ICYMI: 2025-06-24
Latest Headlines
New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public
Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue
Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers
Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network
U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues
APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine
China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom
Siemens Notifies Customers of Microsoft Defender Antivirus Issue
Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives
Chinese APT Hacking Routers to Build Espionage Infrastructure
Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play
Apple, Netflix, Microsoft Sites ‘Hacked’ for Tech Support Scams
New DRAT V2 Updates C2 Protocol Expands Functional Capabilities With Shell Command Execution
NCSC Warns of SHOE RACK Malware Using DOH & SSH Protocol for Attacking Fortinet Firewalls
New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands
Gonjeshke Darande Threat Actors Pose as Hacktivist Infiltrated Iranian Crypto Exchange
2,000+ Devices Hacked Using Weaponized Social Security Statement Themes
Facebook, Netflix, Microsoft Hijacked to Insert Fake Phone Number
Zimbra Classic Web Client Vulnerability Let Attackers Execute Arbitrary JavaScript
Google Cloud Donates A2A Protocol to Linux Foundation Enables Secure, Intelligent Communication
Threat Actors Abuse ConnectWise Configuration to Build a Signed Malware
Critical Convoy Vulnerability Let Attackers Execute Remote Code on Affected Servers
Google Cloud donates A2A AI protocol to the Linux Foundation
SonicWall warns of trojanized NetExtender stealing VPN logins
Windows 10 KB5061087 update released with 13 changes and fixes
Windows 10 users can get extended security updates using Microsoft points
Trezor’s support platform abused in crypto theft phishing attacks
New FileFix attack weaponizes Windows File Explorer for stealthy commands
US House bans WhatsApp on staff devices over security concerns
– MTZ