📔 North Korean Hackers Target Crypto Firms with Novel macOS Malware 📔
📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
SentinelLabs observed North Korean actors deploying novel TTPs to target crypto firms, including a mix of programming languages and signalbased persistence.📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
Infosecurity Magazine
North Korean Hackers Target Crypto Firms with Novel macOS Malware
SentinelLabs observed North Korean actors deploying novel TTPs to target crypto firms, including a mix of programming languages and signal-based persistence
📔 Ransomware: Hunters International Is Not Shutting Down, It's Rebranding 📔
📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
Some admins of Hunters International are now part of the encryptionless cyber extortion group World Leaks.📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
Infosecurity Magazine
Ransomware: Hunters International Is Not Shutting Down, It's Rebranding
Some admins of Hunters International are now part of the encryption-less cyber extortion group World Leaks
🦅 The Week in Vulnerabilities: High-Risk IT and ICS Flaws Flagged by Cyble 🦅
📖 Read more.
🔗 Via "CYBLE"
----------
👁️ Seen on @cibsecurity
IT Vulnerabilities " dataimagecaption"" datamediumfile"httpscyble.comwpcontentuploads202507ITVulnerabilities2300x150.webp" datalargefile"httpscyble.comwpcontentuploads202507ITVulnerabilities2.webp" title"The Week in Vulnerabilities HighRisk IT and ICS Flaws Flagged by Cyble 1" Cyble vulnerability intelligence researchers investigated dozens of vulnerabilities this week to highlight the IT and industrial control system ICS vulnerabilities that security teams should prioritize. Cyble honeypot sensors also detected numerous vulnerabilities under active exploitation, and Cyble dark web researchers observed several threat actors discussing vulnerability exploits on underground and cybercrime forums, including a claimed Apple zeroday. What follows are some highlights from Cybles IT and...📖 Read more.
🔗 Via "CYBLE"
----------
👁️ Seen on @cibsecurity
Cyble
Cyble Reports New Critical ICS And IT Vulnerabilities
Cyble highlights high-risk IT vulnerabilities from June 2025, including zero-days in Chrome, Cisco, WinRAR, and threats to ICS and UPS systems.
🖋️ NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors 🖋️
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
Cybersecurity researchers have shed light on a previously undocumented threat actor called NightEagle aka APTQ95 that has been observed targeting Microsoft Exchange servers as a part of a zeroday exploit chain designed to target government, defense, and technology sectors in China. According to QiAnXin's RedDrip Team, the threat actor has been active since 2023 and has switched network.📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
🖋️ Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties 🖋️
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
Taiwan's National Security Bureau NSB has warned that Chinadeveloped applications like RedNote aka Xiaohongshu, Weibo, TikTok, WeChat, and Baidu Cloud pose security risks due to excessive data collection and data transfer to China. The alert comes following an inspection of these apps carried out in coordination with the Ministry of Justice Investigation Bureau MJIB and the Criminal.📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
❤1👏1
🖋️ Alert: Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS 🖋️
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
Threat actors are weaponizing exposed Java Debug Wire Protocol JDWP interfaces to obtain code execution capabilities and deploy cryptocurrency miners on compromised hosts. "The attacker used a modified version of XMRig with a hard"coded configuration, allowing them to avoid suspicious commandline arguments that are often flagged by defenders," Wiz researchers Yaara Shriki and Gili.📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
❤1
📢 Everything we know about the Ingram Micro cyber attack so far 📢
📖 Read more.
🔗 Via "ITPro"
----------
👁️ Seen on @cibsecurity
A cyber attack on Ingram Micro severely disrupted operations and has been claimed by the SafePay ransomware group.📖 Read more.
🔗 Via "ITPro"
----------
👁️ Seen on @cibsecurity
IT Pro
Everything we know about the Ingram Micro cyber attack so far
The ransomware attack on Ingram Micro has been claimed by the rapidly-expanding SafePay group
🕵️♂️ Bert Blitzes Linux & Windows Systems 🕵️♂️
📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
The new ransomware strain's aggressive multithreading and crossplatform capabilities make it a potent threat to enterprise environments.📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
Dark Reading
Bert Blitzes Linux & Windows Systems
The new ransomware strain's aggressive multithreading and cross-platform capabilities make it a potent threat to enterprise environments.
🕵️♂️ DPRK macOS 'NimDoor' Malware Targets Web3, Crypto Platforms 🕵️♂️
📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
Researchers observed North Korean threat actors targeting cryptocurrency and Web3 platforms on Telegram using malicious Zoom meeting requests.📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
Dark Reading
DPRK macOS 'NimDoor' Malware Targets Web3, Crypto Platforms
Researchers observed North Korean threat actors targeting cryptocurrency and Web3 platforms on Telegram using malicious Zoom meeting requests.
🕵️♂️ Ransomware Attack Triggers Widespread Outage at Ingram Micro 🕵️♂️
📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
The outage began shortly before the July 4 holiday weekend and caused disruptions for customer ordering and other services provided by the IT distributor.📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
Dark Reading
Ransomware Attack Triggers Widespread Outage at Ingram Micro
The outage began shortly before the July 4 holiday weekend and caused disruptions for customer ordering and other services provided by the IT distributor.
🕵️♂️ 'Hunters International' RaaS Group Closes Its Doors 🕵️♂️
📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
The announcement comes just months after security researchers observed that the group was making the transition to rebrand to World Leaks, a data theft outfit.📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
Dark Reading
Hunters International RaaS Group Closes Its Doors
The announcement comes just months after security researchers observed that the group was making the transition to rebrand as World Leaks, a data theft outfit.
🤔1
🕵️♂️ Chrome Store Features Extension Poisoned With Sophisticated Spyware 🕵️♂️
📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
A color picker for Google's browser with more than 100,000 downloads hijacks sessions every time a user navigates to a new webpage and also redirects them to malicious sites.📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
Darkreading
Chrome Store Features Extension Poisoned With Sophisticated Spyware
A color picker for Google's browser with more than 100,000 downloads hijacks sessions every time a user navigates to a new webpage and also redirects them to malicious sites.
🦿 Applying Agentic AI to Legacy Systems? Prepare For These 4 Challenges 🦿
📖 Read more.
🔗 Via "Tech Republic"
----------
👁️ Seen on @cibsecurity
In this TechRepublic exclusive, a chief innovation officer provides guidance on addressing challenges when deploying AI agents in legacy software environments.📖 Read more.
🔗 Via "Tech Republic"
----------
👁️ Seen on @cibsecurity
TechRepublic
Applying Agentic AI to Legacy Systems? Prepare For These 4 Challenges
In this TechRepublic exclusive, a chief innovation officer provides guidance on addressing challenges when deploying AI agents in legacy software environments.
🦿 FBI Warning: Scattered Spider Hackers Are Targeting Airlines, Too 🦿
📖 Read more.
🔗 Via "Tech Republic"
----------
👁️ Seen on @cibsecurity
Scattered Spider hackers are now targeting airlines with advanced social engineering tactics to bypass MFA and breach critical systems, the FBI warns.📖 Read more.
🔗 Via "Tech Republic"
----------
👁️ Seen on @cibsecurity
TechRepublic
FBI Warning: Scattered Spider Hackers Are Targeting Airlines, Too
Scattered Spider hackers are now targeting airlines with advanced social engineering tactics to bypass MFA and breach critical systems, the FBI warns.
🖋️ SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools 🖋️
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
Cybersecurity researchers have disclosed a malicious campaign that leverages search engine optimization SEO poisoning techniques to deliver a known malware loader called Oyster aka Broomstick or CleanUpLoader. The malvertising activity, per Arctic Wolf, promotes fake websites hosting trojanized versions of legitimate tools like PuTTY and WinSCP, aiming to trick software professionals.📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
🖋️ ⚡ Weekly Recap: Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More 🖋️
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
Everything feels secureuntil one small thing slips through. Even strong systems can break if a simple check is missed or a trusted tool is misused. Most threats dont start with alarmsthey sneak in through the little things we overlook. A tiny bug, a reused password, a quiet connectionthats all it takes. Staying safe isnt just about reacting fast. Its about catching these early signs.📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
🖋️ Manufacturing Security: Why Default Passwords Must Go 🖋️
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
If you didn't hear about Iranian hackers breaching US water facilities, it's because they only managed to control a single pressure station serving 7,000 people. What made this attack noteworthy wasn't its scale, but how easily the hackers gained access by simply using the manufacturer's default password "1111." This narrow escape prompted CISA to urge manufacturers to.📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
🖋️ TAG-140 Deploys DRAT V2 RAT, Targeting Indian Government, Defense, and Rail Sectors 🖋️
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
A hacking group with ties other than Pakistan has been found targeting Indian government organizations with a modified variant of a remote access trojan RAT called DRAT. The activity has been attributed by Recorded Future's Insikt Group to a threat actor tracked as TAG140, which it said overlaps with SideCopy, an adversarial collective assessed to be an operational subcluster within.📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
📔 Iran-Aligned Hacking Group Targets Middle Eastern Governments 📔
📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
Iranaligned BladedFeline group has been observed targeting the government of Iraq and KRG with advanced malware.📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
📔 Researchers Share CitrixBleed 2 Detection Analysis After Initial Hold 📔
📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
Vulnerability research company WatchTowr published a detection analysis for the Citrix Blled 2 flaw.📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
Infosecurity Magazine
Researchers Share CitrixBleed 2 Detection Analysis After Initial Hold
Vulnerability research company WatchTowr published a detection analysis for the Citrix Blled 2 flaw
📔 Hackers Target Employee Credentials Amid Spike in ID Attacks 📔
📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
Cybersecurity researchers have observed a 156 increase in credential theft incidents between 2024 and Q1 2025.📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
Infosecurity Magazine
Hackers Target Employee Credentials Amid Spike in ID Attacks
Cybersecurity researchers have observed a 156% increase in credential theft incidents between 2024 and Q1 2025