π¦
Ransomware Landscape August 2025: Qilin Dominates as Sinobi Emerges π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
In August, Qilin was the most active ransomware group for the fourth time in five months, while a new ransomware group is quickly moving up the ranks. Qilins 104 claimed victims in August were nearly double secondplace Akiras 56, but the rapid rise of Sinobi to third place has been one of the more intriguing recent developments in the ransomware landscape chart below. The dominance of Qilin and the rise of Sinobi were among the revelations in Cybles latest global threat landscape report, which also documents a surge in supply chain and critical infrastructure attacks, among other findings. Ransomware attacks rose to 467 in August, the fourth straight monthly increase, even as attack totals remain well below Februarys record chart below. Several attacks had significant sup...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
β€1
ποΈ CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have discovered a new malware loader codenamed CountLoader that has been put to use by Russian ransomware gangs to deliver postexploitation tools like Cobalt Strike and AdaptixC2, and a remote access trojan known as PureHVNC RAT. "CountLoader is being used either as part of an Initial Access Broker's IAB toolset or by a ransomware affiliate with ties to the LockBit,.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
SonicWall is urging customers to reset credentials after their firewall configuration backup files were exposed in a security breach impacting MySonicWall accounts. The company said it recently detected suspicious activity targeting the cloud backup service for firewalls, and that unknown threat actors accessed backup firewall preference files stored in the cloud for less than 5 of its.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
β€1
π New York Blood Center Alerts 194,000 People to Data Breach π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A breach at the New York Blood Center resulted in theft of data for 194,000 people, including SSNs, IDs, bank and health information.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
New York Blood Center Alerts 194,000 People to Data Breach
A breach at the New York Blood Center resulted in theft of data for 194,000 people, including SSNs, IDs, bank and health information
π’ The top ransomware trends for businesses in 2025 π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
A splintering of top groups and changing attitudes toward payments are changing attacker tactics at speed.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
The top ransomware trends for businesses in 2025
A splintering of top groups and changing attitudes toward payments are changing attacker tactics at speed
π Pair of Suspected Scattered Spider Hackers Charged by UK, US Authorities π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
One of the teenage suspects is accused of involvement in at least 120 attacks, resulting in 115m in ransom payments.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Pair of Suspected Scattered Spider Hackers Charged by UK, US Authorities
One of the teenage suspects is accused of involvement in at least 120 attacks, resulting in $115m in ransom payments
ποΈ CISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428 ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The U.S. Cybersecurity and Infrastructure Security Agency CISA on Thursday released details of two sets of malware that were discovered in an unnamed organization's network following the exploitation of security flaws in Ivanti Endpoint Manager Mobile EPMM. "Each set contains loaders for malicious listeners that enable cyber threat actors to run arbitrary code on the compromised server,".π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ U.K. Arrests Two Teen Scattered Spider Hackers Linked to August 2024 TfL Cyber Attack ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Law enforcement authorities in the U.K. have arrested two teen members of the Scattered Spider hacking group in connection with their alleged participation in an August 2024 cyber attack targeting Transport for London TfL, the city's public transportation agency. Thalha Jubair aka EarthtoStar, Brad, Austin, and autistic, 19, from East London and Owen Flowers, 18, from Walsall, West Midlands.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π’ The Salesloft hackers claim they have 1.5 billion compromised Salesforce records π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Dozens of big tech companies have been impacted by the Salesloft Drift attacks.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
The Salesloft hackers claim they have 1.5 billion compromised Salesforce records
Dozens of big tech companies have been impacted by the Salesloft Drift attacks
ποΈ How To Automate Alert Triage With AI Agents and Confluence SOPs Using Tines ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Run by the team at workflow orchestration and AI platform Tines, the Tines library features over 1,000 prebuilt workflows shared by security practitioners from across the community all free to import and deploy through the platform's Community Edition. The workflow we are highlighting streamlines security alert handling by automatically identifying and executing the appropriate Standard.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Russian Hackers Gamaredon and Turla Collaborate to Deploy Kazuar Backdoor in Ukraine ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have discerned evidence of two Russian hacking groups Gamaredon and Turla collaborating together to target and cocomprise Ukrainian entities. Slovak cybersecurity company ESET said it observed the Gamaredon tools PteroGraphin and PteroOdd being used to execute Turla group's Kazuar backdoor on an endpoint in Ukraine in February 2025, indicating that Turla is very likely.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Small businesses, big targets: Protecting your business against ransomware π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
Small business, big risk: How SMBs can fight back against ransomware
Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises.
π Zero-Click Vulnerability in ChatGPT's Agent Enables Silent Gmail Data Theft π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Researchers at Radware found a zeroclick flaw in ChatGPT Deep Research agent when connected to Gmail and browsing.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Zero-Click Vulnerability in ChatGPT's Agent Enables Silent Gmail Data Theft
Researchers at Radware found a zero-click flaw in ChatGPT Deep Research agent when connected to Gmail and browsing
π Attackers Abuse AI Tools to Generate Fake CAPTCHAs in Phishing Attacks π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Trend Micro said the use of AI platforms to create and host fake CAPTCHA pages helps attackers develop more sophisticated phishing campaigns at scale and speed.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Attackers Abuse AI Tools to Generate Fake CAPTCHAs in Phishing Attacks
Trend Micro said the use of AI platforms to create and host fake CAPTCHA pages helps attackers develop more sophisticated phishing campaigns at scale and speed
π Lawyer π
π Read more.
π Via "UnderDefense"
----------
ποΈ Seen on @cibsecurity
The post Lawyer appeared first on UnderDefense.π Read more.
π Via "UnderDefense"
----------
ποΈ Seen on @cibsecurity
π Russian State Hackers Collaborate in Attacks Against Ukraine π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
ESET found that the FSBaffiliated groups, Gamaredon and Turla, are sharing tools to help conduct espionage attacks against Ukrainian organizations.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Russian State Hackers Collaborate in Attacks Against Ukraine
ESET found that the FSB-affiliated groups, Gamaredon and Turla, are sharing tools to help conduct espionage attacks against Ukrainian organizations
β€1
ποΈ 17,500 Phishing Domains Target 316 Brands Across 74 Countries in Global PhaaS Surge ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The phishingasaservice PhaaS offering known as Lighthouse and Lucid has been linked to more than 17,500 phishing domains targeting 316 brands from 74 countries. "PhishingasaService PhaaS deployments have risen significantly recently," Netcraft said in a new report. "The PhaaS operators charge a monthly fee for phishing software with preinstalled templates impersonating, in some cases,.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π¦
The Week in Vulnerabilities: 1000+ Bugs with 135 Publicly Known PoCs π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
IT Vulnerabilities report " dataimagecaption"" datamediumfile"httpscyble.comwpcontentuploads202509ITVulnerabilitiesreport300x150.webp" datalargefile"httpscyble.comwpcontentuploads202509ITVulnerabilitiesreport.webp" title"The Week in Vulnerabilities 1000 Bugs with 135 Publicly Known PoCs 1" Overview Cyble Research and Intelligence Labs CRIL analyzed significant IT vulnerabilities disclosed between September 1016, 2025. Cybles Vulnerability Intelligence module tracked 1,045 IT vulnerabilities, of which over 135 already have publicly available ProofofConcepts PoCs. As the timetoexploit window continues to shrink, this accelerates the risk of realworld exploitation. Highprofile IT vulnerabilities were identified in Apple operating systems, Zimbra Collaboration Suite ZCS, Samsung...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
ποΈ SystemBC Powers REM Proxy With 1,500 Daily VPS Victims Across 80 C2 Servers ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A proxy network known as REM Proxy is powered by malware known as SystemBC, offering about 80 of the botnet to its users, according to new findings from the Black Lotus Labs team at Lumen Technologies. "REM Proxy is a sizeable network, which also markets a pool of 20,000 Mikrotik routers and a variety of open proxies it finds freely available online," the company said in a report shared with.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Fortra Releases Critical Patch for CVSS 10.0 GoAnywhere MFT Vulnerability ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Fortra has disclosed details of a critical security flaw in GoAnywhere Managed File Transfer MFT software that could result in the execution of arbitrary commands. The vulnerability, tracked as CVE202510035, carries a CVSS score of 10.0, indicating maximum severity. "A deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MFT allows an actor with a validly forged.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π’ βChannel their curiosity into something meaningfulβ: Cyber expert warns an uptick of youth hackers should be a βwake-up callβ after teens charged over TfL attack π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Encouraging youths to engage in positive tech initiatives will guide them down the right path and away from nefarious activities.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
βChannel their curiosity into something meaningfulβ: Cyber expert warns an uptick of youth hackers should be a βwake-up callβ afterβ¦
Encouraging youths to engage in positive tech initiatives will guide them down the right path and away from nefarious activities
β€1