CYBERSEC BULLETIN – ONE PLACE FOR YOUR NEWS

NVIDIA shares guidance to defend GDDR6 GPUs against Rowhammer attacks

BleepingComputer2025-07-11

OtherOther

Cyberstarts Launches $300M Liquidity Fund to Help Startups Retain Top Talent

Security Week2025-07-11

Rowhammer Attack Demonstrated Against Nvidia GPU

Security Week2025-07-11

In Other News: Microsoft Finds AMD CPU Flaws, ZuRu macOS Malware, DoNot APT

Security Week2025-07-11

Critical Wing FTP Server Vulnerability Exploited

Security Week2025-07-11

Four Arrested in UK Over M&S, Co-op Cyberattacks

Security Week2025-07-10

Bitcoin Depot breach exposes data of nearly 27,000 crypto users

BleepingComputer2025-07-09

BreachesBreaches

Nippon Steel Subsidiary Blames Data Breach on Zero-Day Attack

Security Week2025-07-09

How To Automate Ticket Creation, Device Identification and Threat Triage With Tines

The Hacker News2025-07-09

OtherOther

Unpatched Ruckus Vulnerabilities Allow Wireless Environment Hacking

Security Week2025-07-09

Overcoming Technical Barriers in Desktop and Application Virtualization

BleepingComputer2025-07-08

OtherOther

RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks

The Hacker News2025-07-08

OtherOther

Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension

The Hacker News2025-07-08

OtherOther

Windows 10 KB5062554 cumulative update released with 13 changes, fixes

BleepingComputer2025-07-08

OtherOther

Malicious Chrome extensions with 1.7M installs found on Web Store

BleepingComputer2025-07-08

OtherOther

Exploits, Technical Details Released for CitrixBleed2 Vulnerability

Security Week2025-07-08

Android malware Anatsa infiltrates Google Play to target US banks

BleepingComputer2025-07-08

BreachesBreaches

CISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation

The Hacker News2025-07-08

OtherOther

SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools

The Hacker News2025-07-07

BreachesBreaches

TAG-140 Deploys DRAT V2 RAT, Targeting Indian Government, Defense, and Rail Sectors

The Hacker News2025-07-07

OtherOther

Ingram Micro outage caused by SafePay ransomware attack

BleepingComputer2025-07-05

RansomwareRansomware

Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties

The Hacker News2025-07-05

OtherOther

Police in Brazil Arrest a Suspect Over $100M Banking Hack

Security Week2025-07-05

Google's AI video maker Veo 3 is now available via $20 Gemini

BleepingComputer2025-07-04

OtherOther

Hunters International ransomware shuts down after World Leaks rebrand

BleepingComputer2025-07-03

RansomwareRansomware

Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets

The Hacker News2025-07-03

OtherOther

Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams

The Hacker News2025-07-03

BreachesBreaches

Cisco Warns of Hardcoded Credentials in Enterprise Software

Security Week2025-07-03

IdeaLab confirms data stolen in ransomware attack last year

BleepingComputer2025-07-03

RansomwareRansomware

Forminator WordPress Plugin Vulnerability Exposes 400,000 Websites to Takeover

Security Week2025-07-02

CISA Warns of Two Exploited TeleMessage Vulnerabilities

Security Week2025-07-02

Kelly Benefits says 2024 data breach impacts 550,000 customers

BleepingComputer2025-07-01

BreachesBreaches

LevelBlue to Acquire Trustwave to Create Major MSSP

Security Week2025-07-01

Google Patches Critical Zero-Day Flaw in Chrome’s V8 Engine After Active Exploitation

The Hacker News2025-07-01

OtherOther

Microsoft Removes Password Management from Authenticator App Starting August 2025

The Hacker News2025-07-01

OtherOther

Cato Networks Raises $359 Million to Expand SASE Business

Security Week2025-06-30

Microsoft warns of Windows update delays due to wrong timestamp

BleepingComputer2025-06-30

OtherOther

Canada Gives Hikvision the Boot on National Security Grounds

Security Week2025-06-30

Switzerland says government data stolen in ransomware attack

BleepingComputer2025-06-30

RansomwareRansomware

⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more

The Hacker News2025-06-30

BreachesBreaches

Microsoft to Preview New Windows Endpoint Security Platform After CrowdStrike Outage

Security Week2025-06-27

In Other News: Norway Dam Hacked, $177M Data Breach Settlement, UNFI Attack Update

Security Week2025-06-27

Russia’s throttling of Cloudflare makes sites inaccessible

BleepingComputer2025-06-27

OtherOther

Cyber Criminals Exploit Open-Source Tools to Compromise Financial Institutions Across Africa

The Hacker News2025-06-26

VulnerabilitiesVulnerabilities

Ex-student charged over hacking university for cheap parking, data breaches

BleepingComputer2025-06-26

OtherOther

Critical Citrix NetScaler Flaw Exploited as Zero-Day

Security Week2025-06-26

FTC approves $126 million in Fortnite refunds over ‘dark patterns’

BleepingComputer2025-06-26

OtherOther

CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet

The Hacker News2025-06-26

OtherOther

Bipartisan Bill Aims to Block Chinese AI From Federal Agencies

Security Week2025-06-26

Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games

The Hacker News2025-06-25

OtherOther

Code Execution Vulnerability Patched in GitHub Enterprise Server

Security Week2025-06-25

Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure

The Hacker News2025-06-25

OtherOther

FileFix attack weaponizes Windows File Explorer for stealthy commands

BleepingComputer2025-06-24

OtherOther

Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives

Security Week2025-06-24

APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine

The Hacker News2025-06-24

BreachesBreaches

US House bans WhatsApp on staff devices over security concerns

BleepingComputer2025-06-24

OtherOther

Revil ransomware members released after time served on carding charges

BleepingComputer2025-06-23

RansomwareRansomware

743,000 Impacted by McLaren Health Care Data Breach

Security Week2025-06-23

How AI-Enabled Workflow Automation Can Help SOCs Reduce Burnout

The Hacker News2025-06-23

OtherOther

US Homeland Security warns of escalating Iranian cyberattack risks

BleepingComputer2025-06-23

BreachesBreaches

WordPress Motors theme flaw mass-exploited to hijack admin accounts

BleepingComputer2025-06-21

OtherOther

OpenAI’s Sam Altman discusses GPT-5 release date

BleepingComputer2025-06-19

OtherOther

Microsoft 365 to block file access via legacy auth protocols by default

BleepingComputer2025-06-18

OtherOther

Microsoft fixes Surface Hub boot issues with emergency update

BleepingComputer2025-06-17

OtherOther

ASUS Armoury Crate bug lets attackers get Windows admin privileges

BleepingComputer2025-06-16

VulnerabilitiesVulnerabilities

Police seizes Archetyp Market drug marketplace, arrests admin

BleepingComputer2025-06-16

OtherOther

ChatGPT's AI coder Codex now lets you choose the best solution

BleepingComputer2025-06-15

OtherOther

ChatGPT Search gets an upgrade as OpenAI takes aim at Google

BleepingComputer2025-06-15

OtherOther

Windows 11 users want these five features back

BleepingComputer2025-06-14

OtherOther

Graphite spyware used in Apple iOS zero-click attacks on journalists

BleepingComputer2025-06-12

OtherOther

Microsoft creates separate Windows 11 24H2 update for incompatible PCs

BleepingComputer2025-06-11

OtherOther

Five plead guilty to laundering $36 million stolen in investment scams

BleepingComputer2025-06-10

OtherOther

OpenAI working to fix ChatGPT outage affecting users worldwide

BleepingComputer2025-06-10

OtherOther

Over 84,000 Roundcube instances vulnerable to actively exploited flaw

BleepingComputer2025-06-09

OtherOther

Google patched bug leaking phone numbers tied to accounts

BleepingComputer2025-06-09

VulnerabilitiesVulnerabilities

Supply chain attack hits Gluestack NPM packages with 960K weekly downloads

BleepingComputer2025-06-07

OtherOther

Designing a Windows Service for Security

BleepingComputer2025-06-05

OtherOther

Old AT&T data leak repackaged to link SSNs, DOBs to 49M phone numbers

BleepingComputer2025-06-05

OtherOther

How to build a robust Windows service to block malware and ransomware

BleepingComputer2025-06-05

RansomwareRansomware

Hacker arrested for breaching 5,000 hosting accounts to mine crypto

BleepingComputer2025-06-04

OtherOther

Ukraine claims it hacked Tupolev, Russia’s strategic warplane maker

BleepingComputer2025-06-04

VulnerabilitiesVulnerabilities

Victoria’s Secret delays earnings release after security incident

BleepingComputer2025-06-03

OtherOther

Android malware Crocodilus adds fake contacts to spoof trusted callers

BleepingComputer2025-06-03

OtherOther

Threat actors abuse Google Apps Script in evasive phishing attacks

BleepingComputer2025-05-29

OtherOther

ConnectWise breached in cyberattack linked to nation-state hackers

BleepingComputer2025-05-29

OtherOther

New 'Defendnot' tool tricks Windows into disabling Microsoft Defender

BleepingComputer2025-05-17

OtherOther

Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks

The Hacker News2025-05-16

OtherOther

US charges 12 more suspects linked to $230 million crypto theft

BleepingComputer2025-05-16

OtherOther

Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks

The Hacker News2025-05-16

OtherOther

5 BCDR Essentials for Effective Ransomware Defense

The Hacker News2025-05-15

RansomwareRansomware

Google fixes high severity Chrome flaw with public exploit

BleepingComputer2025-05-15

VulnerabilitiesVulnerabilities

Ransomware gangs join ongoing SAP NetWeaver attacks

BleepingComputer2025-05-14

RansomwareRansomware

Focused Phishing: Attack Targets Victims With Trusted Sites and Live Validation

BleepingComputer2025-05-14

OtherOther

Microsoft Fixes 78 Flaws, 5 Zero-Days Exploited; CVSS 10 Bug Impacts Azure DevOps Server

The Hacker News2025-05-14

VulnerabilitiesVulnerabilities

Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns

The Hacker News2025-05-14

OtherOther

Ivanti fixes EPMM zero-days chained in code execution attacks

BleepingComputer2025-05-13

OtherOther

Ivanti warns of critical Neurons for ITSM auth bypass flaw

BleepingComputer2025-05-13

OtherOther

Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency

The Hacker News2025-05-13

RansomwareRansomware

ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files

The Hacker News2025-05-12

OtherOther

Majority of Browser Extensions Pose Critical Security Risk, A New Report Reveals

BleepingComputer2025-05-12

OtherOther
Last updated: Sat, 12 Jul 2025 09:13:24 GMT