π Ivanti Vulnerability Exploit Could Expose UK NHS Data π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Two NHS England trusts could see highly sensitive patient records exposed.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Ivanti Vulnerability Exploit Could Expose UK NHS Data
Two NHS England trusts could see highly sensitive patient records exposed
π Microsoft OneDrive Flaw Exposes Users to Data Overreach Risks π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A flaw in OneDrive File Picker has exposed millions to data overreach through excessive OAuth permissions.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Microsoft OneDrive Flaw Exposes Users to Data Overreach Risks
A flaw in OneDrive File Picker has exposed millions to data overreach through excessive OAuth permissions
π΅οΈββοΈ Zscaler Announces Deal to Acquire Red Canary π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The August acquisition will bring together Red Canary's extensive integration ecosystem with Zscaler's cloud transaction data to deliver an AIpowered security operations platform.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Zscaler Announces Deal to Acquire Red Canary
The acquisition, expected to close in August, will bring together Red Canary's extensive integration ecosystem with Zscaler's cloud transaction data to deliver an AI-powered security operations platform.
π¦Ώ GitLab Vulnerability βHighlights the Double-Edged Nature of AI Assistantsβ π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
A remote prompt injection flaw in GitLab Duo allowed attackers to steal private source code and inject malicious HTML. GitLab has since patched the issue.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
GitLab Vulnerability βHighlights the Double-Edged Nature of AI Assistantsβ
A remote prompt injection flaw in GitLab Duo allowed attackers to steal private source code and inject malicious HTML. GitLab has since patched the issue.
π Malicious Machine Learning Model Attack Discovered on PyPI π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A novel attack exploited machine learning models on PyPI, using zipped Pickle files to deliver infostealer malware.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Malicious Machine Learning Model Attack Discovered on PyPI
A novel attack exploited machine learning models on PyPI, using zipped Pickle files to deliver infostealer malware
π Microsoft OneDrive Flaw Exposes Users to Data Overreach Risks π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A flaw in OneDrive File Picker has exposed millions to data overreach through excessive OAuth permissions.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Microsoft OneDrive Flaw Exposes Users to Data Overreach Risks
A flaw in OneDrive File Picker has exposed millions to data overreach through excessive OAuth permissions
π Vietnam-Nexus Hackers Distribute Malware Via Fake AI Video Generator Websites π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A Vietnamnexus hacking group distributes infostealers and backdoors via social media ads promoting fake AI generator websites.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Vietnam-Nexus Hackers Distribute Malware Via Fake AI Video Generators
A Vietnam-nexus hacking group distributes infostealers and backdoors via social media ads promoting fake AI generator websites
π Czech Republic Accuses China of Government Hack π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
This is the first time Czech authorities have officially called out a nationstate over a cyberattack.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Czech Republic Accuses China of Government Hack
This is the first time Czech authorities have officially called out a nation-state over a cyber-attack
π1
π US Government Launches Audit of NISTβs National Vulnerability Database π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The audit of the NVD will be conducted by the US Department of Commerces Office of Inspector General.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π΅οΈββοΈ Zscaler Announces Deal to Acquire Red Canary π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The August acquisition will bring together Red Canary's extensive integration ecosystem with Zscaler's cloud transaction data to deliver an AIpowered security operations platform.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Zscaler Announces Deal to Acquire Red Canary
The acquisition, expected to close in August, will bring together Red Canary's extensive integration ecosystem with Zscaler's cloud transaction data to deliver an AI-powered security operations platform.
π Fake Bitdefender Site Spreads Trio of Malware Tools π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A spoofed Bitdefender site has been used in a malicious campaign distributing VenomRAT and other malware, according to DomainTools.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Fake Bitdefender Site Spreads Trio of Malware Tools
A spoofed Bitdefender site has been used in a malicious campaign distributing VenomRAT and other malware, according to DomainTools
π΅οΈββοΈ Indian Police Arrest Cybercrime Gang Copycats of Myanmar Biz Model π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The region offers attractive conditions a large pool of tech workers, economic disparity, and weak enforcement of cybercrime laws all of which attract businesses legitimate and shady.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Indian Police Arrest Copycats of Myanmar Biz Model
The region offers attractive conditions: a large pool of tech workers, economic disparity, and weak enforcement of cybercrime laws β all of which attract businesses legitimate and shady.
π Adidas Customer Data Stolen in Third-Party Attack π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Adidas revealed that customer contact information, including names, emails and phone numbers were accessed by an unauthorized party.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Adidas Customer Data Stolen in Third-Party Attack
Adidas revealed that customer contact information, including names, emails and phone numbers were accessed by an unauthorized party
π #Infosec2025: Rory Stewart and Paul Chichester to Headline at Infosecurity Europe 2025 π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Former UK government minister Rory Stewart and NCSC Director of Operations Paul Chichester will explore the growing link between geopolitics and cybersecurity.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
#Infosec2025: Rory Stewart and Paul Chichester to Headline at Infosecurity Europe 2025
Former UK government minister Rory Stewart and NCSC Director of Operations Paul Chichester will explore the growing link between geopolitics and cybersecurity
π New Russian State Hacking Group Hits Europe and North America π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A newlydiscovered Russian group, Void Blizzard, has successfully compromised organizations in critical industries, Microsoft warned.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
New Russian State Hacking Group Hits Europe and North America
A newly-discovered Russian group, Void Blizzard, has successfully compromised organizations in critical industries, Microsoft warned
π Microsoft OneDrive Flaw Exposes Users to Data Overreach Risks π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A flaw in OneDrive File Picker has exposed millions to data overreach through excessive OAuth permissions.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Microsoft OneDrive Flaw Exposes Users to Data Overreach Risks
A flaw in OneDrive File Picker has exposed millions to data overreach through excessive OAuth permissions
π Governments Urge Organizations to Prioritize SIEM/SOAR Adoption π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A joint advisory from the US, UK, Australia and others highlights the importance of SIEMSOAR platforms and overcoming implementation challenges.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Governments Urge Organizations to Prioritize SIEM/SOAR Adoption
A joint advisory from the US, UK, Australia and others highlights the importance of SIEM/SOAR platforms and overcoming implementation challenges
π Adidas Customer Data Stolen in Third-Party Attack π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Adidas revealed that customer contact information, including names, emails and phone numbers were accessed by an unauthorized party.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Adidas Customer Data Stolen in Third-Party Attack
Adidas revealed that customer contact information, including names, emails and phone numbers were accessed by an unauthorized party
π΅οΈββοΈ Indian Police Arrest Cybercrime Gang Copycats of Myanmar Biz Model π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The region offers attractive conditions a large pool of tech workers, economic disparity, and weak enforcement of cybercrime laws all of which attract businesses legitimate and shady.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Indian Police Arrest Copycats of Myanmar Biz Model
The region offers attractive conditions: a large pool of tech workers, economic disparity, and weak enforcement of cybercrime laws β all of which attract businesses legitimate and shady.
π Vietnam-Nexus Hackers Distribute Malware Via Fake AI Video Generator Websites π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A Vietnamnexus hacking group distributes infostealers and backdoors via social media ads promoting fake AI generator websites.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Vietnam-Nexus Hackers Distribute Malware Via Fake AI Video Generators
A Vietnam-nexus hacking group distributes infostealers and backdoors via social media ads promoting fake AI generator websites
π DragonForce Ransomware Leveraged in MSP Attack Using RMM Tool π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A targeted cyberattack on an MSP exploited flaws in remote management tools, resulting in ransomware deployment and data theft.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
DragonForce Ransomware Leveraged in MSP Attack Using RMM Tool
A targeted cyber-attack on an MSP exploited flaws in remote management tools, resulting in ransomware deployment and data theft