Hackers Use Weaponized .HTA Files to Infect Victims with Red Ransomware
25
Jul
2025

Hackers Use Weaponized .HTA Files to Infect Victims with Red Ransomware

CloudSEK’s TRIAD team uncovered an active development site deploying Clickfix-themed malware linked to the Epsilon Red ransomware. This variant deviates…

Remote Code Execution in Microsoft SharePoint (CVE-2025-53770) — API Security
25
Jul
2025

Remote Code Execution in Microsoft SharePoint (CVE-2025-53770) — API Security

On July 19, 2025, a critical remote code execution (RCE) vulnerability (CVE-2025-53770, also referred to as ToolShell) was publicly disclosed,…

Microsoft Copilot Rooted to Gain Unauthorized Root Access to its Backend System
25
Jul
2025

Microsoft Copilot Rooted to Gain Unauthorized Root Access to its Backend System

A critical security vulnerability has been discovered in Microsoft Copilot Enterprise, allowing unauthorized users to gain root access to its…

Fake Indian Banking Apps on Android Steal Login Credentials from Users
25
Jul
2025

Fake Indian Banking Apps on Android Steal Login Credentials from Users

A malicious Android application has been uncovered, impersonating legitimate Indian banking apps to orchestrate credential theft, surveillance, and unauthorized financial…

Cyber Espionage
25
Jul
2025

Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor

Jul 25, 2025Ravie LakshmananCyber Espionage / Malware Russian aerospace and defense industries have become the target of a cyber espionage…

The UK’s ransomware payment ban is a strategic win
25
Jul
2025

The UK’s ransomware payment ban is a strategic win

Back in January 2025 the UK government took an important step towards dismantling the ransomware economy by proposing a ban…

Multiple Vulnerabilities in Tridium Niagara Framework
25
Jul
2025

Multiple Vulnerabilities in Tridium Niagara Framework

Researchers identified 13 critical vulnerabilities in Tridium’s widely-deployed Niagara Framework that could allow attackers to compromise building automation systems and…

Fire Ant Hackers Target VMware ESXi and vCenter Flaws to Infiltrate Organizations
25
Jul
2025

Fire Ant Hackers Target VMware ESXi and vCenter Flaws to Infiltrate Organizations

Cybersecurity firm Sygnia has been tracking and mitigating a sophisticated espionage operation dubbed Fire Ant, which zeroes in on virtualization…

Hacker Added Prompt to Amazon Q to Erase Files and Cloud Data
25
Jul
2025

Hacker Added Prompt to Amazon Q to Erase Files and Cloud Data

A security vulnerability recently surfaced involving Amazon’s AI coding assistant, ‘Q’, integrated with VS Code. The incident, reported by 404…

US sanctions North Korean firm, nationals behind IT worker schemes
25
Jul
2025

US sanctions North Korean firm, nationals behind IT worker schemes

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned three North Korean nationals and a…

Strengthening Security Measures In Digital Advertising Platforms
25
Jul
2025

Strengthening Security Measures In Digital Advertising Platforms

Data breaches pose significant threats to digital advertising platforms, jeopardizing user privacy and trust. Implementing robust security measures within display…

Hackers Exploit Google Forms to Trick Victims into Stealing Cryptocurrency
25
Jul
2025

Hackers Exploit Google Forms to Trick Victims into Stealing Cryptocurrency

Cybercriminals are increasingly using Google Forms to plan cryptocurrency theft in a sophisticated evolution of phishing assaults, taking advantage of…