Microsoft has formally tied the exploitation of security flaws in internet-facing SharePoint Server instances to two Chinese hacking groups called Linen Typhoon and Violet Typhoon as early as July 7, 2025, corroborating earlier reports. The tech giant said it also observed a third China-based threat actor, which it tracks as Storm-2603, weaponizing the flaws as … Read More “Microsoft Links Ongoing SharePoint Exploits to Three Chinese Hacker Groups – The Hacker News” »
Author: [email protected] (The Hacker News)
A new wave of phishing attacks exploiting Microsoft 365 OAuth tools has been observed impersonating diplomats to steal access codes – Read More –
Microsoft said two China nation-state threat groups and a separate attacker based in China are exploiting the zero-day vulnerabilities that first caused havoc to SharePoint servers over the weekend. Linen Typhoon and Violet Typhoon — the Chinese government-affiliated threat groups — and an attacker Microsoft tracks as Storm-2603 are exploiting the pair of zero-day vulnerabilities … Read More “Microsoft SharePoint zero-day attacks pinned on China-linked ‘Typhoon’ threat groups – CyberScoop” »
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: DuraComm Corporation Equipment: SPM-500 DP-10iN-100-MU Vulnerabilities: Cleartext Transmission of Sensitive Information, Missing Authentication for a Critical Function, Improper Neutralization of Input During Web Page Generation 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to disclose sensitive information … Read More “DuraComm DP-10iN-100-MU – All CISA Advisories” »
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.6 ATTENTION: Low attack complexity Vendor: Lantronix Equipment: Provisioning Manager Vulnerability: Improper Restriction of XML External Entity Reference 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to perform a cross-site scripting attack, which could result in remote code execution. 3. TECHNICAL DETAILS 3.1 AFFECTED … Read More “Lantronix Provisioning Manager – All CISA Advisories” »
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 6.9 ATTENTION: Exploitable remotely Vendor: Schneider Electric Equipment: System Monitor Application Vulnerability: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to execute untrusted code. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Schneider Electric reports the … Read More “Schneider Electric System Monitor Application – All CISA Advisories” »
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 8.8 ATTENTION: Exploitable remotely/low attack complexity/public exploits are available/known public exploitation Vendor: Schneider Electric Equipment: EcoStruxure Power Operation Vulnerabilities: Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’), Integer Overflow to Buffer Overflow, Improper Handling of Highly Compressed Data (Data Amplification), Out-of-bounds Write, Uncontrolled Resource Consumption 2. … Read More “Schneider Electric EcoStruxure Power Operation – All CISA Advisories” »
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: EcoStruxure IT Data Center Expert Vulnerabilities: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’), Insufficient Entropy, Improper Control of Generation of Code (‘Code Injection’), Server-Side Request Forgery (SSRF), Improper Privilege Management, and Improper … Read More “Schneider Electric EcoStruxture IT Data Center Expert – All CISA Advisories” »
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 5.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: EcoStruxure Power Monitoring Expert (PME) and EcoStruxure Power Operation (EPO) Vulnerability: Exposure of Resource to Wrong Sphere 2. RISK EVALUATION Successful exploitation of this vulnerability could provide other authenticated users with potentially inappropriate access to TGML diagrams. 3. … Read More “Schneider Electric EcoStruxure – All CISA Advisories” »
CISA released nine Industrial Control Systems (ICS) advisories on July 22, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-203-01 DuraComm DP-10iN-100-MU ICSA-25-203-02 Lantronix Provisioning Manager ICSA-25-203-03 Schneider Electric EcoStruxure ICSA-25-203-04 Schneider Electric EcoStruxure Power Operation ICSA-25-203-05 Schneider Electric System Monitor Application ICSA-25-203-06 Schneider Electric EcoStruxture IT Data … Read More “CISA Releases Nine Industrial Control Systems Advisories – All CISA Advisories” »
A widespread RFQ scam exploited net payment terms to fraudulently obtain high-value devices – Read More –
The AI Fix #60: Elon’s AI girlfriend, the arsonist red panda, and the AI that will kill you – Graham Cluley
In episode 60 of The AI Fix, we learn why Grok might be Elon Musk’s bid for digital immortality, how Meta is building a Manhattan-sized data centre called Prometheus, how AI is helping create carbon-sucking concrete, and are bewildered that 2000 people “work” at the Candy Crush company. Plus Graham takes a look at Elon’s … Read More “The AI Fix #60: Elon’s AI girlfriend, the arsonist red panda, and the AI that will kill you – Graham Cluley” »
CISA, in partnership with the Federal Bureau of Investigation (FBI), the Department of Health and Human Services, and the Multi-State Information Sharing and Analysis Center issued a joint Cybersecurity Advisory to help protect businesses and critical infrastructure organizations in North America and Europe against Interlock ransomware. This advisory highlights known Interlock ransomware indicators of compromise … Read More “Joint Advisory Issued on Protecting Against Interlock Ransomware – All CISA Advisories” »
Microsoft has observed three China-based threat actors, Linen Typhoon, Violet Typhoon and Storm-2603, exploiting the SharePoint vulnerabilities – Read More –
Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate – The Hacker News
Mexican organizations are still being targeted by threat actors to deliver a modified version of AllaKore RAT and SystemBC as part of a long-running campaign. The activity has been attributed by Arctic Wolf Labs to a financially motivated hacking group called Greedy Sponge. It’s believed to be active since early 2021, indiscriminately targeting a wide … Read More “Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate – The Hacker News” »
Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access – The Hacker News
Cisco on Monday updated its advisory of a set of recently disclosed security flaws in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) to acknowledge active exploitation. “In July 2025, the Cisco PSIRT [Product Security Incident Response Team], became aware of attempted exploitation of some of these vulnerabilities in the wild,” the company … Read More “Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access – The Hacker News” »
The British government announced plans to prohibit public sector organizations and critical infrastructure operators from paying ransoms to cybercriminals, marking a significant shift in the nation’s approach to combating ransomware attacks that have disrupted essential services and cost the economy millions of pounds annually. The proposed measures would prevent the National Health Service, local councils, … Read More “UK moves to ban public sector organizations from making ransom payments – CyberScoop” »
Summary Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to … Read More “#StopRansomware: Interlock – All CISA Advisories” »
Hackers Exploit Microsoft SharePoint Flaws in Global Breaches – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Hackers are exploiting critical SharePoint flaws (CVE-2025-53770/53771) to breach global targets, including governments and corporations. Microsoft urges immediate action. Learn about the active attacks and how to protect your network from credential theft and backdoors. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
The UK government said a public consultation showed widespread support on a payment ban for public sector and CNI organizations – Read More –
Global Fashion Label SABO’s 3.5M Customer Records Exposed Online – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Global fashion brand SABO suffers data breach, exposing 3.5+ million customer records including names, addresses, and order details. Learn about the risks and what to do. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Making the move from managing a security operations center (SOC) to being a chief information security officer (CISO) is a significant career leap. Not only do you need a solid foundation of tech knowledge but also leadership skills and business smarts. This article will guide you through the practical steps and skills you’ll need to … Read More “How to Advance from SOC Manager to CISO? – The Hacker News” »
Despite being a rebrand of several ransomware families, GLOBAL GROUP innovated with the use of an AI chatbot in the negotiation process – Read More –
ASIC said the financial services firm’s failings led to a data breach impacting nearly 10,000 clients – Read More –
Abnormal AI found that 96% of security leaders have no plans to reduce the headcount in SOC teams as a result of AI adoption, instead focusing on reallocating roles – Read More –
Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent Access – The Hacker News
The recently disclosed critical Microsoft SharePoint vulnerability has been under exploitation as early as July 7, 2025, according to findings from Check Point Research. The cybersecurity company said it observed first exploitation attempts targeting an unnamed major Western government, with the activity intensifying on July 18 and 19, spanning government, telecommunications, and software – Read … Read More “Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent Access – The Hacker News” »
On Sunday, July 20, Microsoft Corp. issued an emergency security update for a vulnerability in SharePoint Server that is actively being exploited to compromise vulnerable organizations. The patch comes amid reports that malicious hackers have used the SharePoint flaw to breach U.S. federal and state agencies, universities, and energy companies. Image: Shutterstock, by Ascannio. In … Read More “Microsoft Fix Targets Attacks on SharePoint Zero-Day – Krebs on Security” »
New Report Reveals Just 10% of Employees Drive 73% of Cyber Risk – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Austin, United States / TX, 22nd July 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Why You Should Use Geolocation in Your React App’s Authentication Process – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Improve security in your React app with geolocation-based authentication, adding a strong layer beyond passwords to prevent unauthorised access. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Arizona election officials say a hack targeting a statewide online portal for political candidates resulted in the defacement and replacement of multiple candidate photos with the late Iranian Ayatollah Ruhollah Khomeini. While officials say the threat is contained and the vulnerability has been fixed, they also blasted the lack of support they’ve received from the … Read More “After website hack, Arizona election officials unload on Trump’s CISA – CyberScoop” »
World Leaks Claims Dell Data Breach, Leaks 1.3 TB of Files – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Former Hunters International ransomware gang, now World Leaks, claims 1.3 TB Dell data breach, leaking over 400K files with internal tools and user data. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Fake npm Website Used to Push Malware via Stolen Token – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Fake npm website used in phishing attack to steal maintainer token, leading to malware in popular JavaScript packages like eslint-config-prettier. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
China-Linked Hackers Launch Targeted Espionage Campaign on African IT Infrastructure – The Hacker News
The China-linked cyber espionage group tracked as APT41 has been attributed to a new campaign targeting government IT services in the African region. “The attackers used hardcoded names of internal services, IP addresses, and proxy servers embedded within their malware,” Kaspersky researchers Denis Kulik and Daniil Pogorelov said. “One of the C2s [command-and-control servers] was … Read More “China-Linked Hackers Launch Targeted Espionage Campaign on African IT Infrastructure – The Hacker News” »
Cybersecurity researchers have unearthed new Android spyware artifacts that are likely affiliated with the Iranian Ministry of Intelligence and Security (MOIS) and have been distributed to targets by masquerading as VPN apps and Starlink, a satellite internet connection service offered by SpaceX. Mobile security vendor Lookout said it discovered four samples of a surveillanceware tool … Read More “Iran-Linked DCHSpy Android Malware Masquerades as VPN Apps to Spy on Dissidents – The Hacker News” »
New samples of DCHSpy, a spyware implant linked to Iranian APT group MuddyWater, were detected by Lookout one week after the start of the Israel-Iran conflict – Read More –
An attack on a US accounting firm delivered PureRAT via Ghost Crypt, involving social engineering and advanced obfuscation techniques – Read More –
An investigation has revealed novel scams using tools like MaisonReceipts, creating realistic fake receipts to resell stolen or counterfeit good – Read More –
Attackers are actively exploiting a critical zero-day vulnerability affecting on-premises Microsoft SharePoint servers, prompting industry heavyweights to sound the alarm over the weekend. Researchers discovered the active, ongoing attack spree Friday afternoon and warnings were issued en masse by Saturday evening. Microsoft released urgent guidance Saturday, advising on-premises SharePoint customers to turn on and properly … Read More “Mass attack spree hits Microsoft SharePoint zero-day defect – CyberScoop” »
Microsoft Confirms Hackers Exploiting SharePoint Flaws, Patch Now – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Microsoft has released new security updates to fix two serious vulnerabilities affecting on-premises SharePoint servers, warning that attackers… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
The U.S. is stepping into a new cyber era, and it comes not a moment too soon. With the Trump administration’s sweeping $1 billion cyber initiative in the “Big Beautiful Bill” and growing congressional momentum under the 2026 National Defense Authorization Act (NDAA) to strengthen cyber deterrence, we’re seeing a shift in posture that many … Read More “Why it’s time for the US to go on offense in cyberspace – CyberScoop” »
Microsoft has released new security updates to fix two serious vulnerabilities affecting on-premises SharePoint servers, warning that attackers… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
CVE-2025-54309 could allow remote attackers to obtain admin access via HTTPS – Read More –
The hacking group NoName057(16) has been operating since 2022, launching cyber attacks on government organisations, media bodies, critical infrastructure, and private companies in Ukraine, America, Canada, and across Europe in a seeming attempt to silence voices that the group considers anti-Russian. Read more in my article on the Hot for Security blog. – Read More … Read More “Europol targets Kremlin-backed cybercrime gang NoName057(16) – Graham Cluley” »
By 2025, Zero Trust has evolved from a conceptual framework into an essential pillar of modern security. No longer merely theoretical, it’s now a requirement that organizations must adopt. A robust, defensible architecture built on Zero Trust principles does more than satisfy baseline regulatory mandates. It underpins cyber resilience, secures third-party partnerships, and ensures uninterrupted … Read More “Assessing the Role of AI in Zero Trust – The Hacker News” »
⚡ Weekly Recap: SharePoint 0-Day, Chrome Exploit, macOS Spyware, NVIDIA Toolkit RCE and More – The Hacker News
Even in well-secured environments, attackers are getting in—not with flashy exploits, but by quietly taking advantage of weak settings, outdated encryption, and trusted tools left unprotected. These attacks don’t depend on zero-days. They work by staying unnoticed—slipping through the cracks in what we monitor and what we assume is safe. What once looked suspicious now … Read More “⚡ Weekly Recap: SharePoint 0-Day, Chrome Exploit, macOS Spyware, NVIDIA Toolkit RCE and More – The Hacker News” »
New GhostContainer Malware Hits High-Value MS Exchange Servers in Asia – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Kaspersky’s SecureList reveals GhostContainer, a new, highly customized backdoor targeting government and high-tech organizations in Asia via Exchange server vulnerabilities. Learn how this APT malware operates and how to stay protected. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
GameForge AI Hackathon 2025: Building the Bridge Between Natural Language and Game Creation – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A 72-hour sprint that produced working solutions for one of game development’s hardest problems: making it accessible to non-programmers. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
On-prem SharePoint customers have been told to assume compromise, with attackers observed to be exfiltrating data from victim servers across critical sectors – Read More –
PoisonSeed Hackers Bypass FIDO Keys Using QR Phishing and Cross-Device Sign-In Abuse – The Hacker News
Cybersecurity researchers have disclosed a novel attack technique that allows threat actors to bypass Fast IDentity Online (FIDO) key protections by deceiving users into approving authentication requests from spoofed company login portals. The activity, observed by Expel as part of a phishing campaign in the wild, has been attributed to a threat actor named PoisonSeed, … Read More “PoisonSeed Hackers Bypass FIDO Keys Using QR Phishing and Cross-Device Sign-In Abuse – The Hacker News” »
3,500 Websites Hijacked to Secretly Mine Crypto Using Stealth JavaScript and WebSocket Tactics – The Hacker News
A new attack campaign has compromised more than 3,500 websites worldwide with JavaScript cryptocurrency miners, marking the return of browser-based cryptojacking attacks once popularized by the likes of CoinHive. Although the service has since shuttered after browser makers took steps to ban miner-related apps and add-ons, researchers from the c/side said they found evidence of … Read More “3,500 Websites Hijacked to Secretly Mine Crypto Using Stealth JavaScript and WebSocket Tactics – The Hacker News” »