The individual is accused of numerous illicit cybercrime and ransomware activities that have generated at least $7m in profit – Read More –
The French employment agency’s partner web portal has been accessed by a malicious actor – Read More –
Cognizant handed over a password to the cybercriminal without asking any authentication questions – Read More –
Google Launches OSS Rebuild to Expose Malicious Code in Widely Used Open-Source Packages – The Hacker News
Google has announced the launch of a new initiative called OSS Rebuild to bolster the security of the open-source package ecosystems and prevent software supply chain attacks. “As supply chain attacks continue to target widely-used dependencies, OSS Rebuild gives security teams powerful data to avoid compromise without burden on upstream maintainers,” Matthew Suozzo, Google Open … Read More “Google Launches OSS Rebuild to Expose Malicious Code in Widely Used Open-Source Packages – The Hacker News” »
A joint US government advisory highlighted novel initial access techniques deployed by Interlock, and urged businesses and critical infrastructure to stay vigilant – Read More –
Multiple Vulnerabilities have been discovered in Microsoft SharePoint Server, which could allow for remote code execution. Microsoft SharePoint Server is a web-based collaborative platform that integrates with Microsoft Office. Successful exploitation of these vulnerabilities allows for unauthenticated access to systems and enables malicious actors to fully access SharePoint content, including file systems and internal configurations, … Read More “Multiple Vulnerabilities in Microsoft SharePoint Server Could Allow for Remote Code Execution – Cyber Security Advisories – MS-ISAC” »
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; … Read More “Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Adobe After Effects – Used for creating motion graphics, visual effects, and compositing in film, television, and online content. Adobe Substance 3D Viewer – A 3D visualization and editing tool for opening, adjusting, and rendering 3D models. … Read More “Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
NCC Group observed a 43% drop in ransomware attacks in Q2 2025, driven by law enforcement actions and internal conflicts in groups – Read More –
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two security flaws impacting SysAid IT support software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities in question are listed below – CVE-2025-2775 (CVSS score: 9.3) – An improper restriction of XML external entity (XXE) reference vulnerability in the … Read More “CISA Warns: SysAid Flaws Under Active Attack Enable Remote File Access and SSRF – The Hacker News” »
CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks – The Hacker News
The U.S. Cybersecurity and Infrastructure Security Agency (CISA), on July 22, 2025, added two Microsoft SharePoint flaws, CVE-2025-49704 and CVE-2025-49706, to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. To that end, Federal Civilian Executive Branch (FCEB) agencies are required to remediate identified vulnerabilities by July 23, 2025. “CISA is – … Read More “CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks – The Hacker News” »
Coyote Trojan First to Use Microsoft UI Automation in Bank Attacks – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Coyote Trojan becomes first malware to abuse Microsoft’s UI Automation in real attacks, targeting banks and crypto platforms with stealthy tactics. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Contract lapse leaves critical infrastructure cybersecurity sensor data unanalyzed at national lab – CyberScoop
Data from sensors that detect threats in critical infrastructure networks is sitting unanalyzed after a government contract expired this weekend, raising risks for operational technology, a program leader at Lawrence Livermore National Laboratory told lawmakers Tuesday. That news arrived at a hearing of a House Homeland Security subcommittee on Stuxnet, the malware that was discovered … Read More “Contract lapse leaves critical infrastructure cybersecurity sensor data unanalyzed at national lab – CyberScoop” »
House Republicans endorse stricter state and federal-led voter roll purges despite dearth of evidence on fraud – CyberScoop
In a congressional hearing on state voter registration practices Tuesday, Republicans on the House Administration Committee were united around common sentiments: It is too easy for citizens to register to vote and too easy for them to stay on voter rolls, states aren’t doing enough to remove ineligible voters, and it’s all led to the … Read More “House Republicans endorse stricter state and federal-led voter roll purges despite dearth of evidence on fraud – CyberScoop” »
CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-54309 CrushFTP Unprotected Alternate Channel Vulnerability CVE-2025-6558 Google Chromium ANGLE and GPU Improper Input Validation Vulnerability CVE-2025-2776 SysAid On-Prem Improper Restriction of XML External Entity Reference Vulnerability CVE-2025-2775 SysAid On-Prem Improper Restriction of XML External Entity Reference … Read More “CISA Adds Four Known Exploited Vulnerabilities to Catalog – All CISA Advisories” »
Multiple Vulnerabilities have been discovered in Microsoft SharePoint Server, which could allow for remote code execution. Microsoft SharePoint Server is a web-based collaborative platform that integrates with Microsoft Office. Successful exploitation of these vulnerabilities allows for unauthenticated access to systems and enables malicious actors to fully access SharePoint content, including file systems and internal configurations, … Read More “Multiple Vulnerabilities in Microsoft SharePoint Server Could Allow for Remote Code Execution – Cyber Security Advisories – MS-ISAC” »
Microsoft Reveals Chinese State Hackers Exploiting SharePoint Flaws – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Microsoft reveals Chinese state-backed hacker groups, including Linen Typhoon, Violet Typhoon, and Storm-2603, are exploiting SharePoint flaws, breaching over 100 organisations. Discover threat actors, their tactics and Microsoft’s urgent security guidance. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Flowable’s Summer 2025 Update Introduces Groundbreaking Agentic AI Capabilities – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Flowable’s 2025.1 update brings powerful Agentic AI features to automate workflows, boost efficiency, and scale intelligent business operations. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-49704 Microsoft SharePoint Code Injection Vulnerability CVE-2025-49706 Microsoft SharePoint Improper Authentication Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: … Read More “CISA Adds Two Known Exploited Vulnerabilities to Catalog – All CISA Advisories” »
Microsoft has formally tied the exploitation of security flaws in internet-facing SharePoint Server instances to two Chinese hacking groups called Linen Typhoon and Violet Typhoon as early as July 7, 2025, corroborating earlier reports. The tech giant said it also observed a third China-based threat actor, which it tracks as Storm-2603, weaponizing the flaws as … Read More “Microsoft Links Ongoing SharePoint Exploits to Three Chinese Hacker Groups – The Hacker News” »
A new wave of phishing attacks exploiting Microsoft 365 OAuth tools has been observed impersonating diplomats to steal access codes – Read More –
Microsoft said two China nation-state threat groups and a separate attacker based in China are exploiting the zero-day vulnerabilities that first caused havoc to SharePoint servers over the weekend. Linen Typhoon and Violet Typhoon — the Chinese government-affiliated threat groups — and an attacker Microsoft tracks as Storm-2603 are exploiting the pair of zero-day vulnerabilities … Read More “Microsoft SharePoint zero-day attacks pinned on China-linked ‘Typhoon’ threat groups – CyberScoop” »
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: DuraComm Corporation Equipment: SPM-500 DP-10iN-100-MU Vulnerabilities: Cleartext Transmission of Sensitive Information, Missing Authentication for a Critical Function, Improper Neutralization of Input During Web Page Generation 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to disclose sensitive information … Read More “DuraComm DP-10iN-100-MU – All CISA Advisories” »
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.6 ATTENTION: Low attack complexity Vendor: Lantronix Equipment: Provisioning Manager Vulnerability: Improper Restriction of XML External Entity Reference 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to perform a cross-site scripting attack, which could result in remote code execution. 3. TECHNICAL DETAILS 3.1 AFFECTED … Read More “Lantronix Provisioning Manager – All CISA Advisories” »
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 6.9 ATTENTION: Exploitable remotely Vendor: Schneider Electric Equipment: System Monitor Application Vulnerability: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to execute untrusted code. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Schneider Electric reports the … Read More “Schneider Electric System Monitor Application – All CISA Advisories” »
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 8.8 ATTENTION: Exploitable remotely/low attack complexity/public exploits are available/known public exploitation Vendor: Schneider Electric Equipment: EcoStruxure Power Operation Vulnerabilities: Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’), Integer Overflow to Buffer Overflow, Improper Handling of Highly Compressed Data (Data Amplification), Out-of-bounds Write, Uncontrolled Resource Consumption 2. … Read More “Schneider Electric EcoStruxure Power Operation – All CISA Advisories” »
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: EcoStruxure IT Data Center Expert Vulnerabilities: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’), Insufficient Entropy, Improper Control of Generation of Code (‘Code Injection’), Server-Side Request Forgery (SSRF), Improper Privilege Management, and Improper … Read More “Schneider Electric EcoStruxture IT Data Center Expert – All CISA Advisories” »
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 5.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: EcoStruxure Power Monitoring Expert (PME) and EcoStruxure Power Operation (EPO) Vulnerability: Exposure of Resource to Wrong Sphere 2. RISK EVALUATION Successful exploitation of this vulnerability could provide other authenticated users with potentially inappropriate access to TGML diagrams. 3. … Read More “Schneider Electric EcoStruxure – All CISA Advisories” »
CISA released nine Industrial Control Systems (ICS) advisories on July 22, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-203-01 DuraComm DP-10iN-100-MU ICSA-25-203-02 Lantronix Provisioning Manager ICSA-25-203-03 Schneider Electric EcoStruxure ICSA-25-203-04 Schneider Electric EcoStruxure Power Operation ICSA-25-203-05 Schneider Electric System Monitor Application ICSA-25-203-06 Schneider Electric EcoStruxture IT Data … Read More “CISA Releases Nine Industrial Control Systems Advisories – All CISA Advisories” »
A widespread RFQ scam exploited net payment terms to fraudulently obtain high-value devices – Read More –
The AI Fix #60: Elon’s AI girlfriend, the arsonist red panda, and the AI that will kill you – Graham Cluley
In episode 60 of The AI Fix, we learn why Grok might be Elon Musk’s bid for digital immortality, how Meta is building a Manhattan-sized data centre called Prometheus, how AI is helping create carbon-sucking concrete, and are bewildered that 2000 people “work” at the Candy Crush company. Plus Graham takes a look at Elon’s … Read More “The AI Fix #60: Elon’s AI girlfriend, the arsonist red panda, and the AI that will kill you – Graham Cluley” »
CISA, in partnership with the Federal Bureau of Investigation (FBI), the Department of Health and Human Services, and the Multi-State Information Sharing and Analysis Center issued a joint Cybersecurity Advisory to help protect businesses and critical infrastructure organizations in North America and Europe against Interlock ransomware. This advisory highlights known Interlock ransomware indicators of compromise … Read More “Joint Advisory Issued on Protecting Against Interlock Ransomware – All CISA Advisories” »
Microsoft has observed three China-based threat actors, Linen Typhoon, Violet Typhoon and Storm-2603, exploiting the SharePoint vulnerabilities – Read More –
Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate – The Hacker News
Mexican organizations are still being targeted by threat actors to deliver a modified version of AllaKore RAT and SystemBC as part of a long-running campaign. The activity has been attributed by Arctic Wolf Labs to a financially motivated hacking group called Greedy Sponge. It’s believed to be active since early 2021, indiscriminately targeting a wide … Read More “Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate – The Hacker News” »
Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access – The Hacker News
Cisco on Monday updated its advisory of a set of recently disclosed security flaws in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) to acknowledge active exploitation. “In July 2025, the Cisco PSIRT [Product Security Incident Response Team], became aware of attempted exploitation of some of these vulnerabilities in the wild,” the company … Read More “Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access – The Hacker News” »
The British government announced plans to prohibit public sector organizations and critical infrastructure operators from paying ransoms to cybercriminals, marking a significant shift in the nation’s approach to combating ransomware attacks that have disrupted essential services and cost the economy millions of pounds annually. The proposed measures would prevent the National Health Service, local councils, … Read More “UK moves to ban public sector organizations from making ransom payments – CyberScoop” »
Summary Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to … Read More “#StopRansomware: Interlock – All CISA Advisories” »
Hackers Exploit Microsoft SharePoint Flaws in Global Breaches – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Hackers are exploiting critical SharePoint flaws (CVE-2025-53770/53771) to breach global targets, including governments and corporations. Microsoft urges immediate action. Learn about the active attacks and how to protect your network from credential theft and backdoors. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
The UK government said a public consultation showed widespread support on a payment ban for public sector and CNI organizations – Read More –
Global Fashion Label SABO’s 3.5M Customer Records Exposed Online – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Global fashion brand SABO suffers data breach, exposing 3.5+ million customer records including names, addresses, and order details. Learn about the risks and what to do. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Making the move from managing a security operations center (SOC) to being a chief information security officer (CISO) is a significant career leap. Not only do you need a solid foundation of tech knowledge but also leadership skills and business smarts. This article will guide you through the practical steps and skills you’ll need to … Read More “How to Advance from SOC Manager to CISO? – The Hacker News” »
Despite being a rebrand of several ransomware families, GLOBAL GROUP innovated with the use of an AI chatbot in the negotiation process – Read More –
ASIC said the financial services firm’s failings led to a data breach impacting nearly 10,000 clients – Read More –
Abnormal AI found that 96% of security leaders have no plans to reduce the headcount in SOC teams as a result of AI adoption, instead focusing on reallocating roles – Read More –
Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent Access – The Hacker News
The recently disclosed critical Microsoft SharePoint vulnerability has been under exploitation as early as July 7, 2025, according to findings from Check Point Research. The cybersecurity company said it observed first exploitation attempts targeting an unnamed major Western government, with the activity intensifying on July 18 and 19, spanning government, telecommunications, and software – Read … Read More “Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent Access – The Hacker News” »
On Sunday, July 20, Microsoft Corp. issued an emergency security update for a vulnerability in SharePoint Server that is actively being exploited to compromise vulnerable organizations. The patch comes amid reports that malicious hackers have used the SharePoint flaw to breach U.S. federal and state agencies, universities, and energy companies. Image: Shutterstock, by Ascannio. In … Read More “Microsoft Fix Targets Attacks on SharePoint Zero-Day – Krebs on Security” »
New Report Reveals Just 10% of Employees Drive 73% of Cyber Risk – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Austin, United States / TX, 22nd July 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Why You Should Use Geolocation in Your React App’s Authentication Process – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Improve security in your React app with geolocation-based authentication, adding a strong layer beyond passwords to prevent unauthorised access. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Arizona election officials say a hack targeting a statewide online portal for political candidates resulted in the defacement and replacement of multiple candidate photos with the late Iranian Ayatollah Ruhollah Khomeini. While officials say the threat is contained and the vulnerability has been fixed, they also blasted the lack of support they’ve received from the … Read More “After website hack, Arizona election officials unload on Trump’s CISA – CyberScoop” »
World Leaks Claims Dell Data Breach, Leaks 1.3 TB of Files – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Former Hunters International ransomware gang, now World Leaks, claims 1.3 TB Dell data breach, leaking over 400K files with internal tools and user data. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto





