French telecommunications giant Orange confirmed it suffered a significant cyberattack on Friday, July 25th, targeting one of its critical information systems. The incident has disrupted services for business customers and some consumer services, primarily affecting operations in France as the…
Author: IT Security News Bot
Chrome High-Severity Vulnerabilities Allow Memory Manipulation and Arbitrary Code Execution
Google has issued an urgent security update for its Chrome browser, patching several vulnerabilities, including a high-severity vulnerability that could allow attackers to manipulate memory and execute arbitrary code on a user’s system. The latest version, Chrome 138.0.7204.183 for Linux…
Lionishackers Threat Actors Exfiltrating and Selling Corporate Databases on Dark Web
A financially motivated threat actor known as Lionishackers has emerged as a significant player in the illicit marketplace for corporate data in recent months. Leveraging opportunistic targeting and a preference for Asian-based victims, the group employs automated SQL injection tools…
Why CISOs should rethink identity risk through attack paths
Identity-based attack paths are behind most breaches today, yet many organizations can’t actually see how those paths form. The 2025 State of Attack Path Management report from SpecterOps makes the case that traditional tools like identity governance, PAM, and MFA…
The food supply chain has a cybersecurity problem
It’s unsettling to think that our food supply chain could be targeted or that the safety of our food could be compromised. But this is exactly the challenge the agri-food sector is dealing with right now. Despite agriculture’s importance, cybersecurity…
Dropbox Passwords to shut down in 2025
Users of the cloud file storage service Dropbox have access to several related tools. One of those, Dropbox Passwords, is being shut down later this year. Dropbox introduced Passwords back in June […] Thank you for being a Ghacks reader.…
Boards shift focus to tech and navigate cautious investors
Corporate boards are adjusting to a more uncertain proxy landscape, according to EY’s 2025 Proxy Season Review. The report highlights four key 2025 proxy season trends shaping governance this year: more oversight of technology, fewer shareholder proposals (especially on sustainability),…
AI is here, security still isn’t
Although 79% of organizations are already running AI in production, only 6% have put in place a comprehensive security strategy designed specifically for AI. As a result, most enterprises remain exposed to threats they are not yet prepared to detect…
Threat Actors Attacking Fans and Teams of Belgian Grand Prix With Phishing Campaigns
Cybercriminals have launched a sophisticated multi-vector attack campaign targeting fans and teams ahead of the 2025 Belgian Grand Prix, scheduled for July 27 at the iconic Spa-Francorchamps circuit. The threat actors have deployed an arsenal of tactics including phishing emails,…
Chrome High-Severity Vulnerabilities Allows Memory Manipulation and Arbitrary Code Execution
Google has issued an urgent security update for its Chrome browser, patching several vulnerabilities, including a high-severity vulnerability that could allow attackers to manipulate memory and execute arbitrary code on a user’s system. The latest version, Chrome 138.0.7204.183 for Linux…
ISC Stormcast For Wednesday, July 30th, 2025 https://isc.sans.edu/podcastdetail/9548, (Wed, Jul 30th)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ISC Stormcast For Wednesday, July 30th, 2025…
AC isn’t blowing cold air? Consider these 5 quick fixes before calling a technician
Summer temperatures are climbing, but if your AC is pushing out warm air instead of a chill breeze, these quick fixes can help bring back the cold air you need. This article has been indexed from Latest news Read the…
Happy 10th birthday, Windows 10! Hoo boy, it’s been a journey
Part of the affection that users have for Windows 10 today is a result of Microsoft’s benign neglect of the OS since the debut of Windows 11. But remember those first five years? This article has been indexed from Latest…
Tea App Takes Messaging System Offline After Second Security Issue Reported
Tea has said about 72,000 images were leaked online in the initial incident, and another 59,000 images publicly viewable in the app from posts, comments and direct messages were also accessed. The post Tea App Takes Messaging System Offline After…
‘Sploitlight’ Vulnerability: How Hackers Bypassed Apple’s TCC Protections
Unpatched Apple devices remain exposed to Sploitlight, a macOS flaw that allows unauthorized access to private user data despite security measures. This article has been indexed from Security | TechRepublic Read the original article: ‘Sploitlight’ Vulnerability: How Hackers Bypassed Apple’s…
IT Security News Hourly Summary 2025-07-30 00h : 6 posts
6 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-07-29 22:2 : AI vs. AI: Prophet Security raises $30M to replace human analysts with autonomous defenders 21:33 : The Covert Operator’s Playbook: Infiltration of…
Surviving the Ransomware Gauntlet: A Test of Resilience
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Surviving the Ransomware Gauntlet: A Test of Resilience
Active Exploitation of Microsoft SharePoint Vulnerabilities: Threat Brief (Updated July 29)
Unit 42 has observed active exploitation of recent Microsoft SharePoint vulnerabilities. Here’s how you can protect your organization. The post Active Exploitation of Microsoft SharePoint Vulnerabilities: Threat Brief (Updated July 29) appeared first on Unit 42. This article has been…
The Lenovo ThinkBook G6 is a powerhouse for work and school, and it’s 70% off at Amazon
The Lenovo ThinkBook G6 is an excellent laptop for students and professionals, and right now, you can save over $1,500 on it at Amazon. This article has been indexed from Latest news Read the original article: The Lenovo ThinkBook G6…
CISA caves to Wyden, agrees to release US telco insecurity report – but won’t say when
The security nerds’ equivalent of the Epstein files saga The US Cybersecurity and Infrastructure Security Agency on Tuesday finally agreed to make public an unclassified report from 2022 about American telecommunications networks’ poor security practices.… This article has been indexed…