Telegram Based Raven Stealer Malware Steals Login Credentials, Payment Data and Autofill Information
29
Jul
2025

Telegram Based Raven Stealer Malware Steals Login Credentials, Payment Data and Autofill Information

The commodity infostealer landscape has a new entrant in Raven Stealer, a compact Delphi/C++ binary that hijacks Telegram’s bot API…

Age Verification Laws Send VPN Use Soaring—and Threaten the Open Internet
29
Jul
2025

Age Verification Laws Send VPN Use Soaring—and Threaten the Open Internet

After the United Kingdom’s Online Safety Act went into effect on Friday, requiring porn platforms and other adult content sites…

Linux 6.16 Released with Performance and Networking Enhancements
29
Jul
2025

Linux 6.16 Released with Performance and Networking Enhancements

Linux creator Linus Torvalds announced the release of Linux kernel version 6.16 on July 27, 2025, marking the end of…

Retail cyber crime spree a “wake-up call”, says NCSC CEO
29
Jul
2025

Building digital resilience in retail

Retailers are not having an easy time. The June 2025 report from the CBI reveals that retail sales fell for…

CISA Warns of PaperCut RCE Vulnerability Exploited in Attacks
29
Jul
2025

CISA Warns of PaperCut RCE Vulnerability Exploited in Attacks

CISA has issued an urgent warning regarding a critical vulnerability in PaperCut NG/MF print management software that threat actors are…

Lionishackers Exfiltrate Sensitive Corporate Databases for Sale on the Dark Web
29
Jul
2025

Lionishackers Exfiltrate Sensitive Corporate Databases for Sale on the Dark Web

Outpost24’s threat intelligence researchers have uncovered the operations of Lionishackers, a financially motivated cyber threat actor specializing in the exfiltration…

New macOS Vulnerability Allows Attackers to Steal Private Files by Bypassing TCC
29
Jul
2025

New macOS Vulnerability Allows Attackers to Steal Private Files by Bypassing TCC

Microsoft Threat Intelligence has uncovered a critical macOS vulnerability that enables attackers to bypass Apple’s Transparency, Consent, and Control (TCC)…

Varonis unveils Next-Gen Database Activity Monitoring for agentless database security and compliance
29
Jul
2025

Varonis unveils Next-Gen Database Activity Monitoring for agentless database security and compliance

Varonis released Next-Gen Database Activity Monitoring (DAM), a new approach to database security that deploys quickly and overcomes the challenges…

Seychelles Commercial Bank Reported Cybersecurity Incident
29
Jul
2025

Seychelles Commercial Bank Reported Cybersecurity Incident

Seychelles Commercial Bank Reported Cybersecurity Incident Pierluigi Paganini July 29, 2025 Seychelles Commercial Bank on Friday said it had recently…

CISA Warns of Cisco Identity Services Engine Vulnerability Exploited in Attacks
29
Jul
2025

CISA Warns of Cisco Identity Services Engine Vulnerability Exploited in Attacks

CISA has issued an urgent warning regarding two critical injection vulnerabilities in Cisco’s Identity Services Engine (ISE) that threat actors…

Threat Actors Use Phishing to Target Belgian Grand Prix Fans and Teams
29
Jul
2025

Threat Actors Use Phishing to Target Belgian Grand Prix Fans and Teams

Cybersecurity experts have pointed to an increase in sophisticated threat actor activity following the July 27 2025 Belgian Grand Prix…

Booz Allen Hamilton launches Vellox Reverser to accelerate AI-powered malware analysis
29
Jul
2025

Booz Allen Hamilton launches Vellox Reverser to accelerate AI-powered malware analysis

Booz Allen Hamilton announced Vellox Reverser, an AI-enabled cloud product that protects organizations from malware as cyberattacks grow increasingly insidious….