Derek B. Johnson
28
Jul
2025

Researchers flag flaw in Google’s AI coding assistant that allowed for ‘silent’ code exfiltration 

Researchers have disclosed a vulnerability in Gemini Command Line Interface (CLI), Google’s latest piece of “agentic” AI software for code…

Naval Group
28
Jul
2025

France’s warship builder Naval Group investigates 1TB data breach

France’s state-owned defense firm Naval Group is investigating a cyberattack after 1TB of allegedly stolen data was leaked on a…

Atomic macOS Stealer Comes With New Backdoor to Enable Remote Access
28
Jul
2025

Atomic macOS Stealer Comes With New Backdoor to Enable Remote Access

The Atomic macOS Stealer (AMOS) has undergone a significant evolution, transforming from a traditional information stealer into a sophisticated persistent…

Oyster Backdoor Disguised as PuTTY and KeyPass Targets IT Admins via SEO Poisoning
28
Jul
2025

Oyster Backdoor Disguised as PuTTY and KeyPass Targets IT Admins via SEO Poisoning

Threat actors have been using trojanized versions of well-known IT tools like PuTTY and WinSCP to spread the Oyster backdoor,…

CLI
28
Jul
2025

Flaw in Gemini CLI AI coding assistant allowed stealthy code execution

A vulnerability in Google’s Gemini CLI allowed attackers to silently execute malicious commands and exfiltrate data from developers’ computers using…

Muddled Libra Actors Attacking Organizations Call Centers for Initial Infiltration
28
Jul
2025

Muddled Libra Actors Attacking Organizations Call Centers for Initial Infiltration

The cyberthreat landscape witnessed a concerning evolution in 2025 as the notorious Muddled Libra threat group dramatically shifted their attack…

ArmouryLoader Bypasses Security Protections to Inject Malicious Code
28
Jul
2025

ArmouryLoader Bypasses Security Protections to Inject Malicious Code

ArmouryLoader and other malicious code loaders have become essential tools for introducing Trojan-type payloads into hacked systems in the ever-changing…

Endgame Gear
28
Jul
2025

Endgame Gear mouse config tool infected users with malware

Gaming peripherals maker Endgame Gear is warning that malware was hidden in its configuration tool for the OP1w 4k v2…

Uncovering Five Critical Vulnerabilities in Microsoft SharePoint
28
Jul
2025

Uncovering Five Critical Vulnerabilities in Microsoft SharePoint

Security researchers from Kaspersky have detailed a sophisticated exploit chain dubbed “ToolShell,” actively targeting on-premise Microsoft SharePoint servers worldwide. The…

Print Friendly, PDF & Email
28
Jul
2025

Why business logic abuse is a major threat

Earlier this year one of the largest ever cases of business logic abuse was detected when a botnet across over…

Scattered Spider Launching Ransomware on Hijacked VMware Systems, Google
28
Jul
2025

Scattered Spider Launching Ransomware on Hijacked VMware Systems, Google

A highly “aggressive” cyber campaign, identified in mid-2025 by Google’s Threat Intelligence Group (GTIG), is posing a severe threat to…

Apple
28
Jul
2025

macOS Sploitlight flaw leaks Apple Intelligence data

Attackers could use a recently patched macOS vulnerability to bypass Transparency, Consent, and Control (TCC) security checks and steal sensitive…