters – Source:thehackernews.com
Source: thehackernews.com – Author: . Threat actors are leveraging public GitHub repositories to host malicious payloads and distribute them via Amadey as part of a campaign...
Hackers Exploit Apache HTTP Server Flaw to Deploy Linuxsys Cryptocurrency Miner – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have discovered a new campaign that exploits a known security flaw impacting Apache HTTP Server to deliver a cryptocurrency...
Europol Disrupts NoName057(16) Hacktivist Group Linked to DDoS Attacks Against Ukraine – Source:thehackernews.com
Source: thehackernews.com – Author: . An international operation coordinated by Europol has disrupted the infrastructure of a pro-Russian hacktivist group known as NoName057(16) that has been...
CTEM vs ASM vs Vulnerability Management: What Security Leaders Need to Know in 2025 – Source:thehackernews.com
Source: thehackernews.com – Author: . The modern-day threat landscape requires enterprise security teams to think and act beyond traditional cybersecurity measures that are purely passive and...
What is Hawala Banking? – Source:davinciforensics.co.za
Source: davinciforensics.co.za – Author: cyberpro. Hawala is an informal way of sending money without actually moving any physical money.It’s based on trust between people and not...
Watch out, another max-severity, make-me-root Cisco bug on the loose – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons Cisco has issued a patch for a critical 10 out of 10 severity bug in its Identity Services Engine (ISE)...
Quantum code breaking? You’d get further with an 8-bit computer, an abacus, and a dog – Source: go.theregister.com
Source: go.theregister.com – Author: Thomas Claburn The US National Institute for Standards and Technology (NIST) has been pushing for the development of post-quantum cryptographic algorithms since...
Microsoft offers vintage Exchange and Skype server users six more months of security updates – Source: go.theregister.com
Source: go.theregister.com – Author: Simon Sharwood Microsoft has extended its security update programs for Exchange Server 2016 and 2019, and Skype for Business 2015 and 2019....
Armenian Man Extradited to US Over Ryuk Ransomware Attacks – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs An Armenian man extradited from Ukraine to the United States has been charged over his alleged role in Ryuk ransomware...
VMware Flaws That Earned Hackers $340,000 at Pwn2Own Patched – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Broadcom informed customers this week that several VMware product vulnerabilities disclosed earlier this year at the Pwn2Own hacking competition have...
Cisco Patches Another Critical ISE Vulnerability – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Cisco on Wednesday informed customers of another critical-severity vulnerability in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC)...
United Natural Foods Expects $400M revenue impact from June cyber attack – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini United Natural Foods Projects (UNFI) expects a $350–$400M sales hit from a June cyberattack, with $50–$60M in net income impact....
Cisco patches critical CVE-2025-20337 bug in Identity Services Engine with CVSS 10 Severity – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Cisco warns of CVE-2025-20337, a critical ISE flaw (CVSS 10) allowing remote code execution with root privileges. Cisco addressed a...
UNC6148 deploys Overstep malware on SonicWall devices, possibly for ransomware operations – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini UNC6148 targets SonicWall devices with Overstep malware, using a backdoor and rootkit for data theft, extortion, or ransomware. Google’s Threat...
Operation Eastwood disrupted operations of pro-Russian hacker group NoName057(16) – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini International law enforcement operation disrupted the activities of the pro-Russia hacking group NoName057(16). European and U.S. authorities disrupted the activities...
GhostContainer backdoor: malware compromising Exchange servers of high-value organizations in Asia – Source: securelist.com
Source: securelist.com – Author: GReAT In a recent incident response (IR) case, we discovered highly customized malware targeting Exchange infrastructure within government environments. Analysis of detection...
China-Backed Salt Typhoon Hacks US National Guard for Nearly a Year – Source: www.darkreading.com
Source: www.darkreading.com – Author: Alexander Culafi Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
AI Driving the Adoption of Confidential Computing – Source: www.darkreading.com
Source: www.darkreading.com – Author: Agam Shah Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...