Source: go.theregister.com – Author: Jessica Lyons US Senator Maria Cantwell (D-WA) has demanded that Google-owned incident response firm Mandiant hand over the Salt Typhoon-related security assessments...
Day: July 25, 2025
Freelance dev shop Toptal caught serving malware after GitHub account break-in – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson Developer freelancing platform Toptal has been inadvertently spreading malicious code after attackers broke into its systems and began distributing malware...
Microsoft admits it ‘cannot guarantee’ data sovereignty – Source: go.theregister.com
Source: go.theregister.com – Author: Paul Kunert Microsoft says it “cannot guarantee” data sovereignty to customers in France – and by implication the wider European Union –...
Advisor to Brit tech contractors Qdos confirms client data leak – Source: go.theregister.com
Source: go.theregister.com – Author: Paul Kunert Updated Business insurance and employment status specialist Qdos has confirmed that an intruder has stolen some customers personal data, according...
DNS security is important but DNSSEC may be a failed experiment – Source: go.theregister.com
Source: go.theregister.com – Author: Bruce Davie Systems Approach Last week I turned on DNSSEC (Domain Name System Security Extensions) for the systemsapproach.org domain. No need to...
Operation CargoTalon targets Russia’s aerospace with EAGLET malware, – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Operation CargoTalon targets Russia’s aerospace and defense sectors with EAGLET malware, using TTN documents to exfiltrate data. SEQRITE Labs researchers...
Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Hundreds of LG LNV5110R cameras are affected by an unpatched auth bypass flaw that allows hackers to gain admin access....
Koske, a new AI-Generated Linux malware appears in the threat landscape – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Koske is a new Linux malware designed for cryptomining, likely developed with the help of artificial intelligence. Koske is a...
Mitel patches critical MiVoice MX-ONE Auth bypass flaw – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Mitel addressed a critical MiVoice MX-ONE flaw that could allow an unauthenticated attacker to conduct an authentication bypass attack. A...
U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm – Source:thehackernews.com
Source: thehackernews.com – Author: . The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned a North Korean front company and three associated...
Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files – Source:thehackernews.com
Source: thehackernews.com – Author: . The threat actor known as Patchwork has been attributed to a new spear-phishing campaign targeting Turkish defense contractors with the goal...
Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor – Source:thehackernews.com
Source: thehackernews.com – Author: . Russian aerospace and defense industries have become the target of a cyber espionage campaign that delivers a backdoor called EAGLET to...
North Korea’s IT Worker Rampage Continues Amid DoJ Action – Source: www.darkreading.com
Source: www.darkreading.com – Author: Tara Seals Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Why Security Nudges Took Off – Source: www.darkreading.com
Source: www.darkreading.com – Author: Swati Babbar Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
The Young and the Restless: Young Cybercriminals Raise Concerns – Source: www.darkreading.com
Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
Can Security Culture Be Taught? AWS Says Yes – Source: www.darkreading.com
Source: www.darkreading.com – Author: Rob Wright Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Epsilon Red Ransomware Detection: New Adversary Campaign Targeting Users Globally via ClickFix – Source: socprime.com
Source: socprime.com – Author: Daryna Olyniychuk Following closely after the Interlock ransomware attacks that used a new custom RAT delivered through a modified ClickFix variant called...
BlackSuit Ransomware Group’s Dark Web Sites Seized in Operation Checkmate – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: BlackSuit’s dark web data leak site and private negotiation panels have been taken offline in what appears to be a large-scale law...
Prolonged Chinese Cyber Espionage Campaign Targets VMware Appliances – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A prolonged Chinese cyber espionage campaign is targeting VMware appliances to gain access to target networks, according to Sygnia researchers. The campaign...
New Chaos Ransomware Emerges, Launches Wave of Attacks – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A new ransomware operator called Chaos has launched a wave of intrusions impacting a wide range of sectors, Cisco Talos has reported....
Hacker Added Prompt to Amazon Q to Erase Files and Cloud Data – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. A security vulnerability recently surfaced involving Amazon’s AI coding assistant, ‘Q’, integrated with VS Code. The incident, reported by 404...
xonPlus Launches Real-Time Breach Alerting Platform for Enterprise Credential Exposure – Source:hackread.com
Source: hackread.com – Author: CyberNewswire. Chennai, India, July 25th, 2025, CyberNewsWire xonPlus, a real-time digital risk alerting system, officially launches today to help security teams detect...
ToolShell: a story of five vulnerabilities in Microsoft SharePoint – Source: securelist.com
Source: securelist.com – Author: Boris Larin, Georgy Kucherin, Ilya Savelyev On July 19–20, 2025, various security companies and national CERTs published alerts about active exploitation of...
Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks – Source:thehackernews.com
Source: thehackernews.com – Author: . Threat hunters have disclosed two different malware campaigns that have targeted vulnerabilities and misconfigurations across cloud environments to deliver cryptocurrency miners....
Overcoming Risks from Chinese GenAI Tool Usage – Source:thehackernews.com
Source: thehackernews.com – Author: . A recent analysis of enterprise data suggests that generative AI tools developed in China are being used extensively by employees in...
The books shaping today’s cybersecurity leaders – Source: www.csoonline.com
Source: www.csoonline.com – Author: Cybersecurity leaders reveal the books that have influenced how they lead, think, and manage security in the enterprise — and their own...
Supply chain attack compromises npm packages to spread backdoor malware – Source: www.csoonline.com
Source: www.csoonline.com – Author: News Jul 24, 20255 mins MalwareOpen SourceSupply Chain Phishing attacks on package maintainer accounts led to infected JavaScript type testing utilities. In...
Microsoft’s incomplete SharePoint patch led to global exploits by China-linked hackers – Source: www.csoonline.com
Source: www.csoonline.com – Author: A July 8 fix for a critical SharePoint zero-day failed to stop active exploitation, enabling state-backed attackers to breach nearly 100 organizations...
Hacker inserts destructive code in Amazon Q tool as update goes live – Source: www.csoonline.com
Source: www.csoonline.com – Author: The incident highlights rising AI risks as malicious actors exploit powerful tools amid weak safeguards and oversight. A hacker managed to insert...
US Targets North Korea’s Illicit Funds: $15M Rewards Offered as American Woman Jailed in IT Worker Scam – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire An Arizona woman was sentenced to prison for her role in a North Korean fake IT worker scheme that hit...