Related News Stories
Stories grouped by similar topics and content
2 related articles · 92% similarity
The Anatsa Android banking trojan has reappeared on Google Play, disguised as a PDF viewer, impacting over 90,000 users. This malicious app steals banking credentials, highlighting the ongoing threat of malware on official app stores.
Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play
Cybersecurity researchers have discovered an Android banking malware campaign that has leveraged a trojan named Anatsa to target users in North Americ...

Android malware Anatsa infiltrates Google Play to target US banks
The Anatsa banking trojan has sneaked into Google Play once more via an app posing as a PDF viewer that counted more than 50,000 downloads. [...]...
4 related articles · 89% similarity
Xu Zewei, a Chinese national allegedly linked to the state-sponsored hacking group Silk Typhoon (also known as Hafnium), was arrested in Milan, Italy. He faces multiple charges related to cyberespionage, including wire fraud and identity theft, stemming from attacks targeting US entities. The arrest highlights ongoing efforts to combat state-sponsored cybercrime.
Suspected Hacker Linked to Silk Typhoon Arrested in Milan
The alleged Chinese state-sponsored hacker faces multiple charges, including wire fraud, aggravated identity theft, and unauthorized access to protect...

Alleged Chinese hacker tied to Silk Typhoon arrested for cyberespionage
A Chinese national was arrested in Milan, Italy, last week for allegedly being linked to the state-sponsored Silk Typhoon hacking group, which respons...
Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks
A Chinese national has been arrested in Milan, Italy, for his alleged links to a state-sponsored hacking group known as Silk Typhoon and for carrying ...

Alleged Chinese State Hacker Wanted by US Arrested in Italy
Xu Zewei has been arrested on charges that he is a member of the Chinese state-sponsored hacking group Hafnium (Silk Typhoon). The post Alleged Chines...
2 related articles · 85% similarity
SAP has issued critical security updates for NetWeaver and Business Objects products to address vulnerabilities allowing remote code execution and potential system takeover. These flaws could enable attackers to compromise systems completely, so immediate patching is strongly recommended.
SAP Patches Critical Flaws That Could Allow Remote Code Execution, Full System Takeover
SAP has released patches for multiple insecure deserialization vulnerabilities in NetWeaver that could lead to full system compromise. The post SAP Pa...
Patchday SAP: NetWeaver-Produkte sind für Schadcode-Attacken anfällig
Angreifer können unter anderem SAP NetWeaver-Produkte und Business Objects attackieren. Sicherheitsupdates stehen zum Download bereit. ...

2 related articles · 83% similarity
Microsoft released cumulative updates KB5062554 for Windows 10 (versions 22H2 and 21H2) and KB5062553 & KB5062552 for Windows 11 (versions 24H2 and 23H2), addressing various security vulnerabilities and bugs with multiple fixes and changes.
Windows 10 KB5062554 cumulative update released with 13 changes, fixes
Microsoft has released the KB5062554 cumulative update for Windows 10 22H2 and Windows 10 21H2, with thirteen new fixes or changes. [...]...
Windows 11 KB5062553 & KB5062552 cumulative updates released
Microsoft has released Windows 11 KB5062553 and KB5062552 cumulative updates for versions 24H2 and 23H2 to fix security vulnerabilities and issues. [....
2 related articles · 83% similarity
Adobe has released critical security updates addressing vulnerabilities in multiple applications, including After Effects and Illustrator, which could lead to denial-of-service attacks and code execution. These patches are crucial for users to protect their systems from potential exploits.
Patchday: Adobe schützt After Effects & Co. vor möglichen Attacken
Mehrere Adobe-Anwendungen sind unter anderem für DoS- und Schadcode-Attacken anfällig. Sicherheitsupdates schaffen Abhilfe. ...

Adobe Patches Critical Code Execution Bugs
Adobe patches were also released for medium-severity flaws in After Effects, Audition, Dimension, Experience Manager Screens, FrameMaker, Illustrator,...
6 related articles · 76% similarity
Microsoft's July 2025 Patch Tuesday addressed over 130 vulnerabilities across various products, including critical flaws in SharePoint, Office, SQL Server, and SPNEGO. The updates included at least one publicly disclosed zero-day vulnerability, highlighting the importance of promptly applying security patches.
Patchday: Microsoft schließt 100.000-$-Lücke in SharePoint aus Hacker-Wettbewerb
Update-Sammlung veröffentlicht: Um Attacken vorzubeugen, sollten Admins sicherstellen, dass ihre Microsoft-Produkte auf dem aktuellen Stand sind. ...

July Patch Tuesday: 14 critical Microsoft vulnerabilities, one SAP hole rated at 10 in severity
Microsoft’s July Patch Tuesday fixes are a mix of good news and bad news for CSOs: Fourteen of the vulnerabilities are rated as...

Microsoft Patches 137 CVEs in July, but No Zero-Days
Some 17 of the bugs are at high risk for exploits, including multiple remote code execution bugs in Office and SharePoint. ...

Microsoft Patches 130 Vulnerabilities, Including Critical Flaws in SPNEGO and SQL Server
For the first time in 2025, Microsoft's Patch Tuesday updates did not bundle fixes for exploited security vulnerabilities, but acknowledged one of the...

Microsoft Patches 130 Vulnerabilities for July 2025 Patch Tuesday
Patch Tuesday July 2025: Microsoft rolled out fixes for 130 vulnerabilities, including a zero-day in SQL Server. The post Microsoft Patches 130 Vulner...
Microsoft July 2025 Patch Tuesday fixes one zero-day, 137 flaws
Today is Microsoft's July 2025 Patch Tuesday, which includes security updates for 137 flaws, including one publicly disclosed zero-day vulnerability i...
2 related articles · 90% similarity
A new, previously unknown Windows spyware, dubbed 'Batavia,' is actively targeting numerous large Russian industrial organizations. The campaign involves phishing emails delivering the malware, resulting in the theft of sensitive documents and data.
Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms
Russian organizations have been targeted as part of an ongoing campaign that delivers a previously undocumented Windows spyware called Batavia. The ac...

'Batavia' Windows spyware campaign targets dozens of Russian orgs
A previously undocumented spyware called 'Batavia' has been targeting large industrial enterprises in Russia in a phishing email campaign that uses co...
2 related articles · 81% similarity
Multiple malicious Chrome extensions, totaling over 1.8 million downloads, have been discovered in the Chrome Web Store. These extensions steal user data, hijack sessions, and redirect users to malicious websites, highlighting security vulnerabilities in the platform.
Malicious Chrome extensions with 1.7M installs found on Web Store
Almost a dozen malicious extensions with 1.7 million downloads in Google's Chrome Web Store could track users, steal browser activity, and redirect to...
Chrome Store Features Extension Poisoned With Sophisticated Spyware
A color picker for Google's browser with more than 100,000 downloads hijacks sessions every time a user navigates to a new webpage and also redirects ...

5 related articles · 79% similarity
Hackers are exploiting a leaked legitimate penetration testing tool, Shellter Elite, to distribute various malware strains, including infostealers like Lumma and Rhadamanthys. This highlights the risk of repurposing security tools for malicious purposes and underscores the need for stronger security practices and oversight.
Hackers 'Shellter' Various Stealers in Red-Team Tool to Evade Detection
Researchers have uncovered multiple campaigns spreading Lumma, Arechclient2, and Rhadamanthys malware by leveraging key features of the AV/EDR evasion...

Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
In yet another instance of threat actors repurposing legitimate tools for malicious purposes, it has been discovered that hackers are exploiting a pop...

Discovery of compromised Shellter security tool raises disclosure debate
CISOs whose staff use the commercial Shellter Elite antivirus evasion software to detect vulnerabilities need to immediately up...

Legitimate Shellter Pen-Testing Tool Used in Malware Attacks
A stolen copy of Shellter Elite shows how easily legitimate security tools can be repurposed by threat actors when vetting and oversight fail. The pos...
Hackers abuse leaked Shellter red team tool to deploy infostealers
Shellter Project, the vendor of a commercial AV/EDR evasion loader for penetration testing, confirmed that hackers used its Shellter Elite product in ...
3 related articles · 85% similarity
A Brazilian central bank service provider, C&M, was hacked, resulting in a $140 million theft from six banks. An employee, João Roque, was arrested and allegedly sold credentials for a paltry $920, enabling the heist. The incident highlights the significant risk posed by insider threats.
Employee arrested after Brazil’s central bank service provider hacked for US $140 million
This month could barely have started any worse for some financial institutions in Brazil. Approximately US $140 million was stolen from the reserve...
Employee gets $920 for credentials used in $140 million bank heist
Hackers stole nearly $140 million from six banks in Brazil by using an employee's credentials from C&M, a company that offers financial connectivi...
Police in Brazil Arrest a Suspect Over $100M Banking Hack
Officials identified the suspect as João Roque, a C&M employee who worked in information technology and allegedly helped others gain unauthorized ...
2 related articles · 94% similarity
The previously unknown NightEagle APT group (APT-Q-95) exploited a Microsoft Exchange vulnerability to spy on Chinese government, military, and technology sectors. Researchers uncovered the sophisticated attacks, highlighting the ongoing threat posed by advanced persistent threats leveraging known software weaknesses.
NightEagle hackers exploit Microsoft Exchange flaw to spy on China’s strategic sectors
A previously undocumented Advanced Persistent Threat (APT) group, “NightEagle,” has been found targeting the Chinese government...

NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors
Cybersecurity researchers have shed light on a previously undocumented threat actor called NightEagle (aka APT-Q-95) that has been observed targeting ...

2 related articles · 90% similarity
Two newly discovered vulnerabilities in the Sudo utility for Linux systems allow local users to gain root privileges. These flaws, one dating back 12 years, impact major Linux distributions and require immediate patching to mitigate significant security risks.
How a 12-year-old bug in Sudo is still haunting Linux users
Two new vulnerabilities have been found in Sudo, a privileged command-line tool installed on Linux systems, that can allow priv...

Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros
Cybersecurity researchers have disclosed two security flaws in the Sudo command-line utility for Linux and Unix-like operating systems that could enab...

7 related articles · 85% similarity
A ransomware attack, specifically SafePay, caused a widespread outage at Ingram Micro, affecting its website and internal systems. The incident disrupted customer services and triggered a multi-day scramble to restore operations, with the company yet to disclose the full extent of the breach.
IT-Vorfall bei Distributor Ingram Micro
Die Webseite des IT-Distributors Ingram Micro zeigt derzeit lediglich den Wartungsmodus an. Ursache ist ein IT-Vorfall....

Technical difficulties or cyber attack? Ingram Micro’s website goes down just in time for the holiday weekend
Nothing says "Holiday Weekend" like a mysterious IT outage....
Ingram Micro suffers global outage as internal systems inaccessible
IT giant Ingram Micro is experiencing a global outage that is impacting its websites and internal systems, with customers concerned that it may be a c...
Ingram Micro outage caused by SafePay ransomware attack
An ongoing outage at IT giant Ingram Micro is caused by a SafePay ransomware attack that led to the shutdown of internal systems, BleepingComputer has...
Ransomware Attack Triggers Widespread Outage at Ingram Micro
The outage began shortly before the July 4 holiday weekend and caused disruptions for customer ordering and other services provided by the IT distribu...

Ingram Micro Scrambling to Restore Systems After Ransomware Attack
The IT products and services giant did not say how the intrusion occurred or whether any data was stolen from its systems. The post Ingram Micro Scram...
Ingram Micro confirms ransomware attack after days of downtime
Ingram Micro is facing a major cybersecurity crisis as a ransomware attack has triggered a multi-day IT outage, disrupting serv...

5 related articles · 86% similarity
Hunters International, a ransomware-as-a-service (RaaS) operation, has ceased its ransomware activities and released free decryptors. The group has rebranded as World Leaks, shifting its focus from ransomware to pure data extortion. Concerns remain about the group's future activities under its new name.
'Hunters International' RaaS Group Closes Its Doors
The announcement comes just months after security researchers observed that the group was making the transition to rebrand to World Leaks, a data thef...

Hunters International Shuts Down, Offers Free Decryptors as It Morphs Into World Leaks
The notorious Hive successor ceases ransomware operations but pivots to pure data extortion under the new World Leaks brand. The post Hunters Internat...
Hunters International ransomware shuts down, releases free decryptors
The Hunters International Ransomware-as-a-Service (RaaS) operation announced today that it has officially closed down its operations and will offer f...
Hunters International ransomware group shuts down – but will it regroup under a new guise?
The notorious Hunters International ransomware-as-a-service operation has announced that it has shut down, in a message posted on its dark web leak si...
Hunters International shuts ransomware operations, reportedly becomes an extortion-only gang
Ransomware gang Hunters International says it’s shutting down its operations for unexplained reasons, and is offering decryptio...

2 related articles · 82% similarity
A security flaw in the Catwatchful Android stalkerware app exposed the personal information of over 62,000 users, including usernames, passwords, and device data. This data breach highlights the significant risks associated with stalkerware and the need for stronger security measures.
Catwatchful stalkerware app spills secrets of 62,000 users – including its own admin
Another scummy stalkerware app has spilled its guts, revealing the details of its 62,000 users - and data from thousands of victims' infected devices....
Undetectable Android Spyware Backfires, Leaks 62,000 User Logins
A vulnerability in the Catwatchful spyware allowed a security researcher to retrieve the usernames and passwords of over 62,000 accounts. The post Und...
2 related articles · 82% similarity
Grafana has issued critical security updates addressing four Chromium vulnerabilities, including a zero-day actively exploited in the wild. These vulnerabilities affect the Image Renderer plugin and Synthetic Monitoring, potentially allowing remote code execution and memory corruption.
Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild
CVE-2025-6554 and three other Chromium vulnerabilities could allow attackers to execute code and corrupt memory remotely. The post Grafana Patches Chr...
Grafana releases critical security update for Image Renderer plugin
Grafana Labs has addressed four Chromium vulnerabilities in critical security updates for the Grafana Image Renderer plugin and Synthetic Monitoring A...
2 related articles · 77% similarity
Research reveals malicious IDE extensions are bypassing verification systems in popular development environments like Visual Studio Code and IntelliJ IDEA. These extensions exploit trust badges to compromise developer systems and introduce vulnerabilities into the software supply chain.
Verified, but vulnerable: Malicious extensions exploit IDE trust badges
Developers across popular integrated development environments (IDEs) like Visual Studio Code, Visual Studio, IntelliJ IDEA, and...

IDE Extensions Pose Hidden Risks to Software Supply Chain
Malicious extensions can be engineered to bypass verification checks for popular integrated development environments, according to research from OX Se...

3 related articles · 85% similarity
Over 40 malicious Firefox extensions, disguised as legitimate cryptocurrency wallet add-ons, have been discovered stealing user funds. These extensions, found in the official Firefox add-on store, target cryptocurrency wallets, highlighting a significant security risk for users. Researchers urge users to review and remove any suspicious extensions immediately.
"FoxyWallet": Mehr als 40 bösartige Firefox-Add-ons entdeckt
IT-Sicherheitsforscher haben eine groß angelegte Kampagne mit bösartigen Firefox-Add-ons entdeckt. Die räumen Krypto-Wallets leer....

Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets
Cybersecurity researchers have uncovered over 40 malicious browser extensions for Mozilla Firefox that are designed to steal cryptocurrency wallet sec...

Dozens of fake wallet add-ons flood Firefox store to drain crypto
More than 40 fake extensions in Firefox's official add-ons store are impersonating popular cryptocurrency wallets from trusted providers to steal wall...
5 related articles · 85% similarity
Cisco addressed a critical vulnerability in its Unified Communications Manager (Unified CM) software. The flaw involved hardcoded root SSH credentials, granting attackers complete control. Security updates have been released to mitigate this maximum-severity risk.
Cisco entfernt SSH-Hintertür in Unified Communications Manager
Der Netzwerkausrüster Cisco hat Sicherheitslücken in verschiedenen Produkten geschlossen. Eine Lücke gilt als kritisch. ...

Hardcoded root credentials in Cisco Unified CM trigger max-severity alert
Cisco (Nasdaq:CSCO) has patched a max severity flaw in its Unified Communications Manager (Unified CM) and Session Management E...

Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials
Cisco has released security updates to address a maximum-severity security flaw in Unified Communications Manager (Unified CM) and Unified Communicati...

Cisco Warns of Hardcoded Credentials in Enterprise Software
Hardcoded SSH credentials in Cisco Unified CM and Unified CM SME could allow attackers to execute commands as root. The post Cisco Warns of Hardcoded ...
Cisco warns that Unified CM has hardcoded root SSH credentials
Cisco has removed a backdoor account from its Unified Communications Manager (Unified CM), which would have allowed remote attackers to log in to unpa...
2 related articles · 82% similarity
A critical remote code execution vulnerability in Anthropic's MCP Inspector debugging tool allows attackers to execute malicious code on developer machines. This flaw poses a significant security risk, impacting both developers and the security of AI systems under development.
KI-Debugging-Tool MCP Inspector: Codeausführung durch Sicherheitslücke möglich
In Anthropics MCP-Inspector, einem Debugging-Tool für MCP-Server, klafft eine kritische Sicherheitslücke. Sie erlaubt das Ausführen von Schadcode....

Critical RCE flaw in Anthropic’s MCP inspector exposes developer machines to remote attacks
A critical remote code execution (RCE) bug in Anthropic’s Model Context Protocol (MCP) inspector tool could allow attackers to ...

5 related articles · 81% similarity
North Korean state-sponsored hackers are employing a new macOS malware, NimDoor, to target Web3 and cryptocurrency companies. The malware, delivered via fake Zoom updates and other social engineering tactics, is designed to steal cryptocurrency and boasts self-revival capabilities. This campaign highlights the escalating sophistication of North Korean cyberattacks.
North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign
Threat actors with ties to North Korea have been observed targeting Web3 and cryptocurrency-related businesses with malware written in the Nim program...

North Korean Hackers Use Fake Zoom Updates to Install macOS Malware
SentinelOne says the fake Zoom update scam delivers ‘NimDoor’, a rare Nim-compiled backdoor. The post North Korean Hackers Use Fake Zoom Updates to In...
DPRK macOS 'NimDoor' Malware Targets Web3, Crypto Platforms
Researchers observed North Korean threat actors targeting cryptocurrency and Web3 platforms on Telegram using malicious Zoom meeting requests. ...

North Korean crypto thieves deploy custom Mac backdoor
North Korean threat actors are targeting companies from the Web3 and crypto industries with a backdoor designed for macOS w...

NimDoor crypto-theft macOS malware revives itself when killed
North Korean state-backed hackers have been using a new family of macOS malware called NimDoor in a campaign that targets web3 and cryptocurrency orga...
3 related articles · 81% similarity
A data breach at Qantas potentially exposed personal information of 6 million customers. The breach, originating from a third-party call center platform, led to an extortion attempt by cybercriminals. While passport and credit card details were reportedly not compromised, other sensitive information may have been accessed.
Qantas Airlines Breached, Impacting 6M Customers
Passengers' personal information was likely accessed via a third-party platform used at a call center, but didn't include passport or credit card info...

Qantas Hit with Extortion Demand After Data Breach
The Australian airline says a cybercriminal attempted to extort it after customer data was stolen from a contact center. The post Qantas Hit with Exto...
Qantas is being extorted in recent data-theft cyberattack
Qantas has confirmed that it is now being extorted by threat actors following a cyberattack that potentially exposed the data for 6 million customers....
2 related articles · 81% similarity
xAI is launching Grok 4, a powerful new coding-focused AI model, bypassing Grok 3.5 to directly compete with Google's Gemini and Anthropic's Claude. The model is expected to release soon after the US Independence Day and boasts advanced coding capabilities.
xAI prepares Grok 4 Code as it plans to take on Claude and Gemini
xAI is preparing the rollout of Grok 4, which replaces Grok 3 as the new state-of-the-art model. [...]...
Grok 4 spotted ahead of launch with special coding features
Elon Musk-funded xAI is skipping Grok 3.5 and releasing Grok 4 after Independence Day in the United States. [...]...
3 related articles · 79% similarity
Critical vulnerabilities in Citrix NetScaler (CVE-2025-5777, dubbed CitrixBleed2) allow authentication bypass and denial-of-service attacks; public exploits are now available, urging immediate patching to mitigate risks.
Citrix warns of login issues after NetScaler auth bypass patch
Citrix warns that patching recently disclosed vulnerabilities that can be exploited to bypass authentication and launch denial-of-service attacks may ...
Exploits, Technical Details Released for CitrixBleed2 Vulnerability
Researchers released technical information and exploit code targeting a critical vulnerability (CVE-2025-5777) in Citrix NetScaler. The post Exploits,...
Public exploits released for Citrix Bleed 2 NetScaler flaw, patch now
Researchers have released proof-of-concept (PoC) exploits for a critical Citrix NetScaler vulnerability, tracked as CVE-2025-5777 and dubbed CitrixBle...
3 related articles · 79% similarity
Sophisticated social engineering attacks, like ClickFix and FileFix, are exploiting browser vulnerabilities and user behavior to execute malicious scripts. These attacks are rapidly increasing, bypassing security measures and posing a significant threat to organizations. The attacks involve tricking users into manipulating downloaded files, resulting in code execution.
FileFix Attack Chain Enables Malicious Script Execution
By using social engineering tactics, threat actors are able to manipulate their victims into saving and renaming files that will backfire against them...

ClickFix Spin-Off Attack Bypasses Key Browser Safeguards
A new threat vector exploits how modern browsers save HTML files, bypassing Mark of the Web and giving attackers another social-engineering attack for...

Sixfold surge of ClickFix attacks threatens corporate defenses
Incidents of ClickFix — the social engineering attack technique that tricks users into executing malicious code — are skyrocket...

2 related articles · 76% similarity
A Mexican drug cartel exploited compromised FBI surveillance technology, highlighting the risk of unintended consequences from widespread surveillance. The incident underscores how easily such systems can be repurposed by malicious actors, emphasizing the importance of robust security measures.
Surveillance Used by a Drug Cartel
Once you build a surveillance system, you can’t control who will use it: A hacker working for the Sinaloa drug cartel was able to obtain an FBI offici...
Smashing Security podcast #424: Surveillance, spyware, and self-driving snafus
A Mexican drug cartel spies on the FBI using traffic cameras and spyware — because "ubiquitous technical surveillance” is no longer just for dystopian...
112 unique articles
IT-Security-Pros: Firmen locken lieber mit Work-Life-Balance als hohem Gehalt
Arbeitgeber legen bei der Suche nach IT-Security-Fachpersonal inzwischen weniger Wert auf den Uni-Abschluss, wie eine Analyse zeigt....

Unpatched Ruckus Vulnerabilities Allow Wireless Environment Hacking
Multiple vulnerabilities in Ruckus Wireless management products could be exploited to fully compromise the managed environments. The post Unpatched Ru...
Canadian Electric Utility Says Power Meters Disrupted by Cyberattack
Nova Scotia Power is notifying individuals affected by the recent data breach, including in the United States. The post Canadian Electric Utility Says...
Trump seeks unprecedented $1.23 billion cut to federal cyber budget
Donald Trump’s sprawling tax bill, which he signed on July 4, contained a few noteworthy cyber funding items, including $250 mi...

Ivanti, Fortinet, Splunk Release Security Updates
Ivanti, Fortinet, and Splunk have released patches for critical- and high-severity vulnerabilities in their products. The post Ivanti, Fortinet, Splun...
How CISOs are training the next generation of cyber leaders
It’s easy for cybersecurity leaders to get caught up on the day-to-day of making sure teams are delivering and risks are being ...

Neue Sicherheitslücken in verschiedenen modernen Ryzen und Epyc Prozessoren AMDs
Die als mittelmäßig gefährlich eingestuften Schwächen wurden von Microsoft erkannt und bislang wohl nicht angegriffen. Einen Linux-Patch gibt es berei...

South Korean Government Imposes Penalties on SK Telecom for Breach
Following a breach at the country's top mobile provider that exposed 27 million records, the South Korean government imposed a small monetary penalty ...

5 Jahre nach großem Microsoft-Exchange-Einbruch: Chinese verhaftet
Hunderttausende MS-Exchange-Server wurden 2020-2021 geknackt. Nun wollen die USA dafür einen Chinesen vor Gericht stellen. Er befindet sich in Italien...

Malicious Open Source Packages Spike 188% YoY
Data exfiltration was the most common malware in Sonatype report, with more than 4,400 packages designed to steal secrets, personally identifiable inf...

Samsung announces major security enhancements coming to One UI 8
Samsung has announced multiple data security and privacy enhancements for its upcoming Galaxy smartphones running One UI 8, its custom user interface ...
M&S confirms social engineering led to massive ransomware attack
M&S confirmed today that the retail outlet's network was initially breached in a "sophisticated impersonation attack" that ultimately led to a Dra...
New Android TapTrap attack fools users with invisible UI trick
A novel tapjacking technique can exploit user interface animations to bypass Android's permission system and allow access to sensitive data or trick u...
Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials
The warning came after the department discovered that an impostor attempted to reach out to at least three foreign ministers, a U.S. senator and a gov...
'Save Our Signs' Wants to Save the Real History of National Parks Before Trump Erases It
Data preservationists and archivists have been working tirelessly since the election of President Donald Trump to save websites, data, and public i...

The Wild West of Agentic AI – An Attack Surface CISOs Can’t Afford to Ignore
As organizations rush to adopt agentic AI, security leaders must confront the growing risk of invisible threats and new attack vectors. The post The W...
The AI Fix #58: An AI runs a shop into the ground, and AI’s obsession with the number 27
In episode 58 of "The AI Fix" podcast, our hosts discover a pair of AI headphones that don't electrocute you, Microsoft invents "medical superintellig...
Overcoming Technical Barriers in Desktop and Application Virtualization
Exposed RDP ports are an open door for attackers. TruGrid SecureRDP enforces Zero Trust and MFA, blocks lateral movement, and secures remote access—no...
4 Critical Steps in Advance of 47-Day SSL/TLS Certificates
With certificate lifespans set to shrink by 2029, IT teams need to spend the next 100 days planning in order to avoid operational disruptions. ...
_Tomasz_Zajda_Alamy.jpg?width=1280&auto=webp&quality=80&disable=upscale)
Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension
Cybersecurity researchers have flagged a supply chain attack targeting a Microsoft Visual Studio Code (VS Code) extension called Ethcode that has been...

Researchers Jailbreak AI by Flooding It With Bullshit Jargon
You can trick AI chatbots like ChatGPT or Gemini into teaching you how to make a bomb or hack an ATM if you make the question complicated, full of aca...

Checking for Fraud: Texas Community Bank Nips Check Fraud in the Bud
Within months of implementing anti-fraud measures and automation, Texas National Bank prevented more than $300,000 in check fraud. ...

Server offline: Angreifer kapern PCs mit Lücke in "Call of Duty WW2"
"Call of Duty WW2"wurde erst bei Microsofts Game Pass wiederveröffentlicht, nun ist das Spiel vorerst offline. Unbekannte griffen Spieler-PCs per Expl...

5 Ways Identity-based Attacks Are Breaching Retail
From overprivileged admin roles to long-forgotten vendor tokens, these attackers are slipping through the cracks of trust and access. Here’s how five ...

The trust crisis in the cloud…and why blockchain deserves a seat at the table
As a cybersecurity consultant guiding organizations across the globe through digital transformation, I’ve observed one recurrin...

RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks
Cybersecurity researchers are calling attention to a malware campaign that's targeting security flaws in TBK digital video recorders (DVRs) and Four-F...

BaitTrap: Over 17,000 Fake News Websites Caught Fueling Investment Fraud Globally
A newly released report by cybersecurity firm CTM360 reveals a large-scale scam operation utilizing fake news websites—known as Baiting News Sites (BN...

Weekly Update 459
Presently sponsored by: Malwarebytes Browser Guard blocks phishing, ads, scams, and trackers for safer, faster browsingNew week, different end of the ...

Android Patchday fällt im Juli aus
Admins können sich zumindest in Bezug auf Android und Pixel-Smartphones zurücklehnen: Im Juli gibt es nichts zu patchen....

How talent-strapped CISOs can tap former federal government cyber pros
Since January, thousands of federal government jobs have vanished through a combination of firings, layoffs and resignations. T...

End of life for Microsoft Office puts malicious macros in the security spotlight
The upcoming end of life for Windows 10 has IT teams busy. From planning on migrations, to testing Windows 11 24H2, many of us ...

CISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added four security flaws to its Known Exploited Vulnerabilities (KEV) cata...

Bitchat ist Jack Dorseys internetfreie Messaging-App
Private Mitteilungen drahtlos zu übermitteln, aber ohne Internet - das soll Bitchat hinkriegen. Der Ansatz ist nicht ganz neu....

TAG-140 Targets Indian Government Via 'ClickFix-Style' Lure
The threat actors trick victims into opening a malicious script, leading to the execution of the BroaderAspect .NET loader. ...

Bert Blitzes Linux & Windows Systems
The new ransomware strain's aggressive multithreading and cross-platform capabilities make it a potent threat to enterprise environments. ...

Polymarket Gamblers Go to War Over Whether Zelenskyy Wore a Suit
Polymarket, an online betting marketplace that bills itself as the future of news, can’t decide whether or not Ukrainian president Volodomyr Zelens...

Doppelte Erpressung möglich: Cyberkriminelle im Clinch
Zwischen zwei rivalisierenden kriminellen Ransomware-Gruppen ist Streit ausgebrochen. Cyberexperten warnen, dass Unternehmen doppelt erpresst werden k...

Atomic macOS infostealer adds backdoor for persistent attacks
Malware analyst discovered a new version of the Atomic macOS info-stealer (also known as 'AMOS') that comes with a backdoor, to attackers persistent a...
SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools
Cybersecurity researchers have disclosed a malicious campaign that leverages search engine optimization (SEO) poisoning techniques to deliver a known ...

Isolated Recovery Environments: A Critical Layer in Modern Cyber Resilience
Written by: Jaysn Rye Executive Summary As adversaries grow faster, stealthier, and more destructive, traditional recovery strategies are increasingl...

The Open-Source Software Saving the Internet From AI Bot Scrapers
For someone who says she is fighting AI bot scrapers just in her free time, Xe Iaso seems to be putting up an impressive fight. Since she launched it ...

⚡ Weekly Recap: Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More
Everything feels secure—until one small thing slips through. Even strong systems can break if a simple check is missed or a trusted tool is misused. M...

Hiding Prompt Injections in Academic Papers
Academic papers were found to contain hidden instructions to LLMs: It discovered such prompts in 17 articles, whose lead authors are affiliated with 1...
Manufacturing Security: Why Default Passwords Must Go
If you didn't hear about Iranian hackers breaching US water facilities, it's because they only managed to control a single pressure station serving 7,...

Antivirus: Comodo Internet Security lässt sich Schadcode unterschieben
Ein IT-Sicherheitsforscher hat mehrere Sicherheitslücken im Virenschutz Comodo Internet Security entdeckt, wodurch Angreifer Schadcode einschleusen kö...

Ransomware-Bande Hunters International hört auf
Der Darknetauftritt von Ransomware-Bande Hunters International wurde leergeräumt und mit einer Abschiedsbotschaft versehen....

Sicherheitsupdate: Dell Data Protection Advisor über viele Lücken angreifbar
Angreifer können an Schwachstellen in Dells Backuplösung Data Protection Advisor ansetzen. Der Computerhersteller stuft das Risiko als kritisch ein. ...

Has CISO become the least desirable role in business?
After nine years as CSO and senior vice president of IT at Sumo Logic, George Gerchow had had enough. The job was stressful...

Let's Encrypt stellt erstes IP-Zertifikat aus
Das Let's-Encrypt-Projekt hat in der vergangenen Woche das erste Zertifikat für eine IP-Adresse ausgestellt. ...

Skills gaps send CISOs in search of managed security providers
A shortage of skilled cybersecurity professionals, combined with budget cuts, is fueling growth in the managed security service...

7-Zip 25.00 bessert Schwachstellen aus und beschleunigt Kompression
Die populäre Kompressionssoftware 7-Zip steht in Version 25.00 zur Installation bereit. Sie korrigiert auch Sicherheitslücken....

TAG-140 Deploys DRAT V2 RAT, Targeting Indian Government, Defense, and Rail Sectors
A hacking group with ties other than Pakistan has been found targeting Indian government organizations with a modified variant of a remote access troj...

OpenAI says GPT-5 will unify breakthroughs from different models
OpenAI has again confirmed that it will unify multiple models into one and create GPT-5, which is expected to ship sometime in the summer. [...]...
Hands on with Windows 11 Notepad's new markdown support
Notepad now lets you use markdown text formatting on Windows 11, which means you can write in Notepad just like you could in WordPad. [...]...
ChatGPT is testing disruptive Study Together feature
OpenAI's "Study together" mode has been spotted in the wild, and it could help students prepare for exams directly from ChatGPT. [...]...
BSI und ANSSI warnen vor VideoIdent bei der digitalen EU-Brieftasche
Das BSI und seine französische Partnerbehörde ANSSI beschreiben videobasierte Identifikation beim Beantragen der geplanten EUDI-Wallet als "herausford...

Android May Soon Warn You About Fake Cell Towers
Plus: Iran-linked hackers threaten to release Trump campaign emails, Chinese hackers still in US telecoms networks, and an abusive deepfake website pl...

Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties
Taiwan's National Security Bureau (NSB) has warned that China-developed applications like RedNote (aka Xiaohongshu), Weibo, TikTok, WeChat, and Baidu ...

Alert: Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS
Threat actors are weaponizing exposed Java Debug Wire Protocol (JDWP) interfaces to obtain code execution capabilities and deploy cryptocurrency miner...

Google's AI video maker Veo 3 is now available via $20 Gemini
Google says Veo 3, which is the company's state-of-the-art video generator, is now shipping to everyone using the Gemini app with a $20 subscription. ...
ChatGPT Deep Research tests new connectors for more context
ChatGPT Deep Research, which is an AI research tool to automate research, is getting support for new connectors (integrations), including Slack. [...]...
Friday Squid Blogging: How Squid Skin Distorts Light
New research. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy...
Hacker leaks Telefónica data allegedly stolen in a new breach
A hacker is threatening to leak 106GB of data allegedly stolen from Spanish telecommunications company Telefónica in a breach that the company did not...
Kommentar: Von wegen KI bedroht Jobs – Daten sind wirklich in Gefahr!
LLMs, KI-Chat und Agenten machen persönliche Daten einfach, kompakt und klar formuliert zugänglich. Dabei sammeln die Betreiber umfassende Mengen davo...

Sogar Notstrom fehlt: Schlechte Sicherheitstandards in Rechenzentren des Bundes
Ein Bericht des Bundesrechnungshofs wirft kein gutes Licht auf die Sicherheit der IT des Bundes. Nur ein Bruchteil der Rechenzentren erreiche Mindests...

In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
Noteworthy stories that might have slipped under the radar: drug cartel hires hacker to identify FBI informants, prison time for Russian ransomware de...
Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
Generative AI is changing how businesses work, learn, and innovate. But beneath the surface, something dangerous is happening. AI agents and custom Ge...

Google Ordered to Pay $314M for Misusing Android Users' Cellular Data Without Permission
Google has been ordered by a court in the U.S. state of California to pay $314 million over charges that it misused Android device users' cellular dat...

Cybersecurity in the supply chain: strategies for managing fourth-party risks
Fourth-party vendors have become a serious supply chain cybersecurity blind spot. Unlike third parties with direct contractual ...

Ransomware-Lösegeld-Verhandler gönnte sich offenbar Provisionen
Ein für das Aushandeln von Lösegeld bei aussichtslosen Ransomware-Vorfällen angestellter Experte hat sich wohl Provisionen zahlen lassen....

Leaks hint at Operator-like tool in ChatGPT ahead of GPT-5 launch
A few new code references in the ChatGPT web app and Android point to an Operator-like tool in GPT's chain of thoughts. [...]...
The Person in Charge of Testing Tech for US Spies Has Resigned
IARPA director Rick Muller is departing after just over a year at the R&D unit that invests in emerging technologies of potential interest to agen...

Trump Officials Want to Prosecute Over the ICEBlock App. Lawyers Say That’s Unconstitutional
The platform, which allows users to anonymously share the locations of ICE agents, is currently the third-most-downloaded iPhone app. ...

Police dismantles investment fraud ring stealing €10 million
The Spanish police have dismantled a large-scale investment fraud operation based in the country, which has caused cumulative damages exceeding €10 mi...
CBP Wants New Tech to Search for Hidden Data on Seized Phones
Customs and Border Protection is asking companies to pitch tools for performing deep analysis on the contents of devices seized at the US border. ...

Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams
A mobile ad fraud operation dubbed IconAds that consisted of 352 Android apps has been disrupted, according to a new report from HUMAN. The identified...

New Cyber Blueprint Aims to Guide Organizations on AI Journey
Deloitte's new blueprint looks to bridge the gap between the massive push for AI adoption and a lack of preparedness among leaders and employees. ...

IdeaLab confirms data stolen in ransomware attack last year
IdeaLab is notifying individuals impacted by a data breach incident last October when hackers accessed sensitive information. [...]...
Microsoft investigates ongoing SharePoint Online access issues
Microsoft is investigating an ongoing incident causing intermittent issues for users attempting to access SharePoint Online sites. [...]...
Dark Web Vendors Shift to Third Parties, Supply Chains
As attacks on software supply chains and third parties increase, more data on critical software and infrastructure services is being advertised and so...

Criminals Sending QR Codes in Phishing, Malware Campaigns
The Anti-Phishing Working Group observed how attackers are increasingly abusing QR codes to conduct phishing attacks or to trick users into downloadin...

Attackers Impersonate Top Brands in Callback Phishing
Microsoft, PayPal, Docusign, and others are among the trusted brands threat actors use in socially engineered scams that try to get victims to call ad...

Microsoft: Exchange Server Subscription Edition now available
Microsoft has announced that the Exchange Server Subscription Edition (SE) is now available to all customers of its enterprise email service. [...]...
The Hidden Weaknesses in AI SOC Tools that No One Talks About
If you’re evaluating AI-powered SOC platforms, you’ve likely seen bold claims: faster triage, smarter remediation, and less noise. But under the hood,...

Microsoft asks users to ignore Windows Firewall config errors
Microsoft asked customers this week to disregard incorrect Windows Firewall errors that appear after rebooting their systems following the installatio...
Podcast: The Life Changing Power of Lifting
For this week’s podcast, I’m talking to our friend Casey Johnston, a tech journalist turned fitness journalist turned independent journalist. Casey...

The Promise and Peril of Digital Security in the Age of Dictatorship
LGBTIQ+ organizations in El Salvador are using technology to protect themselves and create a record of the country’s ongoing authoritarian escalations...

Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms
The French cybersecurity agency on Tuesday revealed that a number of entities spanning governmental, telecommunications, media, finance, and transport...

Third-party risk management: How to avoid compliance disaster
Whether your organization is aware or not, it does relly on third-party services providers that help to make business processes...

5 multicloud security challenges — and how to address them
A multicloud environment is now standard for midsize and large organizations, with tech leaders opting to use multiple cloud pr...

Taiwan: Cyberkrimineller zapfte Notrufdaten ab und verkaufte sie an Bestatter
Ehemaliger Rettungssanitäter in Taiwan verkaufte jahrelang Notrufdaten an Bestatter, die dadurch schneller am Unfallort sein konnten. Die Ermittlungen...

Welcoming Truyu to Have I Been Pwned's Partner Program
Presently sponsored by: Malwarebytes Browser Guard blocks phishing, ads, scams, and trackers for safer, faster browsingI always used to joke that when...

Browser Extensions Pose Heightened, but Manageable, Security Risks
Attackers can abuse malicious extensions to access critical data, including credentials, but organizations can reduce the risks by raising awareness a...

Initial Access Broker Self-Patches Zero Days as Turf Control
A likely China-nexus threat actor has been exploiting unpatched Ivanti vulnerabilities to gain initial access to victim networks and then patching the...

US Treasury Sanctions BPH Provider Aeza Group
In the past, the bulletproof group has been affiliated with many well-known ransomware and malware groups, such as BianLian and Lumma Stealer. ...

AI Tackles Binary Code Challenges to Fortify Supply Chain Security
Analyzing binary code helps vendors and organizations detect security threats and zero-day vulnerabilities in the software supply chain, but it doesn'...
Russian APT 'Gamaredon' Hits Ukraine With Fierce Phishing
A Russian APT known as "Gamaredon" is using spear-phishing attacks and network-drive weaponization to target government entities in Ukraine. ...

DOJ investigates ex-ransomware negotiator over extortion kickbacks
An ex-ransomware negotiator is under criminal investigation by the Department of Justice for allegedly working with ransomware gangs to profit from ex...
A Group of Young Cybercriminals Poses the ‘Most Imminent Threat’ of Cyberattacks Right Now
The Scattered Spider hacking group has caused chaos among retailers, insurers, and airlines in recent months. Researchers warn that its flexible struc...

Spain arrests hackers who targeted politicians and journalists
The Spanish police have arrested two individuals in the province of Las Palmas for their alleged involvement in cybercriminal activity, including data...
Cyberattacke: Angreifer öffnen Staudammventile
In Norwegen kam es im April zu einem Cyberangriff auf die Steuerung eines Staudamms. Dabei wurden die Ventile über Stunden komplett geöffnet....

Forminator plugin flaw exposes WordPress sites to takeover attacks
The Forminator plugin for WordPress is vulnerable to an unauthenticated arbitrary file deletion flaw that could enable full site takeover attacks. [.....
Swiss government warns attackers have stolen sensitive data, after ransomware attack at Radix
The Swiss government has issued a warning after a third-party service provider suffered a ransomware attack, which saw sensitive information stolen fr...
1 Year Later: Lessons Learned From the CrowdStrike Outage
The ever-growing volume of vulnerabilities and threats requires organizations to remain resilient and anti-fragile — that is, to be able to proactivel...

Microsoft fixes ‘Print to PDF’ feature broken by Windows update
Microsoft has fixed a known bug that breaks the 'Print to PDF' feature on Windows 11 24H2 systems after installing the April 2025 preview update. [......
Windows 11: Microsoft aktiviert Hotpatching standardmäßig
Microsoft stellt für die Enterprise-Kunden mit Windows Autopatch Windows-11-Clients standardmäßig auf Hotpatching um....

Like Ransoming a Bike: Organizational Muscle Memory Drives the Most Effective Response
Ransomware is a major threat to the enterprise. Tools and training help, but survival depends on one thing: your organization’s muscle memory to respo...
US Calls Reported Threats by Pro-Iran Hackers to Release Trump-Tied Material a ‘Smear Campaign’
The United States has warned of continued Iranian cyberattacks following American strikes on Iran’s nuclear facilities. The post US Calls Reported Thr...
Second espionage-linked cyberattack hits ICC, exposing persistent threats to global justice systems
The International Criminal Court (ICC) has fallen victim to another sophisticated cyberattack, the second major cyber espionage...

Cybersecurity M&A Roundup: 41 Deals Announced in June 2025
Forty-one cybersecurity merger and acquisition (M&A) deals were announced in June 2025. The post Cybersecurity M&A Roundup: 41 Deals Announced...
Microsoft: DNS issue blocks delivery of Exchange Online OTP codes
Microsoft is working to fix a DNS misconfiguration that is causing one-time passcode (OTP) message delivery failures in Exchange Online for some users...
Schwachstellen: IBM Storage Scale für Attacken anfällig
IBMs Speicherlösung Storage Scale ist über mehrere Sicherheitslücken angreifbar. Eine reparierte Version steht zum Download bereit....
