Source: www.infosecurity-magazine.com – Author: A new investigation into counterfeit receipt scams has uncovered a growing fraud ecosystem centered around tools like MaisonReceipts, which enable users to...
Month: July 2025
Accounting Firm Targeted by Malware Campaign Using New Crypter – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A cyber-attack on a US-based accounting firm in May 2025 has been observed delivering the PureRAT remote access Trojan using a sophisticated...
New CrushFTP Critical Vulnerability Exploited in the Wild – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: At least 10,000 CrushFTP instances are vulnerable to a critical flaw, which is currently being exploited by attackers, affecting the file transfer...
Microsoft: Attackers Actively Compromising On-Prem SharePoint Customers – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Microsoft has warned that attackers are actively exploiting SharePoint vulnerabilities in a high-impact, ongoing campaign impacting critical sectors like government and healthcare....
Europol targets Kremlin-backed cybercrime gang NoName057(16) – Source: www.bitdefender.com
Source: www.bitdefender.com – Author: Graham Cluley A pro-Kremlin cybercrime network has been taken offline after an international law enforcement operation disrupted over 100 of its servers,...
750,000 Impacted by Data Breach at The Alcohol & Drug Testing Service – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The Alcohol & Drug Testing Service (TADTS) is notifying roughly 750,000 people that their personal information was compromised in a...
In Other News: Law Firm Hacked by China, Symantec Flaw, Meta AI Hack, FIDO Key Bypass – Source: www.securityweek.com
Source: www.securityweek.com – Author: SecurityWeek News SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy stories that might have slipped under the radar. We provide...
Rumble in the jungle: APT41’s new target in Africa – Source: securelist.com
Source: securelist.com – Author: Denis Kulik, Daniil Pogorelov Introduction Some time ago, Kaspersky MDR analysts detected a targeted attack against government IT services in the African...
Email Protection Startup StrongestLayer Emerges From Stealth Mode – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Email security and human risk solutions provider StrongestLayer on Thursday emerged from stealth mode with $5.2 million in seed funding....
Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Google on Thursday announced filing a lawsuit against the operators of the Badbox 2.0 botnet, which has ensnared more than...
Settlement Reached in Investors’ Lawsuit Against Meta CEO Mark Zuckerberg and Other Company Leaders – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press A settlement was announced Thursday in court in a class action investors’ lawsuit against Meta CEO Mark Zuckerberg and current...
Friday Squid Blogging: The Giant Squid Nebula – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Beautiful photo. Difficult to capture, this mysterious, squid-shaped interstellar cloud spans nearly three full moons in planet Earth’s sky. Discovered...
Anne Arundel Dermatology Data Breach Impacts 1.9 Million People – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Maryland-based dermatology services provider Anne Arundel Dermatology has disclosed a data breach impacting roughly 1.9 million individuals. Data breach notifications...
Loaf and order: Belgian police launch bread-based cybersecurity campaign – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley Skip to content You’ve heard of ransomware, deepfake scams, and business email compromise. But what about bread bag cybercrime awareness?...
Google Sues the Operators Behind the BadBox 2.0 Botnet – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Google is suing the operators behind BadBox 2.0, accusing multiple Chinese threat groups of playing different roles in the operation...
Ukraine Pwns Russian Drone Maker — Gaskar is ‘Paralyzed’ – Source: securityboulevard.com
Source: securityboulevard.com – Author: Richi Jennings All Your UAVs Are Belong to UKR: Ukrainian Cyber Alliance and Black Owl team up to hack manufacturer of Russian...
The Challenges of Operationalizing Threat Intelligence – Source: securityboulevard.com
Source: securityboulevard.com – Author: Michael Vizard Most security teams subscribe to more threat‑intel feeds than they can digest, yet attackers keep winning. Cyware’s Jawahar Sivasankaran explains...
Summer Vacation Alert Surfaces More Than 5 Million Unsecured Wi-Fi Networks – Source: securityboulevard.com
Source: securityboulevard.com – Author: Michael Vizard Zimperium, a provider of mobile security software, this week published a report that notes more than 5 million unsecured public...
Cambodia Arrests More Than 1,000 in Cyberscam Crackdown – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Cambodian police and military arrested more than 1,000 people in a crackdown on cyberscam operations that have proliferated in recent...
Critical MCP Vulnerabilities are Slipping Through the Cracks – Source: securityboulevard.com
Source: securityboulevard.com – Author: Bar Lanyado We must pay attention to what holds everything together – the glue. That’s where the real MCP vulnerabilities are hiding. ...
‘PoisonSeed’ Attacker Skates Around FIDO Keys – Source: www.darkreading.com
Source: www.darkreading.com – Author: Alexander Culafi Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Nearly 2,000 MCP Servers Possess No Security Whatsoever – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
3 Ways Security Teams Can Minimize Agentic AI Chaos – Source: www.darkreading.com
Source: www.darkreading.com – Author: Josh Lemos Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Firmware Vulnerabilities Continue to Plague Supply Chain – Source: www.darkreading.com
Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
Threat actors scanning for apps incorporating vulnerable Spring Boot tool – Source: www.csoonline.com
Source: www.csoonline.com – Author: News Jul 18, 20255 mins CyberattacksThreat and Vulnerability ManagementVulnerabilities Researchers warn admins to act now; the hole in the open source tool...
Novel malware from Russia’s APT28 prompts LLMs to create malicious Windows commands – Source: www.csoonline.com
Source: www.csoonline.com – Author: News Analysis Jul 18, 20254 mins Advanced Persistent ThreatsCyberattacksPhishing Recent attacks by the state-run cyberespionage group against Ukrainian government targets included malware...
Vodafone von Hackerangriff auf Dienstleister betroffen – Source: www.csoonline.com
Source: www.csoonline.com – Author: Die Vertriebsplattform von Vodafone funktioniert seit Tagen nicht mehr. Grund dafür ist eine Cyberattacke auf einen IT-Dienstleister. Ein Dienstleister von Vodafone Deutschland...
Cisco warns of another critical RCE flaw in ISE, urges immediate patching – Source: www.csoonline.com
Source: www.csoonline.com – Author: The newly disclosed flaw affects a specific API that suffers from insufficient input validation to allow unauthenticated RCE at the root. Cisco...
Building scalable secrets management in hybrid cloud environments: Lessons from enterprise adoption – Source: www.csoonline.com
Source: www.csoonline.com – Author: One leaked AWS key changed everything! Now, secrets management isn’t just smart, it’s survival in the hybrid cloud chaos. I’ll never forget...
Clément Domingo: “We are not using AI correctly to defend ourselves” – Source: www.csoonline.com
Source: www.csoonline.com – Author: Cybercrime is evolving into a sophisticated, business-like ecosystem, with criminal groups operating like legitimate organizations. Ethical hacker Clément Domingo explains how they...





















