ICYMI: 2025-07-18
Latest Headlines
China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones
UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns
Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks
Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services
CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign
Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices
From Backup to Cyber Resilience: Why IT Leaders Must Rethink Backup in the Age of Ransomware
How China’s Patriotic ‘Honkers’ Became the Nation’s Elite Cyberspies
In Other News: Law Firm Hacked by China, Symantec Flaw, Meta AI Hack, FIDO Key Bypass
Email Protection Startup StrongestLayer Emerges From Stealth Mode
Fortinet FortiWeb Flaw Exploited in the Wild After PoC Publication
1.4 Million Affected by Data Breach at Virginia Radiology Practice
CitrixBleed 2: 100 Organizations Hacked, Thousands of Instances Still Vulnerable
Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet
Critical Nvidia Toolkit Flaw Exposes AI Cloud Services to Hacking
Anne Arundel Dermatology Data Breach Impacts 1.9 Million People
Settlement Reached in Investors’ Lawsuit Against Meta CEO Mark Zuckerberg and Other Company Leaders
Google Sued BadBox 2.0 Malware Botnet Operators That Infects 10 Million+ Devices
Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools
Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon
Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution
Ubiquiti UniFi Devices Vulnerability Allows Attackers to Inject Malicious Commands
Threat Actors Weaponizing GitHub Accounts To Host Payloads, Tools and Amadey Malware Plug-Ins
Microsoft Defender for Office 365 Launches New Dashboard for Enhanced Threat Vector Insights
Lenovo Protection Driver Vulnerability Let Attackers Escalate Privilege and Execute Arbitrary Code
CrushFTP zero-day exploited in attacks to gain admin access on servers
Arch Linux pulls AUR packages that installed Chaos RAT malware
UK ties GRU to stealthy Microsoft 365 credential-stealing malware
Microsoft mistakenly tags Windows Firewall error log bug as fixed
Russian alcohol retailer WineLab closes stores after ransomware attack
New Phobos and 8base ransomware decryptor recover files for free
Hackers scanning for TeleMessage Signal clone flaw exposing passwords
OpenAI: GPT-5 is coming, “we’ll see” if it creates a shockwave
– MTZ