A large-scale malware campaign known as SarangTrap has been observed using fake dating apps to steal personal data, targeting South Korean users – Read More –
Author: Joe-W
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Network Thermostat Equipment: X-Series WiFi thermostats Vulnerability: Missing Authentication for Critical Function 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to gain full administrative access to the device. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Network … Read More “Network Thermostat X-Series WiFi Thermostats – All CISA Advisories” »
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 9.4 ATTENTION: Exploitable remotely/low attack complexity Vendor: Honeywell Equipment: Experion PKS Vulnerabilities: Use of Uninitialized Variable, Improper Restriction of Operations within the Bounds of a Memory Buffer, Sensitive Information in Resource Not Removed Before Reuse, Integer Underflow (Wrap or Wraparound), Deployment of Wrong Handler 2. RISK EVALUATION Successful … Read More “Honeywell Experion PKS – All CISA Advisories” »
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.0 ATTENTION: Exploitable from a local network Vendor: Mitsubishi Electric Equipment: CNC Series Vulnerability: Uncontrolled Search Path Element 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to execute malicious code by getting setup-launcher to load a malicious DLL. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS … Read More “Mitsubishi Electric CNC Series – All CISA Advisories” »
Sophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices – The Hacker News
Sophos and SonicWall have alerted users of critical security flaws in Sophos Firewall and Secure Mobile Access (SMA) 100 Series appliances that could be exploited to achieve remote code execution. The two vulnerabilities impacting Sophos Firewall are listed below – CVE-2025-6704 (CVSS score: 9.8) – An arbitrary file writing vulnerability in the Secure PDF eXchange … Read More “Sophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices – The Hacker News” »
The US FBI has issued public announcements warning families of The Com, an online criminal network involving minors in various illicit activities – Read More –
Cybercrime Forum XSS Returns on Mirror and Dark Web 1 Day After Seizure – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Cybercrime forum XSS is back online on its mirror and dark web domains just one day after seizure and admin arrest, but questions about its full return remain unanswered. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Microsoft said Chinese actor Storm-2603 is deploying Warlock ransomware following the exploitation of vulnerabilities in on-prem SharePoint systems – Read More –
Brave Browser Blocks Microsoft Recall from Tracking Online Activity – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Brave browser now blocks Microsoft Recall by default, preventing screenshots and protecting users’ browsing history on Windows 11. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Investigators assessed that the criminal group’s stolen funds amount to €580,000 – Read More –
The Tibetan community has been targeted by a China-nexus cyber espionage group as part of two campaigns conducted last month ahead of the Dalai Lama’s 90th birthday on July 6, 2025. The multi-stage attacks have been codenamed Operation GhostChat and Operation PhantomPrayers by Zscaler ThreatLabz. “The attackers compromised a legitimate website, redirecting users via a … Read More “China-Based APTs Deploy Fake Dalai Lama Apps to Spy on Tibetan Community – The Hacker News” »
You wouldn’t run your blue team once a year, so why accept this substandard schedule for your offensive side? Your cybersecurity teams are under intense pressure to be proactive and to find your network’s weaknesses before adversaries do. But in many organizations, offensive security is still treated as a one-time event: an annual pentest, a … Read More “Pentests once a year? Nope. It’s time to build an offensive SOC – The Hacker News” »
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them – The Hacker News
Is Managing Customer Logins and Data Giving You Headaches? You’re Not Alone! Today, we all expect super-fast, secure, and personalized online experiences. But let’s be honest, we’re also more careful about how our data is used. If something feels off, trust can vanish in an instant. Add to that the lightning-fast changes AI is bringing … Read More “Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them – The Hacker News” »
There is good news for any organisation which has been hit by the Phobos ransomware. Japanese police have released a free decryptor capable of recovering files encrypted by both the notorious Phobos ransomware, and its offshoot 8Base. Read more in my article on the Fortra blog. – Read More – Graham Cluley
Storm-2603 Exploits SharePoint Flaws to Deploy Warlock Ransomware on Unpatched Systems – The Hacker News
Microsoft has revealed that one of the threat actors behind the active exploitation of SharePoint flaws is deploying Warlock ransomware on targeted systems. The tech giant, in an update shared Wednesday, said the findings are based on an “expanded analysis and threat intelligence from our continued monitoring of exploitation activity by Storm-2603.” The threat actor … Read More “Storm-2603 Exploits SharePoint Flaws to Deploy Warlock Ransomware on Unpatched Systems – The Hacker News” »
National Nuclear Security Administration Systems Breached in SharePoint Cyberattack – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
National Nuclear Security Administration and National Institutes of Health targeted in global Microsoft SharePoint vulnerability exploitation. Chinese hacking groups suspected in widespread data breaches. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Wiz believes the active campaign is part of a broader crypto-scam infrastructure, which uses a wide range of exploitation techniques – Read More –
Europol Arrests XSS Forum Admin in Kyiv After 12-Year Run Operating Cybercrime Marketplace – The Hacker News
Europol on Monday announced the arrest of the suspected administrator of XSS.is (formerly DaMaGeLaB), a notorious Russian-speaking cybercrime platform. The arrest, which took place in Kyiv, Ukraine, on July 222, 2025, was led by the French Police and Paris Prosecutor, in collaboration with Ukrainian authorities and Europol. The action is the result of an investigation … Read More “Europol Arrests XSS Forum Admin in Kyiv After 12-Year Run Operating Cybercrime Marketplace – The Hacker News” »
Cybersecurity researchers have uncovered a new stealthy backdoor concealed within the “mu-plugins” directory in WordPress sites to grant threat actors persistent access and allow them to perform arbitrary actions. Must-use plugins (aka mu-plugins) are special plugins that are automatically activated on all WordPress sites in the installation. They are located in the “wp-content/mu-plugins” – Read … Read More “Hackers Deploy Stealth Backdoor in WordPress Mu-Plugins to Maintain Admin Access – The Hacker News” »
Smashing Security podcast #427: When 2G attacks, and a romantic road trip goes wrong – Graham Cluley
Graham warns why it is high time we said goodbye to 2G – the outdated mobile network being exploited by cybercriminals with suitcase-sized SMS blasters. From New Zealand to London, scammers are driving around cities like dodgy Uber drivers, spewing phishing texts to thousands at once. Meanwhile, Carole unpacks a painfully awkward tale of amour … Read More “Smashing Security podcast #427: When 2G attacks, and a romantic road trip goes wrong – Graham Cluley” »
FBI and CISA Warn of Interlock Ransomware Targeting Critical Infrastructure – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
FBI warns of Interlock ransomware using unique tactics to hit businesses and critical infrastructure with double extortion. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Post Content – Read More – IC3.gov News
Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware – The Hacker News
The threat actor behind the exploitation of vulnerable Craft Content Management System (CMS) instances has shifted its tactics to target Magento CMS and misconfigured Docker instances. The activity has been attributed to a threat actor tracked as Mimo (aka Hezb), which has a long history of leveraging N-day security flaws in various web applications to … Read More “Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware – The Hacker News” »
The Trump administration’s new AI Action Plan calls for companies and governments to lean into the technology when protecting critical infrastructure from cyberattacks. But it also recognizes that these systems are themselves vulnerable to hacking and manipulation, and calls for industry adoption of “secure by design” technology design standards to limit their attack surfaces. The … Read More “Trump AI plan pushes critical infrastructure to use AI for cyber defense – CyberScoop” »
XSS.IS Cybercrime Forum Seized After Admin Arrested in Ukraine – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
XSS.IS has been seized after its admin was arrested in Ukraine, however its dark web and mirror domains only show a 504 Gateway Timeout error. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Post Content – Read More – IC3.gov News
Ransomware, considered by British authorities to be the UK’s greatest cybercrime threat, costing the nation billions of pounds and with the capbility to bring essential services to a standstill, is in the gunsights of government. Read more in my article on the Hot for Security blog. – Read More – Graham Cluley
A pair of maximum-severity vulnerabilities affecting Cisco’s network access security platform are under active exploitation, the enterprise networking and IT vendor warned in a security advisory Monday. The software defects in Cisco Identity Services Engine and Cisco ISE Passive Identity Connector — CVE-2025-20281 and CVE-2025-20337 — were disclosed and addressed by Cisco on June 25, … Read More “Cisco network access security platform vulnerabilities under active exploitation – CyberScoop” »
Ukrainian authorities Tuesday arrested the alleged administrator of XSS.is, a Russian-language cybercrime forum, following a four-year investigation by the Paris public prosecutor’s office. Law enforcement officials from France and Europol seized the domain of the influential forum following the arrest. Authorities have not named the suspected administrator of XSS.is. The forum, which was active since … Read More “Authorities in Ukraine nab alleged admin of Russian-language cybercrime forum – CyberScoop” »
A series of new cybersecurity regulations related to the water industry have been set out by New York state agencies – Read More –
Post Content – Read More – IC3.gov News
Post Content – Read More – IC3.gov News
Suspected Admin of XSS.IS Cybercrime Forum Arrested in Ukraine – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Suspected admin of XSS.IS, a major Russian-language cybercrime forum, arrested in Ukraine after years of running malware and data trade operations. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials – The Hacker News
The Windows banking trojan known as Coyote has become the first known malware strain to exploit the Windows accessibility framework called UI Automation (UIA) to harvest sensitive information. “The new Coyote variant is targeting Brazilian users, and uses UIA to extract credentials linked to 75 banking institutes’ web addresses and cryptocurrency exchanges,” Akamai security researcher … Read More “New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials – The Hacker News” »
Microsoft Most Phished Brand in Q2 2025, Check Point Research – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Microsoft was the most impersonated brand in phishing attacks during Q2 2025, accounting for 25% of all attempts, according to Check Point Research. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Security experts have been talking about Kerberoasting for over a decade, yet this attack continues to evade typical defense methods. Why? It’s because existing detections rely on brittle heuristics and static rules, which don’t hold up for detecting potential attack patterns in highly variable Kerberos traffic. They frequently generate false positives or miss “low-and-slow” attacks … Read More “Kerberoasting Detections: A New Approach to a Decade-Old Challenge – The Hacker News” »
The individual is accused of numerous illicit cybercrime and ransomware activities that have generated at least $7m in profit – Read More –
The French employment agency’s partner web portal has been accessed by a malicious actor – Read More –
Cognizant handed over a password to the cybercriminal without asking any authentication questions – Read More –
Google Launches OSS Rebuild to Expose Malicious Code in Widely Used Open-Source Packages – The Hacker News
Google has announced the launch of a new initiative called OSS Rebuild to bolster the security of the open-source package ecosystems and prevent software supply chain attacks. “As supply chain attacks continue to target widely-used dependencies, OSS Rebuild gives security teams powerful data to avoid compromise without burden on upstream maintainers,” Matthew Suozzo, Google Open … Read More “Google Launches OSS Rebuild to Expose Malicious Code in Widely Used Open-Source Packages – The Hacker News” »
A joint US government advisory highlighted novel initial access techniques deployed by Interlock, and urged businesses and critical infrastructure to stay vigilant – Read More –
Multiple Vulnerabilities have been discovered in Microsoft SharePoint Server, which could allow for remote code execution. Microsoft SharePoint Server is a web-based collaborative platform that integrates with Microsoft Office. Successful exploitation of these vulnerabilities allows for unauthenticated access to systems and enables malicious actors to fully access SharePoint content, including file systems and internal configurations, … Read More “Multiple Vulnerabilities in Microsoft SharePoint Server Could Allow for Remote Code Execution – Cyber Security Advisories – MS-ISAC” »
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; … Read More “Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Adobe After Effects – Used for creating motion graphics, visual effects, and compositing in film, television, and online content. Adobe Substance 3D Viewer – A 3D visualization and editing tool for opening, adjusting, and rendering 3D models. … Read More “Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
NCC Group observed a 43% drop in ransomware attacks in Q2 2025, driven by law enforcement actions and internal conflicts in groups – Read More –
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two security flaws impacting SysAid IT support software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities in question are listed below – CVE-2025-2775 (CVSS score: 9.3) – An improper restriction of XML external entity (XXE) reference vulnerability in the … Read More “CISA Warns: SysAid Flaws Under Active Attack Enable Remote File Access and SSRF – The Hacker News” »
CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks – The Hacker News
The U.S. Cybersecurity and Infrastructure Security Agency (CISA), on July 22, 2025, added two Microsoft SharePoint flaws, CVE-2025-49704 and CVE-2025-49706, to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. To that end, Federal Civilian Executive Branch (FCEB) agencies are required to remediate identified vulnerabilities by July 23, 2025. “CISA is – … Read More “CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks – The Hacker News” »
Coyote Trojan First to Use Microsoft UI Automation in Bank Attacks – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Coyote Trojan becomes first malware to abuse Microsoft’s UI Automation in real attacks, targeting banks and crypto platforms with stealthy tactics. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Contract lapse leaves critical infrastructure cybersecurity sensor data unanalyzed at national lab – CyberScoop
Data from sensors that detect threats in critical infrastructure networks is sitting unanalyzed after a government contract expired this weekend, raising risks for operational technology, a program leader at Lawrence Livermore National Laboratory told lawmakers Tuesday. That news arrived at a hearing of a House Homeland Security subcommittee on Stuxnet, the malware that was discovered … Read More “Contract lapse leaves critical infrastructure cybersecurity sensor data unanalyzed at national lab – CyberScoop” »
House Republicans endorse stricter state and federal-led voter roll purges despite dearth of evidence on fraud – CyberScoop
In a congressional hearing on state voter registration practices Tuesday, Republicans on the House Administration Committee were united around common sentiments: It is too easy for citizens to register to vote and too easy for them to stay on voter rolls, states aren’t doing enough to remove ineligible voters, and it’s all led to the … Read More “House Republicans endorse stricter state and federal-led voter roll purges despite dearth of evidence on fraud – CyberScoop” »