π 1 in 3 Android Apps Leak Sensitive Data π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
One third of Android and over half iOS apps shown to be leaking insecure APIs and hardcoded secrets.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
1 in 3 Android Apps Leak Sensitive Data
One third of Android and over half iOS apps shown to be leaking insecure APIs and hardcoded secrets
π SonicWall Discloses Compromise of Cloud Backup Service π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
SonicWall said that threat actors accessed firewall preference files stored in the cloud for around 5 of its firewall install base.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
SonicWall Discloses Compromise of Cloud Backup Service
SonicWall said that threat actors accessed firewall preference files stored in the cloud for around 5% of its firewall install base
π VC Firm Insight Partners Notifies Victims After Ransomware Breach π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Insight Partners has released more details of a 2024 ransomware breach impacting thousands of individuals.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
VC Firm Insight Partners Notifies Victims After Ransomware Breach
Insight Partners has released more details of a 2024 ransomware breach impacting thousands of individuals
π NCA Singles Out βThe Comβ as it Chairs Five Eyes Group π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The UKs National Crime Agency is the new chair of the Five Eyes Law Enforcement Group.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
NCA Singles Out βThe Comβ as it Chairs Five Eyes Group
The UKβs National Crime Agency is the new chair of the Five Eyes Law Enforcement Group
π¦
Ransomware Landscape August 2025: Qilin Dominates as Sinobi Emerges π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
In August, Qilin was the most active ransomware group for the fourth time in five months, while a new ransomware group is quickly moving up the ranks. Qilins 104 claimed victims in August were nearly double secondplace Akiras 56, but the rapid rise of Sinobi to third place has been one of the more intriguing recent developments in the ransomware landscape chart below. The dominance of Qilin and the rise of Sinobi were among the revelations in Cybles latest global threat landscape report, which also documents a surge in supply chain and critical infrastructure attacks, among other findings. Ransomware attacks rose to 467 in August, the fourth straight monthly increase, even as attack totals remain well below Februarys record chart below. Several attacks had significant sup...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
β€1
ποΈ CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have discovered a new malware loader codenamed CountLoader that has been put to use by Russian ransomware gangs to deliver postexploitation tools like Cobalt Strike and AdaptixC2, and a remote access trojan known as PureHVNC RAT. "CountLoader is being used either as part of an Initial Access Broker's IAB toolset or by a ransomware affiliate with ties to the LockBit,.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
SonicWall is urging customers to reset credentials after their firewall configuration backup files were exposed in a security breach impacting MySonicWall accounts. The company said it recently detected suspicious activity targeting the cloud backup service for firewalls, and that unknown threat actors accessed backup firewall preference files stored in the cloud for less than 5 of its.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
β€1
π New York Blood Center Alerts 194,000 People to Data Breach π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A breach at the New York Blood Center resulted in theft of data for 194,000 people, including SSNs, IDs, bank and health information.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
New York Blood Center Alerts 194,000 People to Data Breach
A breach at the New York Blood Center resulted in theft of data for 194,000 people, including SSNs, IDs, bank and health information
π’ The top ransomware trends for businesses in 2025 π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
A splintering of top groups and changing attitudes toward payments are changing attacker tactics at speed.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
The top ransomware trends for businesses in 2025
A splintering of top groups and changing attitudes toward payments are changing attacker tactics at speed
π Pair of Suspected Scattered Spider Hackers Charged by UK, US Authorities π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
One of the teenage suspects is accused of involvement in at least 120 attacks, resulting in 115m in ransom payments.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Pair of Suspected Scattered Spider Hackers Charged by UK, US Authorities
One of the teenage suspects is accused of involvement in at least 120 attacks, resulting in $115m in ransom payments
ποΈ CISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428 ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The U.S. Cybersecurity and Infrastructure Security Agency CISA on Thursday released details of two sets of malware that were discovered in an unnamed organization's network following the exploitation of security flaws in Ivanti Endpoint Manager Mobile EPMM. "Each set contains loaders for malicious listeners that enable cyber threat actors to run arbitrary code on the compromised server,".π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ U.K. Arrests Two Teen Scattered Spider Hackers Linked to August 2024 TfL Cyber Attack ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Law enforcement authorities in the U.K. have arrested two teen members of the Scattered Spider hacking group in connection with their alleged participation in an August 2024 cyber attack targeting Transport for London TfL, the city's public transportation agency. Thalha Jubair aka EarthtoStar, Brad, Austin, and autistic, 19, from East London and Owen Flowers, 18, from Walsall, West Midlands.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π’ The Salesloft hackers claim they have 1.5 billion compromised Salesforce records π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Dozens of big tech companies have been impacted by the Salesloft Drift attacks.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
The Salesloft hackers claim they have 1.5 billion compromised Salesforce records
Dozens of big tech companies have been impacted by the Salesloft Drift attacks
ποΈ How To Automate Alert Triage With AI Agents and Confluence SOPs Using Tines ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Run by the team at workflow orchestration and AI platform Tines, the Tines library features over 1,000 prebuilt workflows shared by security practitioners from across the community all free to import and deploy through the platform's Community Edition. The workflow we are highlighting streamlines security alert handling by automatically identifying and executing the appropriate Standard.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Russian Hackers Gamaredon and Turla Collaborate to Deploy Kazuar Backdoor in Ukraine ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have discerned evidence of two Russian hacking groups Gamaredon and Turla collaborating together to target and cocomprise Ukrainian entities. Slovak cybersecurity company ESET said it observed the Gamaredon tools PteroGraphin and PteroOdd being used to execute Turla group's Kazuar backdoor on an endpoint in Ukraine in February 2025, indicating that Turla is very likely.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Small businesses, big targets: Protecting your business against ransomware π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
Small business, big risk: How SMBs can fight back against ransomware
Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises.
π Zero-Click Vulnerability in ChatGPT's Agent Enables Silent Gmail Data Theft π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Researchers at Radware found a zeroclick flaw in ChatGPT Deep Research agent when connected to Gmail and browsing.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Zero-Click Vulnerability in ChatGPT's Agent Enables Silent Gmail Data Theft
Researchers at Radware found a zero-click flaw in ChatGPT Deep Research agent when connected to Gmail and browsing
π Attackers Abuse AI Tools to Generate Fake CAPTCHAs in Phishing Attacks π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Trend Micro said the use of AI platforms to create and host fake CAPTCHA pages helps attackers develop more sophisticated phishing campaigns at scale and speed.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Attackers Abuse AI Tools to Generate Fake CAPTCHAs in Phishing Attacks
Trend Micro said the use of AI platforms to create and host fake CAPTCHA pages helps attackers develop more sophisticated phishing campaigns at scale and speed
π Lawyer π
π Read more.
π Via "UnderDefense"
----------
ποΈ Seen on @cibsecurity
The post Lawyer appeared first on UnderDefense.π Read more.
π Via "UnderDefense"
----------
ποΈ Seen on @cibsecurity
π Russian State Hackers Collaborate in Attacks Against Ukraine π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
ESET found that the FSBaffiliated groups, Gamaredon and Turla, are sharing tools to help conduct espionage attacks against Ukrainian organizations.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Russian State Hackers Collaborate in Attacks Against Ukraine
ESET found that the FSB-affiliated groups, Gamaredon and Turla, are sharing tools to help conduct espionage attacks against Ukrainian organizations
β€1
ποΈ 17,500 Phishing Domains Target 316 Brands Across 74 Countries in Global PhaaS Surge ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The phishingasaservice PhaaS offering known as Lighthouse and Lucid has been linked to more than 17,500 phishing domains targeting 316 brands from 74 countries. "PhishingasaService PhaaS deployments have risen significantly recently," Netcraft said in a new report. "The PhaaS operators charge a monthly fee for phishing software with preinstalled templates impersonating, in some cases,.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity