Check Point analyzes Chinese APT Storm-2603
01
Aug
2025

Check Point analyzes Chinese APT Storm-2603

ToolShell under siege: Check Point analyzes Chinese APT Storm-2603 Pierluigi Paganini August 01, 2025 Storm-2603 group exploits SharePoint flaws and…

This month in security with Tony Anscombe – July 2025 edition
01
Aug
2025

This month in security with Tony Anscombe – July 2025 edition

Here’s a look at cybersecurity stories that moved the needle, raised the alarm, or offered vital lessons in July 2025…

Microsoft Upgrades .NET Bounty Program with Rewards Up to $40,000
01
Aug
2025

Microsoft Upgrades .NET Bounty Program with Rewards Up to $40,000

Microsoft has significantly enhanced its .NET bounty program, announcing substantial updates that expand the program’s scope, streamline award structures, and…

LLMs Boost Offensive R&D by Identifying and Exploiting Trapped COM Objects
01
Aug
2025

LLMs Boost Offensive R&D by Identifying and Exploiting Trapped COM Objects

Outflank is pioneering the integration of large language models (LLMs) to expedite research and development workflows while maintaining rigorous quality…

SAP sales tactic fuels IT disconnect
01
Aug
2025

AWS sees revenue and profit rise in Q2, bats away competitive concerns

Amazon Web Services (AWS) reported a 17.5% year-on-year increase in revenue to $30.9bn during the second quarter of its 2025…

Pwn2Own Ireland
01
Aug
2025

Pwn2Own hacking contest pays $1 million for WhatsApp exploit

The Zero Day Initiative is offering a $1 million reward to security researchers who will demonstrate a zero-click WhatsApp exploit…

$1,000,000 for WhatsApp 0-Click RCE Exploit at Pwn2Own Ireland 2025
01
Aug
2025

$1,000,000 for WhatsApp 0-Click RCE Exploit at Pwn2Own Ireland 2025

Trend Micro’s Zero Day Initiative (ZDI) announces an unprecedented $1,000,000 bounty for a zero-click remote code execution (RCE) exploit targeting…

Threat Actors Exploit Proofpoint and Intermedia Link Wrapping to Conceal Phishing Payloads
01
Aug
2025

Threat Actors Exploit Proofpoint and Intermedia Link Wrapping to Conceal Phishing Payloads

Cybercriminals are increasingly exploiting link wrapping features from vendors like Proofpoint and Intermedia to mask malicious payloads, leveraging the inherent…

Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks
01
Aug
2025

Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks

Aug 01, 2025Ravie LakshmananThreat Intelligence / Ransomware The threat actor linked to the exploitation of the recently disclosed security flaws…

CISA Issues ICS Advisories for Rockwell Automation, VMware, and Güralp Seismic Monitoring Systems
01
Aug
2025

CISA Issues ICS Advisories for Rockwell Automation, VMware, and Güralp Seismic Monitoring Systems

CISA released two high-severity Industrial Control Systems (ICS) advisories on July 31, 2025, highlighting critical vulnerabilities in widely deployed industrial…

Microsoft to Block External Workbook Links to Unsafe File Types by Default
01
Aug
2025

Microsoft to Block External Workbook Links to Unsafe File Types by Default

Microsoft announced a significant security enhancement for Excel users, revealing plans to block external workbook links to unsafe file types…

Threat Actors Abuse Proofpoint's and Intermedia’s Link Wrapping Features to Hide Phishing Payloads
01
Aug
2025

Threat Actors Abuse Proofpoint’s and Intermedia’s Link Wrapping Features to Hide Phishing Payloads

The latest wave of credential-phishing campaigns has revealed an unexpectedly convenient ally for threat actors: the very e-mail security suites…