ICYMI: 2025-06-03
Latest Headlines
Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack
Critical 10-Year-Old Roundcube Webmail Bug Allows Authenticated Users Run Malicious Code
Scattered Spider: Understanding Help Desk Scams and How to Defend Your Organization
Android Trojan Crocodilus Now Active in 8 Countries, Targeting Banks and Crypto Wallets
Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues
Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion
New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch
Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones
1,000 Instantel Industrial Monitoring Devices Possibly Exposed to Hacking
Zero Networks Raises $55 Million for Microsegmentation Solution
Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names
Deep Dive into Endpoint Security – Tools and Best Practices for 2025
How to Implement Zero Trust Architecture in Enterprise Networks
Top 10 Advanced Threat Detection Techniques for Modern Cybersecurity
10-Year-Old Roundcube RCE Vulnerability Let Attackers Execute Malicious Code
Android Security Update – Patch for Vulnerabilities that Allows Privilege Escalation
Hewlett Packard Enterprise warns of critical StoreOnce auth bypass
Coinbase breach tied to bribed TaskUs support agents in India
Microsoft adds quick machine recovery to Windows 11 settings
Malicious RubyGems pose as Fastlane to steal Telegram API data
Mozilla launches new system to detect Firefox crypto drainer add-ons
CISA warns of ConnectWise ScreenConnect bug exploited in attacks
Victoria’s Secret delays earnings release after security incident
Android malware Crocodilus adds fake contacts to spoof trusted callers
– MTZ