Latest Cybersecurity News and Articles


Vulnerabilities Exposed Phone Number of Any Google User

10 June 2025
Google has awarded $5,000 to a researcher who found security holes that enabled brute-forcing the phone number of any user.  The post Vulnerabilities Exposed Phone Number of Any Google User appeared first on SecurityWeek.

Rare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprises

10 June 2025
The threat actor known as Rare Werewolf (formerly Rare Wolf) has been linked to a series of cyber attacks targeting Russia and the Commonwealth of Independent States (CIS) countries. "A distinctive feature of this threat is that the attackers favor using legitimate third-party software over developing their own malicious binaries," Kaspersky said. "The malicious functionality of the campaign

Whole Foods Distributor United Natural Foods Hit by Cyberattack

10 June 2025
United Natural Foods has taken some systems offline after detecting unauthorized activity on its IT systems, causing disruptions to operations. The post Whole Foods Distributor United Natural Foods Hit by Cyberattack appeared first on SecurityWeek.

CISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalog

10 June 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two critical security flaws impacting Erlang/Open Telecom Platform (OTP) SSH and Roundcube to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities in question are listed below - CVE-2025-32433 (CVSS score: 10.0) - A missing authentication for a critical

Chinese Hackers and User Lapses Turn Smartphones Into a ‘Mobile Security Crisis’

09 June 2025
Foreign hackers have increasingly identified smartphones, other mobile devices and the apps they use as a weak link in U.S. cyberdefenses. The post Chinese Hackers and User Lapses Turn Smartphones Into a ‘Mobile Security Crisis’ appeared first on SecurityWeek.

Chinese Espionage Crews Circle SentinelOne in Year-Long Reconnaissance Campaign

09 June 2025
Anti-malware vendor said it spent the past twelve months deflecting a stream of network reconnaissance probes from China-nexus threat actors The post Chinese Espionage Crews Circle SentinelOne in Year-Long Reconnaissance Campaign appeared first on SecurityWeek.

Harris-Walz Campaign Possibly Targeted in iPhone Cyberattack

09 June 2025
A cybersecurity firm believes an iPhone hacking campaign occurred and targeted 5 high-profile Americans. 

Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group

09 June 2025
The reconnaissance activity targeting American cybersecurity company SentinelOne was part of a broader set of partially-related intrusions into several targets between July 2024 and March 2025. "The victimology includes a South Asian government entity, a European media organization, and more than 70 organizations across a wide range of sectors," security researchers Aleksandar Milenkoski and Tom

Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks

09 June 2025
A now-patched critical security flaw in the Wazur Server is being exploited by threat actors to drop two different Mirai botnet variants and use them to conduct distributed denial-of-service (DDoS) attacks. Akamai, which first discovered the exploitation efforts in late March 2025, said the malicious campaign targets CVE-2025-24016 (CVSS score: 9.9), an unsafe deserialization vulnerability that

Guardz Banks $56M Series B for All-in-One SMB Security

09 June 2025
The Israeli company said the Series B raise was led by ClearSky and included equity stakes for new backer Phoenix Financial. The post Guardz Banks $56M Series B for All-in-One SMB Security appeared first on SecurityWeek.

Mirai Botnets Exploiting Wazuh Security Platform Vulnerability 

09 June 2025
CVE-2025-24016, a critical remote code execution vulnerability affecting Wazuh servers, has been exploited by Mirai botnets. The post Mirai Botnets Exploiting Wazuh Security Platform Vulnerability  appeared first on SecurityWeek.

React Native Aria Packages Backdoored in Supply Chain Attack

09 June 2025
A threat actor published backdoored versions of 17 NPM packages from GlueStack in a fresh supply chain attack. The post React Native Aria Packages Backdoored in Supply Chain Attack appeared first on SecurityWeek.

Malicious NPM Packages Disguised as Express Utilities Allow Attackers to Wipe Systems

09 June 2025
Two malicious NPM packages contain code that would delete production systems when triggered with the right credentials. The post Malicious NPM Packages Disguised as Express Utilities Allow Attackers to Wipe Systems appeared first on SecurityWeek.

Vulnerability Impacts Various Cloud Deployments of Cisco ISE

09 June 2025
A Cisco vulnerability could affect cloud deployments of Cisco Identity Services Engine (ISE) in certain systems. 

84% of Organizations Are Now Using AI in the Cloud

09 June 2025
Orca Security recently released the 2025 State of Cloud Security Report, finding that 84% of organizations now use AI in the cloud, and 62% of organizations have at least one vulnerable AI package.

iMessage Zero-Click Attacks Suspected in Targeting of High-Value EU, US Individuals

09 June 2025
iVerify links iPhone crashes to sophisticated zero-click attacks via iMessage targeting individuals involved in politics in the EU and US. The post iMessage Zero-Click Attacks Suspected in Targeting of High-Value EU, US Individuals appeared first on SecurityWeek.

⚡ Weekly Recap: Chrome 0-Day, Data Wipers, Misused Tools and Zero-Click iPhone Attacks

09 June 2025
Behind every security alert is a bigger story. Sometimes it’s a system being tested. Sometimes it’s trust being lost in quiet ways—through delays, odd behavior, or subtle gaps in control. This week, we’re looking beyond the surface to spot what really matters. Whether it’s poor design, hidden access, or silent misuse, knowing where to look can make all the difference. If you're responsible for

Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise

09 June 2025
You don’t need a rogue employee to suffer a breach. All it takes is a free trial that someone forgot to cancel. An AI-powered note-taker quietly syncing with your Google Drive. A personal Gmail account tied to a business-critical tool. That’s shadow IT. And today, it’s not just about unsanctioned apps, but also dormant accounts, unmanaged identities, over-permissioned SaaS

US Seeks Forfeiture of $7.74M in Cryptocurrency Tied to North Korean IT Workers

09 June 2025
The US is seeking the forfeiture of $7.74 million in cryptocurrency in frozen wallets tied to North Korean fake IT workers schemes. The post US Seeks Forfeiture of $7.74M in Cryptocurrency Tied to North Korean IT Workers appeared first on SecurityWeek.

Nigerian Involved in Hacking US Tax Preparation Firms Sentenced to Prison 

09 June 2025
Kingsley Uchelue Utulu has been sentenced to more than 5 years in prison for his role in a scheme that involved hacking, fraud and identity theft. The post Nigerian Involved in Hacking US Tax Preparation Firms Sentenced to Prison  appeared first on SecurityWeek.