ICYMI: 2025-07-31
Latest Headlines
Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies
Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials
N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto
AI-Driven Trends in Endpoint Security: What the 2025 Gartner® Magic Quadrant™ Reveals
UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud
Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs
Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install
The Kremlin’s Most Devious Hacking Group Is Using Russian ISPs to Plant Spyware
Chinese Researchers Suggest Lasers and Sabotage to Counter Musk’s Starlink Satellites
Reach Security Raises $10 Million for Exposure Management Solution
Open Source CISA Tool Helps Defenders With Hacker Containment, Eviction
Browser Extensions Pose Serious Threat to Gen-AI Tools Handling Sensitive Data
Report Links Chinese Companies to Tools Used by State-Sponsored Hackers
Honeywell Experion PKS Flaws Allow Manipulation of Industrial Processes
Google Project Zero Tackles Upstream Patch Gap With New Policy
Anubis Ransomware Attacking Android and Windows Users to Encrypt Files and Steal Login Credentials
First AI-Powered Malware LAMEHUG Attacking Organizations With Compromised Official Email Account
New Banking Malware DoubleTrouble Attacking Users Via Phishing Sites To Steal Banking Credentials
Chinese Silk Typhoon Hackers Filed 10+ Patents for Highly Intrusive Hacking Tools
NOVABLIGHT as Educational Tool Attacking Users to Steal Login Credentials and Compromise Wallets
Ransomware Groups Using TrickBot Malware to Exfiltrate US$724 Million in Cryptocurrency
North Korean APT Hackers Poison CI/CD Pipelines To Exfiltrate Sensitive Data
Hackers Delivering Cobalt Strike Beacon Leveraging GitHub and Social Media
Microsoft to disable Excel workbook links to blocked file types
Microsoft now pays up to $40,000 for some .NET vulnerabilities
CISA open-sources Thorium platform for malware, forensic analysis
Microsoft: Russian hackers use ISP access to hack embassies in AiTM attacks
Inside a Real Clickfix Attack: How This Social Engineering Hack Unfolds
Spikes in malicious activity precede new security flaws in 80% of cases
Proton launches free standalone cross-platform Authenticator app
– MTZ