Source: www.schneier.com – Author: Bruce Schneier Law journal article that looks at the Dual_EC_PRNG backdoor from a US constitutional perspective: Abstract: The National Security Agency (NSA)...
Day: July 22, 2025
11 Years of Microsoft Regional Director and 15 Years of MVP – Source: www.troyhunt.com
Source: www.troyhunt.com – Author: Troy Hunt I often wonder how much people in other professions genuinely love the industry they’re in to the point that they’d...
Microsoft Links Ongoing SharePoint Exploits to Three Chinese Hacker Groups – Source:thehackernews.com
Source: thehackernews.com – Author: . Microsoft has formally tied the exploitation of security flaws in internet-facing SharePoint Server instances to two Chinese hacking groups called Linen...
Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access – Source:thehackernews.com
Source: thehackernews.com – Author: . Cisco on Monday updated its advisory of a set of recently disclosed security flaws in Identity Services Engine (ISE) and ISE...
Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate – Source:thehackernews.com
Source: thehackernews.com – Author: . Mexican organizations are still being targeted by threat actors to deliver a modified version of AllaKore RAT and SystemBC as part...
How to Advance from SOC Manager to CISO? – Source:thehackernews.com
Source: thehackernews.com – Author: . Making the move from managing a security operations center (SOC) to being a chief information security officer (CISO) is a significant...
Cisco confirms active exploitation of ISE and ISE-PIC flaws – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Cisco warns of active exploits targeting Identity Services Engine (ISE) and ISE-PIC flaws, first observed in July 2025. Cisco confirmed...
SharePoint under fire: new ToolShell attacks target enterprises – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini While SentinelOne did not attribute the attack to a specific threat actor, The Washington Post linked it to China-nexus acors....
CrushFTP zero-day actively exploited at least since July 18 – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Hackers exploit CrushFTP zero-day, tracked as CVE-2025-54309, to gain admin access via HTTPS when DMZ proxy is off. Threat actors...
Hardcoded credentials found in HPE Aruba Instant On Wi-Fi devices – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Hardcoded credentials in HPE Aruba Instant On Wi-Fi devices, let attackers to bypass authentication and access the web interface. HPE...
Flowable’s Summer 2025 Update Introduces Groundbreaking Agentic AI Capabilities – Source:hackread.com
Source: hackread.com – Author: Owais Sultan. Flowable has taken a significant leap forward in the realm of intelligent process automation with its Summer 2025 release. The...
Microsoft Reveals Chinese State Hackers Exploiting SharePoint Flaws – Source:hackread.com
Source: hackread.com – Author: Waqas. Microsoft’s critical new update reveals that specific Chinese nation-state threat groups are actively exploiting vulnerabilities in its on-premises SharePoint servers. Following...
Hackers Exploit Microsoft SharePoint Flaws in Global Breaches – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. New information has emerged regarding ongoing cyberattacks against Microsoft’s on-premises SharePoint servers, revealing a wider impact than initially understood. Yesterday,...
Global Fashion Label SABO’s 3.5M Customer Records Exposed Online – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. A data leak has impacted SABO, a global fashion and design company based in Australia, exposing over 3.5 million customer...
Dell Breached by Extortion Group, Says Data Stolen Was ‘Fake’ – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
Darktrace Acquires Mira Security for Network Visibility – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked?...
Critical Infrastructure Security Is a Critical Concern – Source: www.darkreading.com
Source: www.darkreading.com – Author: Amit Hammer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Coast Guard Issues Cybersecurity Rule for Maritime Transport Safety – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
China-Backed APT41 Cyberattack Surfaces in Africa – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
Human Digital Twins Could Give Attackers a Dangerous Advantage – Source: www.darkreading.com
Source: www.darkreading.com – Author: Arielle Waldman Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Russian Threat Actors Target NGOs with New OAuth Phishing Tactics – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A new wave of targeted phishing attacks exploiting Microsoft 365’s OAuth workflows has been uncovered by cybersecurity experts. These campaigns, observed by...
Widespread Net RFQ Scam Targets High-Value Goods – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A sophisticated and widespread Request for Quote (RFQ) scam using net financing terms has been uncovered by threat researchers. The scam targets businesses...
SharePoint ‘ToolShell’ Vulnerabilities Exploited by Chinese Nation-State Hackers – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Microsoft has confirmed three Chinese-based threat groups have been actively exploiting CVE-2025-53770 and CVE-2025-53771, two critical and high-severity vulnerabilities in internet-facing SharePoint...
UK Confirms Ransomware Payment Ban for Public Sector and CNI – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The UK government has confirmed it is pressing ahead with a proposed ban on ransomware payments by public sector and critical national...
Ransomware Group Uses AI Chatbot to Intensify Pressure on Victims – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A threat actor claiming to have launched a new ransomware-as-a-service (RaaS) venture is leveraging AI chatbots in its negotiation panel to automate...
Australian Regulator Alleges Financial Firm Exposed Clients to Unacceptable Cyber Risks – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Australia’s financial regulator has launched legal action against financial services firm Fortnum Private Wealth for allegedly exposing its clients to unacceptable cybersecurity...
AI Adoption is Driving SOC Role Reallocation Without Cutting Headcount – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Most organizations plan to reallocate security operations center (SOC) roles as a result of broader AI adoption in these teams, according to...
The AI Fix #60: Elon’s AI girlfriend, the arsonist red panda, and the AI that will kill you – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley Skip to content In episode 60 of The AI Fix, we learn why Grok might be Elon Musk’s bid for...
Dell demonstration platform breached by World Leaks extortion group – Source: www.csoonline.com
Source: www.csoonline.com – Author: A synthetic data environment was targeted despite its limited value to cybercriminals. Dell Technologies has confirmed that cybercriminals breached its Customer Solution...
Prettier-ESLint npm packages hijacked in a sophisticated supply chain attack – Source: www.csoonline.com
Source: www.csoonline.com – Author: DLL-based malware targets Windows users after a phishing campaign tricked the maintainer into leaking a token. Popular configuration packages for integrating Prettier...