Docker APIs to Mine Cryptocurrency
24
Jun
2025

Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network

Jun 24, 2025Ravie LakshmananCloud Security / Cryptojacking Misconfigured Docker instances are the target of a campaign that employs the Tor…

Aviatrix Cloud Controller Authentication Vulnerability Let Attackers Execute Remote Code
24
Jun
2025

Aviatrix Cloud Controller Authentication Vulnerability Let Attackers Execute Remote Code

Two critical vulnerabilities in Aviatrix Controller, a Software-Defined Networking (SDN) utility that enables cloud connectivity across different vendors and regions. …

North Korean Hackers Use Malicious Zoom Apps to Execute System-Takeover Attacks
24
Jun
2025

North Korean Hackers Use Malicious Zoom Apps to Execute System-Takeover Attacks

Cybersecurity researchers and targeted individuals have reported a highly sophisticated scam orchestrated by suspected North Korean hackers. This attack, disguised…

High-risk WinRAR RCE vulnerability patched, update quickly! (CVE-2025-6218)
24
Jun
2025

High-risk WinRAR RCE vulnerability patched, update quickly! (CVE-2025-6218)

A recently patched directory traversal vulnerability (CVE-2025-6218) in WinRAR could be leveraged by remote attackers to execute arbitrary code on…

BEARDSHELL Malware and COVENANT
24
Jun
2025

APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine

Jun 24, 2025Ravie LakshmananMalware / Threat Intelligence The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new…

Google I/O: LLM capabilities power agentic AI search
24
Jun
2025

CMA consults on Google’s search dominance

Under the Digital Markets Competition Regime, the Competition and Markets Authority (CMA) has proposed to designate Google with “strategic market…

OWASP AI Testing Guide - A New Project to Detect Vulnerabilities in AI Applications
24
Jun
2025

OWASP AI Testing Guide – A New Project to Detect Vulnerabilities in AI Applications

The Open Web Application Security Project (OWASP) has announced the development of a comprehensive OWASP AI Testing Guide, marking a…

LapDogs Hackers Compromise 1,000 SOHO Devices Using Custom Backdoor for Stealthy Attacks
24
Jun
2025

LapDogs Hackers Compromise 1,000 SOHO Devices Using Custom Backdoor for Stealthy Attacks

Security researchers at SecurityScorecard have uncovered a sprawling cyber-espionage campaign orchestrated by the LapDogs Operational Relay Box (ORB) Network, a…

U.S. House Bans WhatsApp
24
Jun
2025

U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues

Jun 24, 2025Ravie LakshmananData Protection / Mobile Security The U.S. House of Representatives has formally banned congressional staff members from…

U.S. warns of incoming cyber threats following Iran airstrikes
24
Jun
2025

U.S. warns of incoming cyber threats following Iran airstrikes

U.S. warns of incoming cyber threats following Iran airstrikes Pierluigi Paganini June 24, 2025 U.S. warns of cyberattacks by pro-Iranian…

Advanced Malware Campaign Targets WordPress and WooCommerce Sites with Hidden Skimmers
24
Jun
2025

Advanced Malware Campaign Targets WordPress and WooCommerce Sites with Hidden Skimmers

The Wordfence Threat Intelligence Team uncovered a sophisticated malware campaign during a routine site cleanup, revealing a family of malicious…

Common Good Cyber Fund launches to support nonprofits protecting the internet
24
Jun
2025

Common Good Cyber Fund launches to support nonprofits protecting the internet

The Common Good Cyber Fund is a new effort to support cybersecurity that protects everyone, especially those most at risk…