What we are reading

We are always asked what we are reading and paying attention to, whilst we want to keep you updated with this there is just too much stuff. Here is a sample of the daily reading lists.

Chennai Activist Meenakshi Balasubramanian's Journey from Accounting to Advocacy for ... - AInvest
2025-07-10 23:30:04

Meenakshi Balasubramanian, a Chennai activist, advocates for accessibility and inclusion for persons with disabilities in Tamil Nadu and across ...

Go to External Site

 

ATM theft scheme targets Merced, Tulare, six other states | Fresno Bee
2025-07-10 23:30:03

A conspiracy to steal cash via ATM malware led to the indictment of two Venezuelans in Merced County, with theft spanning multiple states on the ...

Go to External Site

 

New ZuRu Malware Variant Attacking macOS Users Via Weaponized Termius App
2025-07-10 23:30:03

A new ZuRu macOS malware variant spreads via trojanized Termius SSH app, targeting developers with advanced infection techniques.

Go to External Site

 

Critical Ruckus Wireless Flaws Threaten Enterprise Wi‑Fi Security - GBHackers
2025-07-10 23:20:11

ServiceNow Platform Vulnerability Enables Attackers to Exfiltrate Sensitive Data · 0. Security researchers have identified a critical vulnerability in ...

Go to External Site

 

INE Security Unveiled Enhanced eMAPT Certification
2025-07-10 23:20:10

A critical vulnerability CVE-2025-6514 with a CVSS score of 9.6 affecting the mcp-remote project allows… 2 hours ago. All Rights ReservedView Non ...

Go to External Site

 

McDonald's McHire Vulnerability Leaked Data of 64 Million Job Seekers - Hackread
2025-07-10 23:20:09

Both companies have stated their commitment to data security following the swift remediation of this critical vulnerability. “This incident is a ...

Go to External Site

 

Russia rejects ethical hacking bill - The Register
2025-07-10 23:10:14

Discussions around making legal provisions for services such as penetration testing and bug bounties were originally introduced by Russia's ...

Go to External Site

 

Phishing gang made USD 50 million on Bitcoin investors account - The Paypers
2025-07-10 23:10:08

... Cisco Talos. Thus, when a user searched for crypto-related keywords such as “blockchain” or “bitcoin wallet,” the spoofed links appeared at the ...

Go to External Site

 

SafePay Ransomware Leverages RDP and VPN for Intruding Into Organizations Network
2025-07-10 22:50:04

SafePay ransomware surged in 2025, hitting 200+ victims via RDP/VPN attacks on MSPs & SMBs, disrupting supply chains.

Go to External Site

 

Weaponized Termius App Delivers Latest ZuRu Malware to macOS Users - GBHackers
2025-07-10 22:50:03

A sophisticated variant of the macOS.ZuRu malware, first identified by a Chinese blogger, has resurfaced with a new method of attack.

Go to External Site

 

SuperOps Takes On Agentic AI with 'Agent Missing' Campaign - Channel Futures
2025-07-10 22:50:03

SuperOps, the AI-powered IT management platform, has unveiled its new Agent Missing campaign for MSPs focused on agentic AI.

Go to External Site

 

AI Attacks Are Coming in a Big Way Now! - KnowBe4 blog
2025-07-10 22:50:03

Most cyberattackers employ two primary methods, social engineering and exploiting software and firmware vulnerabilities, to gain initial access to ...

Go to External Site

 

Fix: Verifying Shim SBAT Data Failed – Security Policy Violation - Appuals
2025-07-10 22:30:12

... Windows updates. These updates make Secure Boot more strict. If the Linux bootloader hasn't been updated or properly configured, the system may ...

Go to External Site

 

How to Restore and Install WordPad in Windows 11 (Easy Guide)
2025-07-10 22:30:11

Note: This is an unofficial workaround. WordPad may not work perfectly, and future Windows updates might disable or break it.

Go to External Site

 

Citrixbleed 2, Hardware Hacking, and Failed Bans – PSW #882 | SC Media
2025-07-10 22:20:09

"TL;DR: We discovered a critical vulnerability in open-vsx.org, the open-source VS Code extensions marketplace powering popular VSCode forks like ...

Go to External Site

 

Alert: Scattered Spider is Targeting the Aviation Sector - KnowBe4 blog
2025-07-10 21:50:03

The US FBI and cybersecurity experts are warning that the Scattered Spider extortion gang has shifted its focus to the aviation and transportation ...

Go to External Site

 

MP Materials Secures £400 Million Pentagon Deal for Rare Earth Magnets - Discovery Alert
2025-07-10 21:20:10

The MP Materials-Pentagon partnership addresses a critical vulnerability in US industrial capacity. For decades, the United States has relied ...

Go to External Site

 

INE Security Launches Enhanced eMAPT Certification - GBHackers
2025-07-10 21:10:13

Industry's Most Comprehensive Mobile Application Penetration Testing Program Addresses Real-World Mobile Security Challenges.

Go to External Site

 

iVerify and NetHope Partner to Advance Mobile Protection for Nonprofits Globally
2025-07-10 20:50:04

Through its philanthropic arm, iVerify will provide its solution to protect journalists, activists and others in harm's way.

Go to External Site

 

Ingram Micro Operations Back Up After Ransomware Attack - Channel Futures
2025-07-10 20:50:03

While many partner businesses were impacted by the Ingram Micro ransomware attack, they are mostly complementary of how it handled the affair.

Go to External Site

 

Check Point Global Threat Index June 2025: Eight African countries among the most targeted as
2025-07-10 20:50:03

Cybercriminals escalate tactics with AsyncRAT's sophisticated campaign, while FakeUpdates continues to be the most widespread malware targeting...

Go to External Site

 

African Crypto Adoption Accelerates While Vital Support Systems Starve - - Disrupt Africa
2025-07-10 20:20:09

Yet this progress hides a critical vulnerability: the organizations enabling it are financially desperate. Incubators and hubs supporting founders ...

Go to External Site

 

National Commission for SCs takes suo motu cognisance of medico's death - PressReader
2025-07-10 19:40:06

The National Commission for Scheduled Castes (NCSC) has taken suo motu cognisance of the death of a postgraduate medical student in a private ...

Go to External Site

 

AMD Transient Scheduler Attacks TSA CVE-2024-36350 Explained - List of AMD Processors Affected
2025-07-10 19:30:13

Windows updates incorporating the revised AMD microcode should arrive via Windows Update. Virtualization and Hypervisor Controls. Cloud providers ...

Go to External Site

 

Microsoft Resolves Widespread WSUS Outage Affecting Business Networks - Yahoo! Tech
2025-07-10 19:30:12

Microsoft has fixed an issue that affected Windows Server Update Services (WSUS), a tool many businesses use to manage and distribute Windows updates ...

Go to External Site

 

Walmart's Ozark Trail Recall: A Litmus Test for Reputational and Supply Chain Risks in Retail
2025-07-10 19:20:09

The recall highlights a critical vulnerability: If Walmart's quality control processes failed to detect the lid design flaw over eight years, it ...

Go to External Site

 

'AI is helping defenders more than attackers' - The New Indian Express
2025-07-10 19:10:03

Cyber criminals now use AI to improvise their phishing attempts–by eliminating spelling and grammar errors and crafting more believable emails.

Go to External Site

 

Hackers Abused GitHub to Spread Malware Mimic as VPN - Cyber Security News
2025-07-10 19:10:03

A sophisticated malware campaign has emerged exploiting the trusted GitHub platform to distribute malicious software disguised as legitimate tools ...

Go to External Site

 

GodFather 2.0: The Malware That Virtualizes Your Apps to Steal Your Data - 24matins.uk
2025-07-10 19:10:03

The GodFather 2.0 malware uses advanced virtualization techniques to create copies of your apps, enabling it to bypass security measures and steal ...

Go to External Site

 

Hackers Exploit GitHub to Distribute Malware Disguised as VPN Software - GBHackers
2025-07-10 19:10:03

CYFIRMA has discovered a sophisticated cyberattack campaign in which threat actors are using GitHub to host and disseminate malware.

Go to External Site

 

MP Materials: The linchpin in America's Rare Earth Renaissance - AInvest
2025-07-10 18:20:09

... critical vulnerability in an era of geopolitical tension. By guaranteeing a 15% equity stake, a $110/kg price floor for key rare earths, and ...

Go to External Site

 

The TTP 12 (Part 1): Underground LLMs — Scams, Jailbreaks, and Poetic Justice - YouTube
2025-07-10 18:20:08

... 12 (Part 1): Underground LLMs — Scams, Jailbreaks, and Poetic Justice. 9 views · 17 minutes ago ...more. Cisco Talos Intelligence Group. 5.37K.

Go to External Site

 

Asus and Adobe vulnerabilities - Cisco Talos Blog
2025-07-10 18:20:08

Cisco Talos' Vulnerability Discovery & Research team recently disclosed two vulnerabilities each in Asus Armoury Crate and Adobe Acrobat products.

Go to External Site

 

Cisco Talos report shows LLMs are being weaponised by cybercriminals
2025-07-10 18:20:08

Cisco Talos has observed a growing use of uncensored, jailbroken and criminal-designed LLMs to support phishing, malware development, and other ...

Go to External Site

 

TECHx Media on X: "AI in the Wrong Hands? @Cisco Talos Uncovers the Dark Side ...
2025-07-10 18:20:08

AI in the Wrong Hands? @Cisco Talos Uncovers the Dark Side Cybercriminals are now weaponizing AI to scale attacks Jailbroken LLMs generating ...

Go to External Site

 

"We can no longer afford to build AI on brittle foundations past their prime." - Haider Aziz, VAST Data
2025-07-10 18:20:08

Previous ArticleCisco Talos report shows LLMs are being weaponised by cybercriminals. Related Articles. Most Read in Home-Slide. Ericsson reinforces ...

Go to External Site

 

Fortinet finds OT security maturity reduces attacks, as more CISOs are at the helm in 2025
2025-07-10 18:10:04

Fortinet revealed persistent gaps, pointing to critical areas where organizations must strengthen their defenses as IT and OT (operational ...

Go to External Site

 

Fake online stores look real, rank high, and trap unsuspecting buyers - Help Net Security
2025-07-10 18:10:03

Learn how cybercriminals create fake online stores in online shopping scams to trick consumers into sharing personal info or sending money.

Go to External Site

 

K7 Antivirus for Mac: Bare-Bones Antivirus Protection for Your Mac | PCMag
2025-07-10 18:10:03

It doesn't even include browser-level protection against malicious and fraudulent websites. With its Windows equivalent, you get a firewall, ...

Go to External Site

 

Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting ... - The Hacker News
2025-07-10 17:20:09

A critical vulnerability in mcp-remote (CVE-2025-6514) allows remote code execution, affecting 437000+ users.

Go to External Site

 

H-ISAC TLP White Threat Bulletin PoC Exploits Available for Citrix NetScaler ADC and ...
2025-07-10 17:20:09

Proof-of-Concept (PoC) exploits for a critical vulnerability, tracked as CVE-2025-5777 and dubbed CitrixBleed2, affecting Citrix NetScaler ADC and ...

Go to External Site

 

Latest Windows 11 update makes your life easier and your system secure - Club386
2025-07-10 17:10:11

Microsoft is out with one of its biggest Windows updates, showcasing the company's continued strive to make it a better OS. By Fahd Temsamani. Jul ...

Go to External Site

 

Microsoft Confirms Windows Server Update Services (WSUS) Sync Issues
2025-07-10 17:10:11

This problem is delaying the deployment of critical Windows updates across enterprise environments that depend on WSUS for patch management. Windows ...

Go to External Site

 

Apple could use a nifty iPhone trick for Macs - updating them to the latest version of macOS ...
2025-07-10 17:10:11

... Windows updates, and it could make everyone's life easier. Latest in Macs. Apple Mac Mini M4. Quick! The tiny but mighty Mac mini is cheaper than ...

Go to External Site

 

Hotpatching Now Available on Windows 11 ARM64 Devices - Petri IT Knowledgebase
2025-07-10 17:10:11

Go to the Microsoft Intune admin center, and navigate to Devices > Windows updates > Quality updates. Select Create Windows quality update policy ...

Go to External Site

 

Robustness of infrastructure networks with cascading overload failures under extreme ...
2025-07-10 16:20:10

Cascading failures are a critical vulnerability of complex information or infrastructure networks. Here we investigate the properties of load ...

Go to External Site

 

Critical Bluetooth Flaws 'PerfektBlue' Expose Millions of Vehicles to 1-Click RCE
2025-07-10 16:20:10

Critical Vulnerability in Kia Cars Allowed Arbitrary Remote Control ...

Go to External Site

 

Cannabis and the cost of complacency | Insurance Business America
2025-07-10 16:20:09

The cannabis sector is booming, but a critical vulnerability threatens to blunt its momentum. Chris Sullivan (pictured), commercial practice ...

Go to External Site

 

Hackers Exploiting GeoServer RCE Vulnerability to Deploy CoinMiner
2025-07-10 16:20:04

A critical remote code execution vulnerability in GeoServer has become a prime target for cybercriminals deploying cryptocurrency mining malware ...

Go to External Site

 

Coffee with Craig and James Episode 153: Malwarebytes' Brian Kane - Channel Futures
2025-07-10 16:20:03

Partners have a huge opportunity to protect SMBs from cyber threats, as Malwarebytes' Brian Kane explains in this episode of Coffee with Craig and ...

Go to External Site

 

Africa top target for cyber attacks – Check Point report - ITWeb
2025-07-10 16:20:03

Eli Smadja, global research group manager at Check Point, provided a detailed overview of Africa's evolving cyber threat landscape, which he said is ...

Go to External Site

 

FG, NITDA pledges robust cybersecurity at maiden edition of NCSC - Technext
2025-07-10 16:10:06

Cybersecurity hackathon at NCSC 2025. As part of the National Cyber Security Conference activities, on Day 1, July 9, the MDAs Hackathon showcased ...

Go to External Site

 

UK companies should have to disclose major cyberattacks, M&S says
2025-07-10 16:10:05

... (NCSC). Active lives, daily routines: How Sun City West Senior community keeps moving. “In fact we have reason to believe there've been two major ...

Go to External Site

 

India: The Go-To Destination for Outsourcing Personal Assistants | EIN Presswire
2025-07-10 16:00:14

That's where CloudIBN steps in — securing outsourcing operations through powerful VAPT Services (Vulnerability Assessment and Penetration Testing).

Go to External Site

 

Securing The Invisible Empire: How Family Offices Can Mitigate Cyber Risks - Mondaq
2025-07-10 16:00:13

Legacy systems still in use may not be patched regularly, and penetration testing is rarely conducted, creating ripe conditions for exploitation.

Go to External Site

 

INE Security Launches Enhanced eMAPT Certification - DevOps.com
2025-07-10 16:00:13

Cary, North Carolina, July 10th, 2025, CyberNewsWire. Industry's Most Comprehensive Mobile Application Penetration Testing Program Addresses ...

Go to External Site

 

Rhadamanthys Infostealer Uses ClickFix Technique to Steal Login Credentials - GBHackers
2025-07-10 15:30:04

The malware's data exfiltration scope is staggeringly broad, targeting system information, browser credentials, cryptocurrency wallets, and even ...

Go to External Site

 

K7 Antivirus for Mac - Review 2025 - PCMag UK
2025-07-10 15:30:03

Cons · No detection of malicious or fraudulent websites · No scores from independent testing labs · Does not detect Windows malware ...

Go to External Site

 

China-based hacker to face charges in US after arrest in Italy | SC Media
2025-07-10 15:30:02

Security pros advised to patch the bugs as CISA warns that they have been actively exploited. botnet bot-net computer virus · Threat Intelligence ...

Go to External Site

 

ServiceNow Platform Vulnerability Enables Attackers to Exfiltrate Sensitive Data
2025-07-10 15:20:10

A critical vulnerability in ServiceNow's widely-used enterprise platform that could enable attackers to extract sensitive data.

Go to External Site

 

European manufacturers face critical vulnerabilities - BetaNews
2025-07-10 15:20:10

Human risk remains a critical vulnerability too as social engineering is responsible for 22 percent of breaches in manufacturing organizations.

Go to External Site

 

GitLab Vulnerabilities Enable Attackers to Inject Malicious Content and Execute Actions
2025-07-10 15:20:10

The most critical vulnerability, designated CVE-2025-6948 with a CVSS score of 8.7, affects all versions from 17.11 before 17.11.6, 18.0 before ...

Go to External Site

 

Beyond Shift Left Security: Maximizing Security Across the Software Development Lifecycle
2025-07-10 15:20:09

For example, if a SAST scanner detects a critical vulnerability, the developer must either resolve it or obtain approval from the security team before ...

Go to External Site

 

Critical mcp-remote Vulnerability Exposes LLM Clients to Remote Code Execution Attacks
2025-07-10 15:20:09

A critical vulnerability CVE-2025-6514 with a CVSS score of 9.6 affecting the mcp-remote project allows attackers to achieve arbitrary operating ...

Go to External Site

 

Microsoft Confirms Teams Outage for Users, Investigation Underway - Updated
2025-07-10 15:20:09

A critical vulnerability CVE-2025-6514 with a CVSS score of... CISO Corner. How to Conduct a Secure Code Review – Tools and Techniques · CISO ...

Go to External Site

 

Critical Bluetooth Protocol Vulnerabilities Expose Devices to RCE Attacks - GBHackers
2025-07-10 15:20:09

Security researchers have identified a critical vulnerability in ServiceNow's... CVE/vulnerability · CISA Warns ValveLink Products May Expose ...

Go to External Site

 

Beware of Scam Websites: How SEO Manipulation is Spreading Hidden Malware
2025-07-10 15:20:06

Scam websites are spreading malware through Google Search. Learn how fake sites are manipulating SEO to distribute malicious software like Oyster.

Go to External Site

 

New malware uses AI to bypass protection - IT-Online
2025-07-10 15:20:06

Kathy Gibson reports – Researchers have uncovered new malware threats that use artificial intelligence (AI) to bypass existing malware detection.

Go to External Site

 

Google reveals details on Android's Advanced Protection for Chrome - Bleeping Computer
2025-07-10 15:20:06

Android malware Anatsa infiltrates Google Play to target US banks ... malware, data breach incidents, and hacks. Previous Article · Next Article ...

Go to External Site

 

Ransomware attacks carry huge financial impacts – but CISO worries still aren't stopping ...
2025-07-10 15:20:05

... malware in the past year. Data from Absolute Security, which surveyed 500 CISOs based in the US through Censuswide, found 72% of respondents ...

Go to External Site

 

Hackers Abuse GitHub to Spread Malware Posing as VPN Software - Cyber Press
2025-07-10 15:20:05

In a recent cyber threat investigation, researchers at CYFIRMA have uncovered an active malware campaign exploiting GitHub.

Go to External Site

 

Fix the Click: Preventing the ClickFix Attack Vector - Unit 42
2025-07-10 15:20:05

... malware. ClickFix campaigns are on the rise. We highlight three that distributed NetSupport RAT, Latrodectus, and Lumma Stealer malware.

Go to External Site

 

Threat Actors Exploit AV/EDR Evasion Framework to Deploy Malware in the Wild
2025-07-10 15:20:05

Elastic Security Labs has identified multiple financially motivated malware campaigns leveraging the commercial AV/EDR evasion framework, ...

Go to External Site

 

New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App
2025-07-10 15:20:05

Cybersecurity researchers have discovered new artifacts associated with an Apple macOS malware called ZuRu, which is known to propagate via ...

Go to External Site

 

AI malware can now evade Microsoft Defender — open-source LLM outsmarts tool around 8 ...
2025-07-10 15:20:05

But here's the rub: the report said Avery's "model was able to generate malware capable of totally bypassing Microsoft Defender for Endpoint about 8% ...

Go to External Site

 

macOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius App
2025-07-10 15:20:05

ZuRu malware continues to prey on macOS users seeking legitimate business tools, adapting its loader and C2 techniques to backdoor its targets.

Go to External Site

 

Browser extensions turn nearly 1 million browsers into website-scraping bots - Ars Technica
2025-07-10 15:20:04

Intentional weakening of browsing protections · Of 45 known Chrome extensions, 12 are now inactive. Some of the extensions were removed for malware ...

Go to External Site

 

Mobile attackers target banking apps with trojan malware - Security Journal UK
2025-07-10 15:20:04

Zimperium has revealed new zLabs research, detailing an advanced evolution of mobile attackers using a GodFather Android banking trojan.

Go to External Site

 

New Scraper Botnet with 3,600+ Unique Devices Attacking Targets in US and UK
2025-07-10 15:20:04

The malware campaign represents a significant escalation in automated web scraping attacks, leveraging a globally distributed infrastructure with ...

Go to External Site

 

If it's open-source, it might come with baggage - Cybernews
2025-07-10 15:20:04

Hackers are flooding open source repositories with malware designed to steal secrets, hijack cloud accounts, and quietly infiltrate the software ...

Go to External Site

 

Think Before You Click: Fake Google Search Results Are Spreading Malware - Tech
2025-07-10 15:20:04

... malware campaign that uses fake websites to distribute malicious software. These scams are particularly dangerous because they mimic legitimate ...

Go to External Site

 

AI malware proves capable of bypassing Microsoft Defender — But not yet a sky‑is‑falling moment
2025-07-10 15:20:04

Researchers from Outflank have trained an open-source AI model to generate malware that evades Microsoft Defender 8% of the time.

Go to External Site

 

Updated AMOS malware gains persistent backdoor - SC Media
2025-07-10 15:20:04

Updated AMOS malware gains persistent backdoor Infosecurity Magazine reports that Atomic macOS Stealer, or AMOS, malware has once again been ...

Go to External Site

 

Millions of Chrome, Edge users compromised with malicious extensions | SC Media
2025-07-10 15:20:04

Further analysis revealed that malware had been added to the extensions much later through updates. "Due to how Google and Microsoft handle ...

Go to External Site

 

Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
2025-07-10 15:20:03

A cryptocurrency social engineering campaign uses fake AI and gaming companies to deliver malware on Windows and macOS, draining digital assets.

Go to External Site

 

Authorities arrest four hackers linked to UK retail hacking spree | TechCrunch
2025-07-10 15:20:03

The Co-op reportedly avoided the ransomware by pulling down its own network before the hackers could activate the malware. Harrods, too, said it ...

Go to External Site

 

China's Rare Earth Dominance: Strategic Resource Control in 2025 - Discovery Alert
2025-07-10 14:20:11

The global rare earth supply chain faces a critical vulnerability—overwhelming dependence on a single source. China controls approximately 70% of ...

Go to External Site

 

35+ Top Pentesting & AI Pentesting Tools for Cybersecurity in 2025 - EC-Council
2025-07-10 14:10:12

Explore 35+ top penetration testing tools and cutting-edge AI pentesting solutions to strengthen cybersecurity in 2025.

Go to External Site

 

Millions of Cars Exposed to Remote Hacking via PerfektBlue Attack - SecurityWeek
2025-07-10 14:10:12

Researchers at penetration testing and threat intelligence firm PCA Cyber Security (formerly PCAutomotive) have discovered that critical ...

Go to External Site

 

Funcom apologises after Dune Awakening patch accidentally wipes player progress | GosuGamers
2025-07-10 14:10:12

To prevent further abuse, Funcom is rolling out additional server-side security upgrades and conducting penetration testing as part of its upcoming ...

Go to External Site

 

McDonald's AI Hiring Bot With Password '123456' Leaks Millions of Job-Seekers Data
2025-07-10 14:10:12

The security researchers identified multiple critical vulnerabilities through systematic penetration testing of the McHire platform. Their ...

Go to External Site

 

Winstanley College awarded gold status for cyber education - Wigan Today
2025-07-10 12:40:06

CyberFirst, a programme led by the UK's National Cyber Security Centre (NCSC), celebrates excellence in cyber education and engagement. The Gold ...

Go to External Site

 

Critical Vulnerability in FortiWeb | Cyber Security Agency of Singapore
2025-07-10 12:20:10

Fortinet has released security updates to address a critical vulnerability (CVE-2025-25257) affecting their FortiWeb products. Impact. Successful ...

Go to External Site

 

IMF Demands Energy, Cocoa Reforms to Anchor Ghana's Fiscal Stability
2025-07-10 12:20:10

The power sector remains a critical vulnerability, with $3.1 billion in legacy debts and an additional $3.7 billion required to clear arrears.

Go to External Site

 

MP Materials Gets Pentagon Boost As US Battles China For Rare Earths - Benzinga
2025-07-10 12:20:09

As the U.S. faces a critical vulnerability in its supply chain concerning the rare earth supply, MP Materials Corp.

Go to External Site

 

Nippon Steel IT Subsidiary Hit by “Zero-Day Attack” - Infosecurity Magazine
2025-07-10 12:20:09

SAP Fixes Critical Vulnerability After Evidence of Exploitation · News 25 Apr 2025. MITRE Unveils Top 25 Most Critical Software Flaws · News 22 Nov ...

Go to External Site

 

Black Kite Releases 2025 State of Financial Services: Hidden Dangers in the Vendor ...
2025-07-10 12:20:09

Black Kite researchers found that 31 out of 140 vendors have at least one critical vulnerability with a CVSS at or above 8, and 15 vendors show an ...

Go to External Site

 

Opossum” Attack Breaks Secure TLS Channels with Malicious Message Injection
2025-07-10 12:20:09

This dual-support requirement creates a critical vulnerability window that attackers can exploit to break the fundamental security assumptions of ...

Go to External Site

 

NATO's Subsea Shield: Geopolitical Risks and Tech Innovation Driving Strategic Investments
2025-07-10 12:20:09

... critical vulnerability. NATO's intensified focus on securing subsea assets, driven by escalating geopolitical tensions and technological ...

Go to External Site

 

Hackers & Espionage: Bundeswehr Suppliers in Focus - B2B Cyber Security
2025-07-10 12:20:09

Critical vulnerability in Linux tool sudo. The critical vulnerability CVE-2025-32463 affects the UNIX and Linux tool sudo and allows local ...

Go to External Site

 

Security alert: TalkTalk customers targeted by fake customer representatives - The Paypers
2025-07-10 10:30:02

They say they then convinced victims to install a computer virus, and afterwards a separate team would use that virus to gain access to victims online ...

Go to External Site

 

Lumma Malware: Unmasking the Stealthy Infostealer - Check Point Software
2025-07-10 09:20:04

Learn about Lumma malware, considered to be one of the most prolific infostealers on the market today, and how organizations can detect and ...

Go to External Site

 

Kaspersky uncovers ongoing Batavia spyware attacks on Russian industrial sector
2025-07-10 09:20:03

The malware consists of the following malicious components: a VBA script and two executable files.” The research indicates that the theme of the ...

Go to External Site

 

Beware! Hackers are using Google Search to trick you into downloading malware, here's how - Digit
2025-07-10 09:20:02

Hackers use SEO to rank fake sites mimicking PuTTY and WinSCP, tricking users into downloading malware. The malware silently runs in the ...

Go to External Site

 

Microsoft admits Windows Server Update Services sync is failing - BetaNews
2025-07-10 08:30:12

This is a serious headache for businesses and organizations that rely on WSUS to manage Windows updates across networks. Reports of errors have ...

Go to External Site

 

2/3 online banking systems to contain at least one critical vulnerability - The Paypers
2025-07-10 08:20:09

Almost half (48%) of mobile banking apps still contained at least one critical vulnerability. In 52% of cases, attackers could exploit ...

Go to External Site

 

New ransomware is small, fast and dangerously self-sufficient - Computing UK
2025-07-10 08:10:03

Cybersecurity researchers have uncovered a new ransomware strain that is drawing attention for its minimalist yet dangerously effective design.

Go to External Site

 

Protection Highlight: Deep Learning Powers Detection of Stealthy Script Threats Delivering ...
2025-07-10 08:10:03

Malicious actors continuously evolve their tactics to evade detection in today's dynamic cybersecurity landscape. Among these, script-based ...

Go to External Site

 

Call of Duty: WWII pulled from PC Game Pass after hackers hijack players' PCs
2025-07-10 07:20:09

A critical vulnerability in the game allowed hackers to take control of the users' computers. After a wave of such reports, Activision made the ...

Go to External Site

 

Government to help small companies beef up cybersecurity defences - The Times
2025-07-10 06:40:06

Richard Horne, CEO of NCSC, speaking at the CYBERUK 2025 conference. The government is taking the cybersecurity threat to businesses very ...

Go to External Site

 

FG deploys measures against cyberattacks - The Guardian Nigeria News
2025-07-10 06:40:06

Speaking in Abuja, yesterday, on the readiness of the country to tackle the menace of cybercrime at the maiden National Cybersecurity Conference (NCSC) ...

Go to External Site

 

Malware steals USD 4 mln from US banks - The Paypers
2025-07-10 05:40:04

The hackers combined code from two malware types, known as Nymaim and Gozi, to create GozNym, a Trojan both persistent and powerful, according to ...

Go to External Site

 

171% Surge in Unique Malware Detections: Report - IDM Magazine
2025-07-10 05:40:03

Transport Layer Security malware rose by 11 percentage points, indicating encrypted channels as a primary attack vector. Endpoint threats saw dramatic ...

Go to External Site

 

Open source has a malware problem, and it's getting worse - Help Net Security
2025-07-10 05:40:02

Sonatype has published its Q2 2025 Open Source Malware Index, identifying 16,279 malicious open source packages across major ecosystems such as ...

Go to External Site

 

Windows Server Update Services (WSUS) is broken, and there is no workaround - Neowin
2025-07-10 05:30:12

It admitted that the bug has resulted in customers not being able to deploy Windows updates via WSUS and Configuration Manager. Although manual ...

Go to External Site

 

Veteran mining boss Friedland hails Trump's 'intelligent' copper tariffs - Financial Times
2025-07-10 04:20:10

... critical vulnerability in national security,” industry veteran Friedland told the Financial Times. “I commend the Trump administration for doing ...

Go to External Site

 

Vulnerability Citrix NetScaler | CVE-2025-5777 - Stormshield
2025-07-10 04:20:10

A critical vulnerability impacting Citrix NetScaler has been reported. It has been assigned the reference CVE-2025- 5777 and a CVSS 3.1 score of ...

Go to External Site

 

Huntress Collaborates with Microsoft to Beef Up Cybersecurity - Channel Futures
2025-07-10 03:40:03

Microsoft Defender for Endpoint, Business and AV, Microsoft 365 Business Premium, E3 and E5 licenses are now enhanced with Huntress' security products ...

Go to External Site

 

Ongoing ClickFix Campaign | Cyber Security Agency of Singapore
2025-07-10 03:40:02

There have been reports of threat actors using a social engineering technique known as ClickFix to trick potential victims into executing ...

Go to External Site

 

One of the biggest security threats to Apple systems just got a major upgrade - MSN
2025-07-10 02:40:03

Atomic Stealer (AMOS), one of the most dangerous infostealer malware threats on the macOS ecosystem, just got a significant upgrade that makes it ...

Go to External Site

 

DoNot APT is expanding scope targeting European foreign ministries - Security Affairs
2025-07-10 02:40:02

DoNot APT, likely an India-linked cyberespionage group, targets European foreign ministries with LoptikMod malware.

Go to External Site

 

FireEye reports POS malware targeting US-based banks and retailers - The Paypers
2025-07-10 01:10:04

The malware is called Treasurehunt and it was developed by a group of hackers that go by the name of Bears. The experts say Treasurehunt is hard ...

Go to External Site

 

Exploit details released for Citrix Bleed 2 flaw affecting NetScaler - CSO Online
2025-07-10 00:30:10

Security researchers have released a technical analysis and proof-of-concept exploit code for a critical vulnerability fixed last month in Citrix ...

Go to External Site