Chinese Hackers Target Taiwan's Semiconductor Sector with Cobalt Strike, Custom Backdoors
17
Jul
2025

Chinese Hackers Target Taiwan’s Semiconductor Sector with Cobalt Strike, Custom Backdoors

The Taiwanese semiconductor industry has become the target of spear-phishing campaigns undertaken by three Chinese state-sponsored threat actors. “Targets of…

Cisco Unified Intelligence Center Vulnerability Allows Remote Attackers to Upload Arbitrary Files
17
Jul
2025

Cisco Unified Intelligence Center Vulnerability Allows Remote Attackers to Upload Arbitrary Files

A critical vulnerability in Cisco’s Unified Intelligence Center (CUIC) web-based management interface has been classified with high severity, allowing authenticated…

Critical SharePoint RCE Vulnerability Exploited via Malicious XML in Web Part
17
Jul
2025

Critical SharePoint RCE Vulnerability Exploited via Malicious XML in Web Part

A severe remote code execution (RCE) vulnerability has been discovered in Microsoft SharePoint that allows attackers to execute arbitrary code…

UNC6148 deploys Overstep malware on SonicWall devices, possibly for ransomware operations
17
Jul
2025

UNC6148 deploys Overstep malware on SonicWall devices, possibly for ransomware operations

UNC6148 deploys Overstep malware on SonicWall devices, possibly for ransomware operations Pierluigi Paganini July 17, 2025 UNC6148 targets SonicWall devices…

SonicWall SMA Devices 0-Day RCE Vulnerability Exploited to Deploy OVERSTEP Ransomware
17
Jul
2025

SonicWall SMA Devices 0-Day RCE Vulnerability Exploited to Deploy OVERSTEP Ransomware

SonicWall’s end-of-life SMA 100 series appliances are again on the front line after investigators unearthed a covert campaign that couples…

How Threat Actors Embed Malicious JavaScript in Vector Files
17
Jul
2025

How Threat Actors Embed Malicious JavaScript in Vector Files

Cybersecurity researchers have identified an emerging attack campaign where threat actors are weaponizing Scalable Vector Graphics (SVG) files to deliver…

Tired of gaps in your security? These open-source tools can help
17
Jul
2025

Tired of gaps in your security? These open-source tools can help

When it comes to spotting threats, security teams need tools that can pull data from all over and make it…

Lenovo Vantage Vulnerabilities Allow Attackers to Escalate Privileges as SYSTEM User
17
Jul
2025

Lenovo Vantage Vulnerabilities Allow Attackers to Escalate Privileges as SYSTEM User

A trio of newly disclosed CVE-2025-6230, CVE-2025-6231 and CVE-2025-6232 underscores how a single trusted OEM utility can become a springboard…

0-Day RCE Flaw in SonicWall SMA Devices Exploited to Launch OVERSTEP Ransomware
17
Jul
2025

0-Day RCE Flaw in SonicWall SMA Devices Exploited to Launch OVERSTEP Ransomware

Google’s Threat Intelligence Group (GTIG) has uncovered a sophisticated cyberattack campaign targeting end-of-life SonicWall Secure Mobile Access (SMA) 100 series…

Socure Workforce Verification detects manipulated or fabricated identities
17
Jul
2025

Socure Workforce Verification detects manipulated or fabricated identities

Socure launched Workforce Verification solution to address the growing threat of employee fraud. Socure’s Workforce Verification adapts its enterprise-grade identity…

Co-op cyberattack
17
Jul
2025

Co-op Cyberattack Exposes Data Of 6.5 Million Members

Co-op has confirmed that the personal details of all 6.5 million of its members were stolen in a cyberattack earlier…

UAP Data Breach confirmed
17
Jul
2025

United Australia Party Confirms UAP Data Breach

The United Australia Party (UAP), led by mining magnate Clive Palmer, has confirmed that it fell victim to a cyberattack…