ICYMI: 2025-07-17
Latest Headlines
Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters
Hackers Exploit Apache HTTP Server Flaw to Deploy Linuxsys Cryptocurrency Miner
Europol Disrupts NoName057(16) Hacktivist Group Linked to DDoS Attacks Against Ukraine
CTEM vs ASM vs Vulnerability Management: What Security Leaders Need to Know in 2025
Chinese Hackers Target Taiwan’s Semiconductor Sector with Cobalt Strike, Custom Backdoors
Cisco Warns of Critical ISE Flaw Allowing Unauthenticated Attackers to Execute Root Code
Watch on Demand: Cloud & Data Security Summit – Tackling Exposed Attack Surfaces in the Cloud
Empirical Security Raises $12 Million for AI-Driven Vulnerability Management
Mobile Forensics Tool Used by Chinese Law Enforcement Dissected
Trial Opens Against Meta CEO Mark Zuckerberg and Other Leaders Over Facebook Privacy Violations
VMware Flaws That Earned Hackers $340,000 at Pwn2Own Patched
Cambodia Makes 1,000 Arrests in Latest Crackdown on Cybercrime
Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier
Chinese State-Sponsored Hackers Attacking Semiconductor Industry with Weaponized Cobalt Strike
Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets
H2Miner Attacking Linux, Windows, and Containers to Mine Monero
Hackers Exploiting DNS Blind Spots to Hide and Deliver Malware
4M+ Internet-Exposed Systems at Risk From Tunneling Protocol Vulnerabilities
Massistant Chinese Mobile Forensic Tooling Gain Access to SMS Messages, Images, Audio and GPS Data
UNG0002 Actors Deploys Weaponize LNK Files Using ClickFix Fake CAPTCHA Verification Pages
Armenian Hacker Extradited to U.S. After Ransomware Attacks on Tech Firms
UK Retailer Co-op Confirms 6.5 Million Members’ Data Stolen in Massive Cyberattacks
Citrix Bleed 2 exploited weeks before PoCs as Citrix denied attacks
VMware fixes four ESXi zero-day bugs exploited at Pwn2Own Berlin
Microsoft Teams voice calls abused to push Matanbuchus malware
Google sues to disrupt BadBox 2.0 botnet infecting 10 million devices
LameHug malware uses AI LLM to craft Windows data-theft commands in real-time
Chinese hackers breached National Guard to steal network configurations
Max severity Cisco ISE bug allows pre-auth command execution, patch now
– MTZ