Latest Cybersecurity News and Articles


Lumma Stealer Malware Returns After Takedown Attempt

23 July 2025
The Lumma Stealer is back after Microsoft and law enforcement took action to significantly disrupt the malware’s infrastructure. The post Lumma Stealer Malware Returns After Takedown Attempt appeared first on SecurityWeek.

Google Launches OSS Rebuild to Expose Malicious Code in Widely Used Open-Source Packages

23 July 2025
Google has announced the launch of a new initiative called OSS Rebuild to bolster the security of the open-source package ecosystems and prevent software supply chain attacks. "As supply chain attacks continue to target widely-used dependencies, OSS Rebuild gives security teams powerful data to avoid compromise without burden on upstream maintainers," Matthew Suozzo, Google Open Source Security

Hackers Start Exploiting Critical Cisco ISE Vulnerabilities

23 July 2025
Cisco says it is aware of attempted exploitation of critical ISE vulnerabilities leading to unauthenticated remote code execution. The post Hackers Start Exploiting Critical Cisco ISE Vulnerabilities appeared first on SecurityWeek.

CISA Warns of SysAid Vulnerability Exploitation

23 July 2025
CISA has added two recent SysAid vulnerabilities, CVE-2025-2776 and CVE-2025-2775, to its KEV catalog. The post CISA Warns of SysAid Vulnerability Exploitation appeared first on SecurityWeek.

CISA Warns: SysAid Flaws Under Active Attack Enable Remote File Access and SSRF

23 July 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two security flaws impacting SysAid IT support software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities in question are listed below - CVE-2025-2775 (CVSS score: 9.3) - An improper restriction of XML external entity (XXE) reference vulnerability in the

CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks

23 July 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA), on July 22, 2025, added two Microsoft SharePoint flaws, CVE-2025-49704 and CVE-2025-49706, to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. To that end, Federal Civilian Executive Branch (FCEB) agencies are required to remediate identified vulnerabilities by July 23, 2025. "CISA is

68% of Organizations Experienced Data Leakage From Employee AI Usage

23 July 2025
AI and the rise of cyberattacks.

Researchers Found Nearly 600 Incidents of AI Fraud

23 July 2025
Managing browser-based vulnerabilities.

Microsoft Says Chinese APTs Exploited ToolShell Zero-Days Weeks Before Patch

22 July 2025
Microsoft says the Chinese threat actors Linen Typhoon, Violet Typhoon, and Storm-2603 have been exploiting the ToolShell zero-days. The post Microsoft Says Chinese APTs Exploited ToolShell Zero-Days Weeks Before Patch appeared first on SecurityWeek.

Reclaiming Control: How Enterprises Can Fix Broken Security Operations

22 July 2025
Once a manageable function, security operations has become a battlefield of complexity. The post Reclaiming Control: How Enterprises Can Fix Broken Security Operations appeared first on SecurityWeek.

Microsoft Links Ongoing SharePoint Exploits to Three Chinese Hacker Groups

22 July 2025
Microsoft has formally tied the exploitation of security flaws in internet-facing SharePoint Server instances to two Chinese hacking groups called Linen Typhoon and Violet Typhoon as early as July 7, 2025, corroborating earlier reports. The tech giant said it also observed a third China-based threat actor, which it tracks as Storm-2603, weaponizing the flaws as well to obtain initial access to

Dell Says Data Leaked by Hackers Is Fake

22 July 2025
Dell confirms the compromise of a demo environment containing synthetic data after hackers leak allegedly stolen information. The post Dell Says Data Leaked by Hackers Is Fake appeared first on SecurityWeek.

Vulnerabilities Expose Helmholz Industrial Routers to Hacking

22 July 2025
Several potentially serious vulnerabilities were recently found and patched in routers made by Germany-based industrial and automation solutions provider Helmholz. The existence of the security holes came to light last week, when Germany’s CERT@VDE published an advisory describing eight vulnerabilities discovered in Helmholz’s REX 100 router, which enables organizations to remotely access and manage industrial […] The post Vulnerabilities Expose Helmholz Industrial Routers to Hacking appeared first on SecurityWeek.

Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access

22 July 2025
Cisco on Monday updated its advisory of a set of recently disclosed security flaws in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) to acknowledge active exploitation. "In July 2025, the Cisco PSIRT [Product Security Incident Response Team], became aware of attempted exploitation of some of these vulnerabilities in the wild," the company said in an alert. The

Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate

22 July 2025
Mexican organizations are still being targeted by threat actors to deliver a modified version of AllaKore RAT and SystemBC as part of a long-running campaign.  The activity has been attributed by Arctic Wolf Labs to a financially motivated hacking group called Greedy Sponge. It's believed to be active since early 2021, indiscriminately targeting a wide range of sectors, such as retail,

Darktrace Acquires Mira Security

22 July 2025
AI-powered cybersecurity company Darktrace has acquired network traffic visibility provider Mira Security. The post Darktrace Acquires Mira Security appeared first on SecurityWeek.

Security Leaders Discuss Qantas Breach

22 July 2025
Security leaders share their insights on the Qantas data breach.

Dior Says Personal Information Stolen in Cyberattack

22 July 2025
Dior says hackers accessed personal information in a January 2025 intrusion. No payment information was compromised. The post Dior Says Personal Information Stolen in Cyberattack appeared first on SecurityWeek.

How to Advance from SOC Manager to CISO?

22 July 2025
Making the move from managing a security operations center (SOC) to being a chief information security officer (CISO) is a significant career leap. Not only do you need a solid foundation of tech knowledge but also leadership skills and business smarts.  This article will guide you through the practical steps and skills you’ll need to nab an executive cybersecurity job and make the

UK Sanctions Russian Hackers Tied to Assassination Attempts

22 July 2025
The UK government has sanctioned three Russian APTs and 18 individuals for their involvement in cyber operations against Ukraine, NATO allies, and EU. The post UK Sanctions Russian Hackers Tied to Assassination Attempts appeared first on SecurityWeek.