logo SOCFeed

Related News Stories

Stories grouped by similar topics and content

📰 Anatsa Trojan Strikes Google Play Again

2 related articles · 92% similarity

The Anatsa Android banking trojan has reappeared on Google Play, disguised as a PDF viewer, impacting over 90,000 users. This malicious app steals banking credentials, highlighting the ongoing threat of malware on official app stores.

2 posts

Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play

Cybersecurity researchers have discovered an Android banking malware campaign that has leveraged a trojan named Anatsa to target users in North Americ...

The Hacker News
Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play

Android malware Anatsa infiltrates Google Play to target US banks

The Anatsa banking trojan has sneaked into Google Play once more via an app posing as a PDF viewer that counted more than 50,000 downloads. [...]...

BleepingComputer
📰 Chinese Hacker

4 related articles · 89% similarity

Xu Zewei, a Chinese national allegedly linked to the state-sponsored hacking group Silk Typhoon (also known as Hafnium), was arrested in Milan, Italy. He faces multiple charges related to cyberespionage, including wire fraud and identity theft, stemming from attacks targeting US entities. The arrest highlights ongoing efforts to combat state-sponsored cybercrime.

4 posts

Suspected Hacker Linked to Silk Typhoon Arrested in Milan

The alleged Chinese state-sponsored hacker faces multiple charges, including wire fraud, aggravated identity theft, and unauthorized access to protect...

darkreading
Suspected Hacker Linked to Silk Typhoon Arrested in Milan

Alleged Chinese hacker tied to Silk Typhoon arrested for cyberespionage

A Chinese national was arrested in Milan, Italy, last week for allegedly being linked to the state-sponsored Silk Typhoon hacking group, which respons...

BleepingComputer

Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks

A Chinese national has been arrested in Milan, Italy, for his alleged links to a state-sponsored hacking group known as Silk Typhoon and for carrying ...

The Hacker News
Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks

Alleged Chinese State Hacker Wanted by US Arrested in Italy

Xu Zewei has been arrested on charges that he is a member of the Chinese state-sponsored hacking group Hafnium (Silk Typhoon). The post Alleged Chines...

SecurityWeek
📰 Urgent SAP NetWeaver Security Patches Released

2 related articles · 85% similarity

SAP has issued critical security updates for NetWeaver and Business Objects products to address vulnerabilities allowing remote code execution and potential system takeover. These flaws could enable attackers to compromise systems completely, so immediate patching is strongly recommended.

2 posts

SAP Patches Critical Flaws That Could Allow Remote Code Execution, Full System Takeover

SAP has released patches for multiple insecure deserialization vulnerabilities in NetWeaver that could lead to full system compromise. The post SAP Pa...

SecurityWeek

Patchday SAP: NetWeaver-Produkte sind für Schadcode-Attacken anfällig

Angreifer können unter anderem SAP NetWeaver-Produkte und Business Objects attackieren. Sicherheitsupdates stehen zum Download bereit. ...

heise security News
Patchday SAP: NetWeaver-Produkte sind für Schadcode-Attacken anfällig
📰 Microsoft Patches Windows 10 & 11

2 related articles · 83% similarity

Microsoft released cumulative updates KB5062554 for Windows 10 (versions 22H2 and 21H2) and KB5062553 & KB5062552 for Windows 11 (versions 24H2 and 23H2), addressing various security vulnerabilities and bugs with multiple fixes and changes.

2 posts

Windows 10 KB5062554 cumulative update released with 13 changes, fixes

Microsoft has released the KB5062554 cumulative update for Windows 10 22H2 and Windows 10 21H2, with thirteen new fixes or changes. [...]...

BleepingComputer

Windows 11 KB5062553 & KB5062552 cumulative updates released

Microsoft has released Windows 11 KB5062553 and KB5062552 cumulative updates for versions 24H2 and 23H2 to fix security vulnerabilities and issues. [....

BleepingComputer
📰 Urgent Adobe Patches: Critical Security Flaws Fixed

2 related articles · 83% similarity

Adobe has released critical security updates addressing vulnerabilities in multiple applications, including After Effects and Illustrator, which could lead to denial-of-service attacks and code execution. These patches are crucial for users to protect their systems from potential exploits.

2 posts

Patchday: Adobe schützt After Effects & Co. vor möglichen Attacken

Mehrere Adobe-Anwendungen sind unter anderem für DoS- und Schadcode-Attacken anfällig. Sicherheitsupdates schaffen Abhilfe. ...

heise security News
Patchday: Adobe schützt After Effects & Co. vor möglichen Attacken

Adobe Patches Critical Code Execution Bugs

Adobe patches were also released for medium-severity flaws in After Effects, Audition, Dimension, Experience Manager Screens, FrameMaker, Illustrator,...

SecurityWeek
📰 Microsoft July Patch Tuesday: Critical Vulnerabilities Fixed

6 related articles · 76% similarity

Microsoft's July 2025 Patch Tuesday addressed over 130 vulnerabilities across various products, including critical flaws in SharePoint, Office, SQL Server, and SPNEGO. The updates included at least one publicly disclosed zero-day vulnerability, highlighting the importance of promptly applying security patches.

6 posts

Patchday: Microsoft schließt 100.000-$-Lücke in SharePoint aus Hacker-Wettbewerb

Update-Sammlung veröffentlicht: Um Attacken vorzubeugen, sollten Admins sicherstellen, dass ihre Microsoft-Produkte auf dem aktuellen Stand sind. ...

heise security News
Patchday: Microsoft schließt 100.000-$-Lücke in SharePoint aus Hacker-Wettbewerb

July Patch Tuesday: 14 critical Microsoft vulnerabilities, one SAP hole rated at 10 in severity

Microsoft’s July Patch Tuesday fixes are a mix of good news and bad news for CSOs: Fourteen of the vulnerabilities are rated as...

CSO Online
July Patch Tuesday: 14 critical Microsoft vulnerabilities, one SAP hole rated at 10 in severity

Microsoft Patches 137 CVEs in July, but No Zero-Days

Some 17 of the bugs are at high risk for exploits, including multiple remote code execution bugs in Office and SharePoint. ...

darkreading
Microsoft Patches 137 CVEs in July, but No Zero-Days

Microsoft Patches 130 Vulnerabilities, Including Critical Flaws in SPNEGO and SQL Server

For the first time in 2025, Microsoft's Patch Tuesday updates did not bundle fixes for exploited security vulnerabilities, but acknowledged one of the...

The Hacker News
Microsoft Patches 130 Vulnerabilities, Including Critical Flaws in SPNEGO and SQL Server

Microsoft Patches 130 Vulnerabilities for July 2025 Patch Tuesday

Patch Tuesday July 2025: Microsoft rolled out fixes for 130 vulnerabilities, including a zero-day in SQL Server. The post Microsoft Patches 130 Vulner...

SecurityWeek

Microsoft July 2025 Patch Tuesday fixes one zero-day, 137 flaws

Today is Microsoft's July 2025 Patch Tuesday, which includes security updates for 137 flaws, including one publicly disclosed zero-day vulnerability i...

BleepingComputer
📰 Batavia Spyware Targets Russian Firms

2 related articles · 90% similarity

A new, previously unknown Windows spyware, dubbed 'Batavia,' is actively targeting numerous large Russian industrial organizations. The campaign involves phishing emails delivering the malware, resulting in the theft of sensitive documents and data.

2 posts

Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms

Russian organizations have been targeted as part of an ongoing campaign that delivers a previously undocumented Windows spyware called Batavia. The ac...

The Hacker News
Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms

'Batavia' Windows spyware campaign targets dozens of Russian orgs

A previously undocumented spyware called 'Batavia' has been targeting large industrial enterprises in Russia in a phishing email campaign that uses co...

BleepingComputer
📰 Malicious Chrome Extensions Infect Millions

2 related articles · 81% similarity

Multiple malicious Chrome extensions, totaling over 1.8 million downloads, have been discovered in the Chrome Web Store. These extensions steal user data, hijack sessions, and redirect users to malicious websites, highlighting security vulnerabilities in the platform.

2 posts

Malicious Chrome extensions with 1.7M installs found on Web Store

Almost a dozen malicious extensions with 1.7 million downloads in Google's Chrome Web Store could track users, steal browser activity, and redirect to...

BleepingComputer

Chrome Store Features Extension Poisoned With Sophisticated Spyware

A color picker for Google's browser with more than 100,000 downloads hijacks sessions every time a user navigates to a new webpage and also redirects ...

darkreading
Chrome Store Features Extension Poisoned With Sophisticated Spyware
📰 Shellter Tool Abuse: Malware Spreads

5 related articles · 79% similarity

Hackers are exploiting a leaked legitimate penetration testing tool, Shellter Elite, to distribute various malware strains, including infostealers like Lumma and Rhadamanthys. This highlights the risk of repurposing security tools for malicious purposes and underscores the need for stronger security practices and oversight.

5 posts

Hackers 'Shellter' Various Stealers in Red-Team Tool to Evade Detection

Researchers have uncovered multiple campaigns spreading Lumma, Arechclient2, and Rhadamanthys malware by leveraging key features of the AV/EDR evasion...

darkreading
Hackers 'Shellter' Various Stealers in Red-Team Tool to Evade Detection

Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware

In yet another instance of threat actors repurposing legitimate tools for malicious purposes, it has been discovered that hackers are exploiting a pop...

The Hacker News
Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware

Discovery of compromised Shellter security tool raises disclosure debate

CISOs whose staff use the commercial Shellter Elite antivirus evasion software to detect vulnerabilities need to immediately up...

CSO Online
Discovery of compromised Shellter security tool raises disclosure debate

Legitimate Shellter Pen-Testing Tool Used in Malware Attacks

A stolen copy of Shellter Elite shows how easily legitimate security tools can be repurposed by threat actors when vetting and oversight fail. The pos...

SecurityWeek

Hackers abuse leaked Shellter red team tool to deploy infostealers

Shellter Project, the vendor of a commercial AV/EDR evasion loader for penetration testing, confirmed that hackers used its Shellter Elite product in ...

BleepingComputer
📰 Brazil Bank Heist: $140M Stolen, Employee Arrested

3 related articles · 85% similarity

A Brazilian central bank service provider, C&M, was hacked, resulting in a $140 million theft from six banks. An employee, João Roque, was arrested and allegedly sold credentials for a paltry $920, enabling the heist. The incident highlights the significant risk posed by insider threats.

3 posts

Employee arrested after Brazil’s central bank service provider hacked for US $140 million

This month could barely have started any worse for some financial institutions in Brazil. Approximately US $140 million was stolen from the reserve...

Graham Cluley

Employee gets $920 for credentials used in $140 million bank heist

Hackers stole nearly $140 million from six banks in Brazil by using an employee's credentials from C&M, a company that offers financial connectivi...

BleepingComputer

Police in Brazil Arrest a Suspect Over $100M Banking Hack

Officials identified the suspect as João Roque, a C&M employee who worked in information technology and allegedly helped others gain unauthorized ...

SecurityWeek
📰 NightEagle APT Targets China via Exchange Flaw

2 related articles · 94% similarity

The previously unknown NightEagle APT group (APT-Q-95) exploited a Microsoft Exchange vulnerability to spy on Chinese government, military, and technology sectors. Researchers uncovered the sophisticated attacks, highlighting the ongoing threat posed by advanced persistent threats leveraging known software weaknesses.

2 posts

NightEagle hackers exploit Microsoft Exchange flaw to spy on China’s strategic sectors

A previously undocumented Advanced Persistent Threat (APT) group, “NightEagle,” has been found targeting the Chinese government...

CSO Online
NightEagle hackers exploit Microsoft Exchange flaw to spy on China’s strategic sectors

NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors

Cybersecurity researchers have shed light on a previously undocumented threat actor called NightEagle (aka APT-Q-95) that has been observed targeting ...

The Hacker News
NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors
📰 Critical Sudo Flaws Threaten Linux Systems

2 related articles · 90% similarity

Two newly discovered vulnerabilities in the Sudo utility for Linux systems allow local users to gain root privileges. These flaws, one dating back 12 years, impact major Linux distributions and require immediate patching to mitigate significant security risks.

2 posts

How a 12-year-old bug in Sudo is still haunting Linux users

Two new vulnerabilities have been found in Sudo, a privileged command-line tool installed on Linux systems, that can allow priv...

CSO Online
How a 12-year-old bug in Sudo is still haunting Linux users

Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros

Cybersecurity researchers have disclosed two security flaws in the Sudo command-line utility for Linux and Unix-like operating systems that could enab...

The Hacker News
Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros
📰 Ingram Micro Hit by Major Ransomware Attack

7 related articles · 85% similarity

A ransomware attack, specifically SafePay, caused a widespread outage at Ingram Micro, affecting its website and internal systems. The incident disrupted customer services and triggered a multi-day scramble to restore operations, with the company yet to disclose the full extent of the breach.

7 posts

IT-Vorfall bei Distributor Ingram Micro

Die Webseite des IT-Distributors Ingram Micro zeigt derzeit lediglich den Wartungsmodus an. Ursache ist ein IT-Vorfall....

heise security News
IT-Vorfall bei Distributor Ingram Micro

Technical difficulties or cyber attack? Ingram Micro’s website goes down just in time for the holiday weekend

Nothing says "Holiday Weekend" like a mysterious IT outage....

Graham Cluley

Ingram Micro suffers global outage as internal systems inaccessible

IT giant Ingram Micro is experiencing a global outage that is impacting its websites and internal systems, with customers concerned that it may be a c...

BleepingComputer

Ingram Micro outage caused by SafePay ransomware attack

An ongoing outage at IT giant Ingram Micro is caused by a SafePay ransomware attack that led to the shutdown of internal systems, BleepingComputer has...

BleepingComputer

Ransomware Attack Triggers Widespread Outage at Ingram Micro

The outage began shortly before the July 4 holiday weekend and caused disruptions for customer ordering and other services provided by the IT distribu...

darkreading
Ransomware Attack Triggers Widespread Outage at Ingram Micro

Ingram Micro Scrambling to Restore Systems After Ransomware Attack

The IT products and services giant did not say how the intrusion occurred or whether any data was stolen from its systems. The post Ingram Micro Scram...

SecurityWeek

Ingram Micro confirms ransomware attack after days of downtime

Ingram Micro is facing a major cybersecurity crisis as a ransomware attack has triggered a multi-day IT outage, disrupting serv...

CSO Online
Ingram Micro confirms ransomware attack after days of downtime
📰 Hunters International Ransomware Shuts Down

5 related articles · 86% similarity

Hunters International, a ransomware-as-a-service (RaaS) operation, has ceased its ransomware activities and released free decryptors. The group has rebranded as World Leaks, shifting its focus from ransomware to pure data extortion. Concerns remain about the group's future activities under its new name.

5 posts

'Hunters International' RaaS Group Closes Its Doors

The announcement comes just months after security researchers observed that the group was making the transition to rebrand to World Leaks, a data thef...

darkreading
'Hunters International' RaaS Group Closes Its Doors

Hunters International Shuts Down, Offers Free Decryptors as It Morphs Into World Leaks

The notorious Hive successor ceases ransomware operations but pivots to pure data extortion under the new World Leaks brand. The post Hunters Internat...

SecurityWeek

Hunters International ransomware shuts down, releases free decryptors

​The Hunters International Ransomware-as-a-Service (RaaS) operation announced today that it has officially closed down its operations and will offer f...

BleepingComputer

Hunters International ransomware group shuts down – but will it regroup under a new guise?

The notorious Hunters International ransomware-as-a-service operation has announced that it has shut down, in a message posted on its dark web leak si...

Graham Cluley

Hunters International shuts ransomware operations, reportedly becomes an extortion-only gang

Ransomware gang Hunters International says it’s shutting down its operations for unexplained reasons, and is offering decryptio...

CSO Online
Hunters International shuts ransomware operations, reportedly becomes an extortion-only gang
📰 Catwatchful Spyware Leaks 62,000 User Data

2 related articles · 82% similarity

A security flaw in the Catwatchful Android stalkerware app exposed the personal information of over 62,000 users, including usernames, passwords, and device data. This data breach highlights the significant risks associated with stalkerware and the need for stronger security measures.

2 posts

Catwatchful stalkerware app spills secrets of 62,000 users – including its own admin

Another scummy stalkerware app has spilled its guts, revealing the details of its 62,000 users - and data from thousands of victims' infected devices....

Graham Cluley

Undetectable Android Spyware Backfires, Leaks 62,000 User Logins

A vulnerability in the Catwatchful spyware allowed a security researcher to retrieve the usernames and passwords of over 62,000 accounts. The post Und...

SecurityWeek
📰 Urgent Grafana Security Patches Released

2 related articles · 82% similarity

Grafana has issued critical security updates addressing four Chromium vulnerabilities, including a zero-day actively exploited in the wild. These vulnerabilities affect the Image Renderer plugin and Synthetic Monitoring, potentially allowing remote code execution and memory corruption.

2 posts

Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild

CVE-2025-6554 and three other Chromium vulnerabilities could allow attackers to execute code and corrupt memory remotely. The post Grafana Patches Chr...

SecurityWeek

Grafana releases critical security update for Image Renderer plugin

Grafana Labs has addressed four Chromium vulnerabilities in critical security updates for the Grafana Image Renderer plugin and Synthetic Monitoring A...

BleepingComputer
📰 IDE Extensions: A Hidden Software Supply Chain Threat

2 related articles · 77% similarity

Research reveals malicious IDE extensions are bypassing verification systems in popular development environments like Visual Studio Code and IntelliJ IDEA. These extensions exploit trust badges to compromise developer systems and introduce vulnerabilities into the software supply chain.

2 posts

Verified, but vulnerable: Malicious extensions exploit IDE trust badges

Developers across popular integrated development environments (IDEs) like Visual Studio Code, Visual Studio, IntelliJ IDEA, and...

CSO Online
Verified, but vulnerable: Malicious extensions exploit IDE trust badges

IDE Extensions Pose Hidden Risks to Software Supply Chain

Malicious extensions can be engineered to bypass verification checks for popular integrated development environments, according to research from OX Se...

darkreading
IDE Extensions Pose Hidden Risks to Software Supply Chain
📰 40+ Fake Firefox Extensions Steal Crypto

3 related articles · 85% similarity

Over 40 malicious Firefox extensions, disguised as legitimate cryptocurrency wallet add-ons, have been discovered stealing user funds. These extensions, found in the official Firefox add-on store, target cryptocurrency wallets, highlighting a significant security risk for users. Researchers urge users to review and remove any suspicious extensions immediately.

3 posts

"FoxyWallet": Mehr als 40 bösartige Firefox-Add-ons entdeckt

IT-Sicherheitsforscher haben eine groß angelegte Kampagne mit bösartigen Firefox-Add-ons entdeckt. Die räumen Krypto-Wallets leer....

heise security News
"FoxyWallet": Mehr als 40 bösartige Firefox-Add-ons entdeckt

Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets

Cybersecurity researchers have uncovered over 40 malicious browser extensions for Mozilla Firefox that are designed to steal cryptocurrency wallet sec...

The Hacker News
Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets

Dozens of fake wallet add-ons flood Firefox store to drain crypto

More than 40 fake extensions in Firefox's official add-ons store are impersonating popular cryptocurrency wallets from trusted providers to steal wall...

BleepingComputer
📰 Cisco Patches Critical Unified CM Flaw

5 related articles · 85% similarity

Cisco addressed a critical vulnerability in its Unified Communications Manager (Unified CM) software. The flaw involved hardcoded root SSH credentials, granting attackers complete control. Security updates have been released to mitigate this maximum-severity risk.

5 posts

Cisco entfernt SSH-Hintertür in Unified Communications Manager

Der Netzwerkausrüster Cisco hat Sicherheitslücken in verschiedenen Produkten geschlossen. Eine Lücke gilt als kritisch. ...

heise security News
Cisco entfernt SSH-Hintertür in Unified Communications Manager

Hardcoded root credentials in Cisco Unified CM trigger max-severity alert

Cisco (Nasdaq:CSCO) has patched a max severity flaw in its Unified Communications Manager (Unified CM) and Session Management E...

CSO Online
Hardcoded root credentials in Cisco Unified CM trigger max-severity alert

Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials

Cisco has released security updates to address a maximum-severity security flaw in Unified Communications Manager (Unified CM) and Unified Communicati...

The Hacker News
Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials

Cisco Warns of Hardcoded Credentials in Enterprise Software

Hardcoded SSH credentials in Cisco Unified CM and Unified CM SME could allow attackers to execute commands as root. The post Cisco Warns of Hardcoded ...

SecurityWeek

Cisco warns that Unified CM has hardcoded root SSH credentials

Cisco has removed a backdoor account from its Unified Communications Manager (Unified CM), which would have allowed remote attackers to log in to unpa...

BleepingComputer
📰 Critical Flaw in Anthropic's MCP Inspector

2 related articles · 82% similarity

A critical remote code execution vulnerability in Anthropic's MCP Inspector debugging tool allows attackers to execute malicious code on developer machines. This flaw poses a significant security risk, impacting both developers and the security of AI systems under development.

2 posts

KI-Debugging-Tool MCP Inspector: Codeausführung durch Sicherheitslücke möglich

In Anthropics MCP-Inspector, einem Debugging-Tool für MCP-Server, klafft eine kritische Sicherheitslücke. Sie erlaubt das Ausführen von Schadcode....

heise security News
KI-Debugging-Tool MCP Inspector: Codeausführung durch Sicherheitslücke möglich

Critical RCE flaw in Anthropic’s MCP inspector exposes developer machines to remote attacks

A critical remote code execution (RCE) bug in Anthropic’s Model Context Protocol (MCP) inspector tool could allow attackers to ...

CSO Online
Critical RCE flaw in Anthropic’s MCP inspector exposes developer machines to remote attacks
📰 NK Hackers Target Crypto with Nim Malware

5 related articles · 81% similarity

North Korean state-sponsored hackers are employing a new macOS malware, NimDoor, to target Web3 and cryptocurrency companies. The malware, delivered via fake Zoom updates and other social engineering tactics, is designed to steal cryptocurrency and boasts self-revival capabilities. This campaign highlights the escalating sophistication of North Korean cyberattacks.

5 posts

North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign

Threat actors with ties to North Korea have been observed targeting Web3 and cryptocurrency-related businesses with malware written in the Nim program...

The Hacker News
North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign

North Korean Hackers Use Fake Zoom Updates to Install macOS Malware

SentinelOne says the fake Zoom update scam delivers ‘NimDoor’, a rare Nim-compiled backdoor. The post North Korean Hackers Use Fake Zoom Updates to In...

SecurityWeek

DPRK macOS 'NimDoor' Malware Targets Web3, Crypto Platforms

Researchers observed North Korean threat actors targeting cryptocurrency and Web3 platforms on Telegram using malicious Zoom meeting requests. ...

darkreading
DPRK macOS 'NimDoor' Malware Targets Web3, Crypto Platforms

North Korean crypto thieves deploy custom Mac backdoor

North Korean threat actors are targeting companies from the Web3 and crypto industries with a backdoor designed for macOS w...

CSO Online
North Korean crypto thieves deploy custom Mac backdoor

NimDoor crypto-theft macOS malware revives itself when killed

North Korean state-backed hackers have been using a new family of macOS malware called NimDoor in a campaign that targets web3 and cryptocurrency orga...

BleepingComputer
📰 Qantas Data Breach: 6M Customers Affected, Extortion Demand

3 related articles · 81% similarity

A data breach at Qantas potentially exposed personal information of 6 million customers. The breach, originating from a third-party call center platform, led to an extortion attempt by cybercriminals. While passport and credit card details were reportedly not compromised, other sensitive information may have been accessed.

3 posts

Qantas Airlines Breached, Impacting 6M Customers

Passengers' personal information was likely accessed via a third-party platform used at a call center, but didn't include passport or credit card info...

darkreading
Qantas Airlines Breached, Impacting 6M Customers

Qantas Hit with Extortion Demand After Data Breach

The Australian airline says a cybercriminal attempted to extort it after customer data was stolen from a contact center. The post Qantas Hit with Exto...

SecurityWeek

Qantas is being extorted in recent data-theft cyberattack

Qantas has confirmed that it is now being extorted by threat actors following a cyberattack that potentially exposed the data for 6 million customers....

BleepingComputer
📰 xAI's Grok 4: Coding AI Challenger

2 related articles · 81% similarity

xAI is launching Grok 4, a powerful new coding-focused AI model, bypassing Grok 3.5 to directly compete with Google's Gemini and Anthropic's Claude. The model is expected to release soon after the US Independence Day and boasts advanced coding capabilities.

2 posts

xAI prepares Grok 4 Code as it plans to take on Claude and Gemini

xAI is preparing the rollout of Grok 4, which replaces Grok 3 as the new state-of-the-art model. [...]...

BleepingComputer

Grok 4 spotted ahead of launch with special coding features

Elon Musk-funded xAI is skipping Grok 3.5 and releasing Grok 4 after Independence Day in the United States. [...]...

BleepingComputer
📰 Urgent: Citrix NetScaler Flaw Exploited, Patch Now!

3 related articles · 79% similarity

Critical vulnerabilities in Citrix NetScaler (CVE-2025-5777, dubbed CitrixBleed2) allow authentication bypass and denial-of-service attacks; public exploits are now available, urging immediate patching to mitigate risks.

3 posts

Citrix warns of login issues after NetScaler auth bypass patch

Citrix warns that patching recently disclosed vulnerabilities that can be exploited to bypass authentication and launch denial-of-service attacks may ...

BleepingComputer

Exploits, Technical Details Released for CitrixBleed2 Vulnerability

Researchers released technical information and exploit code targeting a critical vulnerability (CVE-2025-5777) in Citrix NetScaler. The post Exploits,...

SecurityWeek

Public exploits released for Citrix Bleed 2 NetScaler flaw, patch now

Researchers have released proof-of-concept (PoC) exploits for a critical Citrix NetScaler vulnerability, tracked as CVE-2025-5777 and dubbed CitrixBle...

BleepingComputer
📰 ClickFix & FileFix Attacks Surge

3 related articles · 79% similarity

Sophisticated social engineering attacks, like ClickFix and FileFix, are exploiting browser vulnerabilities and user behavior to execute malicious scripts. These attacks are rapidly increasing, bypassing security measures and posing a significant threat to organizations. The attacks involve tricking users into manipulating downloaded files, resulting in code execution.

3 posts

FileFix Attack Chain Enables Malicious Script Execution

By using social engineering tactics, threat actors are able to manipulate their victims into saving and renaming files that will backfire against them...

darkreading
FileFix Attack Chain Enables Malicious Script Execution

ClickFix Spin-Off Attack Bypasses Key Browser Safeguards

A new threat vector exploits how modern browsers save HTML files, bypassing Mark of the Web and giving attackers another social-engineering attack for...

darkreading
ClickFix Spin-Off Attack Bypasses Key Browser Safeguards

Sixfold surge of ClickFix attacks threatens corporate defenses

Incidents of ClickFix — the social engineering attack technique that tricks users into executing malicious code — are skyrocket...

CSO Online
Sixfold surge of ClickFix attacks threatens corporate defenses
📰 Cartel Hacks FBI Surveillance Systems

2 related articles · 76% similarity

A Mexican drug cartel exploited compromised FBI surveillance technology, highlighting the risk of unintended consequences from widespread surveillance. The incident underscores how easily such systems can be repurposed by malicious actors, emphasizing the importance of robust security measures.

2 posts

Surveillance Used by a Drug Cartel

Once you build a surveillance system, you can’t control who will use it: A hacker working for the Sinaloa drug cartel was able to obtain an FBI offici...

Schneier on Security

Smashing Security podcast #424: Surveillance, spyware, and self-driving snafus

A Mexican drug cartel spies on the FBI using traffic cameras and spyware — because "ubiquitous technical surveillance” is no longer just for dystopian...

Graham Cluley
📄 Individual Stories

112 unique articles

IT-Security-Pros: Firmen locken lieber mit Work-Life-Balance als hohem Gehalt

Arbeitgeber legen bei der Suche nach IT-Security-Fachpersonal inzwischen weniger Wert auf den Uni-Abschluss, wie eine Analyse zeigt....

heise security News
IT-Security-Pros: Firmen locken lieber mit Work-Life-Balance als hohem Gehalt

Unpatched Ruckus Vulnerabilities Allow Wireless Environment Hacking

Multiple vulnerabilities in Ruckus Wireless management products could be exploited to fully compromise the managed environments. The post Unpatched Ru...

SecurityWeek

Canadian Electric Utility Says Power Meters Disrupted by Cyberattack

Nova Scotia Power is notifying individuals affected by the recent data breach, including in the United States. The post Canadian Electric Utility Says...

SecurityWeek

Trump seeks unprecedented $1.23 billion cut to federal cyber budget

Donald Trump’s sprawling tax bill, which he signed on July 4, contained a few noteworthy cyber funding items, including $250 mi...

CSO Online
Trump seeks unprecedented $1.23 billion cut to federal cyber budget

Ivanti, Fortinet, Splunk Release Security Updates

Ivanti, Fortinet, and Splunk have released patches for critical- and high-severity vulnerabilities in their products. The post Ivanti, Fortinet, Splun...

SecurityWeek

How CISOs are training the next generation of cyber leaders

It’s easy for cybersecurity leaders to get caught up on the day-to-day of making sure teams are delivering and risks are being ...

CSO Online
How CISOs are training the next generation of cyber leaders

Neue Sicherheitslücken in verschiedenen modernen Ryzen und Epyc Prozessoren AMDs

Die als mittelmäßig gefährlich eingestuften Schwächen wurden von Microsoft erkannt und bislang wohl nicht angegriffen. Einen Linux-Patch gibt es berei...

heise security News
Neue Sicherheitslücken in verschiedenen modernen Ryzen und Epyc Prozessoren AMDs

South Korean Government Imposes Penalties on SK Telecom for Breach

Following a breach at the country's top mobile provider that exposed 27 million records, the South Korean government imposed a small monetary penalty ...

darkreading
South Korean Government Imposes Penalties on SK Telecom for Breach

5 Jahre nach großem Microsoft-Exchange-Einbruch: Chinese verhaftet

Hunderttausende MS-Exchange-Server wurden 2020-2021 geknackt. Nun wollen die USA dafür einen Chinesen vor Gericht stellen. Er befindet sich in Italien...

heise security News
5 Jahre nach großem Microsoft-Exchange-Einbruch: Chinese verhaftet

Malicious Open Source Packages Spike 188% YoY

Data exfiltration was the most common malware in Sonatype report, with more than 4,400 packages designed to steal secrets, personally identifiable inf...

darkreading
Malicious Open Source Packages Spike 188% YoY

Samsung announces major security enhancements coming to One UI 8

Samsung has announced multiple data security and privacy enhancements for its upcoming Galaxy smartphones running One UI 8, its custom user interface ...

BleepingComputer

M&S confirms social engineering led to massive ransomware attack

M&S confirmed today that the retail outlet's network was initially breached in a "sophisticated impersonation attack" that ultimately led to a Dra...

BleepingComputer

New Android TapTrap attack fools users with invisible UI trick

A novel tapjacking technique can exploit user interface animations to bypass Android's permission system and allow access to sensitive data or trick u...

BleepingComputer

Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials

The warning came after the department discovered that an impostor attempted to reach out to at least three foreign ministers, a U.S. senator and a gov...

SecurityWeek

'Save Our Signs' Wants to Save the Real History of National Parks Before Trump Erases It

Data preservationists and archivists have been working tirelessly since the election of President Donald Trump to save websites, data, and public i...

404 Media
'Save Our Signs' Wants to Save the Real History of National Parks Before Trump Erases It

The Wild West of Agentic AI – An Attack Surface CISOs Can’t Afford to Ignore

As organizations rush to adopt agentic AI, security leaders must confront the growing risk of invisible threats and new attack vectors. The post The W...

SecurityWeek

The AI Fix #58: An AI runs a shop into the ground, and AI’s obsession with the number 27

In episode 58 of "The AI Fix" podcast, our hosts discover a pair of AI headphones that don't electrocute you, Microsoft invents "medical superintellig...

Graham Cluley

Overcoming Technical Barriers in Desktop and Application Virtualization

Exposed RDP ports are an open door for attackers. TruGrid SecureRDP enforces Zero Trust and MFA, blocks lateral movement, and secures remote access—no...

BleepingComputer

4 Critical Steps in Advance of 47-Day SSL/TLS Certificates

With certificate lifespans set to shrink by 2029, IT teams need to spend the next 100 days planning in order to avoid operational disruptions. ...

darkreading
4 Critical Steps in Advance of 47-Day SSL/TLS Certificates

Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension

Cybersecurity researchers have flagged a supply chain attack targeting a Microsoft Visual Studio Code (VS Code) extension called Ethcode that has been...

The Hacker News
Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension

Researchers Jailbreak AI by Flooding It With Bullshit Jargon

You can trick AI chatbots like ChatGPT or Gemini into teaching you how to make a bomb or hack an ATM if you make the question complicated, full of aca...

404 Media
Researchers Jailbreak AI by Flooding It With Bullshit Jargon

Checking for Fraud: Texas Community Bank Nips Check Fraud in the Bud

Within months of implementing anti-fraud measures and automation, Texas National Bank prevented more than $300,000 in check fraud. ...

darkreading
Checking for Fraud: Texas Community Bank Nips Check Fraud in the Bud

Server offline: Angreifer kapern PCs mit Lücke in "Call of Duty WW2"

"Call of Duty WW2"wurde erst bei Microsofts Game Pass wiederveröffentlicht, nun ist das Spiel vorerst offline. Unbekannte griffen Spieler-PCs per Expl...

heise security News
Server offline: Angreifer kapern PCs mit Lücke in "Call of Duty WW2"

5 Ways Identity-based Attacks Are Breaching Retail

From overprivileged admin roles to long-forgotten vendor tokens, these attackers are slipping through the cracks of trust and access. Here’s how five ...

The Hacker News
5 Ways Identity-based Attacks Are Breaching Retail

The trust crisis in the cloud…and why blockchain deserves a seat at the table

As a cybersecurity consultant guiding organizations across the globe through digital transformation, I’ve observed one recurrin...

CSO Online
The trust crisis in the cloud…and why blockchain deserves a seat at the table

RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks

Cybersecurity researchers are calling attention to a malware campaign that's targeting security flaws in TBK digital video recorders (DVRs) and Four-F...

The Hacker News
RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks

BaitTrap: Over 17,000 Fake News Websites Caught Fueling Investment Fraud Globally

A newly released report by cybersecurity firm CTM360 reveals a large-scale scam operation utilizing fake news websites—known as Baiting News Sites (BN...

The Hacker News
BaitTrap: Over 17,000 Fake News Websites Caught Fueling Investment Fraud Globally

Weekly Update 459

Presently sponsored by: Malwarebytes Browser Guard blocks phishing, ads, scams, and trackers for safer, faster browsingNew week, different end of the ...

Troy Hunt's Blog
Weekly Update 459

Android Patchday fällt im Juli aus

Admins können sich zumindest in Bezug auf Android und Pixel-Smartphones zurücklehnen: Im Juli gibt es nichts zu patchen....

heise security News
Android Patchday fällt im Juli aus

How talent-strapped CISOs can tap former federal government cyber pros

Since January, thousands of federal government jobs have vanished through a combination of firings, layoffs and resignations. T...

CSO Online
How talent-strapped CISOs can tap former federal government cyber pros

End of life for Microsoft Office puts malicious macros in the security spotlight

The upcoming end of life for Windows 10 has IT teams busy. From planning on migrations, to testing Windows 11 24H2, many of us ...

CSO Online
End of life for Microsoft Office puts malicious macros in the security spotlight

CISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added four security flaws to its Known Exploited Vulnerabilities (KEV) cata...

The Hacker News
CISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation

Bitchat ist Jack Dorseys internetfreie Messaging-App

Private Mitteilungen drahtlos zu übermitteln, aber ohne Internet - das soll Bitchat hinkriegen. Der Ansatz ist nicht ganz neu....

heise security News
Bitchat ist Jack Dorseys internetfreie Messaging-App

TAG-140 Targets Indian Government Via 'ClickFix-Style' Lure

The threat actors trick victims into opening a malicious script, leading to the execution of the BroaderAspect .NET loader. ...

darkreading
TAG-140 Targets Indian Government Via 'ClickFix-Style' Lure

Bert Blitzes Linux & Windows Systems

The new ransomware strain's aggressive multithreading and cross-platform capabilities make it a potent threat to enterprise environments. ...

darkreading
Bert Blitzes Linux & Windows Systems

Polymarket Gamblers Go to War Over Whether Zelenskyy Wore a Suit

Polymarket, an online betting marketplace that bills itself as the future of news, can’t decide whether or not Ukrainian president Volodomyr Zelens...

404 Media
Polymarket Gamblers Go to War Over Whether Zelenskyy Wore a Suit

Doppelte Erpressung möglich: Cyberkriminelle im Clinch

Zwischen zwei rivalisierenden kriminellen Ransomware-Gruppen ist Streit ausgebrochen. Cyberexperten warnen, dass Unternehmen doppelt erpresst werden k...

heise security News
Doppelte Erpressung möglich: Cyberkriminelle im Clinch

Atomic macOS infostealer adds backdoor for persistent attacks

Malware analyst discovered a new version of the Atomic macOS info-stealer (also known as 'AMOS') that comes with a backdoor, to attackers persistent a...

BleepingComputer

SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools

Cybersecurity researchers have disclosed a malicious campaign that leverages search engine optimization (SEO) poisoning techniques to deliver a known ...

The Hacker News
SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools

Isolated Recovery Environments: A Critical Layer in Modern Cyber Resilience

Written by: Jaysn Rye Executive Summary As adversaries grow faster, stealthier, and more destructive, traditional recovery strategies are increasingl...

Google Threat Intelligence
Isolated Recovery Environments: A Critical Layer in Modern Cyber Resilience

The Open-Source Software Saving the Internet From AI Bot Scrapers

For someone who says she is fighting AI bot scrapers just in her free time, Xe Iaso seems to be putting up an impressive fight. Since she launched it ...

404 Media
The Open-Source Software Saving the Internet From AI Bot Scrapers

⚡ Weekly Recap: Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More

Everything feels secure—until one small thing slips through. Even strong systems can break if a simple check is missed or a trusted tool is misused. M...

The Hacker News
⚡ Weekly Recap: Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More

Hiding Prompt Injections in Academic Papers

Academic papers were found to contain hidden instructions to LLMs: It discovered such prompts in 17 articles, whose lead authors are affiliated with 1...

Schneier on Security

Manufacturing Security: Why Default Passwords Must Go

If you didn't hear about Iranian hackers breaching US water facilities, it's because they only managed to control a single pressure station serving 7,...

The Hacker News
Manufacturing Security: Why Default Passwords Must Go

Antivirus: Comodo Internet Security lässt sich Schadcode unterschieben

Ein IT-Sicherheitsforscher hat mehrere Sicherheitslücken im Virenschutz Comodo Internet Security entdeckt, wodurch Angreifer Schadcode einschleusen kö...

heise security News
Antivirus: Comodo Internet Security lässt sich Schadcode unterschieben

Ransomware-Bande Hunters International hört auf

Der Darknetauftritt von Ransomware-Bande Hunters International wurde leergeräumt und mit einer Abschiedsbotschaft versehen....

heise security News
Ransomware-Bande Hunters International hört auf

Sicherheitsupdate: Dell Data Protection Advisor über viele Lücken angreifbar

Angreifer können an Schwachstellen in Dells Backuplösung Data Protection Advisor ansetzen. Der Computerhersteller stuft das Risiko als kritisch ein. ...

heise security News
Sicherheitsupdate: Dell Data Protection Advisor über viele Lücken angreifbar

Has CISO become the least desirable role in business?

After nine years as CSO and senior vice president of IT at Sumo Logic, George Gerchow had had enough. The job was stressful...

CSO Online
Has CISO become the least desirable role in business?

Let's Encrypt stellt erstes IP-Zertifikat aus

Das Let's-Encrypt-Projekt hat in der vergangenen Woche das erste Zertifikat für eine IP-Adresse ausgestellt. ...

heise security News
Let's Encrypt stellt erstes IP-Zertifikat aus

Skills gaps send CISOs in search of managed security providers

A shortage of skilled cybersecurity professionals, combined with budget cuts, is fueling growth in the managed security service...

CSO Online
Skills gaps send CISOs in search of managed security providers

7-Zip 25.00 bessert Schwachstellen aus und beschleunigt Kompression

Die populäre Kompressionssoftware 7-Zip steht in Version 25.00 zur Installation bereit. Sie korrigiert auch Sicherheitslücken....

heise security News
7-Zip 25.00 bessert Schwachstellen aus und beschleunigt Kompression

TAG-140 Deploys DRAT V2 RAT, Targeting Indian Government, Defense, and Rail Sectors

A hacking group with ties other than Pakistan has been found targeting Indian government organizations with a modified variant of a remote access troj...

The Hacker News
TAG-140 Deploys DRAT V2 RAT, Targeting Indian Government, Defense, and Rail Sectors

OpenAI says GPT-5 will unify breakthroughs from different models

OpenAI has again confirmed that it will unify multiple models into one and create GPT-5, which is expected to ship sometime in the summer. [...]...

BleepingComputer

Hands on with Windows 11 Notepad's new markdown support

Notepad now lets you use markdown text formatting on Windows 11, which means you can write in Notepad just like you could in WordPad. [...]...

BleepingComputer

ChatGPT is testing disruptive Study Together feature

OpenAI's "Study together" mode has been spotted in the wild, and it could help students prepare for exams directly from ChatGPT. [...]...

BleepingComputer

BSI und ANSSI warnen vor VideoIdent bei der digitalen EU-Brieftasche

Das BSI und seine französische Partnerbehörde ANSSI beschreiben videobasierte Identifikation beim Beantragen der geplanten EUDI-Wallet als "herausford...

heise security News
BSI und ANSSI warnen vor VideoIdent bei der digitalen EU-Brieftasche

Android May Soon Warn You About Fake Cell Towers

Plus: Iran-linked hackers threaten to release Trump campaign emails, Chinese hackers still in US telecoms networks, and an abusive deepfake website pl...

Wired - Security Latest
Android May Soon Warn You About Fake Cell Towers

Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties

Taiwan's National Security Bureau (NSB) has warned that China-developed applications like RedNote (aka Xiaohongshu), Weibo, TikTok, WeChat, and Baidu ...

The Hacker News
Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties

Alert: Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS

Threat actors are weaponizing exposed Java Debug Wire Protocol (JDWP) interfaces to obtain code execution capabilities and deploy cryptocurrency miner...

The Hacker News
Alert: Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS

Google's AI video maker Veo 3 is now available via $20 Gemini

Google says Veo 3, which is the company's state-of-the-art video generator, is now shipping to everyone using the Gemini app with a $20 subscription. ...

BleepingComputer

ChatGPT Deep Research tests new connectors for more context

ChatGPT Deep Research, which is an AI research tool to automate research, is getting support for new connectors (integrations), including Slack. [...]...

BleepingComputer

Friday Squid Blogging: How Squid Skin Distorts Light

New research. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy...

Schneier on Security

Hacker leaks Telefónica data allegedly stolen in a new breach

A hacker is threatening to leak 106GB of data allegedly stolen from Spanish telecommunications company Telefónica in a breach that the company did not...

BleepingComputer

Kommentar: Von wegen KI bedroht Jobs – Daten sind wirklich in Gefahr!

LLMs, KI-Chat und Agenten machen persönliche Daten einfach, kompakt und klar formuliert zugänglich. Dabei sammeln die Betreiber umfassende Mengen davo...

heise security News
Kommentar: Von wegen KI bedroht Jobs – Daten sind wirklich in Gefahr!

Sogar Notstrom fehlt: Schlechte Sicherheitstandards in Rechenzentren des Bundes

Ein Bericht des Bundesrechnungshofs wirft kein gutes Licht auf die Sicherheit der IT des Bundes. Nur ein Bruchteil der Rechenzentren erreiche Mindests...

heise security News
Sogar Notstrom fehlt: Schlechte Sicherheitstandards in Rechenzentren des Bundes

In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed

Noteworthy stories that might have slipped under the radar: drug cartel hires hacker to identify FBI informants, prison time for Russian ransomware de...

SecurityWeek

Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It

Generative AI is changing how businesses work, learn, and innovate. But beneath the surface, something dangerous is happening. AI agents and custom Ge...

The Hacker News
Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It

Google Ordered to Pay $314M for Misusing Android Users' Cellular Data Without Permission

Google has been ordered by a court in the U.S. state of California to pay $314 million over charges that it misused Android device users' cellular dat...

The Hacker News
Google Ordered to Pay $314M for Misusing Android Users' Cellular Data Without Permission

Cybersecurity in the supply chain: strategies for managing fourth-party risks

Fourth-party vendors have become a serious supply chain cybersecurity blind spot. Unlike third parties with direct contractual ...

CSO Online
Cybersecurity in the supply chain: strategies for managing fourth-party risks

Ransomware-Lösegeld-Verhandler gönnte sich offenbar Provisionen

Ein für das Aushandeln von Lösegeld bei aussichtslosen Ransomware-Vorfällen angestellter Experte hat sich wohl Provisionen zahlen lassen....

heise security News
Ransomware-Lösegeld-Verhandler gönnte sich offenbar Provisionen

Leaks hint at Operator-like tool in ChatGPT ahead of GPT-5 launch

A few new code references in the ChatGPT web app and Android point to an Operator-like tool in GPT's chain of thoughts. [...]...

BleepingComputer

The Person in Charge of Testing Tech for US Spies Has Resigned

IARPA director Rick Muller is departing after just over a year at the R&D unit that invests in emerging technologies of potential interest to agen...

Wired - Security Latest
The Person in Charge of Testing Tech for US Spies Has Resigned

Trump Officials Want to Prosecute Over the ICEBlock App. Lawyers Say That’s Unconstitutional

The platform, which allows users to anonymously share the locations of ICE agents, is currently the third-most-downloaded iPhone app. ...

Wired - Security Latest
Trump Officials Want to Prosecute Over the ICEBlock App. Lawyers Say That’s Unconstitutional

Police dismantles investment fraud ring stealing €10 million

The Spanish police have dismantled a large-scale investment fraud operation based in the country, which has caused cumulative damages exceeding €10 mi...

BleepingComputer

CBP Wants New Tech to Search for Hidden Data on Seized Phones

Customs and Border Protection is asking companies to pitch tools for performing deep analysis on the contents of devices seized at the US border. ...

Wired - Security Latest
CBP Wants New Tech to Search for Hidden Data on Seized Phones

Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams

A mobile ad fraud operation dubbed IconAds that consisted of 352 Android apps has been disrupted, according to a new report from HUMAN. The identified...

The Hacker News
Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams

New Cyber Blueprint Aims to Guide Organizations on AI Journey

Deloitte's new blueprint looks to bridge the gap between the massive push for AI adoption and a lack of preparedness among leaders and employees. ...

darkreading
New Cyber Blueprint Aims to Guide Organizations on AI Journey

IdeaLab confirms data stolen in ransomware attack last year

IdeaLab is notifying individuals impacted by a data breach incident last October when hackers accessed sensitive information. [...]...

BleepingComputer

Microsoft investigates ongoing SharePoint Online access issues

​Microsoft is investigating an ongoing incident causing intermittent issues for users attempting to access SharePoint Online sites. [...]...

BleepingComputer

Dark Web Vendors Shift to Third Parties, Supply Chains

As attacks on software supply chains and third parties increase, more data on critical software and infrastructure services is being advertised and so...

darkreading
Dark Web Vendors Shift to Third Parties, Supply Chains

Criminals Sending QR Codes in Phishing, Malware Campaigns

The Anti-Phishing Working Group observed how attackers are increasingly abusing QR codes to conduct phishing attacks or to trick users into downloadin...

darkreading
Criminals Sending QR Codes in Phishing, Malware Campaigns

Attackers Impersonate Top Brands in Callback Phishing

Microsoft, PayPal, Docusign, and others are among the trusted brands threat actors use in socially engineered scams that try to get victims to call ad...

darkreading
Attackers Impersonate Top Brands in Callback Phishing

Microsoft: Exchange Server Subscription Edition now available

Microsoft has announced that the Exchange Server Subscription Edition (SE) is now available to all customers of its enterprise email service. [...]...

BleepingComputer

The Hidden Weaknesses in AI SOC Tools that No One Talks About

If you’re evaluating AI-powered SOC platforms, you’ve likely seen bold claims: faster triage, smarter remediation, and less noise. But under the hood,...

The Hacker News
The Hidden Weaknesses in AI SOC Tools that No One Talks About

Microsoft asks users to ignore Windows Firewall config errors

Microsoft asked customers this week to disregard incorrect Windows Firewall errors that appear after rebooting their systems following the installatio...

BleepingComputer

Podcast: The Life Changing Power of Lifting

For this week’s podcast, I’m talking to our friend Casey Johnston, a tech journalist turned fitness journalist turned independent journalist. Casey...

404 Media
Podcast: The Life Changing Power of Lifting

The Promise and Peril of Digital Security in the Age of Dictatorship

LGBTIQ+ organizations in El Salvador are using technology to protect themselves and create a record of the country’s ongoing authoritarian escalations...

Wired - Security Latest
The Promise and Peril of Digital Security in the Age of Dictatorship

Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms

The French cybersecurity agency on Tuesday revealed that a number of entities spanning governmental, telecommunications, media, finance, and transport...

The Hacker News
Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms

Third-party risk management: How to avoid compliance disaster

Whether your organization is aware or not, it does relly on third-party services providers that help to make business processes...

CSO Online
Third-party risk management: How to avoid compliance disaster

5 multicloud security challenges — and how to address them

A multicloud environment is now standard for midsize and large organizations, with tech leaders opting to use multiple cloud pr...

CSO Online
5 multicloud security challenges — and how to address them

Taiwan: Cyberkrimineller zapfte Notrufdaten ab und verkaufte sie an Bestatter

Ehemaliger Rettungssanitäter in Taiwan verkaufte jahrelang Notrufdaten an Bestatter, die dadurch schneller am Unfallort sein konnten. Die Ermittlungen...

heise security News
Taiwan: Cyberkrimineller zapfte Notrufdaten ab und verkaufte sie an Bestatter

Welcoming Truyu to Have I Been Pwned's Partner Program

Presently sponsored by: Malwarebytes Browser Guard blocks phishing, ads, scams, and trackers for safer, faster browsingI always used to joke that when...

Troy Hunt's Blog
Welcoming Truyu to Have I Been Pwned's Partner Program

Browser Extensions Pose Heightened, but Manageable, Security Risks

Attackers can abuse malicious extensions to access critical data, including credentials, but organizations can reduce the risks by raising awareness a...

darkreading
Browser Extensions Pose Heightened, but Manageable, Security Risks

Initial Access Broker Self-Patches Zero Days as Turf Control

A likely China-nexus threat actor has been exploiting unpatched Ivanti vulnerabilities to gain initial access to victim networks and then patching the...

darkreading
Initial Access Broker Self-Patches Zero Days as Turf Control

US Treasury Sanctions BPH Provider Aeza Group

In the past, the bulletproof group has been affiliated with many well-known ransomware and malware groups, such as BianLian and Lumma Stealer. ...

darkreading
US Treasury Sanctions BPH Provider Aeza Group

AI Tackles Binary Code Challenges to Fortify Supply Chain Security

Analyzing binary code helps vendors and organizations detect security threats and zero-day vulnerabilities in the software supply chain, but it doesn'...

darkreading
AI Tackles Binary Code Challenges to Fortify Supply Chain Security

Russian APT 'Gamaredon' Hits Ukraine With Fierce Phishing

A Russian APT known as "Gamaredon" is using spear-phishing attacks and network-drive weaponization to target government entities in Ukraine. ...

darkreading
Russian APT 'Gamaredon' Hits Ukraine With Fierce Phishing

DOJ investigates ex-ransomware negotiator over extortion kickbacks

An ex-ransomware negotiator is under criminal investigation by the Department of Justice for allegedly working with ransomware gangs to profit from ex...

BleepingComputer

A Group of Young Cybercriminals Poses the ‘Most Imminent Threat’ of Cyberattacks Right Now

The Scattered Spider hacking group has caused chaos among retailers, insurers, and airlines in recent months. Researchers warn that its flexible struc...

Wired - Security Latest
A Group of Young Cybercriminals Poses the ‘Most Imminent Threat’ of Cyberattacks Right Now

Spain arrests hackers who targeted politicians and journalists

The Spanish police have arrested two individuals in the province of Las Palmas for their alleged involvement in cybercriminal activity, including data...

BleepingComputer

Cyberattacke: Angreifer öffnen Staudammventile

In Norwegen kam es im April zu einem Cyberangriff auf die Steuerung eines Staudamms. Dabei wurden die Ventile über Stunden komplett geöffnet....

heise security News
Cyberattacke: Angreifer öffnen Staudammventile

Forminator plugin flaw exposes WordPress sites to takeover attacks

The Forminator plugin for WordPress is vulnerable to an unauthenticated arbitrary file deletion flaw that could enable full site takeover attacks. [.....

BleepingComputer

Swiss government warns attackers have stolen sensitive data, after ransomware attack at Radix

The Swiss government has issued a warning after a third-party service provider suffered a ransomware attack, which saw sensitive information stolen fr...

Graham Cluley

1 Year Later: Lessons Learned From the CrowdStrike Outage

The ever-growing volume of vulnerabilities and threats requires organizations to remain resilient and anti-fragile — that is, to be able to proactivel...

darkreading
1 Year Later: Lessons Learned From the CrowdStrike Outage

Microsoft fixes ‘Print to PDF’ feature broken by Windows update

Microsoft has fixed a known bug that breaks the 'Print to PDF' feature on Windows 11 24H2 systems after installing the April 2025 preview update. [......

BleepingComputer

Windows 11: Microsoft aktiviert Hotpatching standardmäßig

Microsoft stellt für die Enterprise-Kunden mit Windows Autopatch Windows-11-Clients standardmäßig auf Hotpatching um....

heise security News
Windows 11: Microsoft aktiviert Hotpatching standardmäßig

Like Ransoming a Bike: Organizational Muscle Memory Drives the Most Effective Response

Ransomware is a major threat to the enterprise. Tools and training help, but survival depends on one thing: your organization’s muscle memory to respo...

SecurityWeek

US Calls Reported Threats by Pro-Iran Hackers to Release Trump-Tied Material a ‘Smear Campaign’

The United States has warned of continued Iranian cyberattacks following American strikes on Iran’s nuclear facilities. The post US Calls Reported Thr...

SecurityWeek

Second espionage-linked cyberattack hits ICC, exposing persistent threats to global justice systems

The International Criminal Court (ICC) has fallen victim to another sophisticated cyberattack, the second major cyber espionage...

CSO Online
Second espionage-linked cyberattack hits ICC, exposing persistent threats to global justice systems

Cybersecurity M&A Roundup: 41 Deals Announced in June 2025

Forty-one cybersecurity merger and acquisition (M&A) deals were announced in June 2025. The post Cybersecurity M&A Roundup: 41 Deals Announced...

SecurityWeek

Microsoft: DNS issue blocks delivery of Exchange Online OTP codes

Microsoft is working to fix a DNS misconfiguration that is causing one-time passcode (OTP) message delivery failures in Exchange Online for some users...

BleepingComputer

Schwachstellen: IBM Storage Scale für Attacken anfällig

IBMs Speicherlösung Storage Scale ist über mehrere Sicherheitslücken angreifbar. Eine reparierte Version steht zum Download bereit....

heise security News
Schwachstellen: IBM Storage Scale für Attacken anfällig

SocFeed by Venacus

SOCFeed is a SOC news aggregator that provides the latest updates on data leaks, breaches, and cybersecurity incidents. Stay informed with real-time news from various sources.

© 2025 SocFeed. All rights reserved.