π¦
CISA Updates Advisory for Active Exploitation Targeting Commvault Metallic SaaS Cloud Platform π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble CISA Updates Advisory for Active Exploitation Targeting Commvault Metallic SaaS Cloud Platform " dataimagecaption"Cyble CISA Updates Advisory for Active Exploitation Targeting Commvault Metallic SaaS Cloud Platform " datamediumfile"httpscyble.comwpcontentuploads202505CybleBlogsCISACommvault300x150.png" datalargefile"httpscyble.comwpcontentuploads202505CybleBlogsCISACommvault1024x512.png" title"CISA Updates Advisory for Active Exploitation Targeting Commvault Metallic SaaS Cloud Platform 2" Overview The U.S. Cybersecurity and Infrastructure Security Agency CISA has released an urgent updated advisory highlighting cyber threat activity targeting Commvaults Metallic SoftwareasaService SaaS platform, which is widely used to back up Microsoft 365 environments. As of May 2025, th...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
CISA Updates Alert On Commvault Metallic Exploitation
CISA issues urgent update on threats targeting Commvaultβs Metallic SaaS platform, widely used for Microsoft 365 backups.
π Vietnam-Nexus Hackers Distribute Malware Via Fake AI Video Generator Websites π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A Vietnamnexus hacking group distributes infostealers and backdoors via social media ads promoting fake AI generator websites.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Vietnam-Nexus Hackers Distribute Malware Via Fake AI Video Generators
A Vietnam-nexus hacking group distributes infostealers and backdoors via social media ads promoting fake AI generator websites
π Adidas Customer Data Stolen in Third-Party Attack π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Adidas revealed that customer contact information, including names, emails and phone numbers were accessed by an unauthorized party.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Adidas Customer Data Stolen in Third-Party Attack
Adidas revealed that customer contact information, including names, emails and phone numbers were accessed by an unauthorized party
π’ Hackers are abusing Microsoft email notifications to target enterprises π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Researchers have uncovered a hybrid emailandphone scam based on fake Microsoft billing emails.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Hackers are abusing Microsoft email notifications to target enterprises
Researchers have uncovered a hybrid email-and-phone scam based on fake Microsoft billing emails
π New Russian State Hacking Group Hits Europe and North America π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A newlydiscovered Russian group, Void Blizzard, has successfully compromised organizations in critical industries, Microsoft warned.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
New Russian State Hacking Group Hits Europe and North America
A newly-discovered Russian group, Void Blizzard, has successfully compromised organizations in critical industries, Microsoft warned
π Fake Bitdefender Site Spreads Trio of Malware Tools π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A spoofed Bitdefender site has been used in a malicious campaign distributing VenomRAT and other malware, according to DomainTools.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Fake Bitdefender Site Spreads Trio of Malware Tools
A spoofed Bitdefender site has been used in a malicious campaign distributing VenomRAT and other malware, according to DomainTools
π’ Hackers are abusing Microsoft email notifications to target enterprises π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Researchers have uncovered a hybrid emailandphone scam based on fake Microsoft billing emails.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Hackers are abusing Microsoft email notifications to target enterprises
Researchers have uncovered a hybrid email-and-phone scam based on fake Microsoft billing emails
π¦
FBI Warns Silent Ransom Group Targeting U.S. Law Firms Using Social Engineering and Callback Phishing π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble FBI Warns Silent Ransom Group Targeting U.S. Law Firms Using Social Engineering and Callback Phishing " dataimagecaption"Cyble FBI Warns Silent Ransom Group Targeting U.S. Law Firms Using Social Engineering and Callback Phishing " datamediumfile"httpscyble.comwpcontentuploads202505CybleBlogsFBISilentRansom300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202505CybleBlogsFBISilentRansom.jpg" title"FBI Warns Silent Ransom Group Targeting U.S. Law Firms Using Social Engineering and Callback Phishing 1" Overview The U.S. Federal Bureau of Investigation FBI has issued a fresh alert warning law firms and cybersecurity professionals about ongoing cyber threat activity linked to the Silent Ransom Group SRGalso known as Luna Moth, Chatty Spider, or UNC3753. This threat actor is...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
FBI Warns Silent Ransom Group Targeting U.S. Law Firms
FBI warns law firms and cybersecurity pros of ongoing threats from the Silent Ransom Group (SRG) in a new alert.
π¦Ώ Bitdefender vs McAfee: Which Antivirus Is Right for You? π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Compare Bitdefender and McAfee to find the best antivirus for your needs. Discover features and make an informed choice.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Bitdefender vs McAfee: Which Antivirus Is Right for You?
Compare Bitdefender and McAfee to find the best antivirus for your needs. Discover features and make an informed choice.
π Ivanti Vulnerability Exploit Could Expose UK NHS Data π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Two NHS England trusts could see highly sensitive patient records exposed.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Ivanti Vulnerability Exploit Could Expose UK NHS Data
Two NHS England trusts could see highly sensitive patient records exposed
π Vietnam-Nexus Hackers Distribute Malware Via Fake AI Video Generator Websites π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A Vietnamnexus hacking group distributes infostealers and backdoors via social media ads promoting fake AI generator websites.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Vietnam-Nexus Hackers Distribute Malware Via Fake AI Video Generators
A Vietnam-nexus hacking group distributes infostealers and backdoors via social media ads promoting fake AI generator websites
π Ivanti Vulnerability Exploit Could Expose UK NHS Data π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Two NHS England trusts could see highly sensitive patient records exposed.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Ivanti Vulnerability Exploit Could Expose UK NHS Data
Two NHS England trusts could see highly sensitive patient records exposed
π DragonForce Ransomware Leveraged in MSP Attack Using RMM Tool π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A targeted cyberattack on an MSP exploited flaws in remote management tools, resulting in ransomware deployment and data theft.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
DragonForce Ransomware Leveraged in MSP Attack Using RMM Tool
A targeted cyber-attack on an MSP exploited flaws in remote management tools, resulting in ransomware deployment and data theft
π Czech Republic Accuses China of Government Hack π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
This is the first time Czech authorities have officially called out a nationstate over a cyberattack.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Czech Republic Accuses China of Government Hack
This is the first time Czech authorities have officially called out a nation-state over a cyber-attack
π1
π Fake Bitdefender Site Spreads Trio of Malware Tools π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A spoofed Bitdefender site has been used in a malicious campaign distributing VenomRAT and other malware, according to DomainTools.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Fake Bitdefender Site Spreads Trio of Malware Tools
A spoofed Bitdefender site has been used in a malicious campaign distributing VenomRAT and other malware, according to DomainTools
π¦Ώ Anthropic Future-Proofs New AI Model With Rigorous Safety Rules π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Anthropics AI Safety Level 3 protections add a filter and limited outbound traffic to prevent anyone from stealing the entire model weights.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Anthropic Future-Proofs New AI Model With Rigorous Safety Rules
Anthropicβs AI Safety Level 3 protections add a filter and limited outbound traffic to prevent anyone from stealing the entire model weights.
π΅οΈββοΈ Why Take9 Won't Improve Cybersecurity π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The latest cybersecurity awareness campaign asks users to pause for nine seconds before clicking but this approach misplaces responsibility and ignores the real problems of system design.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Why Take9 Won't Improve Cybersecurity
The latest cybersecurity awareness campaign asks users to pause for nine seconds before clicking β but this approach misplaces responsibility and ignores the real problems of system design.
π New Russian State Hacking Group Hits Europe and North America π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A newlydiscovered Russian group, Void Blizzard, has successfully compromised organizations in critical industries, Microsoft warned.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
New Russian State Hacking Group Hits Europe and North America
A newly-discovered Russian group, Void Blizzard, has successfully compromised organizations in critical industries, Microsoft warned
π Ivanti Vulnerability Exploit Could Expose UK NHS Data π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Two NHS England trusts could see highly sensitive patient records exposed.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Ivanti Vulnerability Exploit Could Expose UK NHS Data
Two NHS England trusts could see highly sensitive patient records exposed
π Fake Bitdefender Site Spreads Trio of Malware Tools π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A spoofed Bitdefender site has been used in a malicious campaign distributing VenomRAT and other malware, according to DomainTools.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Fake Bitdefender Site Spreads Trio of Malware Tools
A spoofed Bitdefender site has been used in a malicious campaign distributing VenomRAT and other malware, according to DomainTools
π Malicious Machine Learning Model Attack Discovered on PyPI π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A novel attack exploited machine learning models on PyPI, using zipped Pickle files to deliver infostealer malware.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Malicious Machine Learning Model Attack Discovered on PyPI
A novel attack exploited machine learning models on PyPI, using zipped Pickle files to deliver infostealer malware