Source: www.securityweek.com – Author: Associated Press A cyberattack on Russian state-owned flagship carrier Aeroflot caused a mass outage to the company’s computer systems on Monday, Russia’s...
Year: 2025
BlackSuit Ransomware Group Transitioning to ‘Chaos’ Amid Leak Site Seizure – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The BlackSuit ransomware group’s Tor-based leak site has been seized by law enforcement as part of an international operation. Active...
French submarine secrets surface after cyber attack – Source: www.bitdefender.com
Source: www.bitdefender.com – Author: Graham Cluley European defence giant Naval Group has confirmed that it is investigating an alleged cyber attack which has seen what purports...
Allianz Life hit by hackers, customer and staff personal data stolen – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley Skip to content US insurance firm Allianz Life has told the media that hackers stole personal info of the “majority”...
Tea Dating Advice app spills sensitive data – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley This is painfully ironic. As BBC News reports, a woman’s dating app designed to enhance safety and vet potential dating...
Chinese ‘Fire Ant’ spies start to bite unpatched VMware instances – Source: www.csoonline.com
Source: www.csoonline.com – Author: The campaign exploited long-patched VMware vulnerabilities to hijack ESXi hosts, bypass defenses, and persist inside targets. Suspected China-aligned actors are running a...
Entwickler-Tool von Amazon verseucht – Source: www.csoonline.com
Source: www.csoonline.com – Author: Wenn offizielle Updates zerstörerischen Schadcode enthalten, wirft das kein gutes Licht auf den Anbieter. Auch die leistungsstärksten KI-Tools sind kontraproduktiv, wenn sie...
The CISO’s challenge: Getting colleagues to understand what you do – Source: www.csoonline.com
Source: www.csoonline.com – Author: CISOs often operate with significant responsibility but limited formal authority, making it critical to articulate their role clearly. Experts offer strategies for...
Darkweb – das verkannte Security-Tool – Source: www.csoonline.com
Source: www.csoonline.com – Author: Das Darkweb ist nicht nur ein Hort für (Cyber-)Kriminelle, sondern auch ein wichtiges Werkzeug für Sicherheitsprofis. Ein Besuch im Darkweb kann der...
Critical Flaws in WordPress Plugin Leave 10,000 Sites Vulnerable – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: More than 10,000 WordPress sites have been left vulnerable to full site takeover due to three critical security flaws discovered in the...
New Scattered Spider Tactics Target VMware vSphere Environments – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A sophisticated and highly targeted cyber-attack campaign has been identified by security researchers in Google’s Threat Intelligence Group (GTIG). A new report...
Third-Party Breach Impacts Majority of Allianz Life US Customers – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Insurance provider Allianz Life has suffered a major data breach affecting the majority of its 1.4 million US customers, as well as...
Sophisticated Shuyal Stealer Targets 19 Browsers, Demonstrates Advanced Evasion – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
How to Spot Malicious AI Agents Before They Strike – Source: www.darkreading.com
Source: www.darkreading.com – Author: Alisdair Faulkner Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
News alert: xonPlus launches real-time alerting platform to detect exposed enterprise credentials – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: cybernewswire Chennai, India, July 25, 2025, CyberNewswire — xonPlus, a real-time digital risk alerting system, officially launches today to help security teams...
Microsoft SharePoint Zero-Day – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Chinese hackers are exploiting a high-severity vulnerability in Microsoft SharePoint to steal data worldwide: The vulnerability, tracked as CVE-2025-53770, carries...
Exclusive: China-linked hackers target Taiwan’s chip industry with increasing attacks, researchers say – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: Semiconductor chips are seen on a circuit board of a computer in this illustration picture taken February 25, 2022. REUTERS/Florence Lo/Illustration/File Photo...
China-Backed Hackers Intensify Attacks on Taiwan Chipmakers – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: Anti-Phishing, DMARC , Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime 3 State-Sponsored Groups Spear-Phish Semiconductor Ecosystem Prajeet Nair (@prajeetspeaks) •...
Chinese Hackers Target Taiwan’s Semiconductor Sector with Cobalt Strike, Custom Backdoors – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: The Taiwanese semiconductor industry has become the target of spear-phishing campaigns undertaken by three previously undocumented Chinese state-sponsored threat actors. “Targets of...
Click here to steal. – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: Today we are joined by Selena Larson, Threat Researcher at Proofpoint, and co-host of Only Malware in the Building, as she discusses...
Cyber Career Opportunities: Weighing Certifications vs. Degrees – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Tara Seals Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
‘Fire Ant’ Cyber Spies Compromise Siloed VMware Systems – Source: www.darkreading.com
Source: www.darkreading.com – Author: Rob Wright Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
AI-Generated Linux Miner ‘Koske’ Beats Human Malware – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
‘PoisonSeed’ FIDO Attack Turns Out to Be a Red Herring – Source: www.darkreading.com
Source: www.darkreading.com – Author: Alexander Culafi Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Affinity Group Spotlight: Technical Career Path AG July News
As part of their spotlight month, the Technical Career Path Affinity Group shares their recent news, events, and how to get involved. Source Views: 1
SWE on the Hill: Members Successfully Advocate for STEM RESTART Act Reintroduction
SWE’s Hill Day reminds everyone that progress is still possible when powered by people passionate about equity, education, and engineering. Source Views: 0
Friday Squid Blogging: Stable Quasi-Isodynamic Designs – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments not important • July 25, 2025 7:22 PM “Data is like garbage. You’d better know what you are...
Subliminal Learning in AIs – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Today’s freaky LLM behavior: We study subliminal learning, a surprising phenomenon where language models learn traits from model-generated data that...
New York Seeking Public Opinion on Water Systems Cyber Regulations – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire New York State this week opened for public feedback proposed regulations focusing on the cybersecurity of water and wastewater systems....
AI-forged panda images hide persistent cryptomining malware ‘Koske’ – Source: www.csoonline.com
Source: www.csoonline.com – Author: The Linux malware campaign leverages AI-generated code and weaponized panda JPEGs to deploy stealthy and persistent cryptomining rootkits. A new malware strain...




















