Source: go.theregister.com – Author: Connor Jones Britain’s Cyber Monitoring Centre (CMC) estimates the total cost of the cyberattacks that crippled major UK retail organizations recently could...
Author: CISO2CISO Editor 2
Salt Typhoon Targets Telecoms via Router Flaws, Warn FBI and Canada – Source:hackread.com
Source: hackread.com – Author: Waqas. A newly released advisory from the FBI and Canada’s Cyber Centre warns of an ongoing cyber espionage campaign by a China-linked...
China-linked LapDogs Campaign Drops ShortLeash Backdoor with Fake Certs – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. Cybersecurity experts at SecurityScorecard have discovered a widespread cyber espionage operation, dubbed LapDogs, which has compromised an unknown number of...
1inch rolls out expanded bug bounties with rewards up to $500K – Source:hackread.com
Source: hackread.com – Author: CyberNewswire. DUBAI, United Arab Emirates, June 23rd, 2025, CyberNewsWire Five dedicated bug bounty programs upgraded across 1inch core components, including smart contracts,...
Speaker Proposal Deadline Approaches for OpenSSL Conference 2025 in Prague – Source:hackread.com
Source: hackread.com – Author: CyberNewswire. Newark, United States, June 23rd, 2025, CyberNewsWire The OpenSSL Corporation and the OpenSSL Foundation are issuing a final call for speaker...
Fake DMV Texts Scam Hit Thousands in Widespread Phishing Campaign – Source:hackread.com
Source: hackread.com – Author: Waqas. A series of fraudulent text messages impersonating state Departments of Motor Vehicles (DMVs) has spread throughout the United States tricking thousands...
Fake Minecraft Mods on GitHub Found Stealing Player Data – Source:hackread.com
Source: hackread.com – Author: Waqas. A new malware campaign has been targeting Minecraft players through fake mod downloads, according to recent findings from Check Point Research...
Zyxel Devices Hit by Active Exploits Targeting CVE-2023-28771 Vulnerability – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. A serious security vulnerability, tracked as CVE-2023-28771, is affecting Zyxel networking devices. Security researchers at GreyNoise noticed a sudden sharp...
Echo Chamber Jailbreak Tricks LLMs Like OpenAI and Google into Generating Harmful Content – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers are calling attention to a new jailbreaking method called Echo Chamber that could be leveraged to trick popular large...
DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes – Source:thehackernews.com
Source: thehackernews.com – Author: . The United States government has warned of cyber attacks mounted by pro-Iranian groups after it launched airstrikes on Iranian nuclear sites...
XDigo Malware Exploits Windows LNK Flaw in Eastern European Government Attacks – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have uncovered a Go-based malware called XDigo that has been used in attacks targeting Eastern European governmental entities in...
How AI-Enabled Workflow Automation Can Help SOCs Reduce Burnout – Source:thehackernews.com
Source: thehackernews.com – Author: . It sure is a hard time to be a SOC analyst. Every day, they are expected to solve high-consequence problems with...
Google Adds Multi-Layered Defenses to Secure GenAI from Prompt Injection Attacks – Source:thehackernews.com
Source: thehackernews.com – Author: . Google has revealed the various safety measures that are being incorporated into its generative artificial intelligence (AI) systems to mitigate emerging...
16 Billion Stolen Logins for Apple, Google, Facebook and More: How to Stay Safe – Source:www.mcafee.com
Source: www.mcafee.com – Author: Jasdev Dhaliwal. Reports last week detail a “16 billion password leak”, with major news outlets worldwide proclaiming this as one of the...
Largest DDoS Attack to Date – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier It was a recently unimaginable 7.3 Tbps: The vast majority of the attack was delivered in the form of User...
743,000 Impacted by McLaren Health Care Data Breach – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Michigan healthcare provider McLaren Health Care is notifying over 743,000 people that their personal information was compromised in a 2024...
McLaren Health Care data breach impacted over 743,000 people – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The ransomware attack that hit McLaren Health Care in 2024 exposed the personal data of 743,000 individuals. McLaren Health Care...
American steel giant Nucor confirms data breach in May attack – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini American steel giant Nucor confirms hackers stole data in a May cyberattack, following its earlier disclosure of the incident. Nucor,...
The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini UK’s Cyber Monitoring Centre (CMC) labels Marks & Spencer and Co-op cyberattacks a Category 2 event, estimating financial impact at...
Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes’ Data from Saudi Games – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Cyber Fattah leaked thousands of records on athletes and visitors from past Saudi Games, per U.S.-based cybersecurity firm Resecurity. Resecurity...
Qilin ransomware gang now offers a “Call Lawyer” feature to pressure victims – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Qilin ransomware gang now offers a “Call Lawyer” feature to help affiliates pressure victims into paying, per Cybereason. The Qilin...
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50 – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits....
Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs...
US Warns of Heightened Risk of Iranian Cyber-Attacks After Military Strikes – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The US government has warned of a heightened risk of cyber-attacks by Iran state-sponsored threat actors and hacktivist groups following American military...
Cyber Essentials Breaks Quarterly Record for Certifications – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The UK government’s flagship cyber-resilience scheme received a boost late last week with new figures revealing quarterly certifications had surpassed the 10,000...
Chinese “LapDogs” ORB Network Targets US and Asia – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: China-nexus actors are using a network of Operational Relay Boxes (ORBs) including compromised connected devices to target victims in the US and...
⚡ Weekly Recap: Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More – Source:thehackernews.com
Source: thehackernews.com – Author: . Not every risk looks like an attack. Some problems start as small glitches, strange logs, or quiet delays that don’t seem...
SparkKitty, SparkCat’s little brother: A new Trojan spy found in the App Store and Google Play – Source: securelist.com
Source: securelist.com – Author: Sergey Puzan, Dmitry Kalinin In January 2025, we uncovered the SparkCat spyware campaign, which was aimed at gaining access to victims’ crypto...
Threat Casting a Nation State Attack on Critical Infrastructure Scenario at CognectCon2025 – Source: securityboulevard.com
Source: securityboulevard.com – Author: Matthew Rosenquist During exercises at CognectCon2025 a number of cyberattack scenarios were discussed that highlighted the risks of cyber attackers leveraging cognitive...
Feel Reassured with Advanced Secrets Scanning Technologies – Source: securityboulevard.com
Source: securityboulevard.com – Author: Alison Mack Are You Ready for the Future of Cybersecurity? Cybersecurity is not just about human identities anymore. A rising segment of...