Chinese hacking groups are behind SharePoint attacks, Microsoft says
18
Aug
2025

Chinese hacking groups are behind SharePoint attacks, Microsoft says

Microsoft accused Chinese state-sponsored hackers of using flaws in its SharePoint document management software in a hacking campaign that has…

ERMAC Android malware source code leak exposes banking trojan infrastructure
18
Aug
2025

ERMAC Android malware source code leak exposes banking trojan infrastructure

The source code for version 3 of the ERMAC Android banking trojan has been leaked online, exposing the internals of the malware-as-a-service platform…

Threat Actors Exploit Microsoft Help Index File to Deploy PipeMagic Malware
18
Aug
2025

Threat Actors Exploit Microsoft Help Index File to Deploy PipeMagic Malware

Cybersecurity researchers have uncovered a sophisticated campaign where threat actors leverage a Microsoft Help Index File (.mshi) to deploy the…

Fake ChatGPT Desktop App Delivering PipeMagic Backdoor, Microsoft
18
Aug
2025

Fake ChatGPT Desktop App Delivering PipeMagic Backdoor, Microsoft

Microsoft warns that a fake ChatGPT desktop app was used to deliver PipeMagic malware, linked to ransomware attacks exploiting a…

Cyberattack on Hongkong Post exposes address book data of over 60,000 EC-Ship users
18
Aug
2025

Cyberattack on Hongkong Post exposes address book data of over 60,000 EC-Ship users

At least 60,000 users have had their address book information compromised following a cyberattack on Hongkong Post’s online mailing portal,…

N-able
18
Aug
2025

Over 800 N-able servers left unpatched against critical flaws

Over 800 N-able N-central servers remain unpatched against a pair of critical security vulnerabilities tagged as actively exploited last week….

VirtualBox 7.2 Released With Support for Windows 11/Arm VMs and Bug Fixes
18
Aug
2025

VirtualBox 7.2 Released With Support for Windows 11/Arm VMs and Bug Fixes

Oracle has announced the release of VirtualBox 7.2, a major update to the popular open-source virtualization platform that introduces significant…

Weaponized Python Package "termncolor" Uses Windows Run Key for Persistence
18
Aug
2025

Weaponized Python Package “termncolor” Uses Windows Run Key for Persistence

Cybersecurity experts discovered a complex supply chain attack that originated from the Python Package Index (PyPI) in a recent disclosure…

Phishing Scam with Fake Copyright Notices Drops Noodlophile Stealer
18
Aug
2025

Fake Copyright Notices Drop New Noodlophile Stealer Variant

Morphisec warns of a new Noodlophile Stealer variant spread via fake copyright phishing emails, using Dropbox links and DLL side-loading…

Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware
18
Aug
2025

Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware

Aug 18, 2025Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers have lifted the lid on the threat actors’ exploitation of a…

L’Oréal to promote cyber resilience for Britain's beauty salons
18
Aug
2025

L’Oréal to promote cyber resilience for Britain’s beauty salons

The UK and Ireland branch of multibillion-pound beauty giant L’Oréal is to work with the National Cyber Resilience Centre Group…

‘Shadow AI’ increases cost of data breaches, report finds
18
Aug
2025

NIST seeks input on control overlays for securing AI systems

The National Institute of Standards and Technology wants public feedback on a plan to develop guidance for how companies can…