Microsoft Details on Fixing Error “Identify Which Process Is Blocking a File in Windows” With Built-in Tools
https://cybersecuritynews.com/identify-which-process-is-blocking-a-file-in-windows/
https://cybersecuritynews.com/identify-which-process-is-blocking-a-file-in-windows/
Cyber Security News
Microsoft Details on Fixing Error “Identify Which Process Is Blocking a File in Windows” With Built-in Tools
Microsoft has provided comprehensive guidance for resolving the common Windows error "The process cannot access the file because it is being used by another process."
Gigabyte UEFI Firmware Vulnerability Let Attackers Execute Arbitrary Code in the SMM Environment
https://cybersecuritynews.com/gigabyte-uefi-firmware-vulnerability/
https://cybersecuritynews.com/gigabyte-uefi-firmware-vulnerability/
Cyber Security News
Gigabyte UEFI Firmware Vulnerability Let Attackers Execute Arbitrary Code in the SMM Environment
Critical security vulnerabilities have been discovered in Gigabyte UEFI firmware that could allow attackers to execute arbitrary code in SMM.
Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games
https://cybersecuritynews.com/threat-actors-attacking-gen-z-gamers/
https://cybersecuritynews.com/threat-actors-attacking-gen-z-gamers/
Cyber Security News
Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games
Malware campaign targets Gen Z gamers via fake GTA, Minecraft, and CoD installers—19M+ attempts in a year to steal sensitive data.
Wing FTP Server Vulnerability Actively Exploited – 2000+ Servers Exposed Online
https://cybersecuritynews.com/wing-ftp-server-vulnerability-exploited/
https://cybersecuritynews.com/wing-ftp-server-vulnerability-exploited/
Cyber Security News
Wing FTP Server Vulnerability Actively Exploited – 2000+ Servers Exposed Online
Security researchers have confirmed active exploitation of a critical vulnerability in Wing FTP Server, just one day after technical details were publicly disclosed.
DOGE Denizen Marko Elez Leaked API Key for xAI
https://krebsonsecurity.com/2025/07/doge-denizen-marko-elez-leaked-api-key-for-xai/
https://krebsonsecurity.com/2025/07/doge-denizen-marko-elez-leaked-api-key-for-xai/
Krebs on Security
DOGE Denizen Marko Elez Leaked API Key for xAI
Marko Elez, a 25-year-old employee at Elon Musk's Department of Government Efficiency (DOGE), has been granted access to sensitive databases at the U.S. Social Security Administration, the Treasury and Justice departments, and the Department of Homeland Security.…
❤1
20-year-old Vulnerability in Radio Remote Linking Protocol Let Hackers Control Train Brakes
https://cybersecuritynews.com/hackers-control-train-brakes/
https://cybersecuritynews.com/hackers-control-train-brakes/
Cyber Security News
20-Year-Old Vulnerability Allows Hackers to Control Train Brakes
CISA has issued a critical advisory warning about a severe vulnerability in railway communication systems that could allow attackers to control train brakes remotely.
Red Bull-Themed Phishing Attacks Steal Job Seekers Login Credentials
https://cybersecuritynews.com/red-bull-themed-phishing-attacks/
https://cybersecuritynews.com/red-bull-themed-phishing-attacks/
Cyber Security News
Red Bull-Themed Phishing Attacks Steal Job Seekers Login Credentials
Fake Red Bull job emails bypass filters using legit headers, luring users to phishing sites via reCAPTCHA and spoofed Glassdoor pages.
Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot
https://www.bleepingcomputer.com/news/security/gigabyte-motherboards-vulnerable-to-uefi-malware-bypassing-secure-boot/
https://www.bleepingcomputer.com/news/security/gigabyte-motherboards-vulnerable-to-uefi-malware-bypassing-secure-boot/
BleepingComputer
Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot
Dozens of Gigabyte motherboard models run on UEFI firmware vulnerable to security issues that allow planting bootkit malware that is invisible to the operating system and can survive reinstalls.
Interlock ransomware adopts FileFix method to deliver malware
https://www.bleepingcomputer.com/news/security/interlock-ransomware-adopts-filefix-method-to-deliver-malware/
https://www.bleepingcomputer.com/news/security/interlock-ransomware-adopts-filefix-method-to-deliver-malware/
BleepingComputer
Interlock ransomware adopts new FileFix attack to push malware
Hackers have adopted the new technique called 'FileFix' in Interlock ransomware attacks to drop a remote access trojan (RAT) on targeted systems.
Why skipping security prompting on Grok’s newest model is a huge mistake
https://cyberscoop.com/grok4-security-flaws-prompts-splxai-research/
https://cyberscoop.com/grok4-security-flaws-prompts-splxai-research/
CyberScoop
Why skipping security prompting on Grok’s newest model is a huge mistake
DEK: An AI red-teaming company found that xAI’s Grok 4 is “not suitable for enterprises” without substantial security prompting.
UK launches vulnerability research program for external experts
https://www.bleepingcomputer.com/news/security/uk-launches-vulnerability-research-program-for-external-experts/
https://www.bleepingcomputer.com/news/security/uk-launches-vulnerability-research-program-for-external-experts/
BleepingComputer
UK launches vulnerability research program for external experts
UK's National Cyber Security Centre (NCSC) has announced a new Vulnerability Research Initiative (VRI) that aims to strengthen relations with external cybersecurity experts.
CitrixBleed 2 beckons sweeping alarm as exploits spread across the globe
https://cyberscoop.com/citrixbleed2-exploits-spread/
https://cyberscoop.com/citrixbleed2-exploits-spread/
CyberScoop
CitrixBleed 2 beckons sweeping alarm as exploits spread across the globe
The number of Citrix customers impacted by CVE-2025-5777 remains unknown, but researchers have already observed more than 11.5 million attack attempts, targeting thousands of sites.
House passes bill to formalize NTIA’s cyber role following Salt Typhoon attacks
https://cyberscoop.com/ntia-cybersecurity-salt-typhoon-telecoms-house-bill/
https://cyberscoop.com/ntia-cybersecurity-salt-typhoon-telecoms-house-bill/
CyberScoop
House passes bill to formalize NTIA’s cyber role following Salt Typhoon attacks
The bipartisan legislation would codify the agency’s position as the one in charge of coordinating responses to incidents like the breach on U.S. telecoms.
BlackSuit: New Royal/Conti Rebrand Hits With Speed, Stealth, & Data Exfiltration
https://securityonline.info/blacksuit-new-royal-conti-rebrand-hits-with-speed-stealth-data-exfiltration/
https://securityonline.info/blacksuit-new-royal-conti-rebrand-hits-with-speed-stealth-data-exfiltration/
Daily CyberSecurity
BlackSuit: New Royal/Conti Rebrand Hits With Speed, Stealth, & Data Exfiltration
BlackSuit, a rebranded Royal/Conti ransomware, unleashes destructive multi-stage attacks. It uses Cobalt Strike, rclone for data exfil, and deletes shadow copies for stealth and speed.
CVE-2025-43856: OAuth2 Account Hijacking Flaw Found in Immich, a Popular Self-Hosted Photo Platform
https://securityonline.info/cve-2025-43856-oauth2-account-hijacking-flaw-found-in-immich-a-popular-self-hosted-photo-platform/
https://securityonline.info/cve-2025-43856-oauth2-account-hijacking-flaw-found-in-immich-a-popular-self-hosted-photo-platform/
Daily CyberSecurity
CVE-2025-43856: OAuth2 Account Hijacking Flaw Found in Immich, a Popular Self-Hosted Photo Platform
A flaw (CVE-2025-43856) in Immich allows account hijacking via a broken OAuth2 implementation (missing state parameter check). Update to v1.132.0 immediately!
HazyBeacon: Novel Backdoor Uses AWS Lambda for Stealthy C2, Targets Govts
https://securityonline.info/hazybeacon-novel-backdoor-uses-aws-lambda-for-stealthy-c2-targets-govts/
https://securityonline.info/hazybeacon-novel-backdoor-uses-aws-lambda-for-stealthy-c2-targets-govts/
Daily CyberSecurity
HazyBeacon: Novel Backdoor Uses AWS Lambda for Stealthy C2, Targets Govts
Unit 42 uncovers HazyBeacon, a novel backdoor using AWS Lambda URLs for stealthy C2. It's deployed via DLL sideloading, targeting Southeast Asian govts for trade documents.
XORIndex: North Korea’s Evolving Supply Chain Malware Targets npm Ecosystem Again
https://securityonline.info/xorindex-north-koreas-evolving-supply-chain-malware-targets-npm-ecosystem-again/
https://securityonline.info/xorindex-north-koreas-evolving-supply-chain-malware-targets-npm-ecosystem-again/
Daily CyberSecurity
XORIndex: North Korea’s Evolving Supply Chain Malware Targets npm Ecosystem Again
North Korean APTs are using XORIndex malware in a new npm supply chain attack, infiltrating developers via 67 malicious packages to steal crypto wallets and credentials.
ImageMagick Flaw (CVE-2025-53101): Stack Buffer Overflow Allows Potential Remote Code Execution
https://securityonline.info/imagemagick-flaw-cve-2025-53101-stack-buffer-overflow-allows-potential-remote-code-execution/
https://securityonline.info/imagemagick-flaw-cve-2025-53101-stack-buffer-overflow-allows-potential-remote-code-execution/
Daily CyberSecurity
ImageMagick Flaw (CVE-2025-53101): Stack Buffer Overflow Allows Potential Remote Code Execution
A flaw (CVE-2025-53101) in ImageMagick allows stack buffer overflows via filename templates, risking memory corruption and remote code execution. Patch now!
CISA Warns of Active Exploitation of Wing FTP Server Flaw (CVE-2025-47812), CVSS 10
https://securityonline.info/cisa-warns-of-active-exploitation-of-wing-ftp-server-flaw-cve-2025-47812-cvss-10/
https://securityonline.info/cisa-warns-of-active-exploitation-of-wing-ftp-server-flaw-cve-2025-47812-cvss-10/
Daily CyberSecurity
CISA Warns of Active Exploitation of Wing FTP Server Flaw (CVE-2025-47812), CVSS 10
CISA adds critical Wing FTP Server RCE flaw (CVE-2025-47812, CVSS 10.0) to KEV. Actively exploited via null byte and Lua code injection; patch to 7.4.4 immediately!
Google Confirms Major OS Merger: Android & ChromeOS to Become a Single Unified Platform
https://securityonline.info/google-confirms-major-os-merger-android-chromeos-to-become-a-single-unified-platform/
https://securityonline.info/google-confirms-major-os-merger-android-chromeos-to-become-a-single-unified-platform/
Daily CyberSecurity
Google Confirms Major OS Merger: Android & ChromeOS to Become a Single Unified Platform
Google officially confirmed plans to unify Android and ChromeOS into a single platform, aiming for seamless cross-device experiences and streamlined development for its AI-driven future.
CVE-2025-53833 (CVSS 10): Critical SSTI Flaw in LaRecipe Threatens Millions of Laravel Apps
https://securityonline.info/cve-2025-53833-cvss-10-critical-ssti-flaw-in-larecipe-threatens-millions-of-laravel-apps/
https://securityonline.info/cve-2025-53833-cvss-10-critical-ssti-flaw-in-larecipe-threatens-millions-of-laravel-apps/
Daily CyberSecurity
CVE-2025-53833 (CVSS 10): Critical SSTI Flaw in LaRecipe Threatens Millions of Laravel Apps
A critical SSTI flaw (CVE-2025-53833, CVSS 10.0) in LaRecipe allows unauthenticated RCE on affected servers via template injection. Update to v2.8.1 immediately!