Pune Auto Parts Firm Loses ₹2.35 Crore in Man-in-the-Middle Attack
https://cybersecuritynews.com/pune-auto-parts-firm-loses-%e2%82%b92-35-crore/
https://cybersecuritynews.com/pune-auto-parts-firm-loses-%e2%82%b92-35-crore/
Cyber Security News
Pune Auto Parts Firm Loses ₹2.35 Crore in Man-in-the-Middle Attack
A Pune-based automobile parts manufacturer fell victim to a sophisticated man-in-the-middle (MITM) cyber attack, resulting in a loss of ₹2.35 crore.
Retired US Air Force Employee Pleads Guilty for Sharing Military Secrets on a Dating App
https://cybersecuritynews.com/retired-us-air-force-employee-pleads-guilty/
https://cybersecuritynews.com/retired-us-air-force-employee-pleads-guilty/
Cyber Security News
Retired US Air Force Employee Pleads Guilty for Sharing Military Secrets on a Dating App
A former U.S. Air Force employee has pleaded guilty to charges of sharing classified military information about Russia's war in Ukraine.
RenderShock 0-Click Vulnerability Executes Payloads via Background Process Without User Interaction
https://cybersecuritynews.com/rendershock-0-click-vulnerability/
https://cybersecuritynews.com/rendershock-0-click-vulnerability/
Cyber Security News
RenderShock 0-Click Vulnerability Executes Payloads via Background Process Without User Interaction
A sophisticated zero-click attack methodology called RenderShock that exploits passive file preview and indexing behaviors.
KongTuke Attacking Windows Users With New Interlock RAT Variant Using FileFix Technique
https://cybersecuritynews.com/kongtuke-attacking-windows-users/
https://cybersecuritynews.com/kongtuke-attacking-windows-users/
Cyber Security News
KongTuke Attacking Windows Users With New Interlock RAT Variant Using FileFix Technique
KongTuke threat actors now use a PHP-based Interlock RAT via stealthy web injections, marking a shift from older JavaScript-based tactics.
New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting Remote Desktop Protocol
https://cybersecuritynews.com/rdp-forensic-technique/
https://cybersecuritynews.com/rdp-forensic-technique/
Cyber Security News
New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting Remote Desktop Protocol
Innovative forensic methods to track sophisticated attackers who exploit Remote Desktop Protocol (RDP) for lateral movement within enterprise networks.
Defendnot: fake antivirus software to disable Microsoft Defender
https://www.kaspersky.com/blog/defendnot-disables-microsoft-defender-on-windows/53820/
https://www.kaspersky.com/blog/defendnot-disables-microsoft-defender-on-windows/53820/
Kaspersky
Defendnot: fake antivirus software to disable Microsoft Defender
Defendnot is a research tool that disables Microsoft Defender by tricking Windows security.
Microsoft Details on Fixing Error “Identify Which Process Is Blocking a File in Windows” With Built-in Tools
https://cybersecuritynews.com/identify-which-process-is-blocking-a-file-in-windows/
https://cybersecuritynews.com/identify-which-process-is-blocking-a-file-in-windows/
Cyber Security News
Microsoft Details on Fixing Error “Identify Which Process Is Blocking a File in Windows” With Built-in Tools
Microsoft has provided comprehensive guidance for resolving the common Windows error "The process cannot access the file because it is being used by another process."
Gigabyte UEFI Firmware Vulnerability Let Attackers Execute Arbitrary Code in the SMM Environment
https://cybersecuritynews.com/gigabyte-uefi-firmware-vulnerability/
https://cybersecuritynews.com/gigabyte-uefi-firmware-vulnerability/
Cyber Security News
Gigabyte UEFI Firmware Vulnerability Let Attackers Execute Arbitrary Code in the SMM Environment
Critical security vulnerabilities have been discovered in Gigabyte UEFI firmware that could allow attackers to execute arbitrary code in SMM.
Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games
https://cybersecuritynews.com/threat-actors-attacking-gen-z-gamers/
https://cybersecuritynews.com/threat-actors-attacking-gen-z-gamers/
Cyber Security News
Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games
Malware campaign targets Gen Z gamers via fake GTA, Minecraft, and CoD installers—19M+ attempts in a year to steal sensitive data.
Wing FTP Server Vulnerability Actively Exploited – 2000+ Servers Exposed Online
https://cybersecuritynews.com/wing-ftp-server-vulnerability-exploited/
https://cybersecuritynews.com/wing-ftp-server-vulnerability-exploited/
Cyber Security News
Wing FTP Server Vulnerability Actively Exploited – 2000+ Servers Exposed Online
Security researchers have confirmed active exploitation of a critical vulnerability in Wing FTP Server, just one day after technical details were publicly disclosed.
DOGE Denizen Marko Elez Leaked API Key for xAI
https://krebsonsecurity.com/2025/07/doge-denizen-marko-elez-leaked-api-key-for-xai/
https://krebsonsecurity.com/2025/07/doge-denizen-marko-elez-leaked-api-key-for-xai/
Krebs on Security
DOGE Denizen Marko Elez Leaked API Key for xAI
Marko Elez, a 25-year-old employee at Elon Musk's Department of Government Efficiency (DOGE), has been granted access to sensitive databases at the U.S. Social Security Administration, the Treasury and Justice departments, and the Department of Homeland Security.…
❤1
20-year-old Vulnerability in Radio Remote Linking Protocol Let Hackers Control Train Brakes
https://cybersecuritynews.com/hackers-control-train-brakes/
https://cybersecuritynews.com/hackers-control-train-brakes/
Cyber Security News
20-Year-Old Vulnerability Allows Hackers to Control Train Brakes
CISA has issued a critical advisory warning about a severe vulnerability in railway communication systems that could allow attackers to control train brakes remotely.
Red Bull-Themed Phishing Attacks Steal Job Seekers Login Credentials
https://cybersecuritynews.com/red-bull-themed-phishing-attacks/
https://cybersecuritynews.com/red-bull-themed-phishing-attacks/
Cyber Security News
Red Bull-Themed Phishing Attacks Steal Job Seekers Login Credentials
Fake Red Bull job emails bypass filters using legit headers, luring users to phishing sites via reCAPTCHA and spoofed Glassdoor pages.
Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot
https://www.bleepingcomputer.com/news/security/gigabyte-motherboards-vulnerable-to-uefi-malware-bypassing-secure-boot/
https://www.bleepingcomputer.com/news/security/gigabyte-motherboards-vulnerable-to-uefi-malware-bypassing-secure-boot/
BleepingComputer
Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot
Dozens of Gigabyte motherboard models run on UEFI firmware vulnerable to security issues that allow planting bootkit malware that is invisible to the operating system and can survive reinstalls.
Interlock ransomware adopts FileFix method to deliver malware
https://www.bleepingcomputer.com/news/security/interlock-ransomware-adopts-filefix-method-to-deliver-malware/
https://www.bleepingcomputer.com/news/security/interlock-ransomware-adopts-filefix-method-to-deliver-malware/
BleepingComputer
Interlock ransomware adopts new FileFix attack to push malware
Hackers have adopted the new technique called 'FileFix' in Interlock ransomware attacks to drop a remote access trojan (RAT) on targeted systems.
Why skipping security prompting on Grok’s newest model is a huge mistake
https://cyberscoop.com/grok4-security-flaws-prompts-splxai-research/
https://cyberscoop.com/grok4-security-flaws-prompts-splxai-research/
CyberScoop
Why skipping security prompting on Grok’s newest model is a huge mistake
DEK: An AI red-teaming company found that xAI’s Grok 4 is “not suitable for enterprises” without substantial security prompting.
UK launches vulnerability research program for external experts
https://www.bleepingcomputer.com/news/security/uk-launches-vulnerability-research-program-for-external-experts/
https://www.bleepingcomputer.com/news/security/uk-launches-vulnerability-research-program-for-external-experts/
BleepingComputer
UK launches vulnerability research program for external experts
UK's National Cyber Security Centre (NCSC) has announced a new Vulnerability Research Initiative (VRI) that aims to strengthen relations with external cybersecurity experts.
CitrixBleed 2 beckons sweeping alarm as exploits spread across the globe
https://cyberscoop.com/citrixbleed2-exploits-spread/
https://cyberscoop.com/citrixbleed2-exploits-spread/
CyberScoop
CitrixBleed 2 beckons sweeping alarm as exploits spread across the globe
The number of Citrix customers impacted by CVE-2025-5777 remains unknown, but researchers have already observed more than 11.5 million attack attempts, targeting thousands of sites.
House passes bill to formalize NTIA’s cyber role following Salt Typhoon attacks
https://cyberscoop.com/ntia-cybersecurity-salt-typhoon-telecoms-house-bill/
https://cyberscoop.com/ntia-cybersecurity-salt-typhoon-telecoms-house-bill/
CyberScoop
House passes bill to formalize NTIA’s cyber role following Salt Typhoon attacks
The bipartisan legislation would codify the agency’s position as the one in charge of coordinating responses to incidents like the breach on U.S. telecoms.
BlackSuit: New Royal/Conti Rebrand Hits With Speed, Stealth, & Data Exfiltration
https://securityonline.info/blacksuit-new-royal-conti-rebrand-hits-with-speed-stealth-data-exfiltration/
https://securityonline.info/blacksuit-new-royal-conti-rebrand-hits-with-speed-stealth-data-exfiltration/
Daily CyberSecurity
BlackSuit: New Royal/Conti Rebrand Hits With Speed, Stealth, & Data Exfiltration
BlackSuit, a rebranded Royal/Conti ransomware, unleashes destructive multi-stage attacks. It uses Cobalt Strike, rclone for data exfil, and deletes shadow copies for stealth and speed.
CVE-2025-43856: OAuth2 Account Hijacking Flaw Found in Immich, a Popular Self-Hosted Photo Platform
https://securityonline.info/cve-2025-43856-oauth2-account-hijacking-flaw-found-in-immich-a-popular-self-hosted-photo-platform/
https://securityonline.info/cve-2025-43856-oauth2-account-hijacking-flaw-found-in-immich-a-popular-self-hosted-photo-platform/
Daily CyberSecurity
CVE-2025-43856: OAuth2 Account Hijacking Flaw Found in Immich, a Popular Self-Hosted Photo Platform
A flaw (CVE-2025-43856) in Immich allows account hijacking via a broken OAuth2 implementation (missing state parameter check). Update to v1.132.0 immediately!