UNG0002 Actors Deploys Weaponize LNK Files Using ClickFix Fake CAPTCHA Verification Pages
17
Jul
2025

UNG0002 Actors Deploys Weaponize LNK Files Using ClickFix Fake CAPTCHA Verification Pages

A sophisticated espionage campaign targeting multiple Asian jurisdictions has emerged, utilizing weaponized shortcut files and deceptive social engineering techniques to…

Chinese Mobile Forensic Tool Accesses SMS, Images, Audio, and GPS Data
17
Jul
2025

Chinese Mobile Forensic Tool Accesses SMS, Images, Audio, and GPS Data

Cybersecurity researchers at Lookout Threat Lab have uncovered a sophisticated mobile forensics application called Massistant, deployed by Chinese law enforcement…

adoption papers
17
Jul
2025

Adoption agency leaks over a million records

Security researcher Jeremiah Fowler found a publicly accessible database online that contained highly personal information from an adoption agency. Jeremiah,…

Hackers Exploit Apache HTTP Server Flaw to Deploy Linuxsys Cryptocurrency Miner
17
Jul
2025

Hackers Exploit Apache HTTP Server Flaw to Deploy Linuxsys Cryptocurrency Miner

Jul 17, 2025Ravie LakshmananCryptocurrency / Vulnerability Cybersecurity researchers have discovered a new campaign that exploits a known security flaw impacting…

Travelex replacing its software spine as part of cloud migration
17
Jul
2025

Travelex replacing its software spine as part of cloud migration

Travelex is replacing multiple legacy core supply chain systems with an off-the-shelf alternative, as it seeks to complete its transition…

UK Retailer Co-op Confirms 6.5 Million Members' Data Stolen in Massive Cyberattacks
17
Jul
2025

UK Retailer Co-op Confirms 6.5 Million Members’ Data Stolen in Massive Cyberattacks

Co-op has confirmed that all 6.5 million members of the UK retail cooperative had their personal data compromised during a…

Over 4 Million Exposed Devices Used in Two New DoS Attack Campaigns
17
Jul
2025

Over 4 Million Exposed Devices Used in Two New DoS Attack Campaigns

Security researchers have discovered over 4 million vulnerable Internet hosts that can be weaponized for devastating new denial-of-service attacks, marking…

wetransfer logo
17
Jul
2025

WeTransfer walks back clause that said it would train AI on your files

File sharing site WeTransfer has rolled back language that allowed it to train machine learning models on any files that…

NVIDIA Container Toolkit Vulnerability Allows Elevated Arbitrary Code Execution
17
Jul
2025

NVIDIA Container Toolkit Vulnerability Allows Elevated Arbitrary Code Execution

NVIDIA has released critical security updates addressing two significant vulnerabilities in its Container Toolkit and GPU Operator that could allow…

GitHub Abused to Spread Amadey, Lumma and Redline InfoStealers in Ukraine
17
Jul
2025

GitHub Abused to Spread Amadey, Lumma and Redline InfoStealers in Ukraine

A newly identified Malware-as-a-Service (MaaS) operation is using GitHub repositories to spread a mix of infostealer families. This campaign was…

Redefining Cybersecurity In The Age Of Autonomous Agents
17
Jul
2025

U.S.-Russia Cybersecurity Relations. What CISOs Should Know.

When it comes to the cyber-threat landscape, Russian actors are usually portrayed as the bogeymen, according to technology journalist Phil Muncaster,…

Stellar Cyber enhances identity security with ITDR capabilities
17
Jul
2025

Stellar Cyber enhances identity security with ITDR capabilities

At the upcoming Black Hat USA 2025 in Las Vegas, Stellar Cyber will debut its Identity Threat Detection & Response…