CYBERSEC BULLETIN – ONE PLACE FOR YOUR NEWS
NVIDIA shares guidance to defend GDDR6 GPUs against Rowhammer attacks
BleepingComputer • 2025-07-11

Cyberstarts Launches $300M Liquidity Fund to Help Startups Retain Top Talent
Security Week • 2025-07-11

In Other News: Microsoft Finds AMD CPU Flaws, ZuRu macOS Malware, DoNot APT
Security Week • 2025-07-11

Bitcoin Depot breach exposes data of nearly 27,000 crypto users
BleepingComputer • 2025-07-09

How To Automate Ticket Creation, Device Identification and Threat Triage With Tines
The Hacker News • 2025-07-09

Unpatched Ruckus Vulnerabilities Allow Wireless Environment Hacking
Security Week • 2025-07-09

Overcoming Technical Barriers in Desktop and Application Virtualization
BleepingComputer • 2025-07-08

RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks
The Hacker News • 2025-07-08

Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension
The Hacker News • 2025-07-08

Windows 10 KB5062554 cumulative update released with 13 changes, fixes
BleepingComputer • 2025-07-08

Malicious Chrome extensions with 1.7M installs found on Web Store
BleepingComputer • 2025-07-08

Exploits, Technical Details Released for CitrixBleed2 Vulnerability
Security Week • 2025-07-08

Android malware Anatsa infiltrates Google Play to target US banks
BleepingComputer • 2025-07-08

CISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation
The Hacker News • 2025-07-08

SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools
The Hacker News • 2025-07-07

TAG-140 Deploys DRAT V2 RAT, Targeting Indian Government, Defense, and Rail Sectors
The Hacker News • 2025-07-07

Ingram Micro outage caused by SafePay ransomware attack
BleepingComputer • 2025-07-05

Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties
The Hacker News • 2025-07-05

Google's AI video maker Veo 3 is now available via $20 Gemini
BleepingComputer • 2025-07-04

Hunters International ransomware shuts down after World Leaks rebrand
BleepingComputer • 2025-07-03

Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets
The Hacker News • 2025-07-03

Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams
The Hacker News • 2025-07-03

IdeaLab confirms data stolen in ransomware attack last year
BleepingComputer • 2025-07-03

Forminator WordPress Plugin Vulnerability Exposes 400,000 Websites to Takeover
Security Week • 2025-07-02

Kelly Benefits says 2024 data breach impacts 550,000 customers
BleepingComputer • 2025-07-01

Google Patches Critical Zero-Day Flaw in Chrome’s V8 Engine After Active Exploitation
The Hacker News • 2025-07-01

Microsoft Removes Password Management from Authenticator App Starting August 2025
The Hacker News • 2025-07-01

Microsoft warns of Windows update delays due to wrong timestamp
BleepingComputer • 2025-06-30

Switzerland says government data stolen in ransomware attack
BleepingComputer • 2025-06-30

⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more
The Hacker News • 2025-06-30

Microsoft to Preview New Windows Endpoint Security Platform After CrowdStrike Outage
Security Week • 2025-06-27

In Other News: Norway Dam Hacked, $177M Data Breach Settlement, UNFI Attack Update
Security Week • 2025-06-27

Russia’s throttling of Cloudflare makes sites inaccessible
BleepingComputer • 2025-06-27

Cyber Criminals Exploit Open-Source Tools to Compromise Financial Institutions Across Africa
The Hacker News • 2025-06-26

Ex-student charged over hacking university for cheap parking, data breaches
BleepingComputer • 2025-06-26

FTC approves $126 million in Fortnite refunds over ‘dark patterns’
BleepingComputer • 2025-06-26

CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet
The Hacker News • 2025-06-26

Bipartisan Bill Aims to Block Chinese AI From Federal Agencies
Security Week • 2025-06-26

Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games
The Hacker News • 2025-06-25

Code Execution Vulnerability Patched in GitHub Enterprise Server
Security Week • 2025-06-25

Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure
The Hacker News • 2025-06-25

FileFix attack weaponizes Windows File Explorer for stealthy commands
BleepingComputer • 2025-06-24

Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives
Security Week • 2025-06-24

APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine
The Hacker News • 2025-06-24

US House bans WhatsApp on staff devices over security concerns
BleepingComputer • 2025-06-24

Revil ransomware members released after time served on carding charges
BleepingComputer • 2025-06-23

How AI-Enabled Workflow Automation Can Help SOCs Reduce Burnout
The Hacker News • 2025-06-23

US Homeland Security warns of escalating Iranian cyberattack risks
BleepingComputer • 2025-06-23

WordPress Motors theme flaw mass-exploited to hijack admin accounts
BleepingComputer • 2025-06-21

Microsoft 365 to block file access via legacy auth protocols by default
BleepingComputer • 2025-06-18

Microsoft fixes Surface Hub boot issues with emergency update
BleepingComputer • 2025-06-17

ASUS Armoury Crate bug lets attackers get Windows admin privileges
BleepingComputer • 2025-06-16

Police seizes Archetyp Market drug marketplace, arrests admin
BleepingComputer • 2025-06-16

ChatGPT's AI coder Codex now lets you choose the best solution
BleepingComputer • 2025-06-15

ChatGPT Search gets an upgrade as OpenAI takes aim at Google
BleepingComputer • 2025-06-15

Graphite spyware used in Apple iOS zero-click attacks on journalists
BleepingComputer • 2025-06-12

Microsoft creates separate Windows 11 24H2 update for incompatible PCs
BleepingComputer • 2025-06-11

Five plead guilty to laundering $36 million stolen in investment scams
BleepingComputer • 2025-06-10

OpenAI working to fix ChatGPT outage affecting users worldwide
BleepingComputer • 2025-06-10

Over 84,000 Roundcube instances vulnerable to actively exploited flaw
BleepingComputer • 2025-06-09

Google patched bug leaking phone numbers tied to accounts
BleepingComputer • 2025-06-09

Supply chain attack hits Gluestack NPM packages with 960K weekly downloads
BleepingComputer • 2025-06-07

Old AT&T data leak repackaged to link SSNs, DOBs to 49M phone numbers
BleepingComputer • 2025-06-05

How to build a robust Windows service to block malware and ransomware
BleepingComputer • 2025-06-05

Hacker arrested for breaching 5,000 hosting accounts to mine crypto
BleepingComputer • 2025-06-04

Ukraine claims it hacked Tupolev, Russia’s strategic warplane maker
BleepingComputer • 2025-06-04

Victoria’s Secret delays earnings release after security incident
BleepingComputer • 2025-06-03

Android malware Crocodilus adds fake contacts to spoof trusted callers
BleepingComputer • 2025-06-03

Threat actors abuse Google Apps Script in evasive phishing attacks
BleepingComputer • 2025-05-29

ConnectWise breached in cyberattack linked to nation-state hackers
BleepingComputer • 2025-05-29

New 'Defendnot' tool tricks Windows into disabling Microsoft Defender
BleepingComputer • 2025-05-17

Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
The Hacker News • 2025-05-16

US charges 12 more suspects linked to $230 million crypto theft
BleepingComputer • 2025-05-16

Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
The Hacker News • 2025-05-16

5 BCDR Essentials for Effective Ransomware Defense
The Hacker News • 2025-05-15

Google fixes high severity Chrome flaw with public exploit
BleepingComputer • 2025-05-15

Ransomware gangs join ongoing SAP NetWeaver attacks
BleepingComputer • 2025-05-14

Focused Phishing: Attack Targets Victims With Trusted Sites and Live Validation
BleepingComputer • 2025-05-14

Microsoft Fixes 78 Flaws, 5 Zero-Days Exploited; CVSS 10 Bug Impacts Azure DevOps Server
The Hacker News • 2025-05-14

Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns
The Hacker News • 2025-05-14

Ivanti fixes EPMM zero-days chained in code execution attacks
BleepingComputer • 2025-05-13

Ivanti warns of critical Neurons for ITSM auth bypass flaw
BleepingComputer • 2025-05-13

Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
The Hacker News • 2025-05-13

ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files
The Hacker News • 2025-05-12

Majority of Browser Extensions Pose Critical Security Risk, A New Report Reveals
BleepingComputer • 2025-05-12
