π’ Co-op chief executive βvery proudβ of cyber attack response despite huge financial losses π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The company says operating profits are 80 million down, and that the financial effects may continue into the second half.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Co-op chief executive βvery proudβ of cyber attack response despite huge financial losses
The company says operating profits are Β£80 million down, and that the financial effects may continue into the second half
π’ NCA confirms arrest after airport cyber disruption π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Disruption is easing across Europe following the ransomware incident.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
NCA confirms arrest after airport cyber disruption
Disruption is easing across Europe following the ransomware incident
π’ Cyber skills shortages are pushing firms into dangerous shortcuts β and itβs putting them at huge risk of security breaches π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Chronic cyber skills shortages mean many businesses are implementing quick fixes.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Cyber skills shortages are pushing firms into dangerous shortcuts β and itβs putting them at huge risk of security breaches
Chronic cyber skills shortages mean many businesses are implementing quick fixes
π’ Pentesters are now a CISOs best friend as critical vulnerabilities skyrocket π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Attack surfaces are expanding rapidly, but pentesters are here to save the day.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Pentesters are now a CISOs best friend as critical vulnerabilities skyrocket
Attack surfaces are expanding rapidly, but pentesters are here to save the day
ποΈ CTEM's Core: Prioritization and Validation ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Despite a coordinated investment of time, effort, planning, and resources, even the most uptodate cybersecurity systems continue to fail. Every day. Why? Its not because security teams can't see enough. Quite the contrary. Every security tool spits out thousands of findings. Patch this. Block that. Investigate this. It's a tsunami of red dots that not even the most crackerjack team on.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Container .tdwrap Section .tdsection .tdtitle margin 16px 0 4px fontsize 32px lineheight 1.2 fontweight 800 .tdsubtitle margin 0 0 24px color 64748b fontsize 16px Timeline .tdtimeline position relative margin 0 !importantpadding 0!important liststyle none spine .tdtimelinebefore .π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The latest Gcore Radar report analyzing attack data from Q1Q2 2025, reveals a 41 yearonyear increase in total attack volume. The largest attack peaked at 2.2 Tbps, surpassing the 2 Tbps record in late 2024. Attacks are growing not only in scale but in sophistication, with longer durations, multilayered strategies, and a shift in target industries. Technology now overtakes gaming as the most.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Malicious Rust Crates Steal Solana and Ethereum Keys β 8,424 Downloads Confirmed ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have discovered two malicious Rust crates impersonating a legitimate library called fastlog to steal Solana and Ethereum wallet keys from source code. The crates, named fasterlog and asyncprintln, were published by the threat actor under the alias rustguruman and dumbnbased on May 25, 2025, amassing 8,424 downloads in total, according to software supply chain.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Chinese Hackers Use 'BRICKSTORM' Backdoor to Breach US Firms π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The hackers are likely trying to collect data to feed the development of zeroday exploits, said Google researchers.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Chinese Hackers Use 'BRICKSTORM' Backdoor to Breach US Firms
The hackers are likely trying to collect data to feed the development of zero-day exploits, said Google researchers
π Co-op Records Β£206m Revenue Loss Following Cyber-Attack π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The UK retailer estimated the losses from temporarily shutting down some of its systems to contain the threat.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Co-op Records Β£206m Revenue Loss Following Cyber-Attack
The UK retailer estimated the losses from temporarily shutting down some of its systems to contain the threat
π Experts Warn of Global Breach Risk from Indian Suppliers π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
SecurityScorecard report finds 53 of Indian vendors suffered thirdparty breaches in the past year.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Experts Warn of Global Breach Risk from Indian Suppliers
SecurityScorecard report finds 53% of Indian vendors suffered third-party breaches in the past year
ποΈ North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The North Korealinked threat actors associated with the Contagious Interview campaign have been attributed to a previously undocumented backdoor called AkdoorTea, along with tools like TsunamiKit and Tropidoor. Slovak cybersecurity firm ESET, which is tracking the activity under the name DeceptiveDevelopment, said the campaign targets software developers across all operating systems, Windows,.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Phishing Campaign Evolves into PureRAT Deployment, Linked to Vietnamese Threat Actors π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Vietnamese phishing campaign evolves from Python infostealer to PureRAT trojan.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Phishing Campaign Evolves into PureRAT Deployment, Linked to Vietnamese Threat Actors
Vietnamese phishing campaign evolves from Python infostealer to PureRAT trojan
ποΈ Salesforce Patches Critical ForcedLeak Bug Exposing CRM Data via AI Prompt Injection ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have disclosed a critical flaw impacting Salesforce Agentforce, a platform for building artificial intelligence AI agents, that could allow attackers to potentially exfiltrate sensitive data from its customer relationship management CRM tool by means of an indirect prompt injection. The vulnerability has been codenamed ForcedLeak CVSS score 9.4 by Noma Security,.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Malicious AI Agent Server Reportedly Steals Emails π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The security researchers who discovered the malicious npm package called it the first malicious MCP in the wild.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Malicious AI Agent Server Reportedly Steals Emails
The security researchers who discovered the malicious npm package called it the βfirst malicious MCP in the wildβ
π¨ NCSC warns of persistent malware campaign targeting Cisco devices π¨
π Read more.
π Via "UK NCSC"
----------
ποΈ Seen on @cibsecurity
Latest malware analysis report helps organisations detect and mitigate malicious activity targeting certain Cisco devices.π Read more.
π Via "UK NCSC"
----------
ποΈ Seen on @cibsecurity
www.ncsc.gov.uk
NCSC warns of persistent malware campaign targeting Cisco devices
Latest malware analysis report helps organisations detect and mitigate malicious activity targeting certain Cisco devices.
π Critical Vulnerability in Salesforce AgentForce Exposed π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Critical flaw ForcedLeak in Salesforce's AgentForce allows CRM data theft via prompt injection.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Critical Vulnerability in Salesforce AgentForce Exposed
Critical flaw ForcedLeak in Salesforce's AgentForce allows CRM data theft via prompt injection
ποΈ Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cisco is urging customers to patch two security flaws impacting the VPN web server of Cisco Secure Firewall Adaptive Security Appliance ASA Software and Cisco Secure Firewall Threat Defense FTD Software, which it said have been exploited in the wild. The zeroday vulnerabilities in question are listed below CVE202520333 CVSS score 9.9 An improper validation of usersupplied input.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Container .tdwrap Section .tdsection .tdtitle margin 16px 0 4px fontsize 32px lineheight 1.2 fontweight 800 .tdsubtitle margin 0 0 24px color 64748b fontsize 16px Timeline .tdtimeline position relative margin 0 !importantpadding 0!important liststyle none spine .tdtimelinebefore .π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Vane Viper Generates 1 Trillion DNS Queries to Power Global Malware and Ad Fraud Network ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The threat actor known as Vane Viper has been outed as a purveyor of malicious ad technology adtech, while relying on a tangled web of shell companies and opaque ownership structures to deliberately evade responsibility. "Vane Viper has provided core infrastructure in widespread malvertising, ad fraud, and cyberthreat proliferation for at least a decade," Infoblox said in a technical report.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π¨ NCSC statement following reports of nursery data incident π¨
π Read more.
π Via "UK NCSC"
----------
ποΈ Seen on @cibsecurity
Statement from the NCSC in response to reports of an incident impacting nurseries.π Read more.
π Via "UK NCSC"
----------
ποΈ Seen on @cibsecurity
National Cyber Security Centre - NCSC.GOV.UK
NCSC statement following reports of nursery data incident
Statement from the NCSC in response to reports of an incident impacting nurseries.