Chinese Hackers Using ToolShell Vulnerability To Compromise Networks Of Government Agencies
22
Oct
2025

Chinese Hackers Using ToolShell Vulnerability To Compromise Networks Of Government Agencies

China-based threat actors have exploited the critical ToolShell vulnerability in Microsoft SharePoint servers to infiltrate networks across multiple continents, targeting…

Rival Hackers Dox Alleged Operators of Lumma Stealer
22
Oct
2025

Rival Hackers Dox Alleged Operators of Lumma Stealer – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

A major gang that sells a secret data-stealing tool called Lumma Stealer, a highly adaptable Malware-as-a-Service (MaaS) marketed since 2022…

Local council devolution: Could it accelerate the pace of local government cloud adoption?
22
Oct
2025

Government faces questions about why US AWS outage disrupted UK tax office and banking firms

The UK government is being pressed for a response as to why a major, multi-hour Amazon Web Services (AWS) outage in…

Jaguar Land Rover extends production delay following cyberattack
22
Oct
2025

Jaguar Land Rover attack cost British economy $2.5 billion

The late summer cyberattack on Jaguar Land Rover led to a $2.5 billion (1.9 billion pound) financial hit on the…

Meta
22
Oct
2025

Meta launches new anti-scam tools for WhatsApp and Messenger

Meta has announced new tools to help WhatsApp and Messenger users protect themselves from potential scams and secure their accounts. On Messenger,…

Decoding Microsoft 365 Audit Log Events Using Bitfield Mapping Technique
22
Oct
2025

Decoding Microsoft 365 Audit Log Events Using Bitfield Mapping Technique

When users authenticate to Microsoft cloud services, their activities generate authentication events recorded across multiple logging systems. Microsoft Entra sign-in…

When Addressing Cyber Attacks in Healthcare, Prevention is Better Than Treatment
22
Oct
2025

When Addressing Cyber Attacks in Healthcare, Prevention is Better Than Treatment

No industry is spared from cyber-attacks. But some have greater consequences than others. When a hospital or medical group experiences…

Hackers Use ASP.NET Machine Keys to Break Into IIS, Push Malicious Extensions
22
Oct
2025

Hackers Use ASP.NET Machine Keys to Break Into IIS, Push Malicious Extensions

In September 2025, Texas A&M University System (TAMUS) Cybersecurity, a managed detection and response provider, in collaboration with Elastic Security…

More openness on the cards for Apple and Google’s mobile platforms
22
Oct
2025

More openness on the cards for Apple and Google’s mobile platforms

Following a nine-month investigation, the Competition and Markets Authority (CMA) has designated Google’s provision of its mobile platform with strategic…

CISA’s Joint Cyber Defense Collaborative takes major personnel hit
22
Oct
2025

CISA’s international, industry and academic partnerships slashed

The Trump administration has effectively closed the division of the Cybersecurity and Infrastructure Security Agency that coordinates critical infrastructure cybersecurity…

New Tykit Phishing Kit Mimics Microsoft 365 Login Pages to Steal Corporate Account Credentials
22
Oct
2025

New Tykit Phishing Kit Mimics Microsoft 365 Login Pages to Steal Corporate Account Credentials

A sophisticated phishing kit dubbed Tykit, which impersonates Microsoft 365 login pages to harvest corporate credentials. First detected in May…

Threat Actors Exploiting Azure Blob Storage to Breach Organizational Repositories
22
Oct
2025

Threat Actors Exploiting Azure Blob Storage to Breach Organizational Repositories

Threat actors are increasingly targeting Azure Blob Storage, Microsoft’s flagship object storage solution, to infiltrate organizational repositories and disrupt critical…