ICYMI: 2025-04-02
Latest Headlines
Google Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuse
Helping Your Clients Achieve NIST Compliance: A Step by Step Guide for Service Providers
Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers
FIN7 Deploys Anubis Backdoor to Hijack Windows Systems via Compromised SharePoint Sites
New Malware Loaders Use Call Stack Spoofing, GitHub C2, and .NET Reactor for Stealth
Cybersecurity Professor Faced China-Funding Inquiry Before Disappearing, Sources Say
Serial Entrepreneurs Raise $43M to Counter AI Deepfakes, Social Engineering
Vulnerabilities Expose Jan AI Systems to Remote Manipulation
Cyberhaven Banks $100 Million in Series D, Valuation Hits $1 Billion
Google DeepMind Unveils Framework to Exploit AI’s Cyber Weaknesses
North Korea’s IT Operatives Are Exploiting Remote Work Globally
ImageRunner Flaw Exposed Sensitive Information in Google Cloud
Lazarus Uses ClickFix Tactics in Fake Cryptocurrency Job Attacks
Questions Remain Over Attacks Causing DrayTek Router Reboots
Google Brings End-to-End Encrypted Emails to All Enterprise Gmail Users
Brinker Named Among “10 Most Promising Defense Tech Startups of 2025”
North Korean IT Workers Attacking European Organizations to Infiltrate Corporate Infrastructure
ChatGPT Down For Thousands Of Users Worldwide – Latest Outage Updates
New Outlaw Linux Malware Leveraging SSH Brute-Forcing & Corn Jobs to Maintain Persistence
Firefox 137 Released With Fix for Multiple High Severity Vulnerabilities
Google Cloud Platform Privilege Escalation Vulnerability Allows Access to Sensitive Data
Apple Fined $162 Million by French Authorities for Mobile App Advertising Dominance
20,000 WordPress Sites Vulnerable to Arbitrary File Upload and Deletion Attacks
New Android Malware ‘Salvador Stealer’ That Phish & Steals Your Banking Details & OTPs
Genetic data site openSNP to close and delete data over privacy concerns
Verizon Call Filter API flaw exposed customers’ incoming call history
GitHub expands security tools after 39 million secrets leaked in 2024
Royal Mail investigates data leak claims, no impact on operations
Police shuts down KidFlix child sexual exploitation platform
The Reality Behind Security Control Failures—And How to Prevent Them
Counterfeit Android devices found preloaded with Triada malware
– MTZ